نتایج جستجو برای: شبیه ساز opnet

تعداد نتایج: 44021  

این تحقیق با استفاده از روش تحقیق ترکیبی کمی و کیفی به بررسی ارتباط استراتژی‌های آموزش با توسعه حرفه‌ا‌ی دریانوردان و آموزش با شبیه سازهای دریایی پرداخته است. جامعه آماری مطالعه حاضر شامل کلیه دریانوردان ایرانی شاغل بر روی کشتی‌های تجاری بالاتر یا مساوی  3000 تناژ خالص، شرکت‌های کشتیرانی و سازمان بنادر بوده است که 250 تن از افسران و دانشجویانی که بیش از 120 ساعت دوره شبیه ساز را طی نموده‌اند، ب...

ژورنال: :مهندسی مکانیک مدرس 0
نعمت اله فولادی کارشناس پژوهشی/پژوهشگاه فضایی ایران علیرضا محمدی پژوهشگر، پژوهشگاه فضایی ایران هادی رضایی پژوهشگر، پژوهشگاه فضایی ایران

در تحقیق حاضر الگوریتم طراحی دیفیوزر خروجی گاز مافوق صوت از نوع گلوگاه ثانویه برای تست زمینی موتورهای مورد استفاده در ارتفاعات جوی بالاتر از km 100 ارائه شده است. در این الگوریتم پارامترهای هندسی دیفیوزر به دو دسته اصلی و فرعی دسته بندی می شوند. پارامترهای اصلی از روش موج ضربه ای قائم با اعمال ضریب تصحیح محاسبه شده و پارامترهای فرعی از نتایج تجربی گزارش شده از مراجع مختلف تعیین می گردد. نهایتاً ...

2012
Kuldeep Vats Monika Sachdeva Krishan Saluja Amit Rathee

In this paper discusses and evaluates “Optimized Link State Routing Protocol” OLSR routing protocol to better performance. Using OPNET simulator tools for the performance of OLSR routing protocol simulation, create in small network (30 nodes), medium size network (40 nodes) and large network (50 nodes) the complexity of the mobile ad-hoc network. The MPR count,”HELLO”message sent ,routing traff...

2014
Kapil Chawla Kuldeep Vats

In this paper analysis and performance of OLSR and TORA routing protocols is done. We used OPNET Simulation tool we created a network containing 50 mobile nodes with data rate 1 Mbps and 2 Mbps with transmission power 0.005 watts and buffer size 256000 bits each node moves randomly in the network and simulation time was 1500 sec. TORA and OLSR routing protocols were compared in terms of Traffic...

2013
Ravi Sindal Nidhi Jaiswal

A mobile ad hoc network (MANET) consists of mobile wireless nodes. The communication between these mobile nodes is carried without any centralized control. The ease of deployment and the infrastructure less nature of Mobile Ad Hoc Networks (MANET) make them highly desirable for present day multi media communications. In this paper we analyze the performance of TCP/IP based application protocol ...

2009
Karl Benkič

Routing protocol development and evaluation is still very interesting research topic in wireless sensor networks (WSN). There are two options for evaluating the routing protocols: evaluation on the real WSN or evaluation in simulator. The evaluation on the real network takes a lot of time and it can be quite expensive, so, evaluation in the simulator is common researchers selection. When using ...

2013
Mohammed ERRITALI Bouabid El Ouahidi

The objective of this work is to compare with simulating, using OPNET the performance of five Ad hoc routing protocols: DSR, AODV, OLSR ,TORA and GRP , and to examine the impact of mobility and the density of nodes on the behavior of these protocols in a Vehicular Ad hoc NETwork (VANET). The results show that there is not a protocol that is favorite for all evaluation criteria. Indeed, each pro...

Journal: :CoRR 2011
H. A. Esmaili Mohammad Reza Khalili Shoja Hossein Gharaee

Mobile ad hoc networks (MANETs) are dynamic wireless networks without any infrastructure. These networks are weak against many types of attacks. One of these attacks is the black hole. In this attack, a malicious node advertises itself as having freshest or shortest path to specific node to absorb packets to itself. The effect of black hole attack on ad hoc network using AODV as a routing proto...

2005
D. R. Basgeet P. Dugenie D. Kaleshi

This paper presents a new mathematical framework of a Scalable Mobility Model (SMM) to characterise user movement behaviour, which can be applied to a wide number of network scenarios ranging from Local Area Networks (LAN) to Wide Area Networks (WAN). The core technique to describe the spatial and temporal behaviour of mobile users is the introduction of a novel concept referred to as Pole of G...

2013
Mitko Bogdanoski

The paper analyzes systems vulnerability targeted by TCP (Transmission Control Protocol) segments when SYN flag is ON, which gives space for a DoS (Denial of Service) attack called SYN flooding attack or more often referred as a SYN flood attack. The effects of this type of attack are analyzed and presented in OPNET simulation environment. Furthermore, the paper presents two anomaly detection a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید