Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (6)
Encryption and Decryption using DES in JAVA
no vote
DES.java generates the symmetric key using DES algorithm. Key size assigned here is 64 bits. It works only for the key size of 64 bits. 56 bits is mentioned in the coding remaining 8bits is accessed from inbuilt package. Encryption and decryption method is written based on DES algorithm. Message to encrypt can be given as input. Encrypted and decrypted text is displayed in message dialog.
possiblecode
2016-08-23
1
1
How to create Vehicular Ad hoc Network (VANET) in
no vote
<span style="font-family:"">Vehicular Ad hoc Network (VANET)are treated as mobile sensor networks and characterized with specialcharacteristics such as high node mobility and rapid topology changes. VANETnodes can sense a variety of data in its surrounding area to offer severalservices including traffic monitoring, speed controlling, lost vehicle locatingand environmental monitoring as it covers permanently a wide geographicalregion. Nodes are configured with different communication. Vehicles moveswithin the specified network boundary. Nodes in VANET can communicate in twoways: vehicle-to-vehicle (V2V) communication and Vehicle-to-infrastructure(V2I) communication. In V2I communication model, vehicles communicate toRoad-Side-Unit (RSU) through Road-Side-Routers. Data Transmission isestablished between nodes using UDP agent and CBR traffic. The code designs aVANET with sensor node configuration, commu
possiblecode
2016-08-23
0
1
Residual Energy of the nodes in ns2
4.0
≪ span style = "font family's" & gt; energy model represents the energy level of a node in the network. The energy model defined by the node has aninitial value, and the node with energy-saving level has the simulation value. Energy is called initial energy_ In the simulation, the variable represents the initial energy_ Any specific time.The Value of a node's energy level through the input parameter, a node loses energy in any given amount of transmission per packet and per packet received. As a result, the initial energy_ Values in a node get energy decreased.The After a node in the current value receives or sends routingpackets, the data transmission is established between UDP nodesusing agent and CBR communication. The evaluation of residual energy nodes is based on the built-in variable "energy" in the process of finding energy in differenttimes.
possiblecode
2016-08-23
3
1
C Program for ERROR detecting code using CRC-CCITT
no vote
The idea behind the CRC calculation is to look at the number of large binary data as a whole. This number is calculated by dividing a certain value by the sum of the surplus, which is called CRC. The first books partition in CRC computing consumes a lot of computing power, but it can perform very fast if a factory is built using a similar method in school. We will calculate the rest of the character'm 'as an example, which is the 1101 in binary notation, by dividing by 19or10011. Please note that 19 isan is odd. This is necessary because we are going to see more. Please refer to toyour textbook, where binary calculation method is not very different from the decimal method you learned when you were young. It may only see small, a little strange. There are also differences between countries, but the method is isimilar.
possiblecode
2016-08-23
0
1
C Program for Frame Sorting Technique using Buffer
no vote
In Computer Networks a frame is a packet which has been encoded fortransmission over a particular link. A packet consists of three elements: thefirst element is a header, which marks the beginning of the packet, and thesecond element is a data area, which contains the information to be carried inthe packet. The third element of packet is a trailer, which marks the end ofthe packet. Different communications protocols use different conventions fordistinguishing between the header, data, and footer elements and for formattingthe data.             So after dividing the packets intothe frames each frame transmitted independently over network. Due to the networkcongestion or network traffic in between intermediate routers or networkdevices the frames may receive in random order at the receiver. To overcomethis problem a frame sequence number is added in the header of each frame atthe transmitter and at the receiving end after receiving all the f
possiblecode
2016-08-23
0
1
Encryption and Decryption using Blowfish symmetric key algorithm
no vote
<span style="font-family:"">Blowfish.java generates the symmetrickey using Blowfish algorithm. Key size assigned here is 128 bits. It works forkey size of 256 and 448 bits also. Encryption and decryption method is writtenbased on Blowfish algorithm. Message to encrypt can be given as input.Encrypted and decrypted text is displayed in message dialog.
possiblecode
2014-11-26
0
1
No more~