ns2 projects bangalore,Download ns2 software for windows xp,Download NS2 Simulator,Download NS Software,ns2 tutorial,ns2 download,NS2 Projects,NS2 Projects,2015 IEEE NS2 Project,NS2 Projects in Bangalore,IEEE 2017 NS2 Projects

Project Categories

    Electronics Projects ECE Projects EEE Projects Mechanical Projects Biomedical Projects telecommunication Projects instrumentation projects Projects computer science projects Projects Power Electronics Projects VLSI Projects DSP Projects Matlab Projects IEEE Projects
Android ieee projects application projects big data ieee projects bigdata project big data projects Cloud Computing Cloud Computing ieee projects Cloud Computing projects data mining ieee projects Data Mining projects Dependable and Secure Computing ieee projects Dependable and Secure Computing projects hadoop ieee projects hadoop projects ieee ns2 projects ieee project ieee projects ieee projects at chennai ieee projects download ieee projects for cse ieee projects on image processing ieee projects on networking and network security ieee projects topics ieee projects with source code IEEE Student Projects image processing ieee projects image processing projects Java Projects Matab Projects Mobile Computing ieee projects Mobile Computing projects Networking ieee projects Networking projects Network Security ieee projects Network Security projects ns2 ieee projects demo ns2 project Ns2 Projects ns2 projects demo ns2 projects download ns2 projects in chennai ns2 projects source code ns2 projects titles ns2 projects with source code Parallel Distributed System
Computer Science Projects-NS2 Projectsatbangalore, offers both IEEE & NON-IEEE Based Software Projects to students in various domains.

Computer Science Engineering Projects - NS2 - IEEE 2016-2017 PROJECTS - TITLES & SYNOPSIS

2016 NS2 Projects


1. VAMPIRE ATTACKS: DRAINING LIFE FROM WIRELESS AD HOC SENSOR NETWORKS

2. UNITED WE STAND: INTRUSION RESILIENCE IN MOBILE UNATTENDED WSNS

3. LOCALIZED ALGORITHMS FOR DETECTION OF NODE REPLICATION ATTACKS IN MOBILE SENSOR NETWORKS

4. ANOMALY DETECTION BASED SECURE IN-NETWORK AGGREGATION FOR WIRELESS SENSOR NETWORKS

5. FAULT NODE RECOVERY ALGORITHM FOR A WIRELESS SENSOR NETWORK

6. EMBA: AN EFFICIENT MULTIHOP BROADCAST PROTOCOL FOR ASYNCHRONOUS DUTY-CYCLED WIRELESS SENSOR NETWORKS

7. ALERT: AN ANONYMOUS LOCATION-BASED EFFICIENT ROUTING PROTOCOL IN MANETS

8. A PROGRESSIVE APPROACH TO REDUCING DATA COLLECTION LATENCY IN WIRELESS SENSOR NETWORKS WITH MOBILE ELEMENTS

9. CLUSTER-BASED CERTIFICATE REVOCATION WITH VINDICATION CAPABILITY FOR MOBILE AD HOC NETWORKS

10. A LOOSE-VIRTUAL-CLUSTERING-BASED ROUTING FOR POWER HETEROGENEOUS MANETS

11. CHANNEL ALLOCATION AND ROUTING IN HYBRID MULTICHANNEL MULTIRADIO WIRELESS MESH NETWORKS

12. ATTRIBUTE-AWARE DATA AGGREGATION USING POTENTIAL-BASED DYNAMIC ROUTING IN WIRELESS SENSOR NETWORKS

13. MOBICAST ROUTING PROTOCOL FOR UNDERWATER SENSOR NETWORKS

14. LCM: A LINK-AWARE CLUSTERING MECHANISM FOR ENERGY-EFFICIENT ROUTING IN WIRELESS SENSOR NETWORKS

15. BAHG: BACK-BONE-ASSISTED HOP GREEDY ROUTING FOR VANETS CITY ENVIRONMENTS

16. A NEIGHBOR COVERAGE-BASED PROBABILISTIC REBROADCAST FOR REDUCING ROUTING OVERHEAD IN MOBILE AD HOC NETWORKS

17. PROBABILITY-BASED PREDICTION AND SLEEP SCHEDULING FOR ENERGYEFFICIENT TARGET TRACKING IN SENSOR NETWORKS

18. EAACK—A SECURE INTRUSION-DETECTION SYSTEM FOR MANETS

19. TRUST BASED SECURE AODV IN MANET

20. SLEEP SCHEDULING FOR CRITICAL EVENT MONITORING IN WIRELESS SENSOR NETWORKS

21. AN ADAPTIVE CLUSTERING ROUTING PROTOCOL USING TWICE CLUSTER HEAD SELECTION

22. ADAPTIVE FORWARDING DELAY CONTROL FOR VANET DATA AGGREGATION

23. SINKTRAIL: A PROACTIVE DATA REPORTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

24. PASSIVE MEASUREMENT OF INTERFERENCE IN WIFI NETWORKS WITH APPLICATION IN MISBEHAVIOR DETECTION

25. NEIGHBOR TABLE BASED SHORTCUT TREE ROUTING IN ZIGBEE WIRELESS NETWORKS

26. ALBA-R: LOAD-BALANCING GEOGRAPHIC ROUTING AROUND CONNECTIVITY HOLES IN WIRELESS SENSOR NETWORKS

27. A MOBILITY-AWARE NODE DEPLOYMENT AND TREE CONSTRUCTION FRAMEWORK FOR ZIGBEE WIRELESS NETWORKS

28. GRID BASED CLUSTERING WITH PREDEFINED PATH MOBILITY FOR MOBILE SINK DATA COLLECTION TO EXTEND NETWORK LIFETIME IN WIRELESS SENSOR NETWORKS

29. GEOGRAPHICAL ROUTING WITH LOCATION SERVICE IN INTERMITTENTLY CONNECTED MANETS

30. GOAFR: AN OPTIMAL ALGORITHM FOR GEOGRAPHIC ROUTING IN WIRELESS SENSOR NETWORKS

31. ENERGY EFFICIENCY QOS ASSURANCE ROUTING IN WIRELESS MULTIMEDIA SENSOR NETWORKS

32. EFFICIENT MULTIPATH COMMUNICATION FOR TIME-CRITICAL APPLICATIONS IN UNDERWATER ACOUSTIC SENSOR NETWORKS

33. REAL-TIME QUERY SCHEDULING FOR WIRELESS SENSOR NETWORKS

34. IMPROVING SELFISH NODE DETECTION IN MANETS USING A COLLABORATIVE WATCHDOG

35. DYNAMIC DUTY-CYCLE SCHEDULING SCHEMES FOR ENERGY-HARVESTING WIRELESS SENSOR NETWORKS

36. ENERGY-EFFICIENT RESOURCE ALLOCATION AND SCHEDULING FOR MULTICAST OF SCALABLE VIDEO OVER WIRELESS NETWORKS

37. CORMAN: A NOVEL COOPERATIVE OPPORTUNISTIC ROUTING SCHEME IN MOBILE AD HOC NETWORKS

38. FAST DATA COLLECTION IN TREE-BASED WIRELESS SENSOR NETWORKS

39. A NEW SCALABLE HYBRID ROUTING PROTOCOL FOR VANETS

40. RISK-AWARE MITIGATION FOR MANET ROUTING ATTACKS

41. PROTECTING LOCATION PRIVACY IN SENSOR NETWORKS AGAINST A GLOBAL EAVESDROPPER

42. TOWARD RELIABLE DATA DELIVERY FOR HIGHLY DYNAMIC MOBILE AD HOC NETWORKS

43. LOCAL BROADCAST ALGORITHMS IN WIRELESS AD HOC NETWORKS: REDUCING THE NUMBER OF TRANSMISSIONS

44. SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS

45. RCDA: RECOVERABLE CONCEALED DATA AGGREGATION FOR DATA INTEGRITY IN WIRELESS SENSOR NETWORKS

46. WE CAN DELIVER MESSAGES TO FAR VEHICLES

47. USOR: AN UNOBSERVABLE SECURE ON-DEMAND ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

48. DCIM: DISTRIBUTED CACHE INVALIDATION METHOD FOR MAINTAINING CACHE CONSISTENCY IN WIRELESS MOBILE NETWORKS

49. A RENDEZVOUS-BASED APPROACH ENABLING ENERGY-EFFICIENT SENSORY DATA COLLECTION WITH MOBILE SINKS

50. LINK STABILITY AND ENERGY AWARE ROUTING PROTOCOL IN DISTRIBUTED WIRELESS NETWORKS

51. ADAPTIVE POSITION UPDATE FOR GEOGRAPHIC ROUTING IN MOBILE AD HOC NETWORKS

52. ENERGY-EFFICIENT PROTOCOL FOR COOPERATIVE NETWORKS

53. BUFFER SIZING FOR 802.11-BASED NETWORKS

54. END-TO-END CONGESTION CONTROL IN WIRELESS MESH NETWORKS USING A NEURAL NETWORK

55. MINIMUM ENERGY COST RELIABLE ROUTING IN WNET

56. ENERGY-EFFICIENT LOCAL WAKE-UP SCHEDULING IN WIRELESS SENSOR NETWORKS

57. AN ESTIMATED DISTANCE-BASED ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

58. JAMMING-AWARETRAFFIC ALLOCATION FOR MULTIPLE-PATH ROUTING USING PORTFOLIO SELECTION

59. PREDICTION OR NOT? AN ENERGY-EFFICIENT FRAMEWORK FOR CLUSTERING-BASED DATA COLLECTION IN WIRELESS SENSOR NETWORKS

60. FAST DETECTION OF MOBILE REPLICA NODE ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL HYPOTHESIS TESTING

61. DYNAMIC SLEEP SCHEDULING FOR MINIMIZING DELAY IN WIRELESS SENSOR NETWORK

62. A PREDICTIVE ENERGY-EFFICIENT TECHNIQUE TO SUPPORT OBJECTTRACKING SENSOR NETWORKS

63. A POLICY ENFORCING MECHANISM FOR TRUSTED AD HOC NETWORKS

64. IMPLEMENTATION AND PERFORMANCE ANALYSIS OF THE GATEWAY DISCOVERY APPROACHES IN THE INTEGRATED MANET -INTERNET SCENARIO

65. ENERGY EFFICIENT ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS USING SPATIAL CORRELATION BASED MEDIUM ACCESS CONTROL PROTOCOL COMPARED WITH IEEE 802.11

