2013
DOI: 10.1007/s00607-013-0310-8
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive routing protocol for mobile ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
2
2

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…As its name implies, AntOR-v2 [ 21 ] is derived from the protocol AntOR (more specifically of AntOR-DLR), although there are important differences, namely: control packet buffering, obsolete route management, management of sending failures and removal of the virtual pheromone in the maintenance of established routes and the exploration of new routes phase. these differences are discussed in detail.…”
Section: Antor Protocol Familymentioning
confidence: 99%
“…As its name implies, AntOR-v2 [ 21 ] is derived from the protocol AntOR (more specifically of AntOR-DLR), although there are important differences, namely: control packet buffering, obsolete route management, management of sending failures and removal of the virtual pheromone in the maintenance of established routes and the exploration of new routes phase. these differences are discussed in detail.…”
Section: Antor Protocol Familymentioning
confidence: 99%
“…Nodes that taking part in the competitive of cluster head are regarded as the input vector to the forward subnetwork, where the remaining energy of nodes, the number of node's neighbors,the distance from nodes to the base station nodes work as the element of input vector. Then select the most suitable cluster head node through adaptive learning capability of Hamming network [7]. In the data transfer phase,use a function related to the residual energy of cluster head neighbor node and the distance between the cluster heads to select the maximum function value of the neighbor nodes, Nodes that need to pass data transport information to the neighbor nodes, in addition, low node density areas in the network also need to set up intermediate nodes being responsible for forwarding data.…”
Section: Leach Protocol Optimal Design Based On Hamming Networkmentioning
confidence: 99%