Posts by Network Simulator 2

Towards an access control scheme for accessing flows in SDN

Towards an access control scheme for accessing flows in SDN

Sharing network resources with user groups, divisions, or even other companies in software defined networking promises better network utilization. Resource sharing is effectively realized...

Improving wireless physical layer security via co-operative techniques

Improving wireless physical layer security via co-operative techniques

Security is a critical concern in wireless network. Physical layer security exploits the physical characteristics of wireless channel for secure transmission. The physical layer security approach...

Bilateral Teleoperation System Using QoS and Secure Communication Networks for Telemedicine Applications

Bilateral Teleoperation System Using QoS and Secure Communication Networks for Telemedicine Applications

The next generation of telesurgical robotics systems presents significant challenges related to network performance and data security. It is known that...

Estimating Centrality Statistics for Complete and Sampled Networks: Some Approaches and Complications

Estimating Centrality Statistics for Complete and Sampled Networks: Some Approaches and Complications

The study of large, “big data” networks is becoming increasingly common and relevant to our understanding of human systems. Many of the...

Botnet in DDoS Attacks: Trends and Challenges

Botnet in DDoS Attacks: Trends and Challenges

Threats of Distributed Denial of Service (DDoS) attacks have been increasing day-by-day due to rapid development of computer networks and associated infrastructure,...

Non-parametric feature generation for RF-fingerprinting on ZigBee devices

Non-parametric feature generation for RF-fingerprinting on ZigBee devices

As the Internet of Things becomes a reality, proliferation of wireless devices such as ZigBee nodes has accelerated. Their presence...

Demand Response Control in Low Voltage Grids for Technical and Commercial Aggregation Services

Demand Response Control in Low Voltage Grids for Technical and Commercial Aggregation Services

The electrification of sectors such as heating and transportation represents a challenge as well as an opportunity for distribution system...

Secret Key Generation Rate with Power Allocation in Relay-based LTE-A Networks

Secret Key Generation Rate with Power Allocation in Relay-based LTE-A Networks

LTE-A networks exploit low-power relay nodes, picocells and femtocells to boost throughput, enhance coverage, decrease latency, and reduce cost. End users in...

A Saddle Point Algorithm for Networked Online Convex Optimization

A Saddle Point Algorithm for Networked Online Convex Optimization

An algorithm to learn optimal actions in convex distributed online problems is developed. Learning is online because cost functions are...

Security-Constrained Economic Dispatch

Security-Constrained Economic Dispatch

Security-constrained economic dispatch (SCED) is a simplified optimal power flow (OPF) problem. It is widely used in the power industry....

1 2 3 4 5 6 7 8 9 10

NS2 Member Accounts | |
© 2005 - 2024 Vanet Projects

© 2005 - 2024 Matlab Projects