66. CONVERSS: A HYBRID MAC/ROUTING SOLUTION FOR SMALL-SCALE, CONVERGECAST WIRELESS NETWORKS

67. ON DATA COLLECTION USING MOBILE ROBOT IN WIRELESS SENSOR NETWORKS

68. ENERGY-EFFICIENT REAL-TIME MULTICAST ROUTING IN MOBILE AD HOC NETWORKS

69. REUSE_ A COMBINED ROUTING AND LINK SCHEDULING MECHANISM FOR WIRELESS

70. AN OVERVIEW OF MULTI POINT RELAY AODV IN MOBILE AD HOC NETWORK

71. MINIMIZING DELAY AND MAXIMIZING LIFETIME FOR WIRELESS SENSOR NETWORKS WITH ANY CAST

72. CHANNEL-AWARE DETECTION OF GRAY HOLE ATTACKS IN WIRELESS MESH NETWORKS

73. CHANNEL, CAPACITY AND FLOW ASSIGNMENT IN WIRELESS MESH NETWORKS

74. CROSS LAYER BASED CONGESTION CONTROL TECHNIQUE FOR RELIABLE AND ENERGY AWARE ROUTING IN MANET

75. AN AGENT-ASSISTED QOS-BASED ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORKS

76. A NEW PROACTIVE ROUTING PROTOCOL FOR MANET

77. A CLUSTERING ALGORITHM FOR WIRELESS SENSOR NETWORKS BASED ON SOCIAL INSECT COLONIES

CIN0161 PREVENTION OF SELECTIVE BLACK HOLE ATTACKS ON MOBILE AD HOC NETWORKS THROUGH INTRUSION DETECTION SYSTEMS

78. TRANSIENT ANALYSIS OF IEEE 802.15.4 SENSOR NETWORKS

79. SELF-RECONFIGURABLE WIRELESS MESH NETWORKS

80. SCHEDULABILITY ANALYSIS FOR HARD NETWORK LIFETIME WIRELESS SENSOR NETWORKS WITH HIGH ENERGY FIRST CLUSTERING

81. DYNAMIC CONFLICT-FREE TRANSMISSION SCHEDULING FOR SENSOR NETWORK QUERIES

82. COOPERATING WITH SMARTNESS: USING HETEROGENEOUS SMART ANTENNAS IN MULTI-HOP WIRELESS NETWORKS

83. CACAO: DISTRIBUTED CLIENT-ASSISTED CHANNEL ASSIGNMENT OPTIMIZATION FOR UNCOORDINATED WLANS

84. BYPASS FLOW-SPLITTING FORWARDING IN FISH NETWORKS

85. OPTIMAL STOCHASTIC LOCATION UPDATES IN MOBILE AD HOC NETWORKS

86. CHANNEL-AWARE ROUTING IN MANETS WITH ROUTE HANDOFF

87. SUPPORTING EFFICIENT AND SCALABLE MULTICASTING OVER MOBILE AD HOC NETWORKS

88. SECURE HIGH-THROUGHPUT MULTICAST ROUTING IN WIRELESS MESH NETWORKS

89.THROUGHPUT OPTIMIZATION IN MOBILE BACKBONE NETWORKS

90. COMPUTING LOCALIZED POWER-EFFICIENT DATA AGGREGATION TREES FOR SENSOR NETWORKS

91. AN IMPROVED GEOCAST FOR MOBILE AD HOC NETWORKS

92. QOS-AWARE ROUTING AND ADMISSION CONTROL IN SHADOW-FADING ENVIRONMENTS FOR MULTIRATE MANETS

93. DISTRIBUTED FAULT-TOLERANT QUALITY OF WIRELESS NETWORKS

94. MOBILE SAMPLING OF SENSOR FIELD DATA USING CONTROLLED BROADCAST

95. DCAR: DISTRIBUTED CODING-AWARE ROUTING IN WIRELESS NETWORKS (WITH ENHANCEMENT)

96. DISTRIBUTED ENERGY EFFICIENT ROUTING IN AD HOC NETWORKS

97. HANDOFF MINIMIZATION THROUGH A RELAY STATION GROUPING ALGORITHM WITH EFFICIENT RADIO-RESOURCE SCHEDULING POLICIES FOR IEEE 802.16J MULTIHOP RELAY NETWORKS

98. ECODA: ENHANCED CONGESTION DETECTION AND AVOIDANCE FOR MULTIPLE CLASS OF TRAFFIC IN SENSOR NETWORKS

99. RENDERED PATH: RANGE-FREE LOCALIZATION IN ANISOTROPIC SENSOR NETWORKS WITH HOLES

100. A CELL-BASED DECENTRALIZED KEY MANAGEMENT SCHEME FOR SECURE MULTICAST IN MOBILE CELLULAR NETWORKS

101. STATELESS MULTICASTING IN MOBILE AD HOC NETWORKS

102. EFFICIENT BROADCASTING USING NETWORK CODING AND DIRECTIONAL ANTENNAS IN MANETS

103. A FUNCTION ALTERNATION ALGORITHM FOR WIRELESS SENSOR NETWORKS

104. LOW LATENCY AND ENERGY EFFICIENT ROUTING PROTOCOLS FOR WIRELESS SENSOR NETWORKS

105. APPLICATION-LAYER INTRUSION DETECTION IN MANETS

106. ENABLING SECURE RESOURCE SHARING IN WIRELESS MESH NETWORKS

107. DYNAMIC COMPOSITION OF SERVICES IN SENSOR NETWORKS AND ITS IMPLEMENTATION UNDER SENSOR FABRIC 108. GATEWAY SELECTION PROTOCOL IN HYBRID MANET USING DYMO ROUTING

