{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:17Z","timestamp":1747224077482,"version":"3.40.5"},"reference-count":27,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,10,1]]},"abstract":"<p>The ad hoc routing protocol's design has received a huge attention due to the unpredictable and rapid mobility of a node. It is created dynamically without any infrastructure. In ad hoc each node is responsible for routing the information between them. To improve the performance of unused information and to overcome the overhead in maintaining this information the protocols were designed. MANET (Mobile Ad hoc Network) is the collection of wireless mobile nodes which can dynamically form a network. By this definition we can conclude that there is no centralized administration, permanent topology and standard support services. Rough set theory is a computing technique to deal with uncertainty and vagueness. The notion of the thresholds and the temporal extensions to Rough Sets was applied in several protocols. The successful routing in MANETs using the Random Waypoint mobility model was based on various rough sets based protocol.<\/p>","DOI":"10.4018\/ijssmet.2014100105","type":"journal-article","created":{"date-parts":[[2015,1,28]],"date-time":"2015-01-28T12:04:48Z","timestamp":1422446688000},"page":"66-76","source":"Crossref","is-referenced-by-count":19,"title":["Rough Set Based Ad Hoc Network"],"prefix":"10.4018","volume":"5","author":[{"given":"Swati","family":"Chowdhuri","sequence":"first","affiliation":[{"name":"Department of ECE, Seacom Engineering College, Howrah, India"}]},{"given":"Payel","family":"Roy","sequence":"additional","affiliation":[{"name":"Department of CA, JIS College of Engineering, Kalyani, India"}]},{"given":"Srijan","family":"Goswami","sequence":"additional","affiliation":[{"name":"Department of Medical Biotechnology, IGMGS, Kolkata, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7869-6373","authenticated-orcid":true,"given":"Ahmad Taher","family":"Azar","sequence":"additional","affiliation":[{"name":"Benha University, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8437-498X","authenticated-orcid":true,"given":"Nilanjan","family":"Dey","sequence":"additional","affiliation":[{"name":"Department Of ETCE, Jadavpur University, Kolkata, India"}]}],"member":"2432","reference":[{"key":"ijssmet.2014100105-0","doi-asserted-by":"crossref","unstructured":"Choi, K., Kim, K-Y., & Kwon, O. (2010). A need-awaring multi-agent approach for ad hoc need identification and group formation in nomadic community computing. Journal Cybernetics and Systems - Social Awareness in Smart Spaces\u2014Part II, 41(3), 216-244.","DOI":"10.1080\/01969721003684907"},{"key":"ijssmet.2014100105-1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2006.01.026"},{"key":"ijssmet.2014100105-2","first-page":"1","author":"A. E.Hassanien","year":"2007","journal-title":"Advances in Fuzzy Systems"},{"issue":"2","key":"ijssmet.2014100105-3","first-page":"767","article-title":"An Intrusion Detection System for Ad Hoc Networks with Multi-attacks Based on a Support Vector Machine and Rough Set Theory","volume":"8","author":"C.-F.Hsieh","year":"2013","journal-title":"Journal of Cases on Information Technology"},{"key":"ijssmet.2014100105-4","doi-asserted-by":"publisher","DOI":"10.3923\/itj.2011.1038.1043"},{"key":"ijssmet.2014100105-5","first-page":"85","article-title":"A rough set based approach to classify node behavior in mobile ad hoc networks.","volume":"12","author":"M.Jain","year":"2014","journal-title":"Journal of Mathematics and Computer Science"},{"key":"ijssmet.2014100105-6","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637479"},{"key":"ijssmet.2014100105-7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2013\/986985","article-title":"A rough penalty genetic algorithm for multicast routing in mobile ad hoc networks.","author":"C.