نتایج جستجو برای: ns2 simulator
تعداد نتایج: 32400 فیلتر نتایج به سال:
The paper presents design, background as well as simulation results of our new communication system designed for adhoc wireless networks which supports Implanted Chain Certificates Scheme providing efficiency of certificate verification. We employ threshold cryptography to spread the certificate service over specially selected nodes, the vouchers, to achieve high fault tolerance against network...
A Mobile Ad hoc NETwork (MANET) is a group of mobile nodes that rely on wireless network interfaces, without the use fixed infrastructure or centralized administration. In this respect, these networks are very susceptible to numerous attacks. One attacks black hole attack and it considered as one most affected kind MANET. Consequently, an Intrusion Detection System (IDS) has major importance in...
Vehicular Ad-Hoc Networks (VANET) helps to improve the traffic safety by exchanging information between each other and hence the drivers can prepare for a dangerous situation. The Routing protocol for multihop broadcast helps to provide efficient routing in broadcast communications. This protocol has some routing overhead in different network scenarios. Here in the proposed method the network t...
We propose and analyze an information-sharing application for wireless intervehicular networks, called Infoshare. Infoshare leverages the broadcast nature of the wireless medium to achieve maximum spreading of information queries among vehicles, while a smart caching policy limits the overhead resulting from useless queries and duplicated replies. We first evaluate the performance of Infoshare ...
Energy efficient routing protocol is very necessary in wireless sensor network due to the existence of resource constrained sensors. Clustering is an efficient approach for these problems in large sale networks. Hence, in this paper an energy efficient clustering algorithm is designed for sensor networks by considering the residual energy, cluster size and distance between the cluster head and ...
This paper describes the generation of fuzzy signatures to detect some cyber attacks. This approach is an enhancement to our previous work, which was based on the principle of negative selection for generating anomaly detectors using genetic algorithms. The present work includes a different genetic representation scheme for evolving efficient fuzzy detectors. To determine the performance of the...
IEEE 802.11 is a widely used wireless LAN standard for medium access control. TCP is a prominent transport protocol originally designed for wired networks. TCP treats packet loss as congestion and reduces the data rate. In wireless networks packets are lost not only due to congestion but also due to various other reasons. Hence there is need for making TCP adaptable to wireless networks. Variou...
MANET is developing the next generation wireless universe. However MANETS prove their performance only when routing is efficient. In this paper we propose a model of Dedicated Trust System (DTS) which aims in detecting the misbehaving nodes. We implement our DTD using zone routing protocol with trusted systems. We finally develop a reputation model with two new parameters trustee and bucy trust...
NS2 protein is essential for hepatitis C virus (HCV) replication. NS2 protein was expressed and purified. Aptamers against NS2 protein were raised and antiviral effects of the aptamers were examined. The molecular mechanism through which the aptamers exert their anti-HCV activity was investigated. The data showed that aptamer NS2-3 inhibited HCV RNA replication in replicon cell line and infecti...
We approach the problem of load balancing for wireless multi-hop networks by distributed optimisation. We implement an approximation algorithm for minimising the maximum network congestion as a modification to the DSR routing protocol. The algorithm is based on shortest-path computations that are integrated into the DSR route discovery and maintenance process. The resulting Balanced Multipath S...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید