Acta Scientific Computer Sciences

Research Article Volume 5 Issue 3

Proposed AD-hoc Network for Disaster Management

Anirban Biswas1 and Samir Kumar Bandyopadhyay2*

1M.Sc. Bioinformatics, Pondicherry University, India
2Professor, Lincoln Research Institute (Under Lincoln University), UK

*Corresponding Author: Samir Kumar Bandyopadhyay, Professor, Lincoln Research Institute (Under Lincoln University), UK.

Received: January 20, 2023; Published: February 27, 2023


Modern world has advanced in many areas with scientific research and innovation and developed many technologies to make modern life smooth and easy but till date in front of any kinds of unpredictable crisis that is not always predictable. It may be natural disasters like cyclone, crisis like e-commerce transaction failure, criminal offences like bomb blast, agricultural product supply chain disruption etc. Even developed countries equipped with modern technologies and machineries but cannot avoid or minimize the effect of such critical situations. It is possible to predict but still it can cannot be avoided the disastrous scenario always. Therefore, it is very essential and important to provide the area a low cost, low weighted, readily deployable secured network which will communicate the need of the affected area to the proper authority so that the helping hand can be extended quickly to alleviate the suffering condition of the affected zone. This paper studied an Ad-hoc wireless network which is easily deployable, low cost and low weighted having data security. The data security is achieved through data hiding techniques using steganography.

Keywords: Disaster; Steganography; DWT; DFT; Wireless Network


  1. Dourandish B., et al. “Command and control during the first 72 hours of a joint military-civilian disaster response". Twelfth International Command and Control Research and Technology Symposium (12th ICCRTS), 19-21 June 2007, Newport (2007).
  2. Bettstetter C. “Smooth is better than sharp: A random mobility model for simulation of wireless networks". Proc. ACM Intern. Workshop on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM), Rome, Italy, (2001).
  3. Meissner A., et al. “Design Challenges for an Integrated Disaster Management Communication and Information System". The First IEEE Workshop on Disaster Recovery Networks (DIREN 2002), IEEE INFOCOM 2002, New York (2002).
  4. Stepanov I., et al. “A Meta-Model and Framework for User Mobility in Mobile Networks". Proc. of the 11th International Conference on Networking 2003 (ICON 2003) (2003).
  5. Kraaier J and Killat U. “Calculating Mobility Parameters for a Predefined Stationary User Distribution”. Proc. of the 12th IEEE Int. Conf. on Networks (ICON 2004) (2004).
  6. Kim M., et al. “Extracting a mobility model from real user traces”. Proc. of the IEEE INFOCOM (2006).
  7. Mecella M., et al. “WORKPAD: an adaptive peer-to-peer software infrastructure for supporting collaborative work of human operators in emergency/disaster scenarios”. Proc. Of the International symposium on collaborative technologies and systems (CTS 2006) (2006).
  8. Catarci T., et al. “Pervasive Software environments for supporting disaster responses". In IEEE Internet Computing 12.1 (2008).
  9. Minar N., et al. “Cooperating mobile agents for dynamic network routing”. In: Alex Hayzeldon (ed.), Software Agents for Future Communications Systems, Chapter 12, Springer-Verlag, (1999).
  10. Kramer K H., et al. “Mobile software agents for dynamic routing". Mobile Computing and Communications Review, ACM SIGMOBILE publications, 3.2 (1999).
  11. Pham V A and Karmouch A. “Mobile software agents: An overview". IEEE Communication Magazine, July, (1998).
  12. Appeleby S and Steward S. “Mobile software agents for control in telecommunications networks". BT Technology Journal2 (1994).
  13. Chen M., et al. “Deep Learning Regressors for Quantitative Steganalysis". Media Watermarking, Security, and Forensics (2018).
  14. X Yang., et al. “Fast spectral embedded clustering based on structured graph learning for large-scale hyperspectral image”. IEEE Geoscience and Remote Sensing Letters (2020).
  15. AH Wheeb and M T Naser. “Simulation based comparison of routing protocols in wireless multihop ad hoc networks”. International Journal of Electrical and Computer Engineering 4 (2021): 3186-3192.
  16. A H Wheeb and N A S Al-Jamali. “Performance Analysis of OLSR Protocol in Mobile Ad Hoc Networks”. International Journal of Interactive Mobile Technologies (iJIM) 1 (2022): 106-119.


Citation: Anirban Biswas and Samir Kumar Bandyopadhyay. “Proposed AD-hoc Network for Disaster Management".Acta Scientific Computer Sciences 5.3 (2023): 66-72.


Copyright: © 2023 Anirban Biswas and Samir Kumar Bandyopadhyay. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Acceptance rate35%
Acceptance to publication20-30 days

Indexed In

News and Events

  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is March 30, 2023.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of “Best Article of the Issue”.
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.
  • Contact US