intTypePromotion=1
ADSENSE

Mobile computing simulations

Xem 1-20 trên 72 kết quả Mobile computing simulations
  • Chapter 27 - Wireless and mobile computing simulations. The following will be discussed in this chapter: What is ns-2? Getting ns? How to use ns-2? Adding your own stuff? Documentation, bug-fixing, fundamentals of discrete event simulation, ns-2 simulation.

    ppt66p nanhankhuoctai8 23-06-2020 10 0   Download

  • The following will be discussed in this chapter: Relationship between bandwidth of a signal (before and after and encoding SS), benefits of SS, FHSS, slow and fast FHSS, DSSS, relationship between bit rate of a signal (before and after DSSS encoding), CDMA.

    ppt107p nanhankhuoctai8 23-06-2020 3 0   Download

  • (bq) part 2 book "mobile ad hoc networking" has contents: data dissemination in opportunistic networks, task farming in crowd computing, mobility models, topology, and simulations in vanet, experimental work on vanet,...and other contents.

    pdf410p bautroibinhyen19 02-03-2017 43 3   Download

  • In this article, a single microstrip antenna for the future 5G mobile networks is designed using Rogers RT5880 substrate with dielectric constant of 2.2, which has a simple rectangle shape with small size.

    pdf6p vimante2711 05-03-2020 22 1   Download

  • This article proposes a valid route testing mechanism (VRTM) and integration of VRTM into AODV protocol to make DWAODV which is able to detect and prevent the wormhole attacks. Using Network Simulator (NS2), we evaluate the security effectiveness of DWAODV protocol on random movement network topology at high speed.

    pdf16p thuyliebe 05-10-2018 24 2   Download

  • The simulation results in NS2 show that TAM can successfully detect and prevent to 100% malicious nodes using fake keys and above 99% (the mistaken rate below 1.0%) wormhole nodes under hide mode for all mobility scenarios where there are nodes move with 30m/s maximum speeds and variable tunnel lengths.

    pdf22p thuyliebe 05-10-2018 59 0   Download

  • The primary focus of this paper is to present an adon technique named ‘Explicit No’ with reduced complexity, for evaluating trust worthiness of a neighboring node. This scheme helps in mitigating the effect of malicious nodes by correct identification. Results are presented through simulation in NS2.

    pdf6p girlsseek 27-02-2019 15 0   Download

  • In this paper the Macdc method is proposed to encounter the replication attacks using mobile agent technology in mobile WSNs. The mobile agents are used to aware every node from its trustworthy neighbors, so nodes do not interact with malicious nodes. The analysis and simulation results prove the effectiveness and efficiency of proposed Macdc method which also reduces the comparisons overhead.

    pdf7p byphasse043256 21-03-2019 12 0   Download

  • The conventional methods such as firewalls, encryption is no longer adequate. In this paper, we identify three types of threats against AODV which influence the routing message in MANET. Our solution is based on the use of Time based Finite State Machine to identify correct and malicious behavior in AODV. The TFSM have been modelled using JFLAP and simulated in MANET environment using C#.

    pdf8p byphasse043256 22-03-2019 21 0   Download

  • We propose a distributed algorithm to move sensor nodes dynamically and schedule node condition (active or sleeping) to maintain water surface field coverage for extended periods. Simulation results confirm that the features of proposed method can improve the duration of field coverage by 32%.

    pdf9p byphasse043256 23-03-2019 8 0   Download

  • The results show that OLSR has the best results in terms of delay; load whereas AODV has the best throughput. AODV and OLSR perform well with large network sizes and high mobility, whereas DSR protocol performs at an acceptable level with lower mobility and smaller network sizes.

    pdf10p byphasse043256 24-03-2019 16 0   Download

  • In this paper we propose an adaptive congestion control algorithm using cross layer design, which out-performs even during constrained situation. For analyzing the performance we have chosen four popular routing protocols such as AODV, DSR, DSDV and TORA. We also observe through simulation in NS2 that AODV out-performs other routing protocols in normal situation and DSR out-performs in constraint environment.

    pdf8p byphasse043256 24-03-2019 12 0   Download

  • The movement pattern of users is of significant when evaluating the performance of different kinds of algorithms in wireless networking environments. In this paper, we propose an enhanced random waypoint mobility model (ERWP) to achieve a good trade off between reality and complexity.

    pdf5p blossom162 31-03-2019 7 0   Download

  • The two protocols belong to different classes of routing categorization. The technical aspects of the two protocols is studied while highlighting the differences between the two and simulation-based performance comparison of the two protocols is carried out under varying traffic, mobility and network conditions using the Network Simulator.

    pdf6p blossom162 31-03-2019 25 0   Download

  • This paper shows a computer application developed in visual C # that acquires and sends by Bluetooth signals of electromyography through a wireless bracelet Myo for the control of an engine that simulates the steering wheel of a vehicle. The experiments carried out allow the control of a steering system by EMG signals of the right forearm that in the future can be adapted to a user with reduced mobility in the upper limb or serve as neuromotor rehabilitation therapy through serious games in virtual reality.

    pdf7p cleopatrahuynh 01-06-2020 7 0   Download

  • Scientists often have the feeling that, through their work, they are learning about some aspect of themselves. Physicists see this connection in their work; so do, for example, psychologists and chemists. In the study of robotics, the connection between the field of study and ourselves is unusually obvious. And, unlike a science that seeks only to analyze, robotics as currently pursued takes the engineering bent toward synthesis. Perhaps it is for these reasons that the field fascinates so many of us.

    pdf408p xblue06 09-05-2013 120 55   Download

  • This is a book about creating robots with the LEGO® MINDSTORMS™ Robotic Invention System (RIS)™. If you've always dreamed of building and programming your own robots, this is your big chance—the RIS set makes it easy to get started.

    pdf266p beobobeo 01-08-2012 69 15   Download

  • In this book chapter a comparative assessment of modelling and control of mechanical manipulator is considered. First, kinematic and dynamic modelling of wide range mechanical manipulators comprising flexible link, flexible joint and mobile manipulators considered. Then, open-loop optimal control problem is formulated to control of obtained system. Finally, some applications of method including motion planning maximum payload determination are illustrated through the computer simulations.

    pdf0p beobobeo 01-08-2012 72 12   Download

  • In the paper, we propose a femtocell selection scheme for femtocell-tofemtocell handover, named Mobility Prediction and Capacity Estimation based scheme (MPCE-based scheme), which has the advantages of the mobility prediction and femtocell’s available capacity estimation methods. Performance results obtained by computer simulation show that the proposed MPCE-based scheme can reduce unnecessary femtocell-tofemtocell handovers, maintain low data delay and improve the throughput of femtocell users.

    pdf7p babysexy1803 21-02-2019 12 0   Download

  • The main method for evaluating the performance of MANETs is simulation. In this paper performance of Ad-hoc On-demand Distance Vector (AODV) reactive routing protocol is studied by considering IEEE 802.11 and IEEE 802.15.4 standards. Metrics like average end-to-end delay, packet delivery ratio, total bytes received and throughput are considered for investigating simulation scenario by varying network size with 10 mps node mobility.

    pdf8p girlsseek 27-02-2019 12 0   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
207 tài liệu
1139 lượt tải
320 tài liệu
1052 lượt tải
ADSENSE

p_strKeyword=Mobile computing simulations
p_strCode=mobilecomputingsimulations

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2