The International Arab Journal of Information Technology (IAJIT)

Using the Ant Colony Algorithm for Real-Time

Department of Computer Engineering, Süleyman Demire l University, Turkey
#

Internet Connectivity for Mobile Ad Hoc Networks Using Hybrid Adaptive Mobile Agent Protocol

Department of Electronics Engineering, Anna Univers ity, India. 2Department of Information Technology, Thiagarajar C ollege of Engineering, India. 

AlSakibPathan1,MuhammadMonowar2,Md.Rabbi3,MuhammadAlam1,andChoongHong11DepartmentofComputerEngineering,KyungHeeUnive rsity,SouthKorea2DepartmentofComputerScienceandEngineering,UniversityofChittagong,Bangladesh3CSEDepartments,ShahjalalUniversityofScienceandTechnology,Bangladesh

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

Jin-long Zhu1, Wenhui Li2, Huiying Li2, Qiong Wu2, and Liang Zhang2 1Department of Computer Science and Technology, ChangChun Normal University, China 2Department of Computer Science and Technology, Jilin University, China

Security Mechanism against Sybil Attacks for High-Throughput Multicast Routing in Wireless

Abstract: Wireless Mesh Networks (WMNs) have become one of the important domains in wireless communications. They

Aware-Routing Protocol using Best First Search Algorithm in Wireless Sensor

and areas; this led to ubiquity wireless sensor networks everywhere. Energy consumption is considered as the biggest
#

The Effect of Using P-XCAST Routing Protocol on Many-to-Many Applications

School of Computer Sciences, Universiti Sains Malay sia, Malaysia 

An Enhanced Distributed Certificate Authority Scheme for Authentication in Mobile Ad-hoc

Rajaram Ayyasamy1 and Palaniswami Subramani2 1Electronics and Communication Engineering Departmen t, Karpagam College of Engineering, Anna 

An Intelligent Approach of Sniffer Detection Abdul Nasir Khan, Kalim Qureshi, and Sumair Khan

Abstract:  ARP  cache  poisoning  and  putting  host  Network  Inter face  Card  (NIC)  in  promiscuous  mode  are  ways  of  sni ffer