-H.Lin","year":"2013","journal-title":"Journal of Applied Mathematics"},{"key":"ijssmet.2014100105-8","doi-asserted-by":"publisher","DOI":"10.1504\/IJMC.2009.023675"},{"key":"ijssmet.2014100105-9","doi-asserted-by":"crossref","unstructured":"Nagaraju, A., & Ramachandram, S. (2009). Rough set based ad hoc on demand distance vector routing algorithm for MANETs. COMPUTE '09 Proceedings of the 2nd Bangalore Annual Compute Conference. Article no-11, 1-5.","DOI":"10.1145\/1517303.1517316"},{"key":"ijssmet.2014100105-10","doi-asserted-by":"publisher","DOI":"10.1504\/IJWMC.2014.059711"},{"key":"ijssmet.2014100105-11","doi-asserted-by":"publisher","DOI":"10.1504\/IJMNDI.2012.054454"},{"key":"ijssmet.2014100105-12","doi-asserted-by":"publisher","DOI":"10.1504\/IJCNDS.2014.063987"},{"key":"ijssmet.2014100105-13","unstructured":"Own, H. S., & Hassanien, A. E. (2008). Rough wavelet hybrid image classification scheme, In Journal of Convergence Information Technology, 3(4), 65-75."},{"key":"ijssmet.2014100105-14","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219791"},{"issue":"8","key":"ijssmet.2014100105-15","first-page":"242","article-title":"Effective Cross Layer Intrusion Detection in Mobile Ad Hoc Networks Using Rough Set Theory and Support Vector Machines. In Asian","volume":"12","author":"T.Poongothai","year":"2013","journal-title":"Journal of Information Technology"},{"key":"ijssmet.2014100105-16","doi-asserted-by":"crossref","unstructured":"Qu, W. (2010). Declarative Composition Routing Protocols Adaptation in MANET Using Rough Set Theory. Wireless Communications, Networking and Mobile Computing (WiCom '09) 2009. 5th International Conference, 1-4.","DOI":"10.1109\/WICOM.2009.5302173"},{"key":"ijssmet.2014100105-17","doi-asserted-by":"crossref","unstructured":"Rajam, V. M. A. (2006). Mobile Ad Hoc Routing Using Rough Set Theory. International Conference on Hybrid Information Technology (ICHIT) 2006, 2, 80-83.","DOI":"10.1109\/ICHIT.2006.253593"},{"key":"ijssmet.2014100105-18","article-title":"Extensions in Mobile Ad Hoc Routing Using Variable Precision Rough Sets.","volume":"237","author":"V. M. A.Rajam","year":"2007","journal-title":"International Conference on Granular Computing, GRC 2007"},{"issue":"4","key":"ijssmet.2014100105-19","first-page":"29","article-title":"Temporal information systems and their applications to mobile ad hoc routing.","volume":"3","author":"V. M. A.Rajam","year":"2008","journal-title":"Ubiquitous Computing and Communications Journal"},{"key":"ijssmet.2014100105-20","doi-asserted-by":"publisher","DOI":"10.4018\/ijrsda.2014070105"},{"issue":"1","key":"ijssmet.2014100105-21","first-page":"7","article-title":"Analysis of route discovery in mobile ad hoc network routing using information systems.","volume":"1","author":"S.Sathish","year":"2013","journal-title":"International Journal of Computer Science and Engineering Communications"},{"key":"ijssmet.2014100105-22","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2011.1314.1321"},{"key":"ijssmet.2014100105-23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14350-2_64"},{"issue":"2","key":"ijssmet.2014100105-24","first-page":"327","article-title":"Optimal Next Hop Selection for Routing in VANETs Based on Weighted Temporal Decision Systems.","volume":"7","author":"B. S.Shylaja","year":"2011","journal-title":"Journal of Computer Information Systems"},{"issue":"1","key":"ijssmet.2014100105-25","first-page":"1","article-title":"Enhancing Security in Mobile Ad hoc Networks Using RSA Algorithm and SVM\u2013 Survey.","volume":"1","author":"P.Sivaranjanadevi","year":"2014","journal-title":"International Journal of Advanced Computing and Communication System"},{"key":"ijssmet.2014100105-26","unstructured":"Sivaranjanadevi, P., Geetanjali, M., Balaganesh, S., & Poongothai, T. (2012). An Effective Intrusion System for Mobile Ad Hoc Networks using Rough Set Theory and Support Vector Machine. IJCA Proceedings on EGovernance and Cloud Computing Services. EGOV (2), 1-7."}],"container-title":["International Journal of Service Science, Management, Engineering, and Technology"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=122561","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T23:09:17Z","timestamp":1654124957000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/ijssmet.2014100105"}},"subtitle":["A Review"],"short-title":[],"issued":{"date-parts":[[2014,10,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijssmet.2014100105","relation":{},"ISSN":["1947-959X","1947-9603"],"issn-type":[{"type":"print","value":"1947-959X"},{"type":"electronic","value":"1947-9603"}],"subject":[],"published":{"date-parts":[[2014,10,1]]}}}