IBX5980432E7F390 NEW NS2 PROJECT TOPICS - Computer Programming

NEW NS2 PROJECT TOPICS

NEW NS2 PROJECT TOPICS - Hallo Friends Computer Programming, In the article you read this time with the title NEW NS2 PROJECT TOPICS, We have prepared this article for you to read and retrieve information therein. Hopefully the contents of postings Article 2015, Article 2016, Article ns2, Article PROJECT, Article TOPIC, Article TRENDING, We write this you can understand. Alright, good read.

Title : NEW NS2 PROJECT TOPICS
link : NEW NS2 PROJECT TOPICS

Read


NEW NS2 PROJECT TOPICS

Hi, 
 Here are some new trending topics for doing projects in NS2.
  • Passive IP Traceback Disclosing the Locations of IP Spoofers From Path Backscatter - 2015 
  • A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous Wireless Sensor Networks - 2015 
  • Max Contribution An Online Approximation of Optimal Resource Allocation in Delay Tolerant Networks - 2015 
  • Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks with Delay-Constrained Traffics - 2015 
  • Self-Organizing Resource Management Framework in OFDMA Femtocells - 2015 
  • Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks - 2015 
  • Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse Underwater Sensor Networks - 2015 
  • Improving Physical-Layer Security in Wireless Communications Using Diversity Techniques - 2015 
  • Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection  Approach, IEEE Systems Journal, 2015 [NS2].
  • Detection of Malicious Node Behaviour Via I-Watchdog Protocol in Mobile Ad hoc Network With DSDV Routing Scheme,International Conference on Advances in Computing, Communication and Control, 2015 [NS2]
  • Cooperative Load Balancing and Dynamic Channel Allocation for Cluster-Based Mobile Ad Hoc networks, IEEE Transactions on Mobile Computing, 2015 [NS2]
  • Wormhole Attack Detection Algorithms in Wireless Network Coding Systems - 2015 
  • Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing Algorithm - 2015 
  • Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks - 2015 
  • Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud Computing - 2015 
  • Authenticated Key Exchange Protocols for Parallel Network File Systems - 2015 
  • Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks - 2015 
  • Impact of Location Popularity on Throughput and Delay in Mobile Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless  Ad Hoc Networks, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • Cooperative Black Hole Detection Mechanism in Mobile Ad Hoc Network, International Journal of Computer Applications, June 2015
  • Effect Analysis of Black Hole Attack of AODV Protocol in MANET using Table Driven Approach, International Journal of Computer Applications, June 2015
  • Performance Evaluation of QOS Parameters of Hybrid ACO/PSO for Mobile ADHOC Networks, International Journal of Computer Applications, June 2015
  • A Energy Efficient Approach to DSR based Routing Protocol for Ad Hoc Network, International Journal of Computer Applications, May 2015
  • Comparison between Minimum Power Consumption and Minimum Battery Cost
  • Routing for Energy Management in Wireless Ad Hoc Network, International Journal of Computer Applications, May 2015
  • Comparative Analysis of Various Routing Protocol in MANET, International Journal of Computer Applications, May 2015
  • Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Network - 2015 
  • Secrecy Capacity Optimization via Cooperative Relaying and Jamming for WANETs - 2015 
  • Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks - 2015 
  • Improving the Network Lifetime of MANETs through Cooperative MAC Protocol Design - 2015 
  • Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center Networks - 2015 
  • Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs - 2015 
  • Node Mobility Impact on Zone Routing Protocol, International Journal of Computer Applications, May 2015
  • Investigation and Optimization of Hello Message Interval for Scalable Ad-Hoc Network, International Journal of Computer Applications, May 2015
  • A Congestion Control Algorithm for Mobility Model in Mobile Ad-hoc Networks, International Journal of Computer Applications, May 2015
  • MAC-Layer Selfish Misbehavior in IEEE 802.11 Ad Hoc Networks: Detection and Defense, IEEE Transactions on Mobile Computing, 2015 [NS2]
  •  CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes, IEEE Transaction on Mobile Computing, 2014 [NS2]
  • Opportunistic Routing With Congestion Diversity in Wireless Ad Hoc Networks, IEEE/ACM Transactions on Networking, 2012 [NS2]
  • A Novel Token based DME Algorithm in MANET, International Journal of Computer Applications, June 2015
