An Exploration on the Internet Accessibility Optimization in Mobile Ad Hoc Networks (Manets) by Navigating Connectivity Challenges
Keywords:
Mobile ad hoc network, Internet Accessibility Optimization, Navigating Connectivity Challenges, Quality of Service, Bacteria for Aging Optimization Algorithm, Cluster HeadsAbstract
The escalating An autonomous configuration of mobile center points connected by far off connections without a focal center point is known as a mobile ad hoc network, or MANET. Mobile ad hoc networks (MANETs) are self-putting together, quickly deployable remote networks ideal for outside occasions, communications in areas without radio framework, crises, and military drills. Given the adaptability and dynamic nature of network geology, security might be the most weak part of the framework, powerless against assaults like as monitoring, manipulation, and application changes. More security blemishes than quality of service (QoS) exist in MANET. Therefore, it is advised to utilize interruption location, which controls the system to recognize other security weaknesses. It means quite a bit to check for disruptions to make a proper move and give additional protection from unapproved access. The capacity of a mobile center point to forward packs might be impacted by the deficiency of its power supply, which is dependent on the general existence of the system. This paper presents the application of the Bacteria for Aging Optimization Algorithm (BFOA) to give a trust-based got and energy-useful course algorithm in MANETs by finding the ideal leaps in directing advancement. The feathery clustering method is begun at first, and each Cluster Head (CH) is chosen in light of the worth of their strange, direct, and continuous trust. Moreover, regard centers were found in relation to trust levels. Additionally, the CHs partake in multi-hop guiding, and the planned convention decides the ideal course founded on lethargy, throughput, and association inside the course's limits.
Downloads
References
Amiri, E., & Hooshmand, R. (2019). Improving AODV with TOPSIS algorithm and fuzzy logic in VANETs. In 27th Iranian conference on electrical engineering (ICEE) (pp. 1367–1372).
Banoth Rajkumar and Gugulothu Narsimha “Secure multipath routing and data transmission in MANET,” Int. J. Networking and Virtual Organisations, vol. 16, no. 3, pp. 236-252,2016.
Chitkara, M. and Ahmad, M.W. (2014) Review on MANET: Characteristics, Challenges, Imperatives and Routing Protocols. International Journal of Computer Science and Mobile Computing, 3, 432-437.
El-Semary, A. M., & Diab, H. (2019). BP-AODV: Blackhole protected AODV routing protocol for MANETs. Based on Chaotic, 95211. https://doi.org/10.1109/ACCESS.2019.2928804
Goyal, M., Goyal, D., & Kumar, S. (2020). Dragon-AODV: Efficient ad hoc on-demand distance vector routing protocol using dragon fly algorithm. In Soft computing: Theories and applications. Advances in Intelligent Systems and Computing (vol. 1053). Singapore: Springer.
Jabbar, W. A., Ismail, M., & Nordin, R. (2017). Energy and mobility conscious multipath routing scheme for route stability and load balancing in MANETs. Simulation Modelling Practice and Theory, 77, 245–271.
Kumar S, Mehfuz S (2016) Efficient Fuzzy Logic Based Probabilistic broadcasting for mobile ad hoc network. Int J Comput Intell Syst 9(4):666–675
Liu, M. C., Shi, J. X., Li, Z., Li, C. X., Zhu, J., & Liu, S. X. (2017). Towards a better analysis of deep convolutional neural networks. IEEE Transactions on Visualization and Computer Graphics, 23(1), 91–100.
Ming, Y., Cao, S., Zhang, R., Li, Z., Chen, Y., Song, Y., & Qu, H. (2017). Understanding hidden memories of recurrent neural networks. In Proceedings of the IEEE conference on visual analytics science and technology (pp. 13–24).
R. Prasad and P. S. Shankar, ‘‘Efficient performance analysis of energy aware on demand routing protocol in mobile ad-hoc network,’’ Engineering Repots, vol. 2, no. 3, 2020.
S. Bharany et al., “Energy-Efficient Clustering Scheme for Flying Ad-Hoc Networks Using an Optimized LEACH Protocol,” Energies, vol.14, no.19, pp. 6016,2021.
U. Srilakshmi,“Energy-efficient heterogeneous optimization routing protocol for wireless sensor network,” Instrumentation Mesure Métrologie, vol.19,no. 5, pp. 391- 397,2020.
Verma, S. and Singh, P. (2014) Energy Efficient Routing in MANET: A Survey. International Journal of Engineering and Computer Science, 3, 3971-3977.
Wang, Z., Jiao, L., Chen, W., & Zhang, Y. (2019). A survey on visual analytics of big data in environmental monitoring. Journal of Cleaner Production, 238, 117869.
Zeiler, M. D., & Fergus, R. (2014). Visualizing and understanding convolutional networks. In D. Fleet, T. Pajdla, B. Schiele, & T. Tuytelaars (Eds.), Computer Vision–ECCV 2014. Lecture notes in Computer Science (vol. 8689, pp. 818–833). Cham: Springer.
Downloads
Published
How to Cite
Issue
Section
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.