2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN) 2014
DOI: 10.1109/wocn.2014.6923074
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Ad-Hoc Network (MANET) for disaster management

Abstract: Information technology plays an important role in facilitating disaster management and allowing planners for a more efficient disaster handling. Climate change can reasonably be expected to increase countries' vulnerability to natural hazards in future. We are already witnesses of extreme meteorological phenomena, such as expanded fires and floods. This paper gives Mobile Ad-Hoc Network (MANET) along with Dynamic Source Routing protocol (DSR). Simulation results for performance measurement of DSR algorithm for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 6 publications
(4 reference statements)
0
9
0
Order By: Relevance
“…The complexity of this estimator (THEO) is ( ) 3 O N . This high computational cost precludes the use of this optimal estimator in real-time applications.…”
Section: Discussionmentioning
confidence: 99%
“…The complexity of this estimator (THEO) is ( ) 3 O N . This high computational cost precludes the use of this optimal estimator in real-time applications.…”
Section: Discussionmentioning
confidence: 99%
“…Mobile ad hoc network [1] is a group of wireless mobile nodes in which nodes collaborate by forwarding packets for each other to allow them to communicate outside range of direct wireless transmission. The network topology is unpredictable and can vary over time.…”
Section: A Mobile Ad-hoc Network (Manet)mentioning
confidence: 99%
“…It is observed that the performance of the network after application of prevention condition is nearly same as the normal performance. The performance is evaluated in terms of Network Throughput, Packet Delivery Ratio, and Average end to end delay [12]. Dixit et al proposed a novel intrusion detection system for detecting black hole attack and gray hole attack which is based on table driven approach using Ad hoc on demand routing protocol and on the basis of behavior of node the computation of the vote for node and negative voting trunk the node from path nodes create a secure path using highest vote number, in this work simulation done on NS-2.35, result shows that network performance increased by the proposed principle.…”
Section: Related Workmentioning
confidence: 99%