109. PREVENTING BLACK HOLE ATTACK IN MOBILE AD-HOC NETWORKS USING ANOMALY DETECTION

110. ENERGY EFFICIENT AND QOS BASED ROUTING PROTOCOL FOR WIRELESS SENSOR NETWORKS

111. QOS BASED POWER AWARE ROUTING IN MANETS

112. ON THE CONSTRUCTION OF 2-CONNECTED VIRTUAL BACKBONE IN WIRELESS NETWORKS

113. EXTENDING THE LIFETIME OF WIRELESS SENSOR NETWORKS THROUGH ADAPTIVE SLEEP

114. CAR: CONTEXT-AWARE ADAPTIVE ROUTING FOR DELAY TOLERANT MOBILE NETWORKS

115. A DYNAMIC ANOMALY DETECTION SCHEME FOR AODV-BASED MOBILE AD HOC NETWORKS

116. A GROUP KEY AGREEMENT PROTOCOL BASED ON STABILITY AND POWER USING ELLIPTIC CURVE CRYPTOGRAPHY 117. LOCALIZATION OF IRREGULAR WIRELESS SENSOR NETWORKS BASED ON MULTIDIMENSIONAL SCALING

118. A DISTIBUTED CACHE MANAGEMENT ARCHITECTURE FOR MOBILE COMPUTING ENVIRONMENTS

119. A POSITION BASED ANT COLONY ROUTING ALGORITHM FOR MOBILE ADHOC NETWORKS

120. A TRUST-BASED SECURITY SYSTEM FOR UBIQUITOUS AND PERVASIVE COMPUTING ENVIRONMENTS

121. ENERGY EFFICIENT MANET ROUTING USING A COMBINATION OF SPAN AND BECA/AFECA

122. CONGESTION AVOIDANCE AND CONTROL MECHANISM FOR MULTI-PATHS ROUTING IN WSN

123. WIRELESS HOME NETWORK CONTORL MECHANISM FOR STANDBY POWER REDUCTION CIN0113 AN ADVANCED HYBRID PEER-TO-PEER BOTNET

124. REGION-BASED LOCATION-SERVICE-MANAGEMENT PROTOCOL FOR VANETS

125. A QUORUM-BASED ENERGY-SAVING MAC PROTOCOL DESIGN FOR WIRELESS SENSOR NETWORKS

126. UNCERTAINTY MODELING AND REDUCTION IN MANETS

127. MULTIPATH DISSEMINATION IN REGULAR MESH TOPOLOGIES

128. A UNIFIED ANALYSIS OF ROUTING PROTOCOLS IN MANETS

129. TRAFFIC MANAGEMENT IN SENSOR NETWORKS WITH A MOBILE SINK

130. EFFICIENT LOAD-AWARE ROUTING SCHEME FOR WIRELESS MESH NETWORKS

131. SSUM: SMART SERVER UPDATE MECHANISM FOR MAINTAINING CACHE CONSISTENCY IN MOBILE ENVIRONMENTS

132. MINIMUM ENERGY SCHEDULING IN MULTI-HOP WIRELESS NETWORKS WITH RETRANSMISSIONS

133. ON MULTIHOP DISTANCES IN WIRELESS SENSOR NETWORKS WITH RANDOM NODE LOCATIONS

134. ACCURATE AND ENERGY-EFFICIENT RANGE-FREE LOCALIZATION FOR MOBILE SENSOR NETWORKS

135. LOCAL BARRIER COVERAGE IN WIRELESS SENSOR NETWORKS

136. ENABLING EFFICIENT PEER-TO-PEER RESOURCE SHARING IN WIRELESS MESH NETWORKS

137. DISTRIBUTED LOCALIZATION SCHEME FOR MOBILE SENSOR NETWORKS

138. THE IMPACT OF DATA AGGREGATION IN WIRELESS SENSOR NETWORKS CIN0094 SCALABILITY ANALYSIS OF LOCATION MANAGEMENT PROTOCOLS FOR MOBILE AD HOC NETWORKS

