NS2 Projects with Source Code | 100% Output Guaranteed

Tag Archive: Ns2 Projects for students

Measurement-Based Modeling of Time-Variant Fading Statistics in Indoor Peer-to-Peer Scenarios

Investigation of small-scale fading in indoor peer-to-peer networks based on radio channel measurements shows that Rayleigh or double Rayleigh (DR) fading with or without line-of-sight (LOS) component can occur, depending on the mobility and on the scattering properties of the environment. While in double-mobile scenarios, the predominant fading mechanism is a combination of Rayleigh and DR fading, […]

Read more

Moment Analysis of Highway-Traffic Clearance Distribution

To help with the planning of intervehicular communication networks, an accurate understanding of traffic behavior and traffic phase transition is required. We calculate intervehicle spacings from empirical data collected in a multilane highway in California, USA. We calculate the correlation coefficients for spacings between vehicles in individual lanes to show that the flows are independent. We […]

Read more

Adaptive Robust Online Constructive Fuzzy Control of a Complex Surface Vehicle System

In this paper, a novel adaptive robust online constructive fuzzy control (AR-OCFC) scheme, employing an online constructive fuzzy approximator (OCFA), to deal with tracking surface vehicles with uncertainties and unknown disturbances is proposed. Significant contributions of this paper are as follows: 1) unlike previous self-organizing fuzzy neural networks, the OCFA employs decoupled distance measure to dynamically […]

Read more

OARE: Overhearing-Aided Redundancy Elimination in Multi-Rate WLANs

In general, an access point (AP) in wireless local area networks (WLANs) can be easily congested since all related data traffic goes through it. To satisfy the quality of service (QoS) requirement for its customers, protocol-independent redundancy elimination (RE) technique can effectively mitigate the congestion at the AP by reducing redundant data traffic. In this paper, we […]

Read more

Anonymous multi-receiver ID-based signcryption scheme

In earlier multi-receiver signcryption schemes, in order to help the authorised receivers to find the corresponding information for decryption from the ciphertext, the list of identities of all authorised receivers should be included in the ciphertext as a necessary element. However, this method has directly led to the privacy leakage problem of receivers. Later, several […]

Read more

Audit-Free Cloud Storage via Deniable Attribute-based Encryption

Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in practice, some authorities (i.e., coercers) may force cloud […]

Read more

Eikonal Analysis of the Boundaryless Beam Propagation Method

The boundaryless beam propagation method has been reported to suffer from reflections due to frequency aliasing. We propose an alternate explanation of reflection in the method, based on eikonal analysis of the wave equation in the mapped space, and show that reflection starts much before aliasing happens. We theoretically predict the reflection coefficient profile in […]

Read more

Public Space Ambient Intelligence Systems: Benefits, Approaches and Challenges

Modern public shared spaces offer a wide range of business and social functionalities. While they need to be efficiently operated, offering a secure environment is a prime objective. Manifold sensors and actuators, such as public lamps, surveillance systems or emergency phones, have been utilized in order to achieve this goal. Lights, cameras and a variate […]

Read more

Parallel Quantum Computing Teleportation for Spin Qubits in Quantum Dot and Microcavity Coupled System

We investigate the possibility of achieving a nonlocal parallel quantum computation by using hyperentangled photon pairs, quantum-dot spins, and optical-microcavities. Exploiting a pair of hyperentangled photons, the two nonlocal parties in a quantum network can perform a deterministic hyper-controlled-Z gate operation on two spins. With the parallel quantum computation operation, two identical cluster states can be built […]

Read more

Multiobjective Optimization of Linear Cooperative Spectrum Sensing: Pareto Solutions and Refinement

In linear cooperative spectrum sensing, the weights of secondary users and detection threshold should be optimally chosen to minimize missed detection probability and to maximize secondary networkthroughput. Since these two objectives are not completely compatible, we study this problem from the viewpoint of multiple-objective optimization. We aim to obtain a set of evenly distributed Pareto solutions. […]

Read more
Research paper writer service