期刊文献+
共找到9,621篇文章
< 1 2 250 >
每页显示 20 50 100
Modeling and Comprehensive Review of Signaling Storms in 3GPP-Based Mobile Broadband Networks:Causes,Solutions,and Countermeasures
1
作者 Muhammad Qasim Khan Fazal Malik +1 位作者 Fahad Alturise Noor Rahman 《Computer Modeling in Engineering & Sciences》 SCIE EI 2025年第1期123-153,共31页
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a... Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject. 展开更多
关键词 Signaling storm problems control signaling load analytical modeling 3GPP networks smart devices diameter signaling mobile broadband data access data traffic mobility management signaling network architecture 5G mobile communication
在线阅读 下载PDF
CC-OLIA:A dynamic congestion control algorithm for multipath QUIC in mobile networks
2
作者 Haoyu Wang Yang Liu +5 位作者 Zijun Li Yu Zhang Wenjing Gong Tao Jiang Ting Bi Jiaxi Zhou 《Digital Communications and Networks》 2025年第4期1180-1190,共11页
High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support s... High-quality services in today’s mobile networks require stable delivery of bandwidth-intensive network content.Multipath QUIC(MPQUIC),as a multipath protocol that extends QUIC,can utilize multiple paths to support stable and efficient transmission.The standard coupled congestion control algorithm in MPQUIC synchronizes these paths to manage congestion,meeting fairness requirements and improving transmission efficiency.However,current algorithms’Congestion Window(CWND)reduction approach significantly decreases CWND upon packet loss,which lowers effective throughput,regardless of the congestion origin.Furthermore,the uncoupled Slow-Start(SS)in MPQUIC leads to independent exponential CWND growth on each path,potentially causing buffer overflow.To address these issues,we propose the CC-OLIA,which incorporates Packet Loss Classifcation(PLC)and Coupled Slow-Start(CSS).The PLC distinguishes between congestion-induced and random packet losses,adjusting CWND reduction accordingly to maintain throughput.Concurrently,the CSS module coordinates CWND growth during the SS,preventing abrupt increases.Implementation on MININET shows that CC-OLIA not only maintains fair performance but also enhances transmission efficiency across diverse network conditions. 展开更多
关键词 MPQUIC mobile network Congestion control Packet loss Slow start
在线阅读 下载PDF
Environment-aware streaming media transmission method in high-speed mobile networks
3
作者 Jia Guo Jinqi Zhu +3 位作者 Xiang Li Bowen Sun Qian Gao Weijia Feng 《Digital Communications and Networks》 2025年第4期991-1005,共15页
With technological advancements,high-speed rail has emerged as a prevalent mode of transportation.During travel,passengers exhibit a growing demand for streaming media services.However,the high-speed mobile networks e... With technological advancements,high-speed rail has emerged as a prevalent mode of transportation.During travel,passengers exhibit a growing demand for streaming media services.However,the high-speed mobile networks environment poses challenges,including frequent base station handoffs,which significantly degrade wireless network transmission performance.Improving transmission efficiency in high-speed mobile networks and optimizing spatiotemporal wireless resource allocation to enhance passengers’media experiences are key research priorities.To address these issues,we propose an Adaptive Cross-Layer Optimization Transmission Method with Environment Awareness(ACOTM-EA)tailored for high-speed rail streaming media.Within this framework,we develop a channel quality prediction model utilizing Kalman filtering and an algorithm to identify packet loss causes.Additionally,we introduce a proactive base station handoffstrategy to minimize handoffrelated disruptions and optimize resource distribution across adjacent base stations.Moreover,this study presents a wireless resource allocation approach based on an enhanced genetic algorithm,coupled with an adaptive bitrate selection mechanism,to maximize passenger Quality of Experience(QoE).To evaluate the proposed method,we designed a simulation experiment and compared ACOTM-EA with established algorithms.Results indicate that ACOTM-EA improves throughput by 11%and enhances passengers’media experience by 5%. 展开更多
关键词 High-speed mobile networks Streaming media Environment-aware Kalman filtering Resource allocation
在线阅读 下载PDF
High dynamic mobile topology-based clustering algorithm for UAV swarm networks
4
作者 CHEN Siji JIANG Bo +2 位作者 XU Hong PANG Tao GAO Mingke 《Journal of Systems Engineering and Electronics》 2025年第4期1103-1112,共10页