139. PERFORMANCE COMPARISON OF DISTRIBUTED ROUTING ALGORITHMS IN AD HOC MOBILE NETWORKS

140. ADAPTIVE RECONFIGURATION TECHNIQUES FOR POWER MINIMIZATION IN DISTRIBUTED WIRELESS SYSTEMS

141. MINIMIZING RECOVERY STATE IN GEOGRAPHIC AD HOC ROUTING

142. ADAPTIVE AND INTELLIGENT PATH DISCOVERY ON-DEMAND FOR WIRELESS NETWORKS USING SERVICE COMPOSITION

144. A SECURE AUTHENTICATED ROUTING PROTOCOL FOR MOBILE ADHOC NETWORKS

145. IMPROVE COMMUNICATION EFFICIENCY FOR THE PHYSIOLOGICAL

INFORMATION MONITOR SYSTEM BASED ON ZIGBEE

146. MINIMIZING EFFECTIVE ENERGY CONSUMPTION IN MULTI-CLUSTER SENSOR NETWORKS FOR SOURCE EXTRACTION

147. SECURITY AND QOS SELF-OPTIMIZATION IN MOBILE AD HOC NETWORKS

148. SECURING AODV: THE A-SAODV SECURE ROUTING PROTOTYPE

149. LOAD BALANCING: AN APPROACH BASED ON CLUSTERING IN AD HOC NETWORKS

150. ENERGY EFFICIENT LOCATION AIDED ROUTING PROTOCOL FOR WIRELESS MANETS

151. EFFICIENT DIRECTIONAL NETWORK BACKBONE CONSTRUCTION IN MOBILE AD HOC NETWORKS

152. DETECTION OF COMPROMISED SENSOR NODES IN HETEROGENEOUS SENSOR NETWORKS

153. PROTECTING DATA AGGREGATION FROM COMPROMISED NODES IN WIRELESS SENSOR NETWORK

154. THE BLUE ZONE – MOBILE BLUETOOTH NETWORK EXPANSION

155. THE BEES ALGORITHM – A NOVEL TOOL FOR COMPLEX OPTIMISATION PROBLEMS

156. AN EFFICIENT ADMISSION CONTROL ALGORITHM FOR LOAD BALANCING IN HIERARCHICAL MOBILE IPV6 NETWORKS

157. RANDOMCAST: AN ENRGY-EFFICIENT COMMUNICATION SCHEME FOR MOBILE AD HOC NETWORKS

158. PERFORMANCE EVALUATION OF EFFICIENT AND RELIABLE ROUTING PROTOCOLS FOR FIXED-POWER SENSOR NETWORKS

159. TCP-AWARE CHANNEL ALLOCATION IN CDMA NETWORKS

160. IMPROVING SOURCE ROUTING RELIABILITY IN MOBILE AD HOC NETWORKS

161. A NOVEL APPROACH TO SERVICE DISCOVERY IN MOBILE ADHOC NETWORK

162. ADAPTIVE CELL-RELAY ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

163. TCP WITH ADAPTIVE PACING FOR MULTIHOP WIRELESS NETWORKS

164. STABLE AND ENERGY EFFICIENT ROUTING FOR MOBILE ADHOC NETWORKS

165. INTRUSION DETECTION IN HOMOGENEOUS AND HETEROGENEOUS WIRELESS SENSOR NETWORKS

166. EFFICIENT RELIABLE DATA COLLECTION IN WIRELESS SENSOR NETWORKS

167. TOWARD RELIABLE AND EFFICIENT REPORTING IN WIRELESS SENSOR NETWORKS

168. CROSS-LAYER INTERACTION OF TCP AND AD HOC ROUTING PROTOCOLS IN MULTIHOP IEEE 802.11 NETWORKS

169. IMPROVING THROUGHPUT AND FAIRNESS BY REDUCING EXPOSED AND HIDDEN NODES IN 802.11 NETWORKS

170. BANDWIDTH ESTIMATION FOR IEEE 802.11-BASED AD HOC NETWORKS

171. MITIGATING PERFORMANCE DEGRADATION IN CONGESTED SENSOR NETWORKS

172. DESIGN AND PERFORMANCE EVALUATION OF A SCALABLE AUTHENTICATION PROTOCOL IN MOBILE IP

173. GROUP KEY MANAGEMENT IN MANETS

174. ROAMING HONEYPOTS FOR MITIGATING SERVICE-LEVEL DENIAL-OFSERVICE ATTACKS

175. WISE: BEST-PATH SELECTION IN WIRELESS MULTIHOMING ENVIRONMENTS

176. ENERGY-EFFICIENT MAC FOR BROADCAST PROBLEMS IN WIRELESS SENSOR NETWORKS

177. A PERFORMANCE COMPARISON OF MULTI-HOP WIRELESS AD HOC NETWORK ROUTING PROTOCOLS

178. A WIRELESS MAC PROTOCOL USING IMPLICIT PIPELINING

179. INTRODUCING RELIABILITY AND LOAD BALANCING IN MOBILE IPV6 BASED NETWORKS

180. TOWARD BROADCAST RELIABILITY IN MOBILE AD HOC NETWORKS WITH DOUBLE COVERAGE

181. AN ACKNOWLEDGMENT-BASED APPROACH FOR THE DETECTION OF ROUTING MISBEHAVIOR IN MANETS

182. CODA: CONGESTION DETECTION AND AVOIDANCE IN SENSOR NETWORKS

183. UPSTREAM CONGESTION CONTROL IN WIRELESS SENSOR NETWORKS THROUGH CROSS-LAYER OPTIMIZATION

184. MODELING AND ANALYSIS OF HETEROGENEOUS INDUSTRIAL NETWORKS ARCHITECTURES

185. A LOCATION BASED ROUTING METHOD FOR MOBILE AD HOC NETWORKS

2014 NS2 Projects


1.Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks

2.Energy-Efficient Reliable Routing Considering Residual Energy in Wireless Ad Hoc Networks

3.Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

4.Neighbor Table Based Shortcut Tree Routing in ZigBee Wireless Networks

5.Hop-by-Hop Message Authentication and Source Privacy in Wireless Sensor Networks

6.Link Quality Aware Code Dissemination in Wireless Sensor Networks

7.Constructing Load-Balanced Data Aggregation Trees in Probabilistic Wireless Sensor Networks

8.Incentive Based Data Sharing in Delay Tolerant Mobile Networks

9.Smart Grid Mesh Network Security Using Dynamic Key Distribution With Merkle Tree 4-Way Handshaking

