SlideShare une entreprise Scribd logo
1  sur  13
Télécharger pour lire hors ligne
Flat No 2,Second Floor,
Lane No : A26, Above Esha Décor shop ,
Dhayari, Pune.
7385350430
www.ocularsystems.in
info@ocularsystems.in
NS2 Project
1. Secured Link Quality, Delay and Energy Aware Routing
Protocol (SLQDEARP) For Mobile Ad Hoc Networks
2. An improved congestion avoidance control model for TCP Vegas
based on Ad Hoc networks
3. DRINA: A Lightweight and Reliable RoutingApproach for In-
Network Aggregation in Wireless Sensor Networks
4. A Novel Gateway Selection Method to Maximize the System
Throughput of Wireless Mesh Network Deployed in Disaster
Areas
5. An Energy-Efficient Routing Method with Intrusion Detection
and Prevention for Wireless Sensor Networks
6. Content Aware Multi-Metric Routing for MPEG-4 Video over
IEEE 802.11e wireless mesh networks using cross layer
approach
7. An ant swarm-inspired energy-aware routing protocol for
wireless ad-hoc networks
8. Passive Measurement of Interference in WiFi Networks with
Application in Misbehavior Detection
9. Semi-Structure Routing and Performance Analysis for
Cognitive Radio Networks
10. USOR An Unobservable Secure On demand routing protocol
for MANET.
11. Hop By Hop routing in wireless mesh network with
bandwidth guarantee
12. Dynamic Multilevel priority packet scheduling for Wireless
sensor network
13. Geocross : A geographic routing protocol in presence of
loops in urban scenario
14. Vampire Attacks: Draining life from wireless AD HOC
sensor networks
15. ALERT : An Anonymous Location based Efficient routing
protocol in MANETs
16. Cluster-Based Certificate Revocation with Vindication
Capability for Mobile Ad Hoc Networks
17. Investigating a Junction-Based Multipath Source Routing
Algorithm for VANETs
18. A Rank Correlation Based Detection against
Distributed Reflection DoS Attacks
19. Towards Reliable Data Delivery for Highly Dynamic
Mobile Ad Hoc Networks
20. Adaptive Position Update for Geographic Routing in
Mobile Ad Hoc Networks
21. The Three-Tier Security Scheme in Wireless Sensor
Networks with Mobile Sinks
22. ALERT: An Anonymous Location-Based Efficient
Routing Protocol in MANETs
23. Secure Data Collection in Wireless Sensor Networks
Using Randomized Dispersive
24. An Efficient and Robust Addressing Protocol for Node
Auto configuration
25. TARF: A Trust-Aware Routing Framework for Wireless
Sensor Networks
26. BAHG: Back-Bone-Assisted Hop Greedy Routing for
VANET’s City Environments
27. Cut Detection in Wireless Sensor Networks
28. Distributed Cooperative Caching in Social Wireless
Networks
29. EAACK—A Secure Intrusion-Detection System for
MANETs
30. Enhanced OLSR for Defense against DOS Attack in Ad
Hoc Networks
31. Proteus: Multiflow Diversity Routing for Wireless
Networks with Cooperative
32. Target Tracking and Mobile Sensor Navigation in
Wireless Sensor
33. Toward a Statistical Framework for Source Anonymity in
Sensor Networks
34. Design and Implementation of a WLAN Mesh Router
Based on Multipath Routing
35. Analysis of DV-Hop Localization Algorithm in Wireless
Sensor Networks
36. Delaying Transmissions in Data Communication
Networks to Improve Transport
37. Toward Privacy Preserving and Collusion Resistance in
a Location Proof Updating System
38. Model-Based Analysis of Wireless System Architectures
for Real-Time Applications.
39. On Exploiting Transient Social Contact Patterns for
Data Forwarding in Delay-Tolerant Networks
40. Strategies for Energy-Efficient Resource Management
of Hybrid Programming Models
41. Capacity of Hybrid Wireless Mesh Networks with
Random Aps
42. Delay-Optimal Broadcast for Multi hop Wireless
Networks Using Self-Interference Cancellation