Unmanned aerial vehicles(UAVs)have become one of the key technologies to achieve future data collection due to their high mobility,rapid deployment,low cost,and the ability to establish line-of-sight communication lin... Unmanned aerial vehicles(UAVs)have become one of the key technologies to achieve future data collection due to their high mobility,rapid deployment,low cost,and the ability to establish line-of-sight communication links.However,when UAV swarm perform tasks in narrow spaces,they often encounter various spatial obstacles,building shielding materials,and high-speed node movements,which result in intermittent network communication links and cannot support the smooth comple-tion of tasks.In this paper,a high mobility and dynamic topol-ogy of the UAV swarm is particularly considered and the high dynamic mobile topology-based clustering(HDMTC)algorithm is proposed.Simulation and real flight verification results verify that the proposed HDMTC algorithm achieves higher stability of net-work,longer link expiration time(LET),and longer node lifetime,all of which improve the communication performance for UAV swarm networks. 展开更多
关键词 unmanned aerial vehichle(UAV)swarm network UAV clustering mobilITY virtual tube.
在线阅读 下载PDF
Mobile Ad Hoc Network与Internet互联的技术研究 被引量:3
5
作者 胡中功 邹莉 沈斌 《武汉科技学院学报》 2005年第6期65-69,共5页
分析了移动IP和AODV协议的工作机理,对MANET与Internet互联的关键技术,包括协议转换、地址分配、网关发现、路由发现与数据传输等问题进行了详细的讨论,并对今后的研究工作进行了展望。
关键词 mobile AD HOC network Internet 移动IP AODV路由协议
在线阅读 下载PDF
A Minimum Cost Handover Algorithm for Mobile Satellite Networks 被引量:1
6
作者 张涛 张军 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2008年第3期269-274,共6页
For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this articl... For mobile satellite networks, an appropriate handover scheme should be devised to shorten handover delay with optimized application of network resources. By introducing the handover cost model of service, this article proposes a rerouting triggering scheme for path optimization after handover and a new minimum cost handover algorithm for mobile satellite networks. This algorithm ensures the quality of service (QoS) parameters, such as delay, during the handover and minimizes the handover costs. Simulation indicates that this algorithm is superior to other current algorithms in guaranteeing the QoS and decreasing handover costs. 展开更多
关键词 mobile satellite networks satellite handover REROUTING QOS
在线阅读 下载PDF
Adaptive and distance-driven power control scheme in mobile ad hoc networks
7
作者 陶军 刘莹 +2 位作者 肖鹏 朱利旻 陈文强 《Journal of Southeast University(English Edition)》 EI CAS 2013年第3期252-258,共7页
In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random... In order to save the energy and reduce the latency of the end-to-end transmission in mobile ad hoc networks an adaptive and distance-driven power control ADPC scheme is proposed by means of distance research in random geometrics. Through mathematical proof the optimal number of relay nodes and the optimal location of each node for data transmission can be obtained when a distance is given.In the ADPC first the source node computes the optimal number and the sites of the relay nodes between the source and the destination nodes.Then it searches feasible relay nodes around the optimal virtual relay-sites and selects one link with the minimal total transmission energy consumption for data transmission.Simulation results show that the ADPC can reduce both the energy dissipation and the end-to-end latency of the transmission. 展开更多
关键词 power control mobile ad hoc networks energyefficient route optimal virtual relay-site
在线阅读 下载PDF
Improved approach to enhanced Internet connectivity for mobile ad hoc networks
8
作者 沈斌 李波 石冰心 《Journal of Southeast University(English Edition)》 EI CAS 2007年第1期16-21,共6页
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks.... An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others. 展开更多
关键词 mobile ad hoc networks Internet connectivity gateway discovery unidirectional link broadcast storm
在线阅读 下载PDF
Machine Learning for 5G and Beyond:From ModelBased to Data-Driven Mobile Wireless Networks 被引量:12
9
作者 Tianyu Wang Shaowei Wang Zhi-Hua Zhou 《China Communications》 SCIE CSCD 2019年第1期165-175,共11页
