NS2 Projects with Source Code | 100% Output Guaranteed

Tag Archive: Ns2 Projects

Leave Me Alone: App-Level Protection against Runtime Information Gathering on Android

Stealing of sensitive information from apps is always considered to be one of the most critical threats to Android security. Recent studies show that this can happen even to the apps without explicit implementation flaws, through exploiting some design weaknesses of the operating system, e.g., Shared communication channels such as Bluetooth, and side channels such […]

Read more

Lasso-based reverberation suppression in automatic speech Recognition

Far-field automatic speech recognition (ASR) is challenging, mainly attributed to the high reverberation in the recordings. A novel linear sparse prediction model has been proposed to estimate and suppress reverberation. This model considers reverberation as a mixture of early and late reflections of the direct signal and estimates the late reflection with Lasso. It has […]

Read more

A Case of Lightweight PUF Constructions: Cryptanalysis and Machine Learning Attacks

Due to their unique physical properties, physically unclonable functions (PUF) have been proposed widely as versatile cryptographic primitives. It is desirable that silicon PUF circuits should be lightweight, i.e., have low-hardware resource requirements. However, it is also of primary importance that such demands of low hardware overhead should not compromise the security aspects of PUF […]

Read more

Dynamic resource allocation in SCADY grid toolkit

With the advancement in high performance applications and building of low cost computing resources, resource allocation to tasks in Grid Computing has became one of the most critical job. If resource allocation is done properly, it can lead to high performance throughput. This paper analyzes the Windows based Grid toolkit – SCADY (Scalable and Dynamic) […]

Read more

Impact of Packet Sampling on Link Dimensioning

Link dimensioning is used by network operators to properly provision the capacity of their network links. Proposed methods for link dimensioning often require statistics, such as traffic variance, that need to be calculated from packet-level measurements. In practice, due to increasing traffic volume, operators deploy packet sampling techniques aiming to reduce the burden of traffic monitoring, but little is […]

Read more
Research paper writer service