Most of the existing VANET routing protocols rely on information collected from beacons for making routing decisions such as next neighbor selection. Beacons are very small size hello messages that each vehicle broadcasts periodically. Owing to very small payload size of beacons as compared to the payload size of a data message, they can easily pass through even very weak links, through which a data message could never pass. Therefore, the use of beacon information for making routing decisions in a highly dynamic scenario such as VANETs may cause selection of routes through which data message can never be sent. Several researchers have given solutions that do not use beacon information for making routing decisions. But most of these solutions incorporate a large number of broadcasts to forward the data packets, causing wastage of bandwidth. In this paper, we present a beacon information independent geographic routing algorithm called BIIR, which reduces the number of broadcasts to forward the data packets by making intelligent use of information collected by the vehicle during previous route discovery attempts for a destination. Our simulation results have shown that the proposed algorithm outperforms the existing beacon less routing protocols in terms of the average number of broadcasts per data packet forwarding, packet delivery ratio and end to end delay experienced by the data messages.
The Routing Protocol available in prese MANET focuses mainly on the performance a capability against the malicious attacks. The for security issue in MANET is to protect the netw malicious attacks, thereby identifying and prev nodes. The selection of optimal path for routing and security attacks cannot be achieved with the traditi Even though there are many secure routing proto the optimal route discovery and defense against d attacks, they focuses mainly on specific objects an to defend against the particular attacks. Sinc environment is highly dynamic in nature, managin kind of environment is highly crucial as well as operation for building a safe and secure route is proposed protocol ensures the trust among the nod and isolates the malicious node from the network by cooperative movement.
Index Term -MANET (Mobile Ad-hoc Networks attacks, AODV routing protocol, TMS (Trust ManaCognitive, Social Networks, Reputation.
In this study, we propose an inventory model for a differential item, units of which are not in perfect conditions, sold from two-shops-primary and secondary shop, under one management is formulated with stock-dependent demand rate and inflation. Initially, items are purchased in lots and received at the primary shop with an infinite rate of replenishment, then perfect and defective units are separated, only the perfect/ good units are sold from the primary with a profit and its demand is a deterministic linear function of current stock level. The defective units spotted at the time of selling of the good products from the lot are transferred continuously to the adjacent secondary shop for sale at a reduced price and demand for these units is linearly proportional to the selling price. In both shops, shortages are allowed. In this study, there are three scenarios depending upon the time of occurrence of shortages at the shops. At the secondary shop, the time of shortages occurs: (1) exactly at the same time or (2) before or (3) after the time of shortages at the primary shop. In each case under each scenario, profit is maximized and optimum order quantities are evaluated using the computer algorithm based on a gradient method. Finally, a numerical example and sensitivity analysis is used to study the behavior of the model.
In this paper, a deterministic inventory model for deteriorating items with two warehouses and shortages is developed. It is observed that in supermarkets, the demand rate is usually influenced by the amount of the stock level, i.e., the demand rate may go up or down with the on-hand inventory level. Influenced by this, we develop a model where the demand is dependent on the present stock level. Trade credit is provided to the customer to attract them and boost up the demand. A rented warehouse (RW) is used when the ordering quantity exceeds the limited capacity of the own warehouse. Due to different storage conditions, deterioration rate in two warehouses may be different. In addition, shortages are neither completely backlogged nor completely lost assuming the backlogging rate to the inversely proportional to the waiting time for the next replenishment. The associated cost minimisation is illustrated by numerical example and also its sensitivity analysis is carried out by using Mathematica-5.2 for the feasibility and applicability of our model.
Keywords:two-warehouse inventory model; shortage; stock-dependent demand rate; time-dependent partial backlogging rate; permissible delay in payments.
S.R. Singh et al.Reference to this paper should be made as follows: Singh, S.R., Kumari, R. and Kumar, N. (2011) 'A deterministic two warehouse inventory model for deteriorating items with stock-dependent demand and shortages under the conditions of permissible delay', Int.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.