  • A Reputation-based Incentive Framework for Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
  • Prevention of Multiple Coordinated Jellyfish Attacks in Mobile Ad Hoc Networks, International Journal of Computer Applications, June 2015
  • Investigating the Impact of Black Hole Attack on AODV Routing Protocol in MANETS under Responsive and Non-Responsive Traffic, International Journal of Computer Applications, June 2015
  • Performance Evaluation of Position-Based Routing Protocols using Different Mobility Models in MANET, International Journal of Computer Applications, June 2015
  • Detection of Black Hole Attack using Control Packets in AODV Protocol for MANET, International Journal of Computer Applications, May 2015
  • Detection and Prevention Mechanism for TTL Field Tampering Form of DDoS Attack in MANET's, International Journal of Computer Applications, May 2015
  • Cluster Head Election Approach based on Weighted Clustering Algorithm for MANET, International Journal of Computer Applications, May 2015
  • Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs, International Journal of Computer Applications, May 2015
  • Performance Analysis of AODV, CBRP, AOMDV, DSR MANET Routing Protocol using NS2 Simulation, International Journal of Computer Applications, April 2015
  • A New Enhanced Energy Efficient Position based Routing Protocol for Mobile Adhoc Network, international Journal of Computer Applications, April 2015
  • Clustering in Vehicular Ad Hoc Network for Efficient Communication, International Journal of Computer Applications, April 2015
  • Performance Investigation of Signal Strength based Gossip AODV, International Journal of Computer Applications, April 2015
  • Highbrow TCP as an Enhanced TCP New Reno for MANETs - A Simulation Approach, International Journal of Computer Applications, April 2015
  • Enhance the Efficiency Routing between Mobile Nodes in MANET Networks, International Journal of Computer Applications, March 2015
  • Traffic Pattern based Performance Comparison of Two Proactive MANET Routing Protocols using Manhattan Grid Mobility Model, International Journal of Computer Applications, March 2015
  • An Approach to Detect Wormhole Attack in AODV based MANET, International Journal of Computer Applications, March 2015
  • A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, August 2015 [NS2]
  • REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, July- August 2015 [NS2]
  • HORA: A Distributed Coverage Hole Repair Algorithm for Wireless Sensor Networks, IEEE Transactions on Mobile Computing, July 2015[NS2]
  • A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks, IEEE Transactions on Mobile Computing, June 2015 [NS2]
  • An Efficient Distributed Trust Model for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, May 2015 [NS2]
  • A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks, IEEE Transactions on Dependable and Secure Computing, May-June 2015 [NS2]
  • Energy-Efficiency based Clustering and Data Aggregation for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
  • An Improvement of Network Life Time using DLQAR Protocol in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
  • Clustering and General Self-Organized Tree-based Energy-Balance Routing Protocol for Wireless Sensor Network (CGSTEB). International Journal of Computer Applications, May 2015 [NS2]
  • Secure based Clustering Algorithm for Wireless Sensor Networks. International Journal of Computer Applications, May 2015 [NS2]
  • Group Key Management Technique based on Logic- Key Tree in the Field of Wireless Sensor Network. International Journal of Computer Applications, May 2015 [NS2]
  • Clustering based Data Collection using Data Fusion in Wireless Sensor Networks.International Journal of Computer Applications, April 2015 [NS2]
  • An Optimized Cooperative Transmission based on V-BLAST Technique and GA clustering for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • A Novel Approach to Detect and Prevent Wormhole Attack in Wireless Sensor Network. International Journal of Computer Applications, April 2015 [NS2]
  • Comparative Analysis of Various Energy Efficient Protocols for Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • An Energy Preserving Detection Mechanism for Blackhole Attack in Wireless Sensor Networks. International Journal of Computer Applications, April 2015 [NS2]
  • An Energy Efficient Critical Event Monitoring Routing Method for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Improving the Life of the Wireless Sensor Network using Energy Harvesting Clustering. International Journal of Computer Applications, March 2015 [NS2]
