Journal articles on the topic 'NS2 simulator'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'NS2 simulator.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
V Raj, Shruthi, and Hemanth S R. "Simulation of ACO Technique Using NS2 Simulator." International Journal of Engineering Trends and Technology 23, no. 8 (2015): 403–6. http://dx.doi.org/10.14445/22315381/ijett-v23p277.
Full textWijekoon, Janaka, Erwin Harahap, and Hiroaki Nishi. "Service-oriented Router Simulation Module Implementation in NS2 Simulator." Procedia Computer Science 19 (2013): 478–85. http://dx.doi.org/10.1016/j.procs.2013.06.064.
Full textMOUSSA, Neila, Farah Nasri, and Rached Tourki. "NOC Architecture Comparison with Network Simulator NS2." International Journal of Engineering Trends and Technology 13, no. 7 (2014): 340–46. http://dx.doi.org/10.14445/22315381/ijett-v13p269.
Full textAbdo Asaad, Hasan Abdul Raqib, and Belal Al-Fuhaidi. "An Efficient Routing Method for Protection Data Flow in the MPLS Network." Journal of Science and Technology 22, no. 2 (2018): 25–39. http://dx.doi.org/10.20428/jst.v22i2.1286.
Full textLakshmi, N. Naga, P. Karthik, P. Shiva Sai, and A. Sai Vishal. "Implementation of DOS Attack Using NS2." International Journal of Emerging Science and Engineering 12, no. 6 (2024): 1–4. http://dx.doi.org/10.35940/ijese.f9859.12060524.
Full textN., Naga Lakshmi. "Implementation of DOS Attack Using NS2." International Journal of Emerging Science and Engineering (IJESE) 12, no. 6 (2024): 1–4. https://doi.org/10.35940/ijese.F9859.12060524.
Full textIbrahim, Idris Skloul, Peter J. B. King, and Hans-Wolfgang Loidl. "NsGTFA: A GUI Tool to Easily Measure Network Performance through the Ns2 Trace File." Journal of Intelligent Systems 24, no. 4 (2015): 467–77. http://dx.doi.org/10.1515/jisys-2014-0153.
Full textNemade, Chetana Hemant. "Execution Evaluation of AODV Protocol Using NS2 Simulator for Emergency Automobile." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 1792–801. http://dx.doi.org/10.47059/revistageintec.v11i4.2237.
Full textHan, Wen Zhi. "Network Congestion Control Algorithm Simulation Research Based on NS2." Applied Mechanics and Materials 713-715 (January 2015): 2455–61. http://dx.doi.org/10.4028/www.scientific.net/amm.713-715.2455.
Full textBalogh, Tomáš, and Martin Medvecký. "Average Bandwidth Allocation Model of WFQ." Modelling and Simulation in Engineering 2012 (2012): 1–7. http://dx.doi.org/10.1155/2012/301012.
Full textKim, Hye-Sun, and Ki-Tae Hwang. "NS2 based Simulator for Performance Evaluation of P2P Streaming Systems." KIPS Transactions:PartD 14D, no. 5 (2007): 555–64. http://dx.doi.org/10.3745/kipstd.2007.14-d.5.555.
Full textAguirre, Edgar Alirio, Luis Fernando Pedraza Martínez, and Gabriel Puerta. "Evaluación del establecimiento de la métrica de enrutamiento WCETT en una red de radio cognitiva." Revista Tecnura 17, no. 35 (2013): 55. http://dx.doi.org/10.14483/udistrital.jour.tecnura.2013.1.a05.
Full textTippannavar, Sanjay, Meghana N, and Yashwanth S D. "A Security Protocol for V2V Communication using NS2 Network Simulator." International Journal of Innovative Research in Advanced Engineering 10, no. 03 (2023): 49–57. http://dx.doi.org/10.26562/ijirae.2023.v1003.02.
Full textWang, Zhengyou, Wan Wang, Yanhui Xia, et al. "Visual Quality Assessment after Network Transmission Incorporating NS2 and Evalvid." Scientific World Journal 2014 (2014): 1–7. http://dx.doi.org/10.1155/2014/267403.
Full textMr.Ranjeet, Ramesh Suryawanshi*. "SIMULATION AND IMPLEMENTATION OF NETWORK TOPOLOGY USING NS2." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 291–95. https://doi.org/10.5281/zenodo.192907.
Full textLiu, Tong Qing, Guang Jie Han, Chuan Zhu, and Chen Yu Zhang. "Application Research on Aqua-Sim for Underwater Acoustic Sensor Networks." Advanced Materials Research 605-607 (December 2012): 1046–49. http://dx.doi.org/10.4028/www.scientific.net/amr.605-607.1046.
