[vc_row][vc_column width=”1/1″][vc_tabs][vc_tab title=”Wireless communication” tab_id=”1506605438-1-6″][vc_column_text]NS2 Wireless communication Titles
|
1 |
Fundamental Storage-Latency Tradeoff in Cache-Aided MIMO Interference Networks | |
|
2 |
Distributed Power Control Schemes in In-Band Full-Duplex Energy Harvesting Wireless Networks | |
|
3 |
Joint Power Optimization for Device-to-Device Communication in Cellular Networks with Interference Control | |
|
4 |
Interference Modeling for Cellular Networks under Beam forming Transmission | |
|
5 |
Low-Complexity Link Adaptation for Energy Efficiency Maximization in MIMO-OFDM Systems | |
|
6 |
Resource Allocation and Outage Analysis for An Adaptive Cognitive Two-Way Relay Network | |
|
7 |
Energy-Efficient D2D Overlaying Communications with Spectrum-Power Trading | |
|
8 |
Joint Rate Control and Scheduling for Real-Time Wireless Networks | |
|
9 |
Application-Based Optimization of Multi-Level Clustering in ad hoc and Sensor Networks | |
|
10 |
Dynamic Path To Stability in LTE-Unlicensed with User Mobility: A Matching Framework | |
|
11 |
A Coalition Formation Game for Distributed Node Clustering in Mobile Ad Hoc Networks | |
|
12 |
On Using Dual Interfaces with Network Coding for Delivery Delay Reduction | |
| 13 | Dynamic Transmit Covariance Design in MIMO Fading Systems With Unknown Channel Distributions and Inaccurate Channel State Information | |
| 14 | Distributed Interference and Delay Aware Design for D2D Communication in Large Wireless Networks with Adaptive Interference Estimation | |
| 15 | Energy Efficient Transmission in Multi-User MIMO Relay Channels with Perfect and Imperfect Channel State Information | |
| 16 | A Stochastic Geometric Analysis of Device-to-Device Communications Operating over Generalized Fading Channels | |
| 17 | Group Cooperation with Optimal Resource Allocation in Wireless Powered Communication Networks | |
| 18 | An Approximation Algorithm for the Maximum-lifetime Data Aggregation Tree Problem in Wireless Sensor Networks | |
| 19 | On the Performance of Spatial Modulation MIMO for Full-Duplex Relay Networks | |
| 20 | D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G System | |
| 21 | End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting | |
| 22 | Sum-Rate Analysis for Massive MIMO Downlink With Joint Statistical Beamforming and User Scheduling | |
| 23 | A Mixed Transmission Strategy to Achieve Energy Balancing in Wireless Sensor Networks | |
| 24 | Interference Efficiency: A New Metric to Analyze the Performance of Cognitive Radio Networks | |
| 25 | Velocity-Aware Handover Management in Two-Tier Cellular Networks | |
| 26 | Simultaneous Wireless Transfer of Power and Information in a Decode-and-Forward Two-Way Relaying Network | |
| 27 | E2HRC- An Energy-Efficient Heterogeneous Ring Clustering Routing Protocol for Wireless Sensor Networks | |
| 28 | A Secure and Efficient ID-Based Aggregate Signature Scheme for Wireless Sensor Networks | |
| 30 | Traffic Decorrelation Techniques for Countering a Global Eavesdropper in WSN | |
| 31 | Optimization of Watchdog Selection in Wireless Sensor Networks | |
| 32 | Load-Balanced Opportunistic Routing for Duty-Cycled Wireless Sensor Networks | |
| 33 | Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks | |
| 34 | Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks |
[/vc_column_text][/vc_tab][vc_tab title=”Networking” tab_id=”1506605438-2-8″][vc_column_text]NS2 NETWORKING PROJECTS
|
1 |
An Overlay Architecture for Throughput Optimal Multipath Routing | |
|
2 |
A Scalable Framework for Wireless Distributed Computing | |
|
3 |
Routing in Accumulative Multi-Hop Networks | |
|
4 |
Coding for Improved Throughput Performance in Network Switches | |
|
5 |
