2013
DOI: 10.5120/12718-9540
|View full text |Cite
|
Sign up to set email alerts
|

Performance Evaluation of Reactive and Proactive Routing Protocols over MANET

Abstract: Mobile devices are the fundamental requirement of communication network where user wants to freely move without breaking the signal. The Mobile devices today are capable enough to communicate independently. A Mobile Ad Hoc Network (MANET) is a group of wireless mobile nodes which can communicate without any pre-existing infrastructure by creating dynamic network. This paper discuss Mobile Ad-Hoc Network (MANET) environment with the varying number of nodes. The research presents the three reactive routing proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…A novel method [64] was constituted with three predictive models for attack type, attack region, and weapon type prediction. Six supervised machine learning classifiers were fitted on the data set which includes support vector machine (SVM) [13], Artificial Neural Networks (ANN), Naïve Bayes (NB) [12], Random Forest (RF) [59], REP Tree [69], and J48 [70]. The data set contains only information about terrorist attacks that happened during the session 2013-2016 over the world and the agreement of attacks over the data set is tested by Cohen's kappa method [71].…”
Section: Terrorist Attack Prediction Methodsmentioning
confidence: 99%
“…A novel method [64] was constituted with three predictive models for attack type, attack region, and weapon type prediction. Six supervised machine learning classifiers were fitted on the data set which includes support vector machine (SVM) [13], Artificial Neural Networks (ANN), Naïve Bayes (NB) [12], Random Forest (RF) [59], REP Tree [69], and J48 [70]. The data set contains only information about terrorist attacks that happened during the session 2013-2016 over the world and the agreement of attacks over the data set is tested by Cohen's kappa method [71].…”
Section: Terrorist Attack Prediction Methodsmentioning
confidence: 99%
“…After designing models with compressed data, the accuracy of the trained models with compressed data was compared to the accuracy of the trained models with original data. Numerous models employing a variety of categorization techniques (Bayesian Network K2 [28], Bayesian Network TAN [29], J48 decision tree [30], K-Nearest Neighbor [31], Naive Bayes [32], Random Forest [33] and Simple Logistic Regression [34]) have been created in order to study the behavior of each.…”
Section: A: Hill Climbingmentioning
confidence: 99%
“…Te anxious branch is a clear indication that any potential feature relevance should be discounted [17]. Tis classifer is considered the best among the six methods due to its widespread use and construction on information entropy [18]. With this approach, each aspect of the data might be used to break it down into smaller components, such as tree root nodes.…”
Section: Decision Trees Classifer (J48)mentioning
confidence: 99%