During the past few decades,mobile wireless communications have experienced four generations of technological revolution,namely from 1 G to 4 G,and the deployment of the latest 5 G networks is expected to take place i... During the past few decades,mobile wireless communications have experienced four generations of technological revolution,namely from 1 G to 4 G,and the deployment of the latest 5 G networks is expected to take place in 2019.One fundamental question is how we can push forward the development of mobile wireless communications while it has become an extremely complex and sophisticated system.We believe that the answer lies in the huge volumes of data produced by the network itself,and machine learning may become a key to exploit such information.In this paper,we elaborate why the conventional model-based paradigm,which has been widely proved useful in pre-5 G networks,can be less efficient or even less practical in the future 5 G and beyond mobile networks.Then,we explain how the data-driven paradigm,using state-of-the-art machine learning techniques,can become a promising solution.At last,we provide a typical use case of the data-driven paradigm,i.e.,proactive load balancing,in which online learning is utilized to adjust cell configurations in advance to avoid burst congestion caused by rapid traffic changes. 展开更多
关键词 mobile WIRELESS networks DATA-DRIVEN PARADIGM MACHINE learning
在线阅读 下载PDF
Neural Network-Based Adaptive Motion Control for a Mobile Robot with Unknown Longitudinal Slipping 被引量:9
10
作者 Gang Wang Xiaoping Liu +1 位作者 Yunlong Zhao Song Han 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2019年第4期26-34,共9页
When the mobile robot performs certain motion tasks in complex environment, wheel slipping inevitably occurs due to the wet or icy road and other reasons, thus directly influences the motion control accuracy. To addre... When the mobile robot performs certain motion tasks in complex environment, wheel slipping inevitably occurs due to the wet or icy road and other reasons, thus directly influences the motion control accuracy. To address unknown wheel longitudinal slipping problem for mobile robot, a RBF neural network approach based on whole model approximation is presented. The real-time data acquisition of inertial measure unit(IMU), encoders and other sensors is employed to get the mobile robot’s position and orientation in the movement, which is applied to compensate the unknown bounds of the longitudinal slipping using the adaptive technique. Both the simulation and experimental results prove that the control scheme possesses good practical performance and realize the motion control with unknown longitudinal slipping. 展开更多
关键词 mobile robot Longitudinal slipping RBF neural network ADAPTIVE control
在线阅读 下载PDF
Multi-agent cooperative intrusion response in mobile adhoc networks 被引量:6
11
作者 Yi Ping Zou Futai +1 位作者 Jiang Xinghao Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期785-794,共10页
The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- s... The nature of adhoc networks makes them vulnerable to security attacks. Many security technologies such as intrusion prevention and intrusion detection are passive in response to intrusions in that their countermea- sures are only to protect the networks, and there is no automated network-wide counteraction against detected intrusions, the architecture of cooperation intrusion response based multi-agent is propose. The architecture is composed of mobile agents. Monitor agent resides on every node and monitors its neighbor nodes. Decision agent collects information from monitor nodes and detects an intrusion by security policies. When an intruder is found in the architecture, the block agents will get to the neighbor nodes of the intruder and form the mobile firewall to isolate the intruder. In the end, we evaluate it by simulation. 展开更多
关键词 computer networks SECURITY mobile agent mobile adhoc networks intrusion detection intrusion response
在线阅读 下载PDF
Distributed intrusion detection for mobile ad hoc networks 被引量:7
12
作者 Yi Ping Jiang Xinghao +1 位作者 Wu Yue Liu Ning 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期851-859,共9页
Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, and lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. A distributed intrusion detection approach based on timed automata is given. A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then the timed automata is constructed by the way of manually abstracting the correct behaviours of the node according to the routing protocol of dynamic source routing (DSR). The monitor nodes can verify the behaviour of every nodes by timed automata, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, the approach is much more efficient while maintaining the same level of effectiveness. Finally, the intrusion detection method is evaluated through simulation experiments. 展开更多
关键词 mobile ad hoc networks routing protocol SECURITY intrusion detection timed automata.
