2014
DOI: 10.5755/j01.eee.20.3.3421
|View full text |Cite
|
Sign up to set email alerts
|

Bee-MANET: A New Swarm-based Routing Protocol for Wireless Ad Hoc Networks

Abstract: Recently, mobile ad hoc networks (MANETs) have drawn attention by many researchers due to the development of portable devices and wireless network appliances have accounted for ad hoc networks. Many academic researchers have shown great interest in ad hoc networks for twenty years. One of the main fields adopted by researchers studying on Mobile Ad-hoc Networks is to develop routing protocols in wireless systems. Routing protocol development is related to complexity, scalability, adaptability, productivity, an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 14 publications
0
4
0
1
Order By: Relevance
“…Esses processos são conhecidos como estigmergia [18]. O SARA [19] e o Bee-MANET [20] são exemplos de protocolos baseados em formigas e em abelhas, respectivamente.…”
Section: B Roteamento Bioinspiradounclassified
“…Esses processos são conhecidos como estigmergia [18]. O SARA [19] e o Bee-MANET [20] são exemplos de protocolos baseados em formigas e em abelhas, respectivamente.…”
Section: B Roteamento Bioinspiradounclassified
“…In this subsection, Box-Jenkins gas furnace problem that consists of a data set including input-output measurements of 296 pairs is used to obtain a fuzzy rule based model [10], [11], [24], [33]- [43]. The process has a single input u(t) (gas flow rate) and a single output y(t) (CO2 concentration).…”
Section: B Box-jenkins Gas Furnace Problemmentioning
confidence: 99%
“…The major aim of technique, consequently, is used to increase the routing network characteristics through the condition of suitable detail to the disjointed network areas. For this method, consider that there are huge amount of data packets sharing on stable paths [3]. The data packets are challenging for proceeds so individual method to actively objectivity the network area in the buffer storage according to the packet jamming demand pattern for every area on the data packet's transmitting route [4].…”
Section: Introductionmentioning
confidence: 99%