About
12
Publications
1,126
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
15
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (12)
Flying Ad-hoc networks (FANETs) are wireless networks allowing unmanned aerial vehicles (UAVs) to interact without a permanent infrastructure. For effective data transfer in FANETs, routing protocols like Ad hoc On-Demand Distance Vector (AODV) are crucial. While several studies have investigated the use of ETX (Expected Transmission Count) in spec...
Detecting liveness and age estimation have many applications and attract many researchers. There are many approaches for detecting liveness and estimating age, still some limitations can be addressed such as they are focusing on image quality, eyelid motion, and facial expression to analyze spoof images. In addition, existing methods proposed for e...
With the wide-ranging application of flying ad-hoc networks (FANETs), which have received more attention from the industry and research community in recent years. The high demand for continuous network connectivity with reliable and robust communication becomes a challenging research topic. Most researchers investigated the existing routing protoco...
Flying Ad Hoc Network (FANET) is an innovative wireless communication framework that consists of the autonomous movement of Unmanned Aerial Vehicle (UAV) systems and allows them to communicate among them. A FANET offers an effective real-time communication solution for several applications, such as commercial and civilian, by treating each UAV as a...
network, it has proposed for various purposes including military, surveillance and monitoring of areas, where it is unreachable by a human. With the high demand for continues network connectivity with reliable and robust communication becomes a challenging research topic. In addition, the investigation of routing protocols has done by many research...
When the M2M devices communicate and share data with each other within a group or cluster without any direct human intervention, it is called inter-M2M communications. For this purpose, there is a critical need of an energy efficient scalable medium access control (MAC) protocol to facilitate a large number of M2M devices to access the channel. To...
Wireless mesh network has been considering as promising technology for next generation that provides a better services and guarantee to different internet applications. AODV routing protocol is being considered as routing protocol in hybrid wireless mesh network. Route breaks in mobile mesh client is one of the research issues in hybrid wireless me...
AODV-MR (on-demand routing protocol with multi-radio extension) has been designed to support multi-radio interfaces; it uses more than one interface of the same mesh router or gateways for broadcasting duplicated control packets (i.e., RREQ, RRER, and HELLO message) or to rebroadcast it. We have modified AODV-MR, by allocating one interface in a dy...
Wireless mesh network has been considered as a promising technology for the next generation that provides better services and guarantees to different internet applications.AODV routing protocol is being considered as a routing protocol in a hybrid wireless mesh network. Route breaks in mobile mesh clients are one of the research issues in hybrid wi...
Most of the proposed works in Routing protocol for hybrid wireless mesh networks are based on AODV. To be more effective in hybrid wireless mesh networks, the enhancement of AODV is very much important. In this paper, we propose a novel mechanism for route discovery and route repairing by exploiting local connectivity. In this approach, any neighbo...
Rapid growth of internet use has resulted in network traffic congestion problem. Network load balancing is a one method to eliminate traffic congestion in the network as well as to improve the scalability and availability of Internet server programs, such as Web servers, proxy servers, DNS servers and FTP servers It actually distributes Web traffic...