NS2 Projects with Source Code | 100% Output Guaranteed

Tag Archive: Network simulator2 Projects

Power quality dependence on connected appliances in an Off-Grid system

Power quality is one of the most important subjects in the field of power engineering. Especially in the Off-Grid systems, isolated networks, the power quality (PQ) is highly observed aspect. The fundamental Off-Grid feature can be intended an ability to operate regardless external power system, operation with an equal balance of energy production and consumption and […]

Read more

A comparative study of Land Mobile Radio and LTE-based public safety communications

Enabling seamless and mission critical voice and data services is a key requirement for public safetynetworks during the emergency and natural disaster scenarios. The ability to save lives depends on the reliable and effective communication amongst the first responders and victims. Land Mobile Radio System (LMRS) is a legacy technology which has been used for public […]

Read more

Human body channel energy harvesting scheme with −22.5 dBm sensitivity 25.87% efficiency threshold-compensated rectifier

A novel human body channel (HBC) energy harvesting scheme for body sensor networks (BSNs) is proposed in this paper. Human body channel is utilized innovatively as energy transmission medium to reduce the transmission loss dramatically and eliminate influence of shadow effect. Further, a high sensitivity and efficiency rectifier is presented by introducing an effective threshold compensation circuit. […]

Read more

EnDAS: Efficient Encrypted Data Search as a Mobile Cloud Service

Document storage in the cloud infrastructure is rapidly gaining popularity throughout the world. However, it poses risks to consumers unless the data is encrypted for security. Encrypted data should be effectively searchable and retrievable without any privacy leaks, particularly for the mobile client. Although recent research has solved many security issues, the architecture cannot be […]

Read more

IoT-OAS: An OAuth-Based Authorization Service Architecture for Secure Services in IoT Scenarios

standardized way from third-party applications accessing online services, based on the representational state transfer (REST) web architecture. OAuth has been designed to provide an authorization layer, typically on top of a secure transport layer such as HTTPS. The Internet of Things (IoTs) refers to the interconnection of billions of resource-constrained devices, denoted as smart objects, […]

Read more

Aerial assisted path planning for terrestrial rover without complete environment map

There are several existing methods available for planning paths for terrestrial rovers including graph searching, artificial potential fields, neural networks, fuzzy logic, genetic algorithms and ant colony optimization. Of these, the graph search technique is the most popular due to ease of implementation on rovers which don’t have a complete map of the area in which […]

Read more

Security Concerns and Countermeasures in Cloud Computing Paradigm

Since the inception in 2006, cloud computing has been a hot researching area of computer networktechnology. Some giant companies are offering the cloud services now. Migrating data to the cloud remains a tempting trend from a financial perspective but there are several other aspects that must be taken into account before it is decided to do […]

Read more

Heart murmur detection and classification using wavelet transform and Hilbert phase envelope

Detection and classification of heart murmurs play an important role in accurate diagnosis of different types of heart dysfunctions. In this paper, we present a noise-robust method for detection and classification of heart murmurs using stationary wavelet transform (SWT) and Hilbert phase envelope. The proposed method consists of five major stages: SWT based PCG signal […]

Read more

Disambiguating Stereoscopic Transparency Using a Thaumatrope Approach

Volume rendering is a popular visualization technique for scientific computing and medical imaging. By assigning proper transparency, it allows us to see more information inside the volume. However, because volume rendering projects complex 3D structures into the 2D domain, the resultant visualization often suffers from ambiguity and its spatial relationship could be difficult to recognize […]

Read more

Cumulative Distribution Function of Bivariate Gamma Distribution With Arbitrary Parameters and Applications

In this letter, we consider bivariate gamma distributions with arbitrary parameters and obtain closed-form expressions for the cumulative distribution function for scenarios where the difference between the shape parameters of the marginal distributions is an integer.

Read more
Research paper writer service