10.Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing

12.Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks

13.Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks

14.Cross-Layer Approach for Minimizing Routing Disruption in IP Networks

15.Minimum Cost Blocking Problem in Multi-Path Wireless Routing Protocols

16.Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

17.A Study on False Channel Condition Reporting Attacks in Wireless Networks

18.Bandwidth Distributed Denial of Service: Attacks and Defenses

19.STARS: A Statistical Traffic Pattern Discovery System for MANETs

20.A Novel Approach to Trust Management in Unattended Wireless Sensor Networks

21.Designing Energy Routing Protocol with Power Consumption Optimization in MANET

22.PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad Hoc Networks

23.Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach

24.Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning

25.KNN Query Processing Methods in Mobile Ad Hoc Networks

26.AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments

BCA Projects


1. SUPER MARKET

2. CUSTOMIZE & COLLEGE ADMINISTRATION USING INTRANET

3. CHAT CHROME

4. LOG FILE GRABBER

5. SECURE FILE TRANSFER THROUGH VPN

6. REAL TIME PC CONTROL THROUGH SMS

7. APRIORI

8. DETECTING PRODUCT EXPIRATION FOR CONSUMER WELFARE

9. DIGITAL LIBRARY SYSTEM INTEGRATION MODEL CONSTRUCTION BASED ON SEMANTIC WEB SERVICE

10. COURSE MANAGEMENT SYSTEM

11. ENHANCED DATA SECURITY BY USING BLOW RD128_2

12. BUS RESERVATION SYSTEM

13. C TRAINING

14. COLLEGE MANAGEMENT SYSTEM

15. AUTHENTICATION USING MESSAGE AND MISSED CALL

16. GSM BASED WIRELESS CIRCULAR WITH VOICE ANNOUNCEMENT

17. FINGER PRINT BASED STUDENTS ATTENDANCE DETAILS AND SMS

18. RFID BASED STUDENT INFORMATION SYSTEM

19. LOG FILES

20. OPTIMAL CRYPTOGRAPHIC SCHEMES-A NOVEL APPROACH TOWARDS SECURITY

21. SMS BASED LIBRARY

22. TEXT COMPRESSION

23. TIME TABLE GENERATION SYSTEM

24. A NEW BIOMETRIC TECHNOLOGY BASED ON MOUSE DYNAMICS:

25. FINGER PRINT BASED BIOMETRICS SECURITY IN ATM APPLICATION

26. A THREE WAY AUTHENTICATION FRAMEWORK

27. DAY PLANNER

28. FINGER PRINT BASED MEDICAL INFORMATION SYSTEM (WITHOUT HARDWARE)

29. SECURING DATABASE

30. VEHICLE TRACKING USING RFID

31. PEER TO PEER SCHEDULING

32. SMS BASED INDUSTRIAL AUTOMATION USING PERSONAL COMPUTERS

33. GRID INFORMATION RETRIEVAL SYSTEM

34. GENERIC MONITORING INFRASTRUCTURE FOR GRID SYSTEM AND APPLICATION

35. BLACK BERRY DIALING API

36. PROACTIVE PORT SCANNNNG FOR SECURE COMPUTING ENVIRONMENT

37. GUI ORACLE INTERFACE

38. NET SPY

39. TOOLSET FOR NETWORK DATA AVAILABILITY

40. SMS BANKING

41. SECURED SYSTEM USING WEB CAM AND BARCODE (WITHOUT HARDWARE)

42. RESOURCE PLANNING TOOL

43. ADD BUSTER

44. HYPER FILE SHARING

45. REMOTE APPROACH FOR EFFECTIVE TASK EXECUTION AND DATA ACCESSING TOOL

46. BARCODE READER AND TEXT TO VOICE CONVERTER

47. VIRTUAL LAN MESSANGER

48. ADDRESS BOOK

49. A NEW MINING ALGORITHM BASED ON FREQUENT ITEM SETS

50. PLATFORM TIME MANAGE

51. THE DISTANCE TRANSFORM OF IMAGE

52. WRONG METHOD CALL IDENTIFIER

53. VISUAL QUERY BUILDER

54. AUTOMATIC ENQUIRY SYSTEM

55. STOCK CONTROL SYSTEM

56. REMOTE SURVEILLANCE OVER NETWORK USING WEBCAMS

57. CRM MANAGEMENT

58. PC TO PC DATA COMMUNICATION USING LASER TRANSCEIVER

59. RETRIVING FILES USING CONTENT BASED SEARCH

60. BULK SMS GATEWAY

61. DIGITAL LIBRARY

62. IMPLEMENT MEDICAL RECORDS SYSTEM FOR PHYSICIANS

63. SECURE DATA HIDDING AND EXTRACTION

64. MULTI SERVER COMMUNICATION IN DISTRIBUTED DATABASE MANAGEMENT

65. INTER OFFICE MESSAGING SYSTEM

