搜索资源列表
StaticFPSys7.rar
- ApplicationDemo 指纹考勤机、门禁机、门锁的Demo VRR 基于指纹认证的VANET行车安全电子系统Demo,ApplicationDemo fingerprint attendance machine, access control devices, door locks of the Demo VRR fingerprint authentication VANET-based traffic safety electronic systems Demo
VANET_Simulation
- VANET的仿真,国外硕士论文,车辆道路-VANET simulation, master thesis
vanet_Skeleton_for_NS-2
- 基于NS-2的车辆Ad Hoc网络(VANET)的一个应用层协议框架,包含了代码和pdf说明文档-It is a VANET application protocol skeleton based on NS-2. Both source code and doc are included in RAR packet.
StrengtheningPrivacyProtectioninVANETs
- it is paper for VANET Communication
invent-vehicular-traffic-generator.tar
- vehicle generator for VANET.
speed-test-VANET-
- VANET Node Configuration
Rapport-Final-de-projet.pdf
- Rapport de Projet Final Projet VANET -Rapport de Projet Final Projet VANET
VCL-skin
- The feature of VANET mostly resembles the operation technology of MANET in the sense that the process of self-organization, self-management, low bandwidth and shared radio transmission criteria remain same. But the key hindrance in operation of V
fullskins
- High Dynamic topology: The speed and choice of path defines the dynamic topology of VANET. If we assume two vehicles moving away from each other with a speed of 60 mph ( 25m/sec) and if the transmission range is about 250m, then the link between
IEEE802-11p.tcl.tar
- 802.11p extension for the simulation of VANET and WAVE scenarios. It contains the new characteristics of MAC and PHY layers
vanet-document
- vanet dedicated short range communication
vanet_simulation_document
- vanet simulation document on routing
AODV-VANET-ns2
- aodv for vanet with SRP ns2
urban-VANET-scenario-U1.tar
- 车载自组网的仿真实例,城市环境,在NS2实现-VANET simulation example in the urban environment with NS2
urban-VANET-scenario-U2.tar
- 车载自组网仿真实例,城市环境中,NS2实现-VANET simulation example in the urban environment with NS2
vanet-highway-version2(1)
- code for creating a vanet highway scenarion in ns3 that can develope a good simulation
NS2 false information propagation simulation in VANET clusters
- I have simulation the prankster attack in this simulation. Node 3 is programmed as a prankster propagating false information in the VANET cluster. The false information propagated by node 3 affect the movement of three other nodes. First, is 0, who a
vanet
- This is the simulation file VANET in sumo and move software. This simulation is run under ubuntu 12.14 . This simulation with 50 vehicle in 5 junction
vanet
- Performance Evaluation of Urban and Rural Areas for VANET
vanet-vap-code-90
- vanet vap code Pervasive computing refers to the emerging trend toward numerous, easily accessible computing devices connected to an increasingly ubiquitous network infrastructure. Various areas like sensing the environment and Actuating, Human Compu