  • Reliable Adaptive Replication Routing for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
  • Mobile Data Gathering with Load Balanced Clustering and Dual Data Uploading in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, April 2015 [NS2]
  • Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, April 2015 [NS2]
  • Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks, IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2]
  • Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks, January-February 2015 [NS2]
  • Energy and Density Aware Clustering (EDAC) to Improve Lifetime and Connectivity in Multi Level Heterogeneous Wireless Sensor Network. International Journal of Computer Applications , June 2015 [NS2]
  • Collision Optimized Broadcast Scheduling in Wireless Sensor Network. International Journal of Computer Applications, June 2015 [NS2]
  • Clustering and Energy Efficient Routing Protocol for Wireless Sensor Network using Genetic Algorithm. International Journal of Computer Applications, June 2015 [NS2]
  • A Static Code and Dynamic Data Attestation based Intrusion Detection System for Wireless Sensor Networks. International Journal of Computer Applications, June 2015 [NS2]
  • Geographic and Opportunistic Routing for Underwater Sensor Networks, IEEE Transaction on Computers, April 2015 [NS2]
  • Toward Offering More Useful Data Reliably to Mobile Cloud From Wireless Sensor Network, IEEE Transactions on Emerging Topics in Computing, March 2015 [NS2]
  • Distributed Database Management Techniques for Wireless Sensor Networks IEEE Transactions on Parallel and Distributed Systems, February 2015 [NS2/JAVA]
  • Dynamic Routing for Data Integrity and Delay Differentiated Services in Wireless Sensor Networks, IEEE Transactions on Mobile Computing, February 2015 [NS2]
  • Effect of using Mobile Sink on Chain-based Routing Protocols in Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Improving Energy Estimation based Clustering with Energy Threshold for Wireless Sensor Networks. International Journal of Computer Applications, March 2015 [NS2]
  • Batch Mode Job Scheduling Scheme (BJSS) for Clusters in Underwater Wireless Sensor Network (UWSN). International Journal of Computer Applications, June 2015 [NS2]
  • Energy Efficient Clustering Routing Protocol based on LEACH for WSN.International Journal of Computer Applications, June 2015 [NS2]
  • HEF Clustering for Secure and Efficient Data Transmission in CWSN. International Journal of Computer Applications, April 2015 [NS2]
  • Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN. International Journal of Computer Applications, April 2015 [NS2]
  • Energy Conservation Protocol using Sleep Scheduling in WSN. International Journal of Computer Applications, March 2015 [NS2]
  • Analysis of Random Walk Mobility Models with Location Heterogeneity, IEEE Transaction on Parallel and Distributed System, 2015 [NS2]
  • Achieving Congestion Diversity in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, March 2015.
  • A P2P-Based Market-Guided Distributed Routing Mechanism for High-Throughput Hybrid Wireless Networks, Mobile Computing, IEEE Transactions on, February 2015. [NS2]
  • A Distortion-Resistant Routing Framework for Video Traffic in Wireless Multihop Networks, Networking, IEEE/ACM Transaction on, April 2015. [NS2]
  • Backoff Design for IEEE 802.11 DCF Networks: Fundamental Trade off and Design Criterion, Networking, IEEE/ACM Transaction on, February 2015. [NS2]
  • PDR And HOP Count based Routing for Efficient Energy Usage, International Journal of Computer Applications, June 2015 [NS2]
  • Energy-efficient Cluster-based Mechanism for WBAN Communications for Healthcare Applications,International Journal of Computer Applications, June 2015 [NS2]
  • Performance Evaluation of DSR and GRP under Black Hole Attack,International Journal of Computer Applications , June 2015 [NS2]
  • Enhancing Security in DSR Protocol with Energy and Buffer Control Mechanism,International Journal of Computer Applications, June 2015 [NS2]
  • Characteristic Analysis of Mobility using Heterogeneous Network,International Journal of Computer Applications, June 2015 [NS2]
  • Automated Reconfiguration Enabled Mesh Network based on Fuzzy Logic for Performance Improvement, International Journal of Computer Applications, June 2015 [NS2]
  • Hybrid Scheduling for Heterogeneous Asymmetric Mobile Communication,International Journal of Computer Applications, June 2015 [NS2]
  • Cooperation without Synchronization: Practical Cooperative Relaying for Wireless Networks, Networking, IEEE/ACM Transaction on, May 2015. [NS2]
  • DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility, IEEE/ACM Transactions on Networking, April 2015 [NS2]
