Survey on evolutionary computation methods for cybersecurity of mobile ad hoc networks
In this paper, a comprehensive survey of evolutionary computation (EC) methods for
cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are …
cybersecurity of mobile ad hoc networks (MANETs) is presented. Typically, EC methods are …
[PDF][PDF] Research Article Multi-model Bio-cryptographic Authentication in Cloud Storage Sharing for Higher Security
P Selvarani, P Visu - Research Journal of Applied Sciences …, 2015 - researchgate.net
To achieve data storage security in cloud, bio cryptography techniques can be used. This
study presents Personal identification using fingerprint and Iris biometric technology. Usually …
study presents Personal identification using fingerprint and Iris biometric technology. Usually …
Clustering algorithm for AODV routing protocol based on artificial bee colony in MANET
A Rattrout, A Yasin, M Abu-Zant, M Yasin… - Proceedings of the 2nd …, 2018 - dl.acm.org
One of the most important challenges that MANET face is how to connect nodes together
also how to adapt the dynamically changes in the network topology. A novel clustering …
also how to adapt the dynamically changes in the network topology. A novel clustering …
Modified artificial bee colony (abc) algorithm using dynamic technique
MS Beg, AA Waoo - Asian Journal of Electrical Sciences, 2021 - ajesjournal.org
Abstract The artificial Bee Colony Algorithm is a maximum optimization technique. It has
been used in various research papers. In this paper, the dynamic technique has been used …
been used in various research papers. In this paper, the dynamic technique has been used …
[PDF][PDF] Efficient Neighbor Routing in Wireless Mesh Networks
ABSTRACT Wireless Mesh Network (WMN) is a rising technology in the wireless field and
has the advanced features like self-healing, self-configuring, low deployment cost, easy …
has the advanced features like self-healing, self-configuring, low deployment cost, easy …
My way—Routing in multi hop heterogenous wireless sensor networks using straight line algorithm. V2
Straightline routing v2 algorithm is one of the optimized proposed model to route the data
packets efficiently in multi hop heterogeneous Wireless sensor networks. Due to the …
packets efficiently in multi hop heterogeneous Wireless sensor networks. Due to the …
[PDF][PDF] Research Article DYBACON: An Auditor for Secure Kinetic Cloud Storage
GS Priyatharsini, P Visu - Research Journal of Applied Sciences …, 2015 - researchgate.net
Cloud computing is a significant shift of computational paradigm where computing as a utility
and storing data remotely have a great potential. Cloud server provides a low cost, flexible …
and storing data remotely have a great potential. Cloud server provides a low cost, flexible …