2015
DOI: 10.17485/ijst/2015/v8is8/70530
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Routing Protocol for Discovering the Optimum Path in Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Many supervised learning algorithms such as MLP [19], CNN [20], LSTM [21,22], and unsupervised learning algorithms such as LDA [23], K-Harmonic Means [24], DBN [25] were presented for analyzing security threats. Machine learning has also been used to achieve the optimal network configuration considering resource allocation and scheduling [26], [27]. In [28], a semi-supervised learning algorithm (Q-learning) was used to dynamically adjust the appropriate number of resources for cloud computing, which has a better performance in resource management than other methods.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…Many supervised learning algorithms such as MLP [19], CNN [20], LSTM [21,22], and unsupervised learning algorithms such as LDA [23], K-Harmonic Means [24], DBN [25] were presented for analyzing security threats. Machine learning has also been used to achieve the optimal network configuration considering resource allocation and scheduling [26], [27]. In [28], a semi-supervised learning algorithm (Q-learning) was used to dynamically adjust the appropriate number of resources for cloud computing, which has a better performance in resource management than other methods.…”
Section: Related Work and Motivationmentioning
confidence: 99%
“…For this purpose, the joint problem of RA and UA are first formulated to maximize the data rate of MMTS and URFC users by considering the total system's power limitations and QoS constraints. The ruin strategy 37 is then employed to achieve the optimal UA solution via formulating the surplus energy in UAV cells and relay selection as shown in Figure 1. In this model, surplus energy can be determined as the total remaining energy for an UAV during the operational time.…”
Section: Introductionmentioning
confidence: 99%
“…However, conventional security mechanisms that provide confidentiality, integrity, and authentication are not capable of this type of protection [1] [2]. One of the major portions of the studies relevant to anonymous communications were so far related to analyzing routing algorithms with the aim of concealing actual paths from the transmitter well [3], [4]. It should be noted that, in spite of the fact that secure routing algorithms can greatly reduce path discovery attack, the enemy can gain important data via monitoring the link layer and the relevance between pairs of nodes, based on which it can identify the location and role of the base station [5] [6].…”
Section: -Introductionmentioning
confidence: 99%