Hi there! Click one of our representatives below and we will get back to you as soon as possible.

Network Projects

star_border star_border star_border star_border star_border

A Scalable and Modular Architecture for High-Performance Packet Classification

Packet Classification is one of the core function in network infrastructure for various purposes. ..

3,000.00INR
star_border star_border star_border star_border star_border

A Secure and Efficient ID Based Aggregate Signature Scheme for Wireless Sensor Networks

Affording secure and efficient big data aggregation methods is very attractive in the field of wire..

3,500.00INR
star_border star_border star_border star_border star_border

A Secure Data Aggregation Scheme Based on Appropriate Cryptographic Primitives in Heterogeneous Wireless Sensor Networks

Data aggregation is an efficient way to minimize energy consumption on sensors. In this paper, we Pr..

3,500.00INR
star_border star_border star_border star_border star_border

A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks

We address the problem of centralized detection of a binary event in the presence of β fraction fal..

3,500.00INR
star_border star_border star_border star_border star_border

A SECURE PROTOCOL FOR SPONTANEOUS WIRELESS AD HOC NETWORKS CREATION

ABSTRACT A secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmet..

4,500.00INR
star_border star_border star_border star_border star_border

A Self Adaptive Sleep Wake up Scheduling Approach for Wireless Sensor Networkss

Sleep/wake-up scheduling is one of the fundamental problems in Wireless Sensor Networks (WSNs), sin..

3,500.00INR
star_border star_border star_border star_border star_border

A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis

The main objective is accuracy detection on attack detection while considering the both normalizatio..

3,000.00INR
star_border star_border star_border star_border star_border

A Taxonomy for Denial-of-Service Attacks in Wireless Sensor Networks

The number of security breaches is on a sharp increase and so is are the damage and los..

3,500.00INR
star_border star_border star_border star_border star_border

A Traffic Adaptive Multi channel MAC Protocol with Dynamic Slot Allocation for WSNs

Understanding existing algorithms and finding the problems stated and addressed. Using low duty-cycl..

3,500.00INR
star_border star_border star_border star_border star_border

A Trust Management Scheme Based on Behavior Feedback for Opportunistic Networks

Wireless sensor networks (WSNs) are composed of a large number of sensor nodes that are self organiz..

3,500.00INR
star_border star_border star_border star_border star_border

A Truthful QoS-Aware Spectrum Auction with Spatial Reuse for Large-Scale Networks

Abstract The cognitive radio is an intellectual radio that can be planned and arranged energeti..

4,500.00INR
star_border star_border star_border star_border star_border

A TWO-TIERED ON-DEMAND RESOURCE ALLOCATION MECHANISM FOR VM-CASED DATA CENTERS

Abstract:               &nb..

4,500.00INR
star_border star_border star_border star_border star_border

A Unifying Model and Analysis of P2P VoD Replication and Scheduling

Randomized user request on multimedia can be progressing on peer to peer network. Through repetition..

3,000.00INR
star_border star_border star_border star_border star_border

A Virtual Coordinate-Based Bypassing Void Routing for Wireless Sensor Networks

Geographical routing protocols have several desirable features for use in ad hoc and sensor networks..

3,500.00INR
star_border star_border star_border star_border star_border

AASR Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments

A mobile ad hoc network (MANET) is a continuously self-configuring, infrastructure-less network of m..

3,500.00INR
Showing 61 to 75 of 447 (30 Pages)
Free Website Hit Counter
Free website hit counter