在线阅读 下载PDF
Node Coverage Algorithms in Wireless Sensor Networks Using Mobile Agents 被引量:9
13
作者 RAINA Manik KUMAR Subhas PATRO Ranjeet 《自动化学报》 EI CSCD 北大核心 2006年第6期915-921,共7页
This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of g... This paper proposes fault tolerant algorithms for routing mobile agents in a single channel wireless sensor network which cover every node in the network. These algorithms use local knowledge (assume no knowledge of global deployment or topology, etc). We propose the algorithms and show mathematical analysis to support our claims. The paper ends with simulation studies and discussion of results. 展开更多
关键词 Wireless sensor networks mobile agents
在线阅读 下载PDF
Trust-Based Context-Aware Mobile Social Network Service Recommendation 被引量:4
14
作者 XU Jun ZHONG Yuansheng +1 位作者 ZHU Wenqiang SUN Feifei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期149-156,共8页
The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, M... The service recommendation mechanism as a key enabling technology that provides users with more proactive and personalized service is one of the important research topics in mobile social network (MSN). Meanwhile, MSN is susceptible to various types of anonymous information or hacker actions. Trust can reduce the risk of interaction with unknown entities and prevent malicious attacks. In our paper, we present a trust-based service recommendation algorithm in MSN that considers users' similarity and friends' familiarity when computing trustworthy neighbors of target users. Firstly, we use the context information and the number of co-rated items to define users' similarity. Then, motivated by the theory of six degrees of space, the friend familiarity is derived by graph-based method. Thus the proposed methods are further enhanced by considering users' context in the recommendation phase. Finally, a set of simulations are conducted to evaluate the accuracy of the algorithm. The results show that the friend familiarity and user similarity can effectively improve the recommendation performance, and the friend familiarity contributes more than the user similarity. 展开更多
关键词 TRUST CONTEXT-AWARE mobile social network RECOMMENDATION
原文传递
A quality of service routing protocol based on mobility prediction in mobile ad hoc networks 被引量:5
15
作者 王建新 邓曙光 +1 位作者 陈松乔 陈建二 《Journal of Central South University of Technology》 2003年第1期53-57,共5页
A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the ... A QoS routing protocol based on mobility prediction is proposed. The protocol selects the steadiest path based on mobility prediction and QoS requirements on bandwidth, delay, and so forth. The main properties of the protocol as follows. (1) Each node just broadcasts its own information, so the packet is very small and can get to the destination in a very short time. (2) When another path is built for the same QoS requirements, the original path has higher priority. (3) The update messages are reduced by using mobility prediction. (4) Data packets carry the information of link change using piggyback, which is helpful for forecasting the link status more accurately. (5) When source node gets Resource Reserve and reconnect packets at the same time, it selects reconnect packet over Resource Reserve packet. The results of simulation show that the protocol has good network performance with low control overload, and efficiently supports transmitting multimedia with QoS requirements in mobile ad hoc networks. 展开更多
关键词 mobile ad HOC networks PREDICTION QoS ROUTING
在线阅读 下载PDF
Node deployment strategy optimization for wireless sensor network with mobile base station 被引量:7
16
作者 龙军 桂卫华 《Journal of Central South University》 SCIE EI CAS 2012年第2期453-458,共6页
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica... The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends. 展开更多
关键词 wireless sensor network mobile base station network optimization energy consumption balancing density ratio of sensor node network lifetime
在线阅读 下载PDF
An Asynchronous Clustering and Mobile Data Gathering Schema Based on Timer Mechanism in Wireless Sensor Networks 被引量:8
17
作者 Jin Wang Yu Gao +2 位作者 Wei Liu Wenbing Wu Se-Jung Lim 《Computers, Materials & Continua》 SCIE EI 2019年第3期711-725,共15页
Recently,Wireless sensor networks(WSNs)have become very popular research topics which are applied to many applications.They provide pervasive computing services and techniques in various potential applications for the... Recently,Wireless sensor networks(WSNs)have become very popular research topics which are applied to many applications.They provide pervasive computing services and techniques in various potential applications for the Internet of Things(IoT).An Asynchronous Clustering and Mobile Data Gathering based on Timer Mechanism(ACMDGTM)algorithm is proposed which would mitigate the problem of“hot spots”among sensors to enhance the lifetime of networks.The clustering process takes sensors’location and residual energy into consideration to elect suitable cluster heads.Furthermore,one mobile sink node is employed to access cluster heads in accordance with the data overflow time and moving time from cluster heads to itself.Related experimental results display that the presented method can avoid long distance communicate between sensor nodes.Furthermore,this algorithm reduces energy consumption effectively and improves package delivery rate. 展开更多
关键词 Internet of things wireless sensor networks CLUSTERING mobile data collection timer.
