All

What are you looking for?

All
Projects
Results
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Optimized image processing and clustering to mitigate security threats in mobile ad hoc network

The result's identifiers

  • Result code in IS VaVaI

    <a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216275%3A25410%2F20%3A39916702" target="_blank" >RIV/00216275:25410/20:39916702 - isvavai.cz</a>

  • Result on the web

    <a href="http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/13914" target="_blank" >http://journal.uad.ac.id/index.php/TELKOMNIKA/article/view/13914</a>

  • DOI - Digital Object Identifier

    <a href="http://dx.doi.org/10.12928/TELKOMNIKA.v18i1.13914" target="_blank" >10.12928/TELKOMNIKA.v18i1.13914</a>

Alternative languages

  • Result language

    angličtina

  • Original language name

    Optimized image processing and clustering to mitigate security threats in mobile ad hoc network

  • Original language description

    Since there are provisions of many attributes that are not possible or difficult to follow by networks conventionally, mobile ad-hoc networks are extensively deployed. This application starts through the defense sectors, the sensory node presents in the hostile territories down to the gadgets for congestion communication in traffic by general transportation when travelling for adequate provision of infrastructure during disaster recovery. As a lot of importance related to (mobile ad hoc network) MANET application, one important factor in ad-hoc networks is security. Using image processing for securing MANET is the area of focus of this research. Therefore, in this article, the security threats are assessed and representative proposals are summarized in ad-hoc network&apos;s context. The study reviewed the current situation of the art for original to security provision called mobile ad hoc network for wireless networking. The threats to security are recognized while the present solution is observed. The study additionally summarized education erudite, talks on general issues and future instructions are recognized. Also, in this study, the forecast weighted clustering algorithm (FWCA) is employed as a cluster head over weighted clustering algorithm (WCA) is examined as quality in cluster-based routing, service is highly significant with MANET.

  • Czech name

  • Czech description

Classification

  • Type

    J<sub>SC</sub> - Article in a specialist periodical, which is included in the SCOPUS database

  • CEP classification

  • OECD FORD branch

    10201 - Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8)

Result continuities

  • Project

  • Continuities

    I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace

Others

  • Publication year

    2020

  • Confidentiality

    S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů

Data specific for result type

  • Name of the periodical

    Telkomnika

  • ISSN

    1693-6930

  • e-ISSN

  • Volume of the periodical

    18

  • Issue of the periodical within the volume

    1

  • Country of publishing house

    ID - INDONESIA

  • Number of pages

    9

  • Pages from-to

    476-484

  • UT code for WoS article

  • EID of the result in the Scopus database

    2-s2.0-85081921535