How to simulate User-Adopted Interactions in Wireless Security?
Given the dynamic developments and innovation in computing, IT and Information Systems Industry, it appears that there is a shortage of well qualified professionals who will push the edge of...
11 December 2019 6,551 5 View
Mathematical model on logistics and supply chain (LSC) plays an important role in the decision-making tool to obtain optimal strategy. An LSC comprises of the upper parts which consist of raw...
09 October 2019 879 1 View
09 October 2019 2,523 4 View
06 July 2019 2,871 1 View
Smart manufacturing, sometimes referred to as Industry 4.0, heralds a new age of responsive supply networks and tailored products and services made possible by advanced technologies such as the...
05 June 2019 1,559 2 View
The edge detection takes a wide interest in the field of digital image processing and computer vision, which is one of the basic stages in the process of patterns recognition and image...
04 May 2019 7,070 3 View
Text classification (TC) is a popular technique in the data mining and it used to get valuable information from the vast amount of data. The process of classifying or grouping documents into...
04 May 2019 1,441 3 View
Long Term Evolution (LTE) is the 4th generation broadband technology for mobile. LTE has been developed by 3GPP in release 8 technical specifications (R8). The LTE facilitates QoS to be...
02 March 2019 8,260 2 View
Vertical Handover (VHO) decision algorithm for heterogeneous network architectures which integrate both cellular networks and Wireless Local Area Networks (WLANs). The cellular-WLAN and WLAN-WLAN...
02 March 2019 9,189 1 View
Given the current dynamic developments in Computing, Internet and ICT industry, the Cyber Security has become essential part of curriculum in higher education worldwide. However, there are number...
01 February 2019 6,275 15 View
Is there a powerful system for the security of the systems distributed on IoT systems?
02 March 2021 3,858 10 View
Hi Community, I'm facing the issue of integration/compiling a new routing protocol in a WSN simulator. The final goal is to successfully add, configure this routing protocol in hardware devices...
01 March 2021 9,332 6 View
Hello researchers, Hello Castalia3.2 researchers I am a beginner with Castalia, I work on optimization of RFID systems used in wireless body networks. I simulated a WBAN with 10 nodes and one...
28 February 2021 400 1 View
Hi Hope you are well. Can you please share your code for D2D implementation in Matlab. I want to implement D2D in Matlab based Vienna simulator and struggling to deploy D2D. Thanks
24 February 2021 9,378 3 View
I understand there are a lot of software programs that can simulate DED by going through specific modeling, simulation, and commands. For me, that was time consuming and results were not accurate....
24 February 2021 4,428 3 View
Using GDB, it is straightforward to debug and monitor a target program by setting a break-point at a specific instruction, since the instruction addresses are known. However, we have two...
24 February 2021 1,598 2 View
Hi, We are trying to simulate particles with Langevin dynamics in a shear flow by Lees-Edwards boundary conditions in MD simulations. It seems thermal forces and shear flow do not go hand in...
23 February 2021 1,761 1 View
Dear researchers, I want to simulate a flow (air) in a wind tunnel, and I want to integrate a fluidic actuator inside it in order to control the separation of the boundary layer. At the blower...
22 February 2021 4,882 3 View
For my research, I would like to simulate an end to end 5G network. My goal is to observe the behaviour of SDAP protocol, dynamic configuration of 5QI values etc. To summarize I would like to...
21 February 2021 7,624 3 View
Dear Research Gaters, Let me first add context to the question. I am looking to simulate the waste management system and resources of a city. The hardware devices I need to simulate include,...
21 February 2021 2,333 4 View