  • Distributed Information-Based Cooperative Strategy Adaptation in Opportunistic Mobile Networks, IEEE Transactions on Parallel and Distributed Systems, March 2015. [NS2]
  • Real Time Traffic Splitting and Efficient Flooding Mechanism in LSRP,International Journal of Computer Applications, May 2015 [NS2]
  • HOP-by-HOP Packet Forwarding Mechanism in Wireless Mesh Network, International Journal of Computer Applications, May 2015 [NS2]
  • Performance Comparison of different Congestion Control Protocols in Hybrid Network,International Journal of Computer Applications, May 2015 [NS2]
  • Efficient Routing in Zigbee Wireless Network using Shortcut Tree Routing.,International Journal of Computer Applications, May 2015 [NS2]
  • Performance Evaluation and Comparison of PDTMRP and MAODV,International Journal of Computer Applications, May 2015 [NS2]
  • Impact of Hello Interval on Performance of AODV Protocol,International Journal of Computer Applications, April 2015 [NS2]
  • An Optimizing Technique based on Genetic Algorithm for Power Management in Heterogeneous Multi-Tier Web Clusters,International Journal of Computer
  • Applications, April 2015 [NS2]
  • Hybrid Protocol for Handling Security using SBPGP, International Journal of Computer Applications , April 2015 [NS2]
  • Efficient Multicast Delivery for Data Redundancy Minimization over Wireless Data Centers, IEEE Transactions on Emerging Topics in Computing, March 2015. [NS2]
  • Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks, IEEE/ACM Transactions on Networking, 2015. [NS2]
  • Enhancing Availability in Content Delivery Networks for Mobile Platforms, IEEE Transaction on Parallel and Distributed System, Aug. 2015. [NS2]
  • High-Throughput Reliable Multicast in Multi-Hop Wireless Mesh Networks, IEEE Transaction on Mobile Computing, April 2015. [NS2]
  • Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes, IEEE Transactions on Mobile Computing, 2015 [NS2]
  • Neighbor Discovery in Wireless Networks with Multi-packet Reception, IEEE Transaction on Parallel and Distributed Systems, July 2015 [NS2]
  • Routing Pressure: A Channel-Related and Traffic-Aware Metric of Routing Algorithm, IEEE Transaction of Parallel and Distributed Systems, March 2015 [NS2]
  • The Mason Test: A Defense Against Sybil Attacks in Wireless Networks Without Trusted Authorities, IEEE Transaction on Mobile Computing, 2015 [NS2]
  • An Efficient Auction-based Mechanism for Mobile Data Offloading, IEEE Transactions on Mobile Computing, August 2015 [NS2]
  • Comparative Analysis of E-AOMDV and MC-AOMDV using Multi-criteria Multipath Routing,International Journal of Computer Applications , March 2015 [NS2]
  • Message Matching-based Artificial Bee Colony based Behaviour Detection in Delay Tolerant Networks,International Journal of Computer Applications, March 2015 [NS2]
  • New Protocol of Aggressive Packet Combining Scheme: An Extension to Throughput Comparison,International Journal of Computer Applications, March 2015 [NS2]
  • Performance Comparison of AODV and DSR Routing Protocols using Real Time Test-bed. International Journal of Computer Applications ,February 2015 [NS2]
  • Game Theory based Incentive Mechanisms in Delay Tolerant Network,International Journal of Computer Applications, April 2015 [NS2]
  • Concurrent Bandwidth Reservation Strategies for Big Data Transfers in HighPerformance Networks, IEEE Transactions on Network and Service Management, June 2015.
  •  Incentive Based Data Sharing in Delay Tolerant Mobile Networks, IEEE Transactions on Wireless Communications, January 2014 [NS2].
  • Technique to Improve the File Transfer Outcomes Between Road Side Unit and Vehicles in Vehicular Ad-Hoc Networks, International Conference on Computing, Communication and Automation, May 2015 [NS2].
  • A Reactive and Scalable Unicast Solution for Video Streaming over VANETs, IEEE Transaction on Computers, 2015 [NS2]
  • Secure and Robust Multi-Constrained QoS aware Routing Algorithm for VANETs , IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]
  • Isolating Packet Dropping Misbehavior in VANET Using Ant Colony Optimization, International Journal of Computer Applications, June 2015.
  • An Intersection based Traffic Monitoring using VANET, International Journal of Computer Applications, May 2015.
  • PBA: Prediction-based Authentication for Vehicle-to-Vehicle Communications,IEEE Transaction on Dependable and Secure Computing, 2015 [NS2]



Thus article NEW NS2 PROJECT TOPICS This time, hopefully, can give benefits to all of you. well, see you in posting other articles.

Berlangganan Untuk Mendapatkan Artikel Terbaru:

0 Komentar Untuk "NEW NS2 PROJECT TOPICS"

Posting Komentar