SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
International Journal on Applications of Graph Theory in Wireless Ad
hoc Networks and Sensor Networks (GRAPH-HOC)
ISSN : 0975-7031 Online) ; 0975-7260 (Print)
http://airccse.org/journal/graphhoc/GRAPH-HOC.html
Most Cited Articles - 2011
A Comparison of Link Layer Attacks on Wireless Sensor Networks
Shahriar Mohammadi and Hossein Jadidoleslamy, Graph-Hoc Journal, Vol.3, No.1, March 2011,
PP. 35-56 DOI : 10.5121/jgraphhoc.2011.3103
A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods
Maaly A. Hassan and Andrew Chickadel, Graph-Hoc Journal, Vol.3, No.1, March 2011, PP. 58-
67 DOI : 10.5121/jgraphhoc.2011.3104
Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in
Mobile Ad-Hoc Networks
Santosh Kumar S C Sharma Bhupendra Suman, Graph-Hoc Journal, Vol.3, No.3, September
2011, PP. 25-38 DOI : 10.5121/jgraphoc.2011.3303
Most Cited Articles - 2010
An Overview of Mobile Ad-Hoc Networks for the Existing Protocols and Applications
Saleh Ali K.Al-Omari and Putra Sumari, Graph-Hoc Journal, Vol.2, No.1,March 2010, PP. 87-
110 DOI : 10.5121/jgraphhoc.2010.2107
Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad
Hoc Networks
S. Sumathy and B.Upendra Kumar, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 9 to 16
DOI : 10.5121/jgraphhoc.2010.2102
Coverage andConnectivity Aware Neural Network Based Energy Efficient Routing in Wireless
Sensor Networks
Neeraj Kumar, Manoj Kumar and R.B. Patel, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP.
45-60 DOI : 10.5121/jgraphhoc.2010.2105
Simulated Annealing for Location Area Planning in Cellular Networks
N. B. Prajapati, R. R. Agravat and M. I. Hasan, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP.
01-07 DOI : 10.5121/jgraphhoc.2010.2101
A Review Of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc
Networks
Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 01-15 DOI : 10.5121/jgraphoc.2010.2201
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding
Technique for Wireless Sensor and Ad Hoc Networks
Kaushik Ghosh, Sarbani Roy and Pradip K. Das, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 34-44 DOI : 10.5121/jgraphoc.2010.2204
Case Study On Social Engineering Techniques for Persuasion
Mosin Hasan, Nilesh Prajapati and Safvan Vohara, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 17-23 DOI : 10.5121/jgraphoc.2010.2202
Constructing Minimum ConnectedDominating Set: Algorithmic Approach
G.N. Purohit and Usha Sharma, Graph-Hoc Journal, Vol.2, No.3, September 2010, PP. 59-66
DOI : 10.5121/jgraphoc.2010.2305
The Impact of Data Replicatino on Job Scheduling Performance in Hierarchical Data Grid
Somayeh Abdi, Hossein Pedram and Somayeh Mohamadi, Graph-Hoc Journal, Vol.2, No.3,
September 2010 , PP. 15-25
DOI : 10.5121/jgraphoc.2010.2302
A Review Of the Energy Efficient and Secure Multicast routing protocols for Mobile Ad Hoc
Networks
Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010,
PP. 1 to 15
DOI : 10.5121/jgraphoc.2010.2201
AIRCC Publishing Corporation
www.airccse.org

Más contenido relacionado

Más de graphhoc

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...graphhoc
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...graphhoc
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSgraphhoc
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet graphhoc
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices graphhoc
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...graphhoc
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text graphhoc
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective graphhoc
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...graphhoc
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidancegraphhoc
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksgraphhoc
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksgraphhoc
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...graphhoc
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifegraphhoc
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...graphhoc
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...graphhoc
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...graphhoc
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles graphhoc
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONgraphhoc
 

Más de graphhoc (20)

ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
ON THE PROBABILITY OF K-CONNECTIVITY IN WIRELESS AD HOC NETWORKS UNDER DIFFER...
 
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
The Impact of Data Replication on Job Scheduling Performance in Hierarchical ...
 
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHSDISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
DISTANCE TWO LABELING FOR MULTI-STOREY GRAPHS
 
Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet  Impact of Mobility for Qos Based Secure Manet
Impact of Mobility for Qos Based Secure Manet
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
A Battery Power Scheduling Policy with Hardware Support In Mobile Devices
 
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 A Review of the Energy Efficient and Secure Multicast Routing Protocols for ... A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
A Review of the Energy Efficient and Secure Multicast Routing Protocols for ...
 
Case Study On Social Engineering Techniques for Persuasion Full Text
Case Study On Social Engineering Techniques for Persuasion   Full Text Case Study On Social Engineering Techniques for Persuasion   Full Text
Case Study On Social Engineering Techniques for Persuasion Full Text
 
Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective  Breaking the Legend: Maxmin Fairness notion is no longer effective
Breaking the Legend: Maxmin Fairness notion is no longer effective
 
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet F...
 
