Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks

International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 119 - Number 11
Year of Publication: 2015
Meenu Punj
Tanupreet Singh

Meenu Punj and Tanupreet Singh. Article: Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks. International Journal of Computer Applications 119(11):23-22, June 2015. Full text available. BibTeX

	author = {Meenu Punj and Tanupreet Singh},
	title = {Article: Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {119},
	number = {11},
	pages = {23-22},
	month = {June},
	note = {Full text available}


The multicast describes the distribution of structures from just one single node to number of destinations. These real-time services have a stringent necessity of QoS factors like bandwidth, delay, jitter etc. to ensure clean, consistent, and fair sign to the receivers. In this paper, in the proposed technique the issue of multi-cast tree has been removed using clustering based technique. First of all multi-radio and multichannel based cluster has been deployed and these cluster head are responsible for the multicasting which decrease the overall energy consumption of nodes and complexity of intelligent algorithms. The path has been evaluated based upon the ant colony optimization. Thus it improves the overall performance of the QoS parameters of Ad-hoc networks.


  • Zheng, Du. "A Game Theoretic Approach for Security and Quality of Service (QoS) Co-Design in Cooperative Wireless Communication Networks. " PhD diss. , Carleton University, 2011.
  • Tsou, Po-Chun, Jian-Ming Chang, Yi-Hsuan Lin, Han-Chieh Chao, and Jiann-Liang Chen. "Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. " In Advanced Communication Technology (ICACT), 2011 13th International Conference on, pp. 755-760. IEEE, 2011.
  • Wong, Starsky HY, Chi-Kin Chau, and Kang-Won Lee. "Managing interoperation in multi-organization MANETs by dynamic gateway assignment. " In Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on, pp. 129-136. IEEE, 2011.
  • Tabash, Ibrahim K. , Nesar Ahmad, and Salim Beg. "A Congestion Window Control mechanism based on Fuzzy Logic to improve TCP performance in MANETs. " In Computational Intelligence and Communication Networks (CICN), 2011 International Conference on, pp. 21-26. IEEE, 2011.
  • Kumar, A. , S. S. Srivastava, B. Ram, and P. Singh. "Exploring a new dimension in MANETs through a new routing protocol. " In Electronics Computer Technology (ICECT), 2011 3rd International Conference on, vol. 5, pp. 328-331. IEEE, 2011.
  • Song, Ronggong, and H. Tang. "LAA: Link-layer anonymous access for tactical MANETs. " In 2012 MILITARY COMMUNICATIONS CONFERENCE, Orlando, pp. 1-7. 2012.
  • Chacko, Namrata Marium, Shini Sam, and P. Getzi Jeba Leelipushpam. "A survey on various privacy and security features adopted in MANETs routing Protocol. " In Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Multi-Conference on, pp. 508-513. IEEE, 2013.
  • Gao, Juntao, and Xiaohong Jiang. "Delay modeling for broadcast-based two-hop relay manets. " In Modeling & Optimization in Mobile, Ad Hoc & Wireless Networks (WiOpt), 2013 11th International Symposium on, pp. 357-363. IEEE, 2013.
  • Zhao, Peng, Xinyu Yang, Wei Yu, and Xinwen Fu. "A Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs. " IEEE transactions on vehicular technology 62, no. 5 (2013): 2290-2302.
  • Chen, Yin, Yulong Shen, Xiaohong Jiang, and Jie Li. "Throughput capacity of ALOHA MANETs. " In Communications in China-Workshops (CIC/ICCC), 2013 IEEE/CIC International Conference on, pp. 71-75. IEEE, 2013.
  • Gharib, Mohammed, Ehsan Emamjomeh-Zadeh, Ashkan Norouzi-Fard, and Ali Movaghar. "A novel probabilistic key management algorithm for large-scale manets. " In Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on, pp. 349-356. IEEE, 2013.
  • Liu, Wang, Kejie Lu, Jianping Wang, Yi Qian, Liusheng Huang, Jun Liu, and Dapeng Oliver Wu. "On the throughput-delay trade-off in large-scale MANETs with a generalized iid mobility model. " In INFOCOM, 2013 Proceedings IEEE, pp. 1321-1329. IEEE, 2013.
  • Dahshan, Hisham, Fatma Elsayed, Alaa Rohiem, Aly Elgmoghazy, and James Irvine. "A Trust Based Threshold Revocation Scheme for MANETs. " In Vehicular Technology Conference (VTC Fall), 2013 IEEE 78th, pp. 1-5. IEEE, 2013.
  • Tan, Seryvuth, and Keecheon Kim. "Secure Route Discovery for preventing black hole attacks on AODV-based MANETs. " In ICT Convergence (ICTC), 2013 International Conference on, pp. 1027-1032. IEEE, 2013.
  • Mohammad, S. N. , M. J. Ashraf, S. Wasiq, S. Iqbal, and Nadeem Javaid. "Analysis and Modeling of Network Connectivity in Routing Protocols for MANETs and VANETs. " In Broadband and Wireless Computing, Communication and Applications (BWCCA), 2013 Eighth International Conference on, pp. 528-533. IEEE, 2013.
  • Chen, Kang, Haiying Shen, and Haibo Zhang. "Leveraging social networks for p2p content-based file sharing in disconnected manets. " Mobile Computing, IEEE Transactions on 13, no. 2 (2014): 235-249.
  • Chadli, Sara, Mohammed Saber, and Abdelhak Ziyyat. "Defining Categories to Select Representative Attack Test-Cases in MANETs. " In Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on, pp. 658-663. IEEE, 2014.