2016
DOI: 10.1007/s11276-015-1186-7
|View full text |Cite
|
Sign up to set email alerts
|

Moralism: mobility prediction with link stability based multicast routing protocol in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(23 citation statements)
references
References 24 publications
0
21
0
Order By: Relevance
“…This resulting network is referred to as a hybrid wireless network. Due to the dynamic nature of such network, quite often computational intelligence approaches such as fuzzy logic systems [5][6][7] and evolutionary computing could be applied to optimization in hybrid wireless networks. In this paper, we are interested in applying evolutionary computing (artificial bee colony) to Vehicular ad Hoc Network (VANET).…”
Section: Introductionmentioning
confidence: 99%
“…This resulting network is referred to as a hybrid wireless network. Due to the dynamic nature of such network, quite often computational intelligence approaches such as fuzzy logic systems [5][6][7] and evolutionary computing could be applied to optimization in hybrid wireless networks. In this paper, we are interested in applying evolutionary computing (artificial bee colony) to Vehicular ad Hoc Network (VANET).…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, some methods are proposed to design the routing algorithms considering the high mobility of FANETs. In order to adapt the routing algorithms to dynamic topologies in FANETs, some researches focus on the prediction technique [12] and the idea of distance vector routing protocols [13] to design the routing algorithms for FANETs. Sugranes and Razi [14] proposed an optimal routing method based on Dijkstra's shortest path algorithm (OR-DSP) and prediction technique for UAV networks with queued communication systems by incorporating predicted network topology.…”
Section: Related Workmentioning
confidence: 99%
“…We define the end if (8) end for (9) for each node j ∈ A(S t i ) do (10) Uses (5) and (11) to compute q ij and r ij ; (11) end for (12) Uses (7) 6 Mobile Information Systems termination time υ k T to be the stopping time when packet k is terminated within delay constraint and υ k s to be the stopping timeout of delay threshold. e notation μ k,n denotes the transmission gain when the packet k is transmitted at slot n, and μ k,n < ∞.…”
Section: Algorithm Analysismentioning
confidence: 99%
“…The fundamental idea behind considering link stability is to facilitate a protocol to select those channels that persist for longer periods. Link stability can be evaluated using parameters like the relative mobility of the nodes sharing the link, received power, the energy of nodes, signal to interference and noise ratio (SINR), congestion on the link, and bandwidth of the link. Authors in present a stable path metric called expected transmission count (ETX), which searches high‐throughput routes for data transmission.…”
Section: Related Work/backgroundmentioning
confidence: 99%