Management of quality of service in mobile ad hoc networks / Yasser Ahmed Dahab Mohamed ; Supervised Imane Aly Saroit , Hesham Nabih Elmahdy
Material type:
- ادارة جودة الخدمة فى شبكات الادهوك المتحركة [Added title page title]
- Issued also as CD
Item type | Current library | Home library | Call number | Copy number | Status | Barcode | |
---|---|---|---|---|---|---|---|
![]() |
قاعة الرسائل الجامعية - الدور الاول | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.Ph.D.2011.Ya.M (Browse shelf(Opens below)) | Not for loan | 01010110056378000 | ||
![]() |
مخـــزن الرســائل الجـــامعية - البدروم | المكتبة المركزبة الجديدة - جامعة القاهرة | Cai01.20.01.Ph.D.2011.Ya.M (Browse shelf(Opens below)) | 56378.CD | Not for loan | 01020110056378000 |
Browsing المكتبة المركزبة الجديدة - جامعة القاهرة shelves Close shelf browser (Hides shelf browser)
No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | No cover image available | ||
Cai01.20.01.Ph.D.2011.Ta.D Designing a robust watermarking system for real time video / | Cai01.20.01.Ph.D.2011.Ta.D Designing a robust watermarking system for real time video / | Cai01.20.01.Ph.D.2011.Ya.M Management of quality of service in mobile ad hoc networks / | Cai01.20.01.Ph.D.2011.Ya.M Management of quality of service in mobile ad hoc networks / | Cai01.20.01.Ph.D.2012.Ah.I An intrusion detection system for mobile Ad hoc networks / | Cai01.20.01.Ph.D.2012.Ah.I An intrusion detection system for mobile Ad hoc networks / | Cai01.20.01.Ph.D.2012.As.N Network secuirity based on multimedia data hiding techniques / |
Thesis (Ph.D.) - Cairo University - Faculty of Computers and Information - Department of Information Technology
In this thesis two new QoS protocole were proposed for the mobile ad hoc networks . Thefirst protocol is for the medium access control (MAC) layer whereas the second protocol supports the network layer . The two protocols aim to support real time applications . The operation of each proposed protocol is adapted dynamically according to the network load conditions
Issued also as CD
There are no comments on this title.