66. INSTANT EMAIL VIEWER

67. SOLUTION TO DISTRIBUTED COMPUTING PROBLEM USING REMOTE METHOD INVOCATION

68. BANK ACCOUNT COLLECTOR SYSTEM

69. A DISTRIBUTED DATABASE QUERYING SYSTEM USING JAVA RMI

70. SMS BASED LIBRARY

71. BANKING APPLICATION FOR FEE PAYMENT

72. EMAIL SPAM DETECTOR

73. HOSTEL DECISION SUPPORT SYSTEM

74. SMS BASED PC, APPLIANCE CONTROL AND ACADEMIC DETAILS RETRIVAL

75. TOOLS MANAGEMENT SYSTEM

76. AUTHERIZED LOGIN AND FILE TRANSFER USING BAR-CODE

77. MONSTAR AIRLINES BOOKING

78. A CELL PHONE BASED TWO-FACTOR AUTHENTICATION SYSTEM FOR COMPUTERS

79. SCHEDULING ALGORITHAM

80. AUTOMATIC MAIL RESPONSE SYSTEM

81. SMS BASED PRODUCT PROMOTION SYSTEM FOR COMPANIES

82. BUDGET APPROVAL SYSTEM

83. SIGN LANGUAGE CHAT FOR DISABLED PEOPLE

84. MEDICAL TRANSCRIPTION PROCESSING & TRACKING SYSTEM

85. SCHOOL ADMINISTRATION SYSTEM

86. PORTABLE STORAGE

87. INCENTIVE-BASED SCHEDULING FOR MARKET-LIKE COMPUTATIONAL GRIDS

88. MINING WEIGHTED ASSOCIATION RULES WITHOUT PREASSIGNED WEIGHTS

89. BIOMETRIC AUTHENTICATION FOR BORDER CONTROL APPLICATIONS

90. REMOTE BANKING SYSTEM

91. ATM IMPLEMENTATION

92. JAVA SEARCH ENGINE

93. FTP FILE TRANSFER

94. BIOMETRIC BASED SECURITY FOR FILE TRANSFER USING FINGERPRINT

95. FINGERPRINT AND IRIS BASED ATM SYSTEM

96. RFID BASED LIBRARY MANAGEMENT SYSTEM

97. FINGERPRINT BASED VISA PROCESSING

98. FINGERPRINT BASED ATTENDANCE SYSTEM (WITHOUT HARDWARE)

99. RFID BASED OBJECT DETECTION

100. TENDER EVOLUATION SYSTEM

101. INTELLIGENT PACKET FILTERING & CONGESTION CONTROL

102. AUTOMATIC RESPONSE SYSTEM USING MOBILE FOR H-R MANAGEMENT SYSTEM

103. VOTING SYSTEM

104. TIME TABLE GENERATOR

105. SMS BASED LIBRARY AND LAB AUTOMATION

106. FILE TRANSFER THROUGH PSTN LINE WITH TELEPHONE MODEM

107. SMART MEDICARE SYSTEM

108. HOME AUTOMATION IN JAVA

109. LAB AUTOMATION AND VIDEO MONITORING

110. PREPAID CARD FOR PETROL BUNK SYSTEM

111. INTERACTIVE VOICE RESPONSE SYSTEM

112. AUTOMATIC RESPONSE FOR GAS BOOKING

113. AUTOMATIC RESPONSE FOR STUDENT INFORMATION SYSTEM

114. MARK ANNOUNCEMENT SYSTEM

115. SIGNATURE TREE

116. IDENTIFICATION SYSTEM COMBINED WITH FINGERPRINT AND CRYPTOGRAPHY

117. PROJECT TIME KEEPER

118. ENHANCING A SCHOOL WEBSITE WITH APPLETS

119. WEB BROWSER

120. MUSIC PLAYER

121. SMS BASED CALL TAXIE INFORMATION SYSTEM

122. SMS BASED PHONE BOOK SEARCH

123. JAVA GUI HELPER

124. SMS BASED THEATRE TICKET ENQUIRY

125. REMOTE COMPILATION

126. MESSAGE BROADCASTING

127. COLLEGE ADMINISTRATION SYSTEM

128. SUPER MARKET

129. M-BANKING SECURITY A FUTURISTIC IMPROVED SECURITY APPROACH

130. VIDEO TRANSMISSION

131. SMTP MAIL SERVER

132. SECURED DATA COMMUNICATION ON LSB TECHNIQUE

133. AUDIO CONFERENCING

134. FILE SHARING SYSTEM

135. ZIP&UNZIP TOOL

136. ELECTION SYSTEM

137. JAVA COMPILER

138. SQL VIEWER

139. PROJECT TIME TRACKER

140. PERSONAL FINANCE MANAGEMENT

141. BARCODE GENERATOR

142. WORD PROCESSOR

143. JAVA BASED TEXT EDITO

144. CAR SALES SYSTEM

145. BANK MANAGEMENT SYSTEM

146. DIRECTORY SEARCH UTILITY

147. QUESTION BANK

148. REMOTE NETWORK MONITOR

149. DIJSKTRAS ALGORITHM

150. FILE TRANSFER USING SOCKETS

151. INVENTORY MANAGEMENT SYSTEM

152. MEDICAL STORE MANAGEMENT SYSTEM

153. LIBRARY MANAGEMENT

154. CAMPUS INFORMATION SYSTEM

155. COLLEGE ADMINISTRATION AND COUNSELLING SYSTEM

156. FILE CRYPTER

157. MULTICAST ROUTING

158. JAVA E-MAIL SERVER AND MESSAGING SYSTEM (JEM)

159. CHAT ROOM

160. BRAIN TUMOR SEGMENTATION FOR MRI IMAGES

161. FILE SEARCH ENGINE

162. JAVA EXPLORER

163. INTRUSION DETECTION

164. MULTICAST CHATTING

165. NETWORK PORT SCANNER

166. VIRTUAL DATABASE DESIGNING

