SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
International Journal on Applications of Graph Theory in Wireless Ad
hoc Networks and Sensor Networks (GRAPH-HOC)
ISSN : 0975-7031 Online) ; 0975-7260 (Print)
http://airccse.org/journal/graphhoc/GRAPH-HOC.html
Most Cited Articles - 2011
A Comparison of Link Layer Attacks on Wireless Sensor Networks
Shahriar Mohammadi and Hossein Jadidoleslamy, Graph-Hoc Journal, Vol.3, No.1, March 2011,
PP. 35-56 DOI : 10.5121/jgraphhoc.2011.3103
A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods
Maaly A. Hassan and Andrew Chickadel, Graph-Hoc Journal, Vol.3, No.1, March 2011, PP. 58-
67 DOI : 10.5121/jgraphhoc.2011.3104
Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in
Mobile Ad-Hoc Networks
Santosh Kumar S C Sharma Bhupendra Suman, Graph-Hoc Journal, Vol.3, No.3, September
2011, PP. 25-38 DOI : 10.5121/jgraphoc.2011.3303
Most Cited Articles - 2010
An Overview of Mobile Ad-Hoc Networks for the Existing Protocols and Applications
Saleh Ali K.Al-Omari and Putra Sumari, Graph-Hoc Journal, Vol.2, No.1,March 2010, PP. 87-
110 DOI : 10.5121/jgraphhoc.2010.2107
Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad
Hoc Networks
S. Sumathy and B.Upendra Kumar, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 9 to 16
DOI : 10.5121/jgraphhoc.2010.2102
Coverage andConnectivity Aware Neural Network Based Energy Efficient Routing in Wireless
Sensor Networks
Neeraj Kumar, Manoj Kumar and R.B. Patel, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP.
45-60 DOI : 10.5121/jgraphhoc.2010.2105
Simulated Annealing for Location Area Planning in Cellular Networks
N. B. Prajapati, R. R. Agravat and M. I. Hasan, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP.
01-07 DOI : 10.5121/jgraphhoc.2010.2101
A Review Of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc
Networks
Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 01-15 DOI : 10.5121/jgraphoc.2010.2201
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding
Technique for Wireless Sensor and Ad Hoc Networks
Kaushik Ghosh, Sarbani Roy and Pradip K. Das, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 34-44 DOI : 10.5121/jgraphoc.2010.2204
Case Study On Social Engineering Techniques for Persuasion
Mosin Hasan, Nilesh Prajapati and Safvan Vohara, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 17-23 DOI : 10.5121/jgraphoc.2010.2202
Constructing Minimum ConnectedDominating Set: Algorithmic Approach
G.N. Purohit and Usha Sharma, Graph-Hoc Journal, Vol.2, No.3, September 2010, PP. 59-66
DOI : 10.5121/jgraphoc.2010.2305
The Impact of Data Replicatino on Job Scheduling Performance in Hierarchical Data Grid
Somayeh Abdi, Hossein Pedram and Somayeh Mohamadi, Graph-Hoc Journal, Vol.2, No.3,
September 2010 , PP. 15-25
DOI : 10.5121/jgraphoc.2010.2302
A Review Of the Energy Efficient and Secure Multicast routing protocols for Mobile Ad Hoc
Networks
Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 1 to 15
DOI : 10.5121/jgraphoc.2010.2201
AIRCC Publishing Corporation
www.airccse.org

Contenu connexe

Plus de graphhoc

Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
graphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
graphhoc
 

Plus de graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

JGRAPH-HOC-Most Cited Articles

  • 1. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) ISSN : 0975-7031 Online) ; 0975-7260 (Print) http://airccse.org/journal/graphhoc/GRAPH-HOC.html Most Cited Articles - 2011 A Comparison of Link Layer Attacks on Wireless Sensor Networks Shahriar Mohammadi and Hossein Jadidoleslamy, Graph-Hoc Journal, Vol.3, No.1, March 2011, PP. 35-56 DOI : 10.5121/jgraphhoc.2011.3103 A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods Maaly A. Hassan and Andrew Chickadel, Graph-Hoc Journal, Vol.3, No.1, March 2011, PP. 58- 67 DOI : 10.5121/jgraphhoc.2011.3104 Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks Santosh Kumar S C Sharma Bhupendra Suman, Graph-Hoc Journal, Vol.3, No.3, September 2011, PP. 25-38 DOI : 10.5121/jgraphoc.2011.3303 Most Cited Articles - 2010 An Overview of Mobile Ad-Hoc Networks for the Existing Protocols and Applications Saleh Ali K.Al-Omari and Putra Sumari, Graph-Hoc Journal, Vol.2, No.1,March 2010, PP. 87- 110 DOI : 10.5121/jgraphhoc.2010.2107 Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks S. Sumathy and B.Upendra Kumar, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 9 to 16 DOI : 10.5121/jgraphhoc.2010.2102 Coverage andConnectivity Aware Neural Network Based Energy Efficient Routing in Wireless Sensor Networks Neeraj Kumar, Manoj Kumar and R.B. Patel, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 45-60 DOI : 10.5121/jgraphhoc.2010.2105 Simulated Annealing for Location Area Planning in Cellular Networks N. B. Prajapati, R. R. Agravat and M. I. Hasan, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 01-07 DOI : 10.5121/jgraphhoc.2010.2101 A Review Of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 01-15 DOI : 10.5121/jgraphoc.2010.2201
  • 2. I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding Technique for Wireless Sensor and Ad Hoc Networks Kaushik Ghosh, Sarbani Roy and Pradip K. Das, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 34-44 DOI : 10.5121/jgraphoc.2010.2204 Case Study On Social Engineering Techniques for Persuasion Mosin Hasan, Nilesh Prajapati and Safvan Vohara, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 17-23 DOI : 10.5121/jgraphoc.2010.2202 Constructing Minimum ConnectedDominating Set: Algorithmic Approach G.N. Purohit and Usha Sharma, Graph-Hoc Journal, Vol.2, No.3, September 2010, PP. 59-66 DOI : 10.5121/jgraphoc.2010.2305 The Impact of Data Replicatino on Job Scheduling Performance in Hierarchical Data Grid Somayeh Abdi, Hossein Pedram and Somayeh Mohamadi, Graph-Hoc Journal, Vol.2, No.3, September 2010 , PP. 15-25 DOI : 10.5121/jgraphoc.2010.2302 A Review Of the Energy Efficient and Secure Multicast routing protocols for Mobile Ad Hoc Networks Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 1 to 15 DOI : 10.5121/jgraphoc.2010.2201 AIRCC Publishing Corporation www.airccse.org