43. Distance Bounding A Practical Security Solution for
Real-Time Location Systems
44. Detection and Localization of Multiple Spoofing
Attackers in Wireless Networks
45. Cross-Layer Design of Congestion Control and Power
Control in Fast-Fading Wireless Networks
46. Mobi-Sync Efficient Time Synchronization for Mobile
Underwater Sensor Networks
47. Discovery and Verification of Neighbor Positions in
Mobile Ad Hoc Networks
48. Mobile Relay Configuration in Data-Intensive Wireless
Sensor Network
49. In-Network Estimation with Delay Constraints in
Wireless Sensor Network
50. Harvesting-Aware Energy Management for Time-Critical
Wireless Sensor Networks With Joint Voltage and Modulation
scaling
51. Network Traffic Classification Using Correlation
Information
52. Quality-Differentiated Video Multicast in Multirate
Wireless Networks
53. Power Allocation for Statistical QoS Provisioning in
Opportunistic Multi-Relay DF Cognitive Networks
54. Coloring-Based Inter-WBAN Scheduling for Mobile
Wireless Body Area Networks
55. Cross-Layer Design of Congestion Control and Power
Control in Fast-Fading Wireless Networks
56. Analysis of Distance-Based Location Management in
Wireless Communication Networks
57. A Resource Allocation Scheme for Scalable Video
Multicast in WiMAX Relay Networks
58. Localized Algorithms for Detection of Node Replication
Attacks in Mobile Sensor Networks
59. Secure and Reliable Routing Protocols for
Heterogeneous Multihop Wireless Networks
60. Efficient Algorithms for Neighbor Discovery in Wireless
Networks
61. Hop-by-Hop Message Authentication and Source
Privacy in Wireless Sensor Networks
62. ProHet: A Probabilistic Routing Protocol with Assured
Delivery Rate in Wireless Heterogeneous Sensor Networks
63. LDTS A Lightweight and Dependable Trust System for
Clustered Wireless Sensor Networks
64. DCIM: Distributed Cache Invalidation Method for
Maintaining Cache Consistency in Wireless Mobile Networks
65. Opportunistic MANETs: Mobility Can Make Up for Low
Transmission Power
66. Optimal Multicast Capacity
and Delay Tradeoffs in MANETs
67. A Rank Correlation Based Detection against Distributed
Reflection DoS Attacks
68. Towards Reliable Data Delivery for Highly Dynamic
Mobile Ad Hoc Networks
69. Adaptive Position Update for Geographic Routing in
Mobile Ad Hoc Networks
70. The Three-Tier Security Scheme in Wireless Sensor
Networks with Mobile Sinks
71. ALERT : An Anonymous Location – Based Efficient
Routing Protocol in MANETs
72. Secure Data Collection in Wireless Sensor Networks
Using Randomized Dispersive Routes
73. An Efficient and Robust Addressing Protocol for Node
Autoconfiguration in Ad Hoc Networks
74. TARF: A Trust-Aware Routing Framework for Wireless
Sensor Networks
75. BAHG: Back-Bone-Assisted Hop Greedy Routing for
VANET’s City Environments
76. Cut Detection in Wireless Sensor Networks
77. Distributed Cooperative Caching in Social Wireless
Networks
78. EAACK—A Secure Intrusion-Detection System for
MANETs
79. Enhanced OLSR for Defense against DOS Attack in Ad
Hoc Networks
80. Proteus: Multi flow Diversity Routing for Wireless
Networks with Cooperative Transmissions
81. Target Tracking and Mobile Sensor Navigation in
Wireless Sensor
82. Toward a Statistical Framework for Source Anonymity in
Sensor Networks
83. Design and Implementation of a WLAN Mesh Router
Based on Multipath Routing
84. Analysis of DV-Hop Localization Algorithm in Wireless
Sensor Networks
85. Delaying Transmissions in Data Communication
Networks to Improve Transport-Layer Performance
86. Secure Data Collection In Wireless Sensor Networks
Using Randomized Dispersive Routes
87. A Secure Intrusion detection system against DDOS

