Optical fiber is one of the most important communications media in communication
system. Due to its versatile advantages and negligible transmission loss it is used in high
speed data transmission. There are various types of optical fiber, the Fibe
r Bragg Grating
(FBG) is commonly chosen as important components to compensate the dispersion in
optical communication system. Because the low cost of filter for wavelength selection and
low insertion loss, it has also customized reflection spectrum and wide bandwidth. The
simulation of transmission system will be analyzed based on different parameters using
OptiSystem simulator. By simulating a model of communication system and using the
most suitable settings of the system which include input power, fiber cable length (km) and
attenuation coefficient (dB/km) at cable section, there are three different parameters will be
investigated, which are Signal power, Noise power, output power at receiver.
In this PAPER, we perform a study and extensive comparative between
the well-known link quality estimators and CTP, a tree-based routing
protocol provided by TinyOS for different network topology and simulate
it using TOSSIM simulator to evaluate
the performance of these
estimators.
The
aim objectives of this study is, to determine the optimum distance
for the cavity that can allow maximum light to pass through
according to one of the criteria for assessing global sustainability,
and to study the daylight characteristic of t
hese double facade
windows, In this research, it conducted numerous experiments to
study the effect of doubling the facade design on the standard of
sustainability (daylight factor) space studied.
In this thesis an analytical study is done on existing cloud
resource allocation strategies and a comparative study summarize
them on the basis of technique used and objective as well as their
advantage and disadvantage.
In this search, we provide a study
about the security in VANET networks which are considered to be a
part of mobile wireless networks and designed to work between
moving vehicles. The most important security flaws of this
networks and its applica
tions are studied.
In fact, we study the most important and dangerous attacks that may
target VANET networks and analyze its main risks. Furthermore,
we simulate some of these attacks Specifically Denial-of Service
(DOS) attack using prober tools depending on chosen parameters
that characterize the network performance. moreover, we provide
some Security solutions to help counter measuring these attacks and
minimize this effects, and Finally we apply these solutions and
evaluate them.
In this paper, we use NCTUns 6.0
to simulate this kind of networks ,because it is difficult to do that is the
real world .In this paper, two routing protocols (AODV, ADV) are
studied within many scenarios to achieve their performances and
reliabi
lity using many metrics.
We conclude that ADV routing protocol adapts quickly when the
complexity of network and mobility of nodes increase. This is achieved
by varying the size and frequency of routing updates.
Throughput
الإنتاجية
MANET
VANET
شعاع المسافة عند الطلب النقال
شعاع المسافة الموائم
شبكات العقد النقالة
شبكات المركبات النقالة
التصادمات
الرزم المرمية
متوسط توصيل الرزم
متوسط التأخير طرف إلى طرف
متوسط حمل التوجيه
المحاكي NCTUns 6.0
NCTUns 6.0 simulator
AODV
ADV
collisions
drop packets
Packet delivery ratio
المزيد..
This paper focuses on securing zone routing protocol (ZRP) from
one of the most possible attacks such as bogus route attack and
black hole attack. This paper provides a solution against this attack
using identity based cryptography(IBC), We implement, evaluate
our proposal using NS-2 network Simulator.
The study aimedtoalertthe danger oferosionare three types ofsoilsexposedby
calculatingthe amount ofsoilerodedfromthe impact ofthe
Cascadefiverainstormsequalintensity, thosesoils, has been securedsoilsnecessaryfor the
studyofseveral areas ofdiffere
nt provincesin Syria, where he wasplaced in thebasin,
thenoffered forrainstormsbymobile(Rainfall Simulation),andaftereveryrainstormwas
recordedreadingsfor the loss ofsoilfromeachbasinrunoffandinfiltration.
The results of thisstudy showedthe effectin terms oftexturesin thedrift,
themoremechanicalgroupsdriftingin the threesoilsareprimarilysiltgroup, followed by the
mudpack, thensand, and clay soilswith ahigh percentageofsiltmosterosionofclay soilswith
alowpercentageofsilt, followed bysandyclayloamsoils, wherethe amount ofsoillostfromthe
clay soilreachedwith a high contentofsilt147.7t/ h/y, andthe lowclaycontentofsilt118.5t/
h/y, while the soilwithtexturesLummisandyclay, reaching 90.5t / h/y.And soil erosion that
attaches primarily by college carbonates then dispersion ratio of organic matter and then
finally percentage silt.
This paper presents parallel computers architectures especially Superscalar
processors and Vector processors, building a simulator depending on the basic
characteristics for each architecture, the simulator simulates their mechanism of work
progra
mmatically at the aim of comparing the performance of the two architectures in
executing Data Level Parallelism (DLP) and Instruction Level Parallelism ILP.
The results shows that the effectiveness of executing instructions in parallel depends
significantly on choosing the appropriate architecture for execution, according to the type
of parallelism that can be applied to instructions, and the vector features in the vector
architecture achieve remarkable improvement in performance that cannot be ignored in
execution of DLP, simplify the code and reduce the number of instruction. The provided
simulator is a good core that can be developed and modified especially in the field of
education for the students of Computer Science and Engineering and the research field.