NS2 Projects with Source Code | 100% Output Guaranteed

Tag Archive: 2015 Ns2 Projects

Path Logics for Querying Graphs: Combining Expressiveness and Efficiency

We study logics expressing properties of paths in graphs that are tailored to querying graph databases: a data model for new applications such as social networks, the Semantic Web, biological data, crime detection, and others. The basic construct of such logics, a regular path query, checks for paths whose labels belong to a regular language. These […]

Read more

Interdatacenter Job Routing and Scheduling With Variable Costs and Deadlines

To reduce their operational costs, datacenter (DC) operators can schedule large jobs at DCs in different geographical locations with time- and location-varying electricity and bandwidth prices. We introduce a framework and algorithms to do so that minimize electricity and bandwidth cost subject to job indivisibility, deadlines, priorities, and DC resource constraints. In doing so, we […]

Read more

Aerial assisted path planning for terrestrial rover without complete environment map

There are several existing methods available for planning paths for terrestrial rovers including graph searching, artificial potential fields, neural networks, fuzzy logic, genetic algorithms and ant colony optimization. Of these, the graph search technique is the most popular due to ease of implementation on rovers which don’t have a complete map of the area in which […]

Read more

FRoDO: Fraud Resilient Device for Off-line micropayments

Credit and debit card data theft is one of the earliest forms of cybercrime. Still, it is one of the most common nowadays. Attackers often aim at stealing such customer data by targeting the Point of Sale (for short, PoS) system, i.e. the point at which a retailer first acquires customer data. Modern PoS systems […]

Read more

DSearching: Using Floating Mobility Information for Distributed Node Searching in DTNs

In delay tolerant networks (DTNs), enabling a mobile node to search and find another interested mobile node is an important function in many applications. However, the movement of nodes in DTNs makes the problem formidable. Current node searching methods in disconnected networks mainly rely on fixed stations in the network and infrastructure-based communication to collect node position information, which is difficult […]

Read more

Compact Fluorescent Lamp Modeling for Large-Scale Harmonic Penetration Studies

Low-watt compact fluorescent lamps (CFLs) may account for significant energy consumption of power distribution feeders in future years. This can lead to power-quality concerns because these devices consume highly distorted currents. In order to predict CFL harmonic current emissions into networks, CFL models capable of predicting these emissions accurately are being studied. On the other hand, […]

Read more

A Sensorless Adaptive Maximum Power Point Extraction Method With Voltage Feedback Control for Small Wind Turbines in Off-Grid Applications

Due to the ever growing global energy demand and pollution levels, clean and renewable alternative energy resources, such as wind, have become indispensable for preserving the planet for future generations. With wind being an unpredictable resource, it is imperative that wind systems extract as much power from the wind as possible while it is available. […]

Read more

Security Concerns and Countermeasures in Cloud Computing Paradigm

Since the inception in 2006, cloud computing has been a hot researching area of computer networktechnology. Some giant companies are offering the cloud services now. Migrating data to the cloud remains a tempting trend from a financial perspective but there are several other aspects that must be taken into account before it is decided to do […]

Read more

Managing Emergency Traffic Evacuation With a Partially Random Destination Allocation Strategy: A Computational-Experiment-Based Optimization Approach

Natural or man-made disasters can cause huge losses of human life and property. One of the effective and widely used response and mitigation strategies for these disasters is traffic evacuation. Evacuation destination choice is critical in evacuation traffic planning and management. In this paper, we propose a partially random destination allocation strategy for evacuation management. […]

Read more

Bluetooth Low Energy for data streaming: Application-level analysis and recommendation

Wearable devices enable the unobtrusive sensing of a wide range of human activities and the development of innovative applications. Wireless communication capabilities are one of the crucial features of networked wearable devices, since they set data exchange specifications and heavily affect the power consumption of the devices. In this paper, we investigate the use of the Bluetooth […]

Read more
Research paper writer service