Thread / Post | Tags | ||
Title: how to create a malicious node in opnet Page Link: how to create a malicious node in opnet - Posted By: akashvarad Created at: Thursday 17th of August 2017 08:04:03 AM | |||
how to create black hole attack in opnet simulator. which parameters should be set to create this attack ....etc | |||
| |||
Title: code for malicious node detection in ns2 Page Link: code for malicious node detection in ns2 - Posted By: bvnod Created at: Thursday 05th of October 2017 04:01:33 AM | |||
sir, | |||
| |||
Title: automatic path finding robot full report Page Link: automatic path finding robot full report - Posted By: ashikshanu Created at: Thursday 17th of August 2017 04:57:48 AM | |||
can you pls post the full report of path finding robot pls :huh: working on it :( ....etc | |||
Title: malicious node ns2 source code Page Link: malicious node ns2 source code - Posted By: nimrod Created at: Thursday 05th of October 2017 05:17:54 AM | |||
25 wireless node | |||
Title: create a malicious node in opnet Page Link: create a malicious node in opnet - Posted By: ankita Created at: Thursday 17th of August 2017 05:41:37 AM | |||
tell which parameters are used to create a malicious node in jelly fish attack in opnet modeler 14.5 ....etc | |||
Title: On finding paths and flows in multicriteria stochastic and time-varying networks Page Link: On finding paths and flows in multicriteria stochastic and time-varying networks - Posted By: minumol Created at: Thursday 17th of August 2017 05:27:14 AM | |||
This dissertation addresses two classes of network flow problems in networks with multiple, stochastic and time-varying attributes. The first problem class is concerned with providing routing instructions with the ability to make updated decisions as information about travel conditions is revealed for individual travelers in a transportation network. Three exact algorithms are presented for identifying all or a subset of the adaptive Pareto-optimal solutions with respect to the expected value of each criterion from each node to a desired destin ....etc | |||
Title: ns2 sample code for eliminating malicious node using trust value evaluation Page Link: ns2 sample code for eliminating malicious node using trust value evaluation - Posted By: rahulvemula_961 Created at: Thursday 05th of October 2017 04:09:51 AM | |||
i'm doing m.cs final year project .so will u please help me to get the coding or algorithm for eliminating malicious node using trust based evaluation ....etc | |||
Title: Finding frequent items over general update streams Page Link: Finding frequent items over general update streams - Posted By: poloman007 Created at: Thursday 17th of August 2017 08:05:32 AM | |||
Abstract. | |||
Title: malicious node in opnet Page Link: malicious node in opnet - Posted By: dileeplukose Created at: Thursday 17th of August 2017 05:42:06 AM | |||
how can we make a node as malicious in opnet?I tried various parameters like hello allowed loss and packet queue size but it is not giving the exact result. ....etc | |||
Title: c progarm for finding follow and first Page Link: c progarm for finding follow and first - Posted By: mohanraj_m25 Created at: Thursday 17th of August 2017 05:26:45 AM | |||
I am not getting the proper code to calculate first and follow of productions after elimination of left recursion . |
Please report us any abuse/complaint to "omegawebs @ gmail.com" |