Full textPrasad, A.Y*1 &. DR R. Balakrishna2. "AN OPTIMIZED SOLUTION FOR MEASURES OF NETWORK LIFE TIME AND ENERGY CONSUMPTION USING IMPROVED ENERGY EFFICIENT LEACH PROTOCOL IN MANET." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 2 (2019): 102–12. https://doi.org/10.5281/zenodo.2566000.
Full textCai, Zhi Qiang, Rong Sheng Lv, and Shi Wen Sun. "One QoS Routing Algorithm for Load Balancing in IP Backbone Networks: Design and Simulation." Applied Mechanics and Materials 427-429 (September 2013): 2664–67. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2664.
Full textLiza, Farhana Ferdusi, and Khan Md. Al-Farabi. "Handover Delay Optimization in PMIPV6 Domain Through Improved Update Latency." DIU Journal of Science & Technology 6, no. 1 (2024): 9–16. https://doi.org/10.5281/zenodo.13731657.
Full textAtul, R. Halmare &. Poonam T. Bedarkar. "TOPOLOGICAL DESIGN OF NETWORKS FOR TCP-IP USING NS2." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY [ICEMESM-18] (April 27, 2018): 219–24. https://doi.org/10.5281/zenodo.1232307.
Full textLi, Li, Xiaoke Jin, Chenhe Lu, Zongbo Wei, and Jin Li. "Modelling and Simulation on Acoustic Channel of Underwater Sensor Networks." Wireless Communications and Mobile Computing 2021 (November 29, 2021): 1–12. http://dx.doi.org/10.1155/2021/8263600.
Full textU., Pavan Kumar. "IMPLEMENTATION OF A SECURITY PROTOCOL FOR BLUETOOTH AND WI-FI." International Journal of Network Security & Its Applications (IJNSA) 5, no. 3 (2013): 67–83. https://doi.org/10.5281/zenodo.4289544.
Full textB N, Prof Yuvaraju, and Dr Niranjan N. Chiplunkar. "Scenario Based Performance Analysis of variants of TCP using NS2-Simulator." International Journal of Computer Applications 4, no. 9 (2010): 20–24. http://dx.doi.org/10.5120/855-1197.
Full textMishra, Sakshi, and Girish Kumar Tiwari. "Analysis Performance of Different Routing Protocols for MANETs using NS2 Simulator." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 607–13. http://dx.doi.org/10.22214/ijraset.2022.47951.
Full textZoraida, B., and G. Indumathi. "Comparison of software defined networking with traditional networking using NS2 simulator." International Journal on Information Technologies and Security 15, no. 3 (2023): 3–14. http://dx.doi.org/10.59035/tbww1651.
Full textChen, Yun Han, Gui He Qin, and Yang Nan. "The Simulation Platform of Logical Ring in CAN Network Management." Applied Mechanics and Materials 427-429 (September 2013): 2174–78. http://dx.doi.org/10.4028/www.scientific.net/amm.427-429.2174.
Full textThamizhmaran, K., and A. Charles. "Comparison of on-demand routing protocol for MANET using simulation." i-manager's Journal on Communication Engineering and Systems 11, no. 1 (2022): 13. http://dx.doi.org/10.26634/jcs.11.1.18659.
Full textAlkenani, Jawad, and Khulood Ahmed Nassar. "Enhanced system for ns2 trace file analysis with network performance evaluation." Iraqi Journal of Intelligent Computing and Informatics (IJICI) 1, no. 2 (2022): 119–30. http://dx.doi.org/10.52940/ijici.v1i2.22.
Full textSangeeta Vhatkar. "Performance and QoS Assessment in WSN: Comparative Analysis of MBC, ECHERP, and PDCH Routing Methods." Journal of Electrical Systems 20, no. 4s (2024): 2176–84. http://dx.doi.org/10.52783/jes.2324.
Full textBalla, Rajeshwar L., and Venugopal Kotoju. "Sinkhole Attack detection and prevention in MANET & Improving the performance of AODV Protocol." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 07 (2013): 210–14. https://doi.org/10.5281/zenodo.14607291.
Full textAmena, Begum, Zahidur Rahman Md., Nancy Nurunnahar, and Enamul Haq Md. "Comparative Performance Evaluation of Mobile Ad-hoc Network Routing Protocols using NS2 Simulator." International Journal of Recent Technology and Engineering (IJRTE) 9, no. 3 (2020): 707–13. https://doi.org/10.35940/ijrte.C4691.099320.
Full textChabou, Zakaria, Adnane Addaim, and Abdessalam Ait Madi. "Enhancing performance of slotted ALOHA protocol for IoT covered by constellation low-earth orbit satellites." Bulletin of Electrical Engineering and Informatics 13, no. 6 (2024): 4030–40. http://dx.doi.org/10.11591/eei.v13i6.8158.
Full textPatel, Suraj. "Performance Analysis of Routing Protocols in Mobile Ad-hoc Networks (MANETs) Using NS2: A Comparative Study of AODV, DSR, and DSDV." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 09 (2024): 1–8. http://dx.doi.org/10.55041/ijsrem37624.
