Hi there! Click one of our representatives below and we will get back to you as soon as possible.

NS2 Projects

star_border star_border star_border star_border star_border

Generating Correlated Digital Certificates: Framework and Applications

Bolstering public key authentication of networking entities, digital certificates are an entrenche..

4,500.00INR
star_border star_border star_border star_border star_border

Geographic and Opportunistic Routing for Underwater Sensor Networks

Geographical routing protocols have several desirable features for use in ad hoc and sensor networks..

3,500.00INR
star_border star_border star_border star_border star_border

Green COMP Energy Aware Cooperation for Green Cellular Networks

Due to the rapidly growing demand for mobile communication technology, the number of worldwide cellu..

4,500.00INR
star_border star_border star_border star_border star_border

Green-Cell-Planning-and-Deployment-for-Small-Cell-Networks-in-Smart-Cities

Cellular networks are in a major transition from a carefully planned set of large tower-mounted base..

4,500.00INR
star_border star_border star_border star_border star_border

Group Key Management Technique based on Logic Key Tree in the Field of Wireless Sensor Network

Recently, with the rapid development and implementation of wireless medical sensors, electronic heal..

3,500.00INR
star_border star_border star_border star_border star_border

Group-Based Neighbor Discovery in Low-Duty-Cycle Mobile Sensor Networks

Wireless sensor networks have been used in many mobile applications such as wildlife tracking and ..

4,500.00INR
star_border star_border star_border star_border star_border

Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection

 An intrusion detection system (IDS) for vehicular ad hoc networks (VANETs) is proposed and e..

4,500.00INR
star_border star_border star_border star_border star_border

HydroCast: Pressure Routing for Underwater Sensor Networks

Underwater sensor networks were recently proposed to support time-critical aquatic applications such..

3,500.00INR
star_border star_border star_border star_border star_border

Identifying-and-Addressing-Reachability-and-Policy-Attacks-in-Secure-BGP

Mobile Ad Hoc network are increasingly being deployed in security-critical applications. Because of ..

4,500.00INR
star_border star_border star_border star_border star_border

Improving Access Point Association Protocols Through Channel Utilization and Adaptive Probing+C451

A distributed access point selection scheme by which nodes select an appropriate access point to a..

4,500.00INR
star_border star_border star_border star_border star_border

Improving the Network Lifetime of MANETs through cooperative MAC Protocol Design

Mobile ad-hoc networks have been regarded as a promising path towards future wireless communication ..

3,500.00INR
star_border star_border star_border star_border star_border

Increasing User Perceived Quality by Selective Load Balancing of Video Traffic in Wireless Networks

Data aggregation is an efficient way to minimize energy consumption on sensors. In this paper, we Pr..

3,500.00INR
star_border star_border star_border star_border star_border

Integrated Energy and Spectrum Harvesting for 5G Wireless Communications

In general, the wireless communication network architecture is implemented with either energy effici..

3,500.00INR
star_border star_border star_border star_border star_border

Interference Based Topology Control Algorithm for Delay Constrained Mobile Ad Hoc Networks

As the foundation of routing, topology control should minimize the interference among nodes, and inc..

3,500.00INR
star_border star_border star_border star_border star_border

Jelly Fish attack Analysis, detection and countermeasure in TCP based MANET

MANET is a collection of mobile nodes communicating in a multi hop manner without any fixed infrastr..

3,500.00INR
Showing 121 to 135 of 215 (15 Pages)
LiveZilla Live Chat Software
Free Website Hit Counter
Free website hit counter