An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks
In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and...
Ausführliche Beschreibung
Autor*in: |
Karl Brown [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2022 |
---|
Schlagwörter: |
Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET |
---|
Übergeordnetes Werk: |
In: International Journal of Interactive Mobile Technologies - International Association of Online Engineering (IAOE), 2018, 16(2022), 10 |
---|---|
Übergeordnetes Werk: |
volume:16 ; year:2022 ; number:10 |
Links: |
---|
DOI / URN: |
10.3991/ijim.v16i10.30041 |
---|
Katalog-ID: |
DOAJ042735335 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ042735335 | ||
003 | DE-627 | ||
005 | 20230308063906.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230227s2022 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.3991/ijim.v16i10.30041 |2 doi | |
035 | |a (DE-627)DOAJ042735335 | ||
035 | |a (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK5101-6720 | |
100 | 0 | |a Karl Brown |e verfasserin |4 aut | |
245 | 1 | 3 | |a An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks |
264 | 1 | |c 2022 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. | ||
650 | 4 | |a Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET | |
653 | 0 | |a Telecommunication | |
773 | 0 | 8 | |i In |t International Journal of Interactive Mobile Technologies |d International Association of Online Engineering (IAOE), 2018 |g 16(2022), 10 |w (DE-627)558042449 |w (DE-600)2406982-6 |x 18657923 |7 nnns |
773 | 1 | 8 | |g volume:16 |g year:2022 |g number:10 |
856 | 4 | 0 | |u https://doi.org/10.3991/ijim.v16i10.30041 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f |z kostenfrei |
856 | 4 | 0 | |u https://online-journals.org/index.php/i-jim/article/view/30041 |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/1865-7923 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2086 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 16 |j 2022 |e 10 |
author_variant |
k b kb |
---|---|
matchkey_str |
article:18657923:2022----::nsaaepromnewrapocfruuaiefetvns |
hierarchy_sort_str |
2022 |
callnumber-subject-code |
TK |
publishDate |
2022 |
allfields |
10.3991/ijim.v16i10.30041 doi (DE-627)DOAJ042735335 (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f DE-627 ger DE-627 rakwb eng TK5101-6720 Karl Brown verfasserin aut An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET Telecommunication In International Journal of Interactive Mobile Technologies International Association of Online Engineering (IAOE), 2018 16(2022), 10 (DE-627)558042449 (DE-600)2406982-6 18657923 nnns volume:16 year:2022 number:10 https://doi.org/10.3991/ijim.v16i10.30041 kostenfrei https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f kostenfrei https://online-journals.org/index.php/i-jim/article/view/30041 kostenfrei https://doaj.org/toc/1865-7923 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2044 GBV_ILN_2055 GBV_ILN_2086 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 16 2022 10 |
spelling |
10.3991/ijim.v16i10.30041 doi (DE-627)DOAJ042735335 (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f DE-627 ger DE-627 rakwb eng TK5101-6720 Karl Brown verfasserin aut An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET Telecommunication In International Journal of Interactive Mobile Technologies International Association of Online Engineering (IAOE), 2018 16(2022), 10 (DE-627)558042449 (DE-600)2406982-6 18657923 nnns volume:16 year:2022 number:10 https://doi.org/10.3991/ijim.v16i10.30041 kostenfrei https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f kostenfrei https://online-journals.org/index.php/i-jim/article/view/30041 kostenfrei https://doaj.org/toc/1865-7923 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2044 GBV_ILN_2055 GBV_ILN_2086 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 16 2022 10 |
allfields_unstemmed |
10.3991/ijim.v16i10.30041 doi (DE-627)DOAJ042735335 (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f DE-627 ger DE-627 rakwb eng TK5101-6720 Karl Brown verfasserin aut An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET Telecommunication In International Journal of Interactive Mobile Technologies International Association of Online Engineering (IAOE), 2018 16(2022), 10 (DE-627)558042449 (DE-600)2406982-6 18657923 nnns volume:16 year:2022 number:10 https://doi.org/10.3991/ijim.v16i10.30041 kostenfrei https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f kostenfrei https://online-journals.org/index.php/i-jim/article/view/30041 kostenfrei https://doaj.org/toc/1865-7923 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2044 GBV_ILN_2055 GBV_ILN_2086 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 16 2022 10 |
allfieldsGer |
10.3991/ijim.v16i10.30041 doi (DE-627)DOAJ042735335 (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f DE-627 ger DE-627 rakwb eng TK5101-6720 Karl Brown verfasserin aut An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET Telecommunication In International Journal of Interactive Mobile Technologies International Association of Online Engineering (IAOE), 2018 16(2022), 10 (DE-627)558042449 (DE-600)2406982-6 18657923 nnns volume:16 year:2022 number:10 https://doi.org/10.3991/ijim.v16i10.30041 kostenfrei https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f kostenfrei https://online-journals.org/index.php/i-jim/article/view/30041 kostenfrei https://doaj.org/toc/1865-7923 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2044 GBV_ILN_2055 GBV_ILN_2086 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 16 2022 10 |
allfieldsSound |
10.3991/ijim.v16i10.30041 doi (DE-627)DOAJ042735335 (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f DE-627 ger DE-627 rakwb eng TK5101-6720 Karl Brown verfasserin aut An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks 2022 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET Telecommunication In International Journal of Interactive Mobile Technologies International Association of Online Engineering (IAOE), 2018 16(2022), 10 (DE-627)558042449 (DE-600)2406982-6 18657923 nnns volume:16 year:2022 number:10 https://doi.org/10.3991/ijim.v16i10.30041 kostenfrei https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f kostenfrei https://online-journals.org/index.php/i-jim/article/view/30041 kostenfrei https://doaj.org/toc/1865-7923 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2044 GBV_ILN_2055 GBV_ILN_2086 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 16 2022 10 |
language |
English |
source |
In International Journal of Interactive Mobile Technologies 16(2022), 10 volume:16 year:2022 number:10 |
sourceStr |
In International Journal of Interactive Mobile Technologies 16(2022), 10 volume:16 year:2022 number:10 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET Telecommunication |
isfreeaccess_bool |
true |
container_title |
International Journal of Interactive Mobile Technologies |
authorswithroles_txt_mv |
Karl Brown @@aut@@ |
publishDateDaySort_date |
2022-01-01T00:00:00Z |
hierarchy_top_id |
558042449 |
id |