Full textZamani, Elham, and Mohammadreza Soltanaghaei. "The Improved Overhearing Backup AODV Protocol in MANET." Journal of Computer Networks and Communications 2016 (2016): 1–8. http://dx.doi.org/10.1155/2016/6463157.
Full textZhang, Runtong, Fuzhi Chu, Quan Yuan, and Wei Dai. "A Study on an Energy Conservation and Interconnection Scheme between WSN and Internet Based on the 6LoWPAN." Mobile Information Systems 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/592613.
Full textSharma, Saurabh, Dipti Jindal, and Rashi Agarwal. "Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-hoc Network." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (2018): 1305. http://dx.doi.org/10.11591/ijece.v8i3.pp1305-1314.
Full textSyed S, Syes Abdul, and T. Senthil Kumaran. "Extremely Vibrant Routing Scheme for Mobile Adhoc Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 306. http://dx.doi.org/10.11591/ijeecs.v9.i2.pp306-310.
Full textSaurabh, Sharma, Jindal Dipti, and Agarwal Rashi. "Analysing Mobile Random Early Detection for Congestion Control in Mobile Ad-hoc Network." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 3 (2018): 1305–14. https://doi.org/10.11591/ijece.v8i3.pp1305-1314.
Full textS., Syes Abdul Syed, and Senthil Kumaran T. "Extremely Vibrant Routing Scheme for Mobile Adhoc Network." Indonesian Journal of Electrical Engineering and Computer Science 9, no. 2 (2018): 306–10. https://doi.org/10.11591/ijeecs.v9.i2.pp306-310.
Full textBali, Akanksha, Malvika Ashok, and Megha Mahajan. "Performance Analysis of Routing Protocols under Security Issues through Use of NS2 Simulator." International Journal of Computer Applications 180, no. 20 (2018): 38–44. http://dx.doi.org/10.5120/ijca2018916478.
Full textMohapatra, S., and P. Kanungo. "Performance analysis of AODV, DSR, OLSR and DSDV Routing Protocols using NS2 Simulator." Procedia Engineering 30 (2012): 69–76. http://dx.doi.org/10.1016/j.proeng.2012.01.835.
Full textHasan, Mohammad Shahidul, Christopher Harding, Hongnian Yu, and Alison Griffiths. "Modeling delay and packet drop in Networked Control Systems using network simulator NS2." International Journal of Automation and Computing 2, no. 2 (2005): 187–94. http://dx.doi.org/10.1007/s11633-005-0187-x.
Full textDanda, Nandhini, and K. Suresh Babu Dr. "Vehicular Ad-Hoc Networks (VANET)." International Journal of Innovative Science and Research Technology 7, no. 4 (2022): 533–40. https://doi.org/10.5281/zenodo.6519390.
Full textRashad, Zahraa Khazal. "Evaluating the Impact of Mid-Link Bandwidth Constraints on Video Streaming Performance Using NS2." International journal of Computer Networks & Communications 16, no. 5 (2024): 77–90. http://dx.doi.org/10.5121/ijcnc.2024.16505.
Full textFlizikowski, Adam, Marcin Przybyszewski, and Witold Hołubowicz. "Evaluation of wimax admission control algorithms in mobile voip scenarios with batch arrivals and nbldpc fec." Image Processing & Communications 18, no. 1 (2013): 45–56. http://dx.doi.org/10.2478/v10248-012-0072-5.
Full textMohammed, Ahmed Jubair, Hamid Hassan Mustafa, A. Mostafa Salama, et al. "Competitive analysis of single and multi-path routing protocols in MANET." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 19, no. 1 (2020): 293–300. https://doi.org/10.11591/ijeecs.v19.i1.pp293-300.
Full textK., Prabu, and Thamizhmaran K. "A Review of FIFO Design for Wireless Network." Journal of Research and Advancement in Electrical Engineering 6, no. 3 (2023): 18–21. https://doi.org/10.5281/zenodo.10148054.
Full textMohammed, Marwan Aziz. "Performance Study of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks Based on Network Simulator NS2." Sulaimani Journal for Engineering Sciences 2, no. 2 (2015): 7–12. http://dx.doi.org/10.17656/sjes.100020.
Full textMohammed, Marwan Aziz. "Performance Study of AODV and DSDV Routing Protocols for Mobile Ad Hoc Networks Based on Network Simulator NS2." Sulaimani journal for engineering sciences 2, no. 2 (2015): 7–12. http://dx.doi.org/10.17656/sjes.10020.
Full textK., Thamizhmaran. "A Review of PQ Model for Infrastructureless Network." Recent Trends in Control and Converter 6, no. 3 (2023): 14–16. https://doi.org/10.5281/zenodo.10168573.
Full text