Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Sunil Taneja and Ashwani Kush, “A Survey of Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010, ISSN: 2010-0248.
    2. Alex Hinds, Michael Ngulube, Shaoying Zhu, and Hussain Al-Aqrabi, “Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET),” International Journal of Information and Education Technology, Vol. 3, No. 1, February 2013, DOI: 10.7763/.
    3. Wei-Shen Lai,, Chu-Hsing Lin, Jung-Chun Liu, YenLin Huang, Mei-Chun Chou,” I-SEAD: A Secure Routing Protocol for Mobile Ad Hoc Networks” IJOMUE, Vol.3, No.4, October 2008.
    4. Peyman Arebi, “A New Method for Restoration Broken Links in Wireless Ad-hoc Networks by Estimation Energy Consumption” IEEE Fourth International Conference on Computational Intelligence, Communication Systems and Networks, 2012.
    5. Chen, B. Jamieson, K., Balkrishnan, Morris, R.(2002) “Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks”Kluwer Academic Publishers,Vol. 8, pp. 481- 494.
    6. Hajj, El,W., Fuqaha, Al,A., Guizani, M., (2009) “On efficient network planning and routing in large scale Manet”, IEEE Transaction On Vehicular Technology, Vol. 58 Issue 7, pp.3796-3801.
    7. Liu, W.,Zhang, C., Yao,G.,Fang, Y.(2011) “DELAR: A Device-Energy-Load Aware Relaying Framework for Heterogeneous Mobile Ad Hoc Networks” IEEE journal on selected areas in communications,Vol. 29 Issue 8, pp.1572- 1584.
    8. (Raja ram, A. Dr. and Sugesh, J. (2011),“Power Aware Routing for MANET Using Ondemand Multipath Routing Protocol”. IJCSI International Journal of Computer Science,Vol. 8 Issue 2, pp. 517-522.)

Recent Article