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidanceFault tolerant wireless sensor mac protocol for efficient collision avoidance
Fault tolerant wireless sensor mac protocol for efficient collision avoidance
 
Enhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networksEnhancing qo s and qoe in ims enabled next generation networks
Enhancing qo s and qoe in ims enabled next generation networks
 
Simulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networksSimulated annealing for location area planning in cellular networks
Simulated annealing for location area planning in cellular networks
 
Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...Secure key exchange and encryption mechanism for group communication in wirel...
Secure key exchange and encryption mechanism for group communication in wirel...
 
Simulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real lifeSimulation to track 3 d location in gsm through ns2 and real life
Simulation to track 3 d location in gsm through ns2 and real life
 
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
Performance Analysis of Ultra Wideband Receivers for High Data Rate Wireless ...
 
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
Coverage and Connectivity Aware Neural Network Based Energy Efficient Routing...
 
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
An Overview of Mobile Ad Hoc Networks for the Existing Protocols and Applicat...
 
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles  An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
An Algorithm for Odd Graceful Labeling of the Union of Paths and Cycles
 
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATIONACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
ACTOR GARBAGE COLLECTION IN DISTRIBUTED SYSTEMS USING GRAPH TRANSFORMATION
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

JGRAPH-HOC-Most Cited Articles

  • 1. International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks (GRAPH-HOC) ISSN : 0975-7031 Online) ; 0975-7260 (Print) http://airccse.org/journal/graphhoc/GRAPH-HOC.html Most Cited Articles - 2011 A Comparison of Link Layer Attacks on Wireless Sensor Networks Shahriar Mohammadi and Hossein Jadidoleslamy, Graph-Hoc Journal, Vol.3, No.1, March 2011, PP. 35-56 DOI : 10.5121/jgraphhoc.2011.3103 A Review of Interference Reduction in Wireless Networks Using Graph Coloring Methods Maaly A. Hassan and Andrew Chickadel, Graph-Hoc Journal, Vol.3, No.1, March 2011, PP. 58- 67 DOI : 10.5121/jgraphhoc.2011.3104 Classification and Evaluation of Mobility Metrics for Mobility Model Movement Patterns in Mobile Ad-Hoc Networks Santosh Kumar S C Sharma Bhupendra Suman, Graph-Hoc Journal, Vol.3, No.3, September 2011, PP. 25-38 DOI : 10.5121/jgraphoc.2011.3303 Most Cited Articles - 2010 An Overview of Mobile Ad-Hoc Networks for the Existing Protocols and Applications Saleh Ali K.Al-Omari and Putra Sumari, Graph-Hoc Journal, Vol.2, No.1,March 2010, PP. 87- 110 DOI : 10.5121/jgraphhoc.2010.2107 Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks S. Sumathy and B.Upendra Kumar, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 9 to 16 DOI : 10.5121/jgraphhoc.2010.2102 Coverage andConnectivity Aware Neural Network Based Energy Efficient Routing in Wireless Sensor Networks Neeraj Kumar, Manoj Kumar and R.B. Patel, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 45-60 DOI : 10.5121/jgraphhoc.2010.2105 Simulated Annealing for Location Area Planning in Cellular Networks N. B. Prajapati, R. R. Agravat and M. I. Hasan, Graph-Hoc Journal, Vol.2,No.1,March 2010, PP. 01-07 DOI : 10.5121/jgraphhoc.2010.2101 A Review Of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad Hoc Networks Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 01-15 DOI : 10.5121/jgraphoc.2010.2201
  • 2. I-Min: An Intelligent Fermat Point Based Energy Efficient Geographic Packet Forwarding Technique for Wireless Sensor and Ad Hoc Networks Kaushik Ghosh, Sarbani Roy and Pradip K. Das, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 34-44 DOI : 10.5121/jgraphoc.2010.2204 Case Study On Social Engineering Techniques for Persuasion Mosin Hasan, Nilesh Prajapati and Safvan Vohara, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 17-23 DOI : 10.5121/jgraphoc.2010.2202 Constructing Minimum ConnectedDominating Set: Algorithmic Approach G.N. Purohit and Usha Sharma, Graph-Hoc Journal, Vol.2, No.3, September 2010, PP. 59-66 DOI : 10.5121/jgraphoc.2010.2305 The Impact of Data Replicatino on Job Scheduling Performance in Hierarchical Data Grid Somayeh Abdi, Hossein Pedram and Somayeh Mohamadi, Graph-Hoc Journal, Vol.2, No.3, September 2010 , PP. 15-25 DOI : 10.5121/jgraphoc.2010.2302 A Review Of the Energy Efficient and Secure Multicast routing protocols for Mobile Ad Hoc Networks Busola S. Olagbegi and Natarajan Meghanathan, Graph-Hoc Journal, Vol.2, No.2, June 2010, PP. 1 to 15 DOI : 10.5121/jgraphoc.2010.2201 AIRCC Publishing Corporation www.airccse.org