在线阅读 下载PDF
Anonymous multipath routing protocol based on secret sharing in mobile ad hoc networks 被引量:2
18
作者 Siguang Chen Meng Wu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2011年第3期519-527,共9页
Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of secu... Because the intrinsic characteristics of mobile ad hoc networks(MANETs) cause several vulnerabilities,anonymous routing protocols attract much more attention in secure mobile ad hoc networks for the purposes of security and privacy concerns.Until recently,lots of anonymous routing protocols have been proposed.However,most of them are single path or use one path at a time,and the multipath schemes can not thwart both the passive attacks and active attacks simultaneously.Thus an anonymous multipath routing protocol based on secret sharing is proposed.The protocol provides identity anonymity,location anonymity,data and traffic anonymity by employing cryptograph technology and secret sharing in MANET communication process.Meanwhile,a hash function is introduced to detect active attacks in the data transmission process.The protocol can effectively thwart various passive attacks and reduce the successful probability of active attacks(such as interception and physical destroy attacks).Simulation results show that the proposed scheme provides a reasonably good level of network security and performance. 展开更多
关键词 multipath routing secret sharing CRYPTOGRAPHY ANONYMITY SECURITY mobile ad hoc network(MANET).
在线阅读 下载PDF
Mobile Network Computer Can Better Describe The Future of Information Society 被引量:1
19
作者 Zhaoming Guo Yi Jiang Shihua Bi 《China Communications》 SCIE CSCD 2016年第12期90-96,共7页
In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, ... In the paper, we illustrate the importance of the concept of mobile network computer from a technological perspective. Because of the usefulness of mobile network computers, with the growth of the Internet of things, mobile network computers may include not only TV box audio-visual equipment, wireless household appliances, and mobile communication equipment, but may also include devices such as intelligent foot rings, smart watches, smart glasses, smart shoes and smart coats. Considering the different types of networks, e.g. IP multimedia Subsystem(IMS), we explain why some network elements are inaccurate and misleading from a technological perspective. We aim to popularize the concept of mobile network computers for its accuracy and importance, which better define modern mobile terminals and reflects the nature of multiple mobile terminals based on the structure of their integrated computers and the capabilities of processing multimedia. In the computer and Internet age, network computers and mobile network computers are the main terminals of fixed and mobile networks, respectively. Therefore, based on the concept of mobile network computers, we discuss the future of information society. 展开更多
关键词 mobile computer network mobile network computer mobile communication network WAP IMS
在线阅读 下载PDF
Link reliability based hybrid routing for tactical mobile ad hoc network 被引量:2
20
作者 Xie Xiaochuan Wei Gang +2 位作者 Wu Keping Wang Gang Jia Shilou 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第2期259-267,共9页
Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network... Tactical mobile ad hoc network (MANET) is a collection of mobile nodes forming a temporary network, without the aid of pre-established network infrastructure. The routing protocol has a crucial impact on the network performance in battlefields. Link reliability based hybrid routing (LRHR) is proposed, which is a novel hybrid routing protocol, for tactical MANET. Contrary to the traditional single path routing strategy, multiple paths are established between a pair of source-destination nodes. In the hybrid routing strategy, the rate of topological change provides a natural mechanism for switching dynamically between table-driven and on-demand routing. The simulation results indicate that the performances of the protocol in packet delivery ratio, routing overhead, and average end-to-end delay are better than the conventional routing protocol. 展开更多
关键词 tactical mobile ad hoc networks hybrid routing link reliability edge weight.
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部