DOAJ042735335 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ042735335</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308063906.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3991/ijim.v16i10.30041</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ042735335</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5101-6720</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Karl Brown</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">International Journal of Interactive Mobile Technologies</subfield><subfield code="d">International Association of Online Engineering (IAOE), 2018</subfield><subfield code="g">16(2022), 10</subfield><subfield code="w">(DE-627)558042449</subfield><subfield code="w">(DE-600)2406982-6</subfield><subfield code="x">18657923</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:16</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3991/ijim.v16i10.30041</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://online-journals.org/index.php/i-jim/article/view/30041</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1865-7923</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">16</subfield><subfield code="j">2022</subfield><subfield code="e">10</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Karl Brown |
spellingShingle |
Karl Brown misc TK5101-6720 misc Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET misc Telecommunication An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks |
authorStr |
Karl Brown |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)558042449 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TK5101-6720 |
illustrated |
Not Illustrated |
issn |
18657923 |
topic_title |
TK5101-6720 An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET |
topic |
misc TK5101-6720 misc Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET misc Telecommunication |
topic_unstemmed |
misc TK5101-6720 misc Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET misc Telecommunication |
topic_browse |
misc TK5101-6720 misc Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET misc Telecommunication |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
International Journal of Interactive Mobile Technologies |
hierarchy_parent_id |
558042449 |
hierarchy_top_title |
International Journal of Interactive Mobile Technologies |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)558042449 (DE-600)2406982-6 |
title |
An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks |
ctrlnum |
(DE-627)DOAJ042735335 (DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f |
title_full |
An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks |
author_sort |
Karl Brown |
journal |
International Journal of Interactive Mobile Technologies |
journalStr |
International Journal of Interactive Mobile Technologies |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2022 |
contenttype_str_mv |
txt |
author_browse |
Karl Brown |
container_volume |
16 |
class |
TK5101-6720 |
format_se |
Elektronische Aufsätze |
author-letter |
Karl Brown |
doi_str_mv |
10.3991/ijim.v16i10.30041 |
title_sort |
escalated performance aware approach for cumulative effectiveness in mobile ad-hoc networks |
callnumber |
TK5101-6720 |
title_auth |
An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks |
abstract |
In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. |
abstractGer |
In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. |
abstract_unstemmed |
In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_2044 GBV_ILN_2055 GBV_ILN_2086 GBV_ILN_2108 GBV_ILN_2119 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
container_issue |
10 |
title_short |
An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks |
url |
https://doi.org/10.3991/ijim.v16i10.30041 https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f https://online-journals.org/index.php/i-jim/article/view/30041 https://doaj.org/toc/1865-7923 |
remote_bool |
true |
ppnlink |
558042449 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.3991/ijim.v16i10.30041 |
callnumber-a |
TK5101-6720 |
up_date |
2024-07-03T13:45:43.487Z |
_version_ |
1803565760244613120 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ042735335</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230308063906.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230227s2022 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.3991/ijim.v16i10.30041</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ042735335</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ9386d2a5d6e747099d7e2f462a5b318f</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5101-6720</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Karl Brown</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="3"><subfield code="a">An Escalated Performance Aware Approach for Cumulative Effectiveness in Mobile Ad-Hoc Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2022</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">In order to provide secure communication between mobile nodes in a hostile environment, security has become a top priority. There are a variety of nontrivial difficulties to security design in mobile ad hoc networks because of its unique properties, such as open peer to peer network architecture and shared wireless medium. Building multi-layered security systems that provide broad coverage while still delivering optimal network performance makes perfect sense in light of these problems. Specifically, in this study, we address the basic issue of maintaining the multi-hop network connectivity between mobile nodes in a Mobile Ad Hoc Networks (MANET). There are a number of security concerns that need to be addressed in order to safeguard the multihop wireless channel's MANET connection and network layer activities when delivering packets. We go through these difficulties and possible solutions in this paper. Complete security solutions should cover both layers and include the prevention, detection and response aspects of the three components of the security system. Providing secure communication between mobile nodes in a hostile environment has become a top priority. For example, the open peer-to-peer architecture, shared wireless medium, resource limits, and high dynamic network topology of mobile ad hoc networks provide a variety of nontrivial security design difficulties. The work integrates the effectual approach with the integrity and performance aware implementation for the Mobile Adhoc Networks.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile Ad Hoc Networks, MANET Effectiveness, Performance in MANET</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Telecommunication</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">International Journal of Interactive Mobile Technologies</subfield><subfield code="d">International Association of Online Engineering (IAOE), 2018</subfield><subfield code="g">16(2022), 10</subfield><subfield code="w">(DE-627)558042449</subfield><subfield code="w">(DE-600)2406982-6</subfield><subfield code="x">18657923</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:16</subfield><subfield code="g">year:2022</subfield><subfield code="g">number:10</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.3991/ijim.v16i10.30041</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/9386d2a5d6e747099d7e2f462a5b318f</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://online-journals.org/index.php/i-jim/article/view/30041</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/1865-7923</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">16</subfield><subfield code="j">2022</subfield><subfield code="e">10</subfield></datafield></record></collection>
|
score |
7.4006233 |