2013 4th International Conference on Intelligent Systems, Modelling and Simulation 2013
DOI: 10.1109/isms.2013.120
|View full text |Cite
|
Sign up to set email alerts
|

Interference Aware Adaptive Routing for CDMA Based Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 10 publications
0
5
0
Order By: Relevance
“…We considered all that the base stations and the users are equipped with single antenna. In this case, the SINR of i-th CU can be calculated as [20],…”
Section: System Modelmentioning
confidence: 99%
“…We considered all that the base stations and the users are equipped with single antenna. In this case, the SINR of i-th CU can be calculated as [20],…”
Section: System Modelmentioning
confidence: 99%
“…Interference is an important parameter to consider because if all the nodes transmit on same frequency band, the received power at the destination is affected by the amount of interference present in the environment [18]. In addition, thermal noise also degrades the performance of the link.…”
Section: Research Articlementioning
confidence: 99%
“…The interference at receiver is weighted sum of all the interfering nodes. The results show that the proposed solution provides better packet delivery and low routing overhead as compared to traditional OLSR routing The interference aware energy efficient routing (IAEE) algorithm proposed in [18] selects the routes which provide low interference to the data packet results in better routes as compared to MHC routing technique. In this technique source node selects the next hop which has lowest interference from all of its neighbors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The building block of edge computing-enabled 5G networks is infrastructure less network of wireless devices, in which, the devices act cooperatively to establish communication between a source and a destination [7]. These networks have applications in many real life scenarios such as military communication, rescue and emergency operations, conference rooms, and in the situation where infrastructure is not available or difficult to deploy [8]. On the other hand, the distributed nature of these networks imposes multiple challenges such as data privacy, network security, and detection and mitigation of malicious devices [9], [10].…”
Section: Introductionmentioning
confidence: 99%