Contenu connexe

Tendances

IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...IEEEBEBTECHSTUDENTPROJECTS
 
Analysis and implementation of a wsn with remote access through sms
Analysis and implementation of a wsn with remote access through smsAnalysis and implementation of a wsn with remote access through sms
Analysis and implementation of a wsn with remote access through smsimpulsetechembedded12
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
Wireless Sensor Network with Mobile Integration
Wireless Sensor Network with Mobile IntegrationWireless Sensor Network with Mobile Integration
Wireless Sensor Network with Mobile Integrationimshashank
 
Wireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesWireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesShakas Technologies
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkIJMER
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 

Tendances (11)

Ns2 titles
Ns2 titlesNs2 titles
Ns2 titles
 
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...IEEE 2014 NS2 NETWORKING PROJECTS  Improving spectrum efficiency via in netwo...
IEEE 2014 NS2 NETWORKING PROJECTS Improving spectrum efficiency via in netwo...
 
Analysis and implementation of a wsn with remote access through sms
Analysis and implementation of a wsn with remote access through smsAnalysis and implementation of a wsn with remote access through sms
Analysis and implementation of a wsn with remote access through sms
 
M.Tech NS2 List
M.Tech NS2 List M.Tech NS2 List
M.Tech NS2 List
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
Wireless Sensor Network with Mobile Integration
Wireless Sensor Network with Mobile IntegrationWireless Sensor Network with Mobile Integration
Wireless Sensor Network with Mobile Integration
 
Wireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titlesWireless sensor networks 2016-2017 titles
Wireless sensor networks 2016-2017 titles
 
A Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor NetworkA Review of Routing Protocols for Wireless Sensor Network
A Review of Routing Protocols for Wireless Sensor Network
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
Wsn
WsnWsn
Wsn
 

En vedette

Efficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity RankingEfficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity RankingSWAMI06
 
Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar
Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar
Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar Brandon Hess
 
Technology will save our minds and bodies
Technology will save our minds and bodiesTechnology will save our minds and bodies
Technology will save our minds and bodiespetervs77
 
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language ProcessingOpinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language ProcessingSWAMI06
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction systemSWAMI06
 
Knight Mobile LLC 2014 presentation
Knight Mobile LLC 2014 presentationKnight Mobile LLC 2014 presentation
Knight Mobile LLC 2014 presentationKnightMobile
 
The Big Draw at The British International School Shanghai Pudong
The Big Draw at The British International School Shanghai PudongThe Big Draw at The British International School Shanghai Pudong
The Big Draw at The British International School Shanghai PudongKaty Christie
 
Detection of Spyware by Mining Executable Files
Detection of  Spyware by Mining Executable FilesDetection of  Spyware by Mining Executable Files
Detection of Spyware by Mining Executable FilesSWAMI06
 
Annotating Search Results from Web Databases
Annotating Search Results from Web DatabasesAnnotating Search Results from Web Databases
Annotating Search Results from Web DatabasesSWAMI06
 
Multimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringMultimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringSWAMI06
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationSWAMI06
 
Frequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoopFrequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoopSWAMI06
 
Tugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kitaTugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kitadyahayusitengiluse
 
Tugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kitaTugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kitadyahayusitengiluse
 

En vedette (15)

Efficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity RankingEfficient Instant-Fuzzy Search With Proximity Ranking
Efficient Instant-Fuzzy Search With Proximity Ranking
 
Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar
Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar
Hubspot + ReadyTalk Webinar - Secrets to a Successful Webinar
 
Technology will save our minds and bodies
Technology will save our minds and bodiesTechnology will save our minds and bodies
Technology will save our minds and bodies
 
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language ProcessingOpinion Mining & Sentiment Analysis Based on Natural Language Processing
Opinion Mining & Sentiment Analysis Based on Natural Language Processing
 
Es autocad civil_2014_01
Es autocad civil_2014_01Es autocad civil_2014_01
Es autocad civil_2014_01
 
Heart disease prediction system
Heart disease prediction systemHeart disease prediction system
Heart disease prediction system
 
Knight Mobile LLC 2014 presentation
Knight Mobile LLC 2014 presentationKnight Mobile LLC 2014 presentation
Knight Mobile LLC 2014 presentation
 
The Big Draw at The British International School Shanghai Pudong
The Big Draw at The British International School Shanghai PudongThe Big Draw at The British International School Shanghai Pudong
The Big Draw at The British International School Shanghai Pudong
 
Detection of Spyware by Mining Executable Files
Detection of  Spyware by Mining Executable FilesDetection of  Spyware by Mining Executable Files
Detection of Spyware by Mining Executable Files
 
Annotating Search Results from Web Databases
Annotating Search Results from Web DatabasesAnnotating Search Results from Web Databases
Annotating Search Results from Web Databases
 
Multimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question AnsweringMultimedia Answer Generation for Community Question Answering
Multimedia Answer Generation for Community Question Answering
 
A Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized DeduplicationA Hybrid Cloud Approach for Secure Authorized Deduplication
A Hybrid Cloud Approach for Secure Authorized Deduplication
 
Frequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoopFrequent itemset mining_on_hadoop
Frequent itemset mining_on_hadoop
 
Tugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kitaTugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kita
 
Tugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kitaTugas persentasi barang yang melekat pada tubuh kita
Tugas persentasi barang yang melekat pada tubuh kita
 

Similaire à ns2-project-list

NS2 IEEE M.E/M.Tech PROJECTS 2014-15
NS2 IEEE M.E/M.Tech PROJECTS 2014-15NS2 IEEE M.E/M.Tech PROJECTS 2014-15
NS2 IEEE M.E/M.Tech PROJECTS 2014-15360° Corp
 
Ns2 new project list
Ns2 new project listNs2 new project list
Ns2 new project listSagar Verma
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titlesEcwaytechnoz
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titlesEcway2004
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titlesEcwayt
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titlesEcwaytechnoz
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titlesEcwaytech
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titlesEcway2004
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titlesEcwayt
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titlesEcwaytechnoz
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013ambitlick
 
IEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulationIEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulationallmightinfo
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013ambitlick
 

Similaire à ns2-project-list (20)

Java project 2013
Java project 2013Java project 2013
Java project 2013
 
NS2 IEEE M.E/M.Tech PROJECTS 2014-15
NS2 IEEE M.E/M.Tech PROJECTS 2014-15NS2 IEEE M.E/M.Tech PROJECTS 2014-15
NS2 IEEE M.E/M.Tech PROJECTS 2014-15
 
Ns2 new project list
Ns2 new project listNs2 new project list
Ns2 new project list
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titles
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titles
 
2013 ieee ns2 project titles
2013 ieee ns2 project titles2013 ieee ns2 project titles
2013 ieee ns2 project titles
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titles
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titles
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titles
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titles
 
2013 ieee project ns2 titles
2013 ieee project ns2 titles2013 ieee project ns2 titles
2013 ieee project ns2 titles
 
2014 ieee project ns2 titles
2014 ieee project ns2 titles2014 ieee project ns2 titles
2014 ieee project ns2 titles
 
Ambitlick ns2 2013
Ambitlick ns2 2013Ambitlick ns2 2013
Ambitlick ns2 2013
 
2013 2014 ns2 titles
2013 2014 ns2 titles2013 2014 ns2 titles
2013 2014 ns2 titles
 
2013 2014 ns2 titles
2013 2014 ns2 titles2013 2014 ns2 titles
2013 2014 ns2 titles
 
IEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulationIEEE Project 2014 Ns2 simulation
IEEE Project 2014 Ns2 simulation
 
Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013Low cost Java IEEE Projects 2013
Low cost Java IEEE Projects 2013
 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
 
