Increasing the Reliability of Packet Sending in Ad Hoc Networks using the Fuzzy Set Theory

سال انتشار: 1397
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 368

فایل این مقاله در 12 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

TECCONF04_049

تاریخ نمایه سازی: 30 شهریور 1398

چکیده مقاله:

Temporary or Ad Hoc networks are one of the new topics and the subset of wireless networks, but they have their own differences and features. Due to its modernity and unique structure, on the one hand, and on the other hand, due to the increasing development of various applications, this group of networks is considered to be the most important and hottest topic of computer networks. In today s research the focus of past research in this regard is often on the topic of support for trust or confidence. But so far, an effective research has not been provided with the ability to provide and support reliable trust. Trust and quality, on the one hand, according to the nature and characteristics of non-structured case networks, and on the other hand, based on the applications of this group of networks, especially in the military and sensitive fields, the most basic and The most important concepts are related to sensor networks and play an essential role in the performance and performance of this network of networks. Due to the very high importance of these concepts in non-structured networks, in recent years, various studies in this field have been presented to improve the performance of the network, which somehow shows the importance and value of the research topic. But on the other hand, due to the fact that in the section on the description of the problem, also the existence of the challenges and issues of play in this category, the need for further research and research in this field, and the necessity of presenting the proposed research Gives The results of simulations show the improvement of the overall efficiency of mobile cell network performance with the proposed protocol as compared to previous studies, especially the basic research of TQR. In the proposed method, in the area of trust, in the area of trust, the criteria of the time of evaluation of trust, valuation of exchanges and the optimal use of recommendations in the evaluation of trust were considered. In terms of assuring and maintaining the desired quality, in comparison with previous studies, the energy standards of intermediate nodes, congestion and bandwidth were investigated and used.

نویسندگان

Javad Hedayati

Department of Computer, Faculty of Engineering, Islamic Azad University, Damavand Branch, Damavand, Iran

Samaneh Salehi Nasab

Department of Computer, Faculty of Engineering, Islamic Azad University, Damavand Branch,Damavand, Iran