Performance Analysis of a Simulation-Based Communication Network Model with NS2 Simulator

Author(s):  
G. Rajendra Kumar ◽  
B. Dinesh Reddy ◽  
N. Thirupathi Rao ◽  
Debnath Bhattacharyya
2021 ◽  
pp. 1-29
Author(s):  
Sk. Meeravali ◽  
Debnath Bhattacharyya ◽  
N.Thirupathi Rao ◽  
Yu-Chen Hu

2014 ◽  
Vol 989-994 ◽  
pp. 2639-2642
Author(s):  
Nan Qi Yuan ◽  
Tian Jiang ◽  
Shi Bai ◽  
Hao Sun ◽  
Jing Mei Zhao

In order to research dynamic network astringency reaching uniformity, this paper perfects the Vicsek model and puts forward improving dynamic network astringency efficiency by weighted model. We prove that the convergence rate of weighted model is faster than the classic Vicsek model and it can optimize dynamic network.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Sign in / Sign up

Export Citation Format

Share Document