搜索资源列表
Security-Paper-Presentation
- A Novel Security Scheme for Wireless Adhoc Network
05678607
- data of mobile adhoc network
Adhoc-TCP.tar
- 对TCP在AD HOC网络中实现的介绍,内容很不错,可以看看。-AD HOC network for TCP is implemented in the introduction, the content is very good, you can see.
dsdv01.tcl.tar
- ns2 simulaiton, adhoc network on compare 3 protocol dsr, aodv, dsdv
aodv
- AODV source codes for omnet++ used for adhoc network simulation.
lab23
- 这是柯志亨的《NS2仿真实验-多媒体和无线网络通信》一书中实验23的源代码。它实现了adhoc网络路由协议效果分析-This is Ke Zhi Heng' s " NS2 simulation- multimedia and wireless network communication," a book experiment 23 source code. It implements the adhoc network routing protocol effectiv
wifi-adhoc
- 在ns3中用来仿真ad hoc网络的一个代码例子,同时会跟踪信源进行包统计-Used for the simulation of AD hoc network in ns3 a code example, at the same time will be tracking information source for packet statistics
adhoc-security
- 提出了一种基于信任模型的机会路由协议,有效地保证了自组网网路的安全正常通信。弥补了机会路由协议中的安全隐患问题-This paper proposes a trust model based routing protocols, effectively guarantee the safety of AD hoc network normal communication.To make up for the safety problems in routing protocol opportun
aodv20
- AODV protocol in Adhoc network
aodv40
- AODV for 40 node in Adhoc network
aodv60
- AODV for 60 node in Adhoc network
reregardingadhocnetwork
- some research papers on adhoc network one of the best area of research
Paramter initialization Method for MANET
- Technique for Parameter initialization in mobile adhoc network
MANET authentication scheme
- source code for hash based authentication scheme for mobile adhoc network
SCHEDULING-SCHEMES-FOR-THROUGHPUT-OPTIMIZATION-IN
- This thesis presents a scheme for scheduling of wireless adhoc networks by using directional antennas using the concept of frequency reuse. The idea of wireless adhoc network communication is taken one step further by adding directional antennas for
AdHocaSatt
- adhoc network with satellite overlay to improve performance
NEW-49(1)
- improving security performance in adhoc network with satellite overlay
Workflow
- This project concentrates on the deterministic approach. This guarantees the full coverage in mobile adhoc network. This uses deterministic broadcast protocols that use neighbor set information only, which is more efficient method.
LEACH--Protocol-in-Matlab
- LEACH protocol for adhoc network using MATLAB
VAN
- Implementation of beacons control bulk data dissemination protocol in vehicular adhoc network