American Journal of Networks and Communications

Special Issue

Ad Hoc Networks

  • Submission Deadline: Mar. 20, 2015
  • Status: Submission Closed
  • Lead Guest Editor: Manish Bhardwaj
About This Special Issue
This special issue mainly works on performance evaluation of ad hoc networks. Ad hoc wireless mobile networks are self-organizing and self-reconfiguring networks that can be establish anytime and anywhere without the presence of static radio base stations or fixed backbone infrastructures. Advances in battery technology have unfortunately fallen behind that of CPU technology. This issue contains the various key points for performance evaluation of the networks which are given below:

1. Verification of analytical models and simulation environments against real-life
2. Proven practices for validation of wireless networking solutions through simulation or experimentation
3. Benchmarking methods enabling fair comparison between competing solutions or subsequent developments
4. Unambiguous definitions of performance evaluation metrics and according methods for measurement and calculation
5. Tools specialized for realistic traffic generation and the creation of repeatable background environment properties (for example home, office, factory) in simulators or experimental settings
6. Methods and techniques to generate repeatable, reproducible, and reliable measurements in experimental homogeneous/heterogeneous settings
7. Analysis of control tools for configuring and driving experiments, e.g. management and control tools to conduct experiments with ease and efficiency, monitor the experiment conditions, and run-time modifying the experiment parameters
8. Distributed measurement techniques and tools for test-beds/experimental facilities including small to large-scale test-beds, federated test-beds, homogeneous/heterogeneous test-beds, etc
9. Run-time integration of modeling and simulation tools into test-beds/experimental facilities
10. Data-mining, interpretation, knowledge acquisition from simulation or experimental measurements
11. Statistical analysis of experimental data including multivariate analysis (e.g., analysis of variance, regression analysis, principal component analysis and variants, discriminant analysis and variants), analysis time series (e.g. frequency-domain/time-domain methods, parametric and non-parametric methods, univariate/multivariate), statistical inference (e.g., frequentist, Bayesian)
Lead Guest Editor
  • Manish Bhardwaj

    Computer Science and Engineering Department, NCR Campus, SRM University (Sri Ramaswamy Memorial University), Ghaziabad, India

Guest Editors
  • Dr. JAGADEESAN D

    Computer Science and Engg, Adhiparasakthi College of Engg.,, India

  • Partha Sarathi Chakraborty

    Department of Computer Science and Engineering, SRM University (Sri Ramaswamy Memorial University), Modinagar, India

  • Bal Krishna Saraswat

    Department of Computer Science and Engineering, SRM University (Sri Ramaswamy Memorial University), NCR Campus, Ghaziabad, India

  • Analp Pathak

    Department of Computer Science and Engineering, SRM University, Ghaziabad, India

  • Jaswinder Singh

    Department of Computer Science and Engineering, Sri Ramaswamy Memorial University (SRM University), Kancheepuram, India

Published Articles
  • Secure Route Selection in Manet Using Ant Colony Optimization

    Somesh Maheshwari , Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 54-56
    Received: Dec. 22, 2014
    Accepted: Dec. 27, 2014
    Published: Feb. 12, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.19
    Downloads:
    Views:
    Abstract: A Mobile Adhoc network is a collection of nodes that are dynamically and arbitrarily located in such a manner that the inter connections between nodes are capable of changing on a continual basis. Ad hoc wireless networks are increasing in popularity, because of the spread of laptops, sensor devices, personal digital assistants, and other mobile el... Show More
  • Privacy Preserving Data Publishing through Slicing

    Shivani Rohilla , Megha Sharma , A. Kulothungan , Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 45-53
    Received: Dec. 22, 2014
    Accepted: Dec. 27, 2014
    Published: Feb. 12, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.18
    Downloads:
    Views:
    Abstract: Microdata publishing should be privacy preserved as it may contain some sensitive information about an individual. Various anonymization techniques, generalization and bucketization, have been designed for privacy preserving microdata publishing. Generalization does not work better for high dimensional data. Bucketization failed to prevent membersh... Show More
  • Security in Ad Hoc Networks

    Sanjana Lakkadi , Amit Mishra , Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 27-34
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.16
    Downloads:
    Views:
    Abstract: Ad hoc networks are a wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, these networks are self-configurable and autonomous systems which are able to support movability and organize themselves arbitrarily. These unique characteristics of ad h... Show More
  • Efficient Routing with Reduced Routing Overhead and Retransmission of Manet

    Megha Sharma , Shivani Rohilla , Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 22-26
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.15
    Downloads:
    Views:
    Abstract: Adhoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure. In manet nodes can change location and configure itself, the mobility of nodes causes continuous link breakage due to which frequent path failure occur and route discov... Show More
  • Ontology Based Fuzzy Query Execution

    Geetanjali tyagi , kumar kaushik , Arnika Jain , Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 16-21
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.14
    Downloads:
    Views:
    Abstract: Database engineering has been progressed up to the Relational database stage. Fuzzy information administration in databases is a complex process in view of adaptable information nature and heterogeneous database frameworks. Relational Database Management System (RDBMS) can just handle fresh information but cannot handle precise data information. St... Show More
  • An Adaptive Algorithm to Prevent SQL Injection

    Ashish John , Ajay Agarwal , Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 12-15
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.13
    Downloads:
    Views:
    Abstract: SQL Injection attacks are one of the top most threats for application written for the web. SQL Injection is a type of attack in which the attacker uses SQL commands to gain access or make changes to data. It allows attacker to obtain unauthorized access to the database to change the intended queries. In the web environment, end user privacy is one ... Show More
  • C2 Torus New Interconnection Network Topology Based on 2D Torus

    Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 1-4
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 28, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.11
    Downloads:
    Views:
    Abstract: Mesh and Torus are most popular interconnection topologies based on 2D-mesh. Comparison between Mesh and Torus will be considered and new interconnection topology will be proposed to provide better performance. The C2Mesh is an enhanced mesh interconnected network. This paper enhances the Performance of torus network based on the theme of C2Mesh. T... Show More
  • Design of Secure Ad Hoc Network Using Three Dimensional Discrete Wavelet Transformation Based on Performance Enhancement

    Laith Ali Abdul-Rahaim , Ammar Abdulrasool Muneer

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 35-44
    Received: Dec. 16, 2014
    Accepted: Jan. 10, 2015
    Published: Jan. 22, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.17
    Downloads:
    Views:
    Abstract: This work shows new and efficient algorithm of cryptographic purpose based symmetric and conventional techniques that considers the representation of the cipher text by using the three dimensional Discrete Wavelet Transform to find the wavelet decomposition vector containing the approximation and the detail coefficients then build the three dimensi... Show More
  • Selection of Efficient Relay for Energy-Efficient Cooperative Ad Hoc Networks

    Manish Bhardwaj

    Issue: Volume 4, Issue 3-1, May 2015
    Pages: 5-11
    Received: Dec. 22, 2014
    Accepted: Dec. 25, 2014
    Published: Jan. 18, 2015
    DOI: 10.11648/j.ajnc.s.2015040301.12
    Downloads:
    Views:
    Abstract: The Cooperative Communication (CC) is a technology that allows multiple nodes to simultaneously transmit the same data. It can save power and extend transmission coverage. However, prior research work on topology control considers CC only in the aspect of energy saving, not that of coverage extension. This paper identify the challenges in the devel... Show More