CREC List.docx
CREC List.docxCREC List.docx
CREC List.docx
 

Dernier

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 

Dernier (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 

ns2-project-list

  • 1. Flat No 2,Second Floor, Lane No : A26, Above Esha Décor shop , Dhayari, Pune. 7385350430 www.ocularsystems.in info@ocularsystems.in NS2 Project 1. Secured Link Quality, Delay and Energy Aware Routing Protocol (SLQDEARP) For Mobile Ad Hoc Networks 2. An improved congestion avoidance control model for TCP Vegas based on Ad Hoc networks 3. DRINA: A Lightweight and Reliable RoutingApproach for In- Network Aggregation in Wireless Sensor Networks 4. A Novel Gateway Selection Method to Maximize the System Throughput of Wireless Mesh Network Deployed in Disaster Areas 5. An Energy-Efficient Routing Method with Intrusion Detection and Prevention for Wireless Sensor Networks 6. Content Aware Multi-Metric Routing for MPEG-4 Video over IEEE 802.11e wireless mesh networks using cross layer approach 7. An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks 8. Passive Measurement of Interference in WiFi Networks with Application in Misbehavior Detection
  • 2. 9. Semi-Structure Routing and Performance Analysis for Cognitive Radio Networks 10. USOR An Unobservable Secure On demand routing protocol for MANET. 11. Hop By Hop routing in wireless mesh network with bandwidth guarantee 12. Dynamic Multilevel priority packet scheduling for Wireless sensor network 13. Geocross : A geographic routing protocol in presence of loops in urban scenario 14. Vampire Attacks: Draining life from wireless AD HOC sensor networks 15. ALERT : An Anonymous Location based Efficient routing protocol in MANETs 16. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks 17. Investigating a Junction-Based Multipath Source Routing Algorithm for VANETs 18. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks 19. Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks
  • 3. 20. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 21. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 22. ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs 23. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive 24. An Efficient and Robust Addressing Protocol for Node Auto configuration 25. TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks
  • 4. 26. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments 27. Cut Detection in Wireless Sensor Networks 28. Distributed Cooperative Caching in Social Wireless Networks 29. EAACK—A Secure Intrusion-Detection System for MANETs 30. Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks 31. Proteus: Multiflow Diversity Routing for Wireless Networks with Cooperative 32. Target Tracking and Mobile Sensor Navigation in Wireless Sensor
  • 5. 33. Toward a Statistical Framework for Source Anonymity in Sensor Networks 34. Design and Implementation of a WLAN Mesh Router Based on Multipath Routing 35. Analysis of DV-Hop Localization Algorithm in Wireless Sensor Networks 36. Delaying Transmissions in Data Communication Networks to Improve Transport 37. Toward Privacy Preserving and Collusion Resistance in a Location Proof Updating System 38. Model-Based Analysis of Wireless System Architectures for Real-Time Applications. 39. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks
  • 6. 40. Strategies for Energy-Efficient Resource Management of Hybrid Programming Models 41. Capacity of Hybrid Wireless Mesh Networks with Random Aps 42. Delay-Optimal Broadcast for Multi hop Wireless Networks Using Self-Interference Cancellation 43. Distance Bounding A Practical Security Solution for Real-Time Location Systems 44. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks 45. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks
  • 7. 46. Mobi-Sync Efficient Time Synchronization for Mobile Underwater Sensor Networks 47. Discovery and Verification of Neighbor Positions in Mobile Ad Hoc Networks 48. Mobile Relay Configuration in Data-Intensive Wireless Sensor Network 49. In-Network Estimation with Delay Constraints in Wireless Sensor Network 50. Harvesting-Aware Energy Management for Time-Critical Wireless Sensor Networks With Joint Voltage and Modulation scaling 51. Network Traffic Classification Using Correlation Information
  • 8. 52. Quality-Differentiated Video Multicast in Multirate Wireless Networks 53. Power Allocation for Statistical QoS Provisioning in Opportunistic Multi-Relay DF Cognitive Networks 54. Coloring-Based Inter-WBAN Scheduling for Mobile Wireless Body Area Networks 55. Cross-Layer Design of Congestion Control and Power Control in Fast-Fading Wireless Networks 56. Analysis of Distance-Based Location Management in Wireless Communication Networks 57. A Resource Allocation Scheme for Scalable Video Multicast in WiMAX Relay Networks 58. Localized Algorithms for Detection of Node Replication Attacks in Mobile Sensor Networks
  • 9. 59. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks 60. Efficient Algorithms for Neighbor Discovery in Wireless Networks 61. Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks 62. ProHet: A Probabilistic Routing Protocol with Assured Delivery Rate in Wireless Heterogeneous Sensor Networks 63. LDTS A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks 64. DCIM: Distributed Cache Invalidation Method for Maintaining Cache Consistency in Wireless Mobile Networks 65. Opportunistic MANETs: Mobility Can Make Up for Low Transmission Power
  • 10. 66. Optimal Multicast Capacity and Delay Tradeoffs in MANETs 67. A Rank Correlation Based Detection against Distributed Reflection DoS Attacks 68. Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks 69. Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks 70. The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks 71. ALERT : An Anonymous Location – Based Efficient Routing Protocol in MANETs 72. Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
  • 11. 73. An Efficient and Robust Addressing Protocol for Node Autoconfiguration in Ad Hoc Networks 74. TARF: A Trust-Aware Routing Framework for Wireless Sensor Networks 75. BAHG: Back-Bone-Assisted Hop Greedy Routing for VANET’s City Environments 76. Cut Detection in Wireless Sensor Networks 77. Distributed Cooperative Caching in Social Wireless Networks 78. EAACK—A Secure Intrusion-Detection System for MANETs 79. Enhanced OLSR for Defense against DOS Attack in Ad Hoc Networks
  • 12. 80. Proteus: Multi flow Diversity Routing for Wireless Networks with Cooperative Transmissions 81. Target Tracking and Mobile Sensor Navigation in Wireless Sensor 82. Toward a Statistical Framework for Source Anonymity in Sensor Networks 83. Design and Implementation of a WLAN Mesh Router Based on Multipath Routing 84. Analysis of DV-Hop Localization Algorithm in Wireless Sensor Networks 85. Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance 86. Secure Data Collection In Wireless Sensor Networks Using Randomized Dispersive Routes
  • 13. 87. A Secure Intrusion detection system against DDOS