A Novel Approximation for Multi-Hop Connected Clustering Problem in Wireless Networks | |
|
6 |
Connectivity Analysis in Wireless Networks With Correlated Mobility and Cluster Scalability | |
|
7 |
Diversity Coding in Two-Connected Networks | |
|
8 |
User-Centric Network MIMO With Dynamic Clustering | |
|
9 |
Multicast in Multihop CRNs Under Uncertain Spectrum Availability: A Network Coding Approach | |
|
10 |
Deterministic Broadcasting and Random Linear Network Coding in Mobile Ad Hoc Networks | |
|
12 |
Fair Routing for Overlapped Cooperative Heterogeneous Wireless Sensor Networks | |
| 13 | Toward Cooperation by Carrier Aggregation in Heterogeneous Networks A Hierarchical Game Approach | |
| 14 | Distributed Learning for Energy-Efficient Resource Management in Self-Organizing Heterogeneous Networks | |
| 15 | End-to-end Throughput Maximization for Underlay Multi-hop Cognitive Radio Networks with RF Energy Harvesting | |
| 16 | Maximizing Spectral Efficiency for Energy Harvesting-Aware WBAN | |
| 17 | Opportunistic Shortcut Tree Routing in ZigBee Networks | |
| 18 | Performance Optimization of CSMA Networks with a Finite Retry Limit | |
| 19 | Video Packet Scheduling with Stochastic QoS for Cognitive Heterogeneous Networks |
[/vc_column_text][/vc_tab][vc_tab title=”Secure Computing” tab_id=”1506606711915-2-9″][vc_column_text]DEPENDABLE AND SECURE COMPUTING PROJECTS
|
1 |
Towards a Reliable Detection of Covert Timing Channels over Real-Time Network Traffic | |
|
2 |
Privacy-Preserving Fine-Grained Data Retrieval Schemes For Mobile Social Networks | |
|
3 |
Fault-Tolerant Adaptive Routing in Dragonfly Networks | |
|
4 |
Optimal Spot-Checking for Collusion Tolerance in Computer Grids |
[/vc_column_text][/vc_tab][vc_tab title=”Mobile Computing” tab_id=”1506606758017-3-2″][vc_column_text]NS2 MOBILE COMPUTING PROJECTS
|
1 |
Distributed Clustering-Task Scheduling for Wireless Sensor Networks Using Dynamic Hyper Round Policy | |
|
2 |
Energy-Efficient and Distributed Network Management Cost Minimization in Opportunistic Wireless Body Area Networks | |
|
3 |
Stability and Dynamic Control of Underlay Mobile Edge Networks | |
|
4 |
Secure MAC: Securing Wireless Medium Access Control Against Insider Denial-of- Service Attacks | |
|
5 |
Improving Throughput and Fairness of Converge cast in Vehicular Networks | |
|
6 |
Quality-Aware Traffic Offloading in Wireless Networks | |
|
7 |
Mode Selection and Resource Allocation in Device-to-Device Communications: A Matching Game Approach | |
|
8 |
Optimal Scheduling for Interference Mitigation by Range Information |
[/vc_column_text][/vc_tab][vc_tab title=”MANET” tab_id=”1506606801821-4-10″][vc_column_text]MANET:
|
1 |
Adaptive Rerouting to Avoid Local Congestion in MANETs | |
|
2 |
CRCMD&R: Cluster and Reputation based cooperative malicious node Detection & Removal scheme in MANETs | |
|
3 |
EPPN: Extended Prime Product Number based wormhole DETECTION scheme for MANETs | |
|
4 |
Lightweight authentication-based scheme for AODV in ad-hoc networks | |
|
5 |
Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography |
[/vc_column_text][/vc_tab][vc_tab title=”VANET” tab_id=”1506606840942-5-6″][vc_column_text]VANET:
|
1 |
REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET | |
|
2 |
Enhancing Security and Privacy for Identity-Based Batch Verification Scheme in VANETs | |
|
3 |
Distributed Aggregate Privacy-Preserving Authentication in VANETs | |
|
4 |
EAAP: Efficient Anonymous Authentication With Conditional Privacy-Preserving Scheme for Vehicular Ad Hoc Network | |
|
5 |
GDVAN: A New Greedy Behavior Attack Detection Algorithm for VANETs | |
|
6 |
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs |
[/vc_column_text][/vc_tab][/vc_tabs][/vc_column][/vc_row]