NS2 Projects with Source Code | 100% Output Guaranteed

Category Archive: NS2 PROJECT CENTER

Demonstration of 3×341-Gb/s PDM-OFDM-256 Iterative Polar Modulation Signals Over 495 km of a Field-Deployed WDM System

We report a field demonstration of transmission of 1.44 Tb/s over the Korean Advanced ResearchNetwork using three 341-Gb/s PDM-OFDM signals with 256-iterative-polar-modulation. The dispersion managed commercial wavelength-division multiplexed (WDM) transmission system, deployed on legacy fiber and supporting WDM transmission on a 100-GHz grid, covered the distance of 248 km between Daejeon and Seoul. Using a loop-back […]

Read more

Design of an adaptive security mechanism for modern routers

Modern routers should be able to support many new functions to meet the needs of customers. To achieve such flexibility, programmable packet processors have replaced traditional fixed-function custom logic in the data path of routers. This programmability introduces new vulnerabilities in these systems that can lead to new types of network attacks. We propose a monitoring subsystem […]

Read more

Fault current limiting in a wind power plant equipped with a DFIG using the interface converter and an optimized located FCL

Along with extending the application of Distributed Generation (DG) units attending renewable energy resources some technical problems such as protection issues are appeared. Fault level increase and inconsistency among protection elements such as relays are of these problems. Fault Current Limiter (FCL) is an appropriate choice that limits the current injected to the faulty point […]

Read more

Human body channel energy harvesting scheme with −22.5 dBm sensitivity 25.87% efficiency threshold-compensated rectifier

A novel human body channel (HBC) energy harvesting scheme for body sensor networks (BSNs) is proposed in this paper. Human body channel is utilized innovatively as energy transmission medium to reduce the transmission loss dramatically and eliminate influence of shadow effect. Further, a high sensitivity and efficiency rectifier is presented by introducing an effective threshold compensation circuit. […]

Read more

Effective Real-Time Android Application Auditing

Mobile applications can access both sensitive personal data and the network, giving rise to threats of data leaks. App auditing is a fundamental program analysis task to reveal such leaks. Currently, static analysis is the de facto technique which exhaustively examines all data flows and pinpoints problematic ones. However, static analysis generates false alarms for being […]

Read more

Open government and open data a global perspective

Civil society organizations (CSOs) are investing in new technologies and are increasingly working innetworks and coalitions (such as Open Parliament, Open Contracting and Open Government) to develop standards for effective accountability through transparency and disclosure. These initiatives hold the promise of transforming the way government and societies work together to improve governance. There is therefore an […]

Read more

A Low-Error, Cost-Efficient Design Procedure for Evaluating Logarithms to be Used in a Logarithmic Arithmetic Processor

Based on an error-flattened, non-uniform-region linear-approximation algorithm, this brief proposes a low-error and a cost-efficient design procedure for realizing an optimized shift-and-add Logarithmic Unit (LU), which uses minimum hardware to meet the desired error constraint for embedded graphics systems. Mathematically, this brief first derives two solutions of the error-flattened algorithm. Subsequently, for an error constraint, […]

Read more

Path Logics for Querying Graphs: Combining Expressiveness and Efficiency

We study logics expressing properties of paths in graphs that are tailored to querying graph databases: a data model for new applications such as social networks, the Semantic Web, biological data, crime detection, and others. The basic construct of such logics, a regular path query, checks for paths whose labels belong to a regular language. These […]

Read more

TEES: An Efficient Search Scheme over Encrypted Data on Mobile Cloud

Cloud storage provides a convenient, massive, and scalable storage at low cost, but data privacy is a major concern that prevents users from storing files on the cloud trustingly. One way of enhancing privacy from data owner point of view is to encrypt the files before outsourcing them onto the cloud and decrypt the files […]

Read more

EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service

Document storage in the cloud infrastructure is rapidly gaining popularity throughout the world. However, it poses risks to consumers unless the data is encrypted for security. Encrypted data should be effectively searchable and retrievable without any privacy leaks, particularly for the mobile client. Although recent research has solved many security issues, the architecture cannot be […]

Read more
Research paper writer service