167. IMAGE STEGANOGRAPHY

168. CHECK INFORMATION EXTRACTION

169. IRIS RECOGNITION

170. VISIBLE WATER MARKING (CONFERENCE)

171. FILE SPILTTER

172. VIDEO CONFERENCING

173. RSA ENCRYPTION

174. FINGER PRINT BASED VOTING MACHINE

175. FINGER PRINT BASED ATM APPLICATION

176. MAIL TRACER

177. EDGE DETECTION

178. REMOTE ADMINISTRATION CROSS PLATFORM

179. IMAGE PROCESSING EDITOR

180. NETWORK TRAFFIC ANALYZER

181. NEW TECHNIQUE FOR PASSPORT AUTHENTICATION

182. DECISION TREE ALGORITHM IN DATA MINING

183. REMOTE ADMINISTRATION AND NETWORK MONITOR

184. CRYPTOGRAPHY (RSA, DES , BLOWFISH)

185. DYNAMIC CRYPTOGRAPHY

186. ONLINE VOTING FOR HOUSEHOLD NOMINEE

187. NETWORK COP

188. LAMPORT’S ALGORITHM IN PEER TO PEER NETWORK LAMPORTS ALGORITHM IN PEER TO PEER NETWORK

189. A PARALLEL FILE TRANSFER PROTOCOL FOR MIRROR AND GRID SYSTEMS

190. BI-LINGUAL TRANSLATING TOOL

191. PRIVACY-PRESERVING DISTRIBUTED PROFILE MATCHING IN PROXIMITYBASED MOBILE SOCIAL NETWORKS

192. TOWARD FINE-GRAINED, UNSUPERVISED, SCALABLE PERFORMANCE DIAGNOSIS FOR PRODUCTION CLOUD COMPUTING SYSTEMS

193. THEMIS: A MUTUALLY VERIFIABLE BILLING SYSTEM FOR THE CLOUD COMPUTING ENVIRONMENT

194. OPTIMAL MULTISERVER CONFIGURATION FOR PROFIT MAXIMIZATION IN CLOUD COMPUTING

195. AN EFFICIENT AND SECURE DYNAMIC AUDITING PROTOCOL FOR DATA STORAGE IN CLOUD COMPUTING

196. A HIGHLY PRACTICAL APPROACH TOWARD ACHIEVING MINIMUM DATA SETS STORAGE COST IN THE CLOUD

197. MINING ORDER-PRESERVING SUBMATRICES FROM DATA WITH REPEATED MEASUREMENTS

198. FAST NEAREST NEIGHBOR SEARCH WITH KEYWORDS

199. FACILITATING EFFECTIVE USER NAVIGATION THROUGH WEBSITE STRUCTURE IMPROVEMENT

200. ENFORCING SECURE AND PRIVACY-PRESERVING INFORMATION BROKERING IN DISTRIBUTED INFORMATION SHARING

201. DYNAMIC QUERY FORMS FOR DATABASE QUERIES

202. BEYOND TEXT QA: MULTIMEDIA ANSWER GENERATION BY HARVESTING WEB INFORMATION

203. A GENERALIZED FLOW-BASED METHOD FOR ANALYSIS OF IMPLICIT RELATIONSHIPS ON WIKIPEDIA

204. WINDS OF CHANGE: FROM VENDOR LOCK-IN TO THE META CLOUD

205. TOWARDS SECURE MULTI-KEYWORD TOP-K RETRIEVAL OVER ENCRYPTED CLOUD DATA

206. TOWARDS DIFFERENTIAL QUERY SERVICES IN COST-EFFICIENT CLOUDS

207. THE Q-MATRIX METHOD: MINING STUDENT RESPONSE DATA FOR KNOWLEDGE

208. SPATIAL APPROXIMATE STRING SEARCH

209. SECURE MINING OF ASSOCIATION RULES IN HORIZONTALLY DISTRIBUTED DATABASES

210. ROBUST MODULE-BASED DATA MANAGEMENT

211. ON THE KNOWLEDGE SOUNDNESS OF A COOPERATIVE PROVABLE DATA POSSESSION SCHEME IN MULTICLOUD STORAGE

212. MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS

213. M-PRIVACY FOR COLLABORATIVE DATA PUBLISHING

214. MINING CONTRACTS FOR BUSINESS EVENTS AND TEMPORAL CONSTRAINTS IN SERVICE ENGAGEMENTS

215. KEY-AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING IN CLOUD STORAGE

216. K-ANONYMITY FOR CROWDSOURCING DATABASE

217. INCENTIVE COMPATIBLE PRIVACY-PRESERVING DATA ANALYSIS

218. IMPROVING SECURITY AND EFFICIENCY IN ATTRIBUTE-BASED DATA SHARING

219. GINIX: GENERALIZED INVERTED INDEX FOR KEYWORD SEARCH

220. FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE

221. ENABLING DATA DYNAMIC AND INDIRECT MUTUAL TRUST FOR CLOUD COMPUTING STORAGE SYSTEMS

222. EFFICIENT ALGORITHMS FOR MINING HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASES

223. DYNAMIC AUDIT SERVICES FOR OUTSOURCED STORAGES IN CLOUDS

224. DOCUMENT CLUSTERING FOR FORENSIC ANALYSIS: AN APPROACH FOR IMPROVING COMPUTER INSPECTION

225. CUSTOMIZED POLICIES FOR HANDLING PARTIAL INFORMATION IN RELATIONAL DATABASES

226. COMPARABLE ENTITY MINING FROM COMPARATIVE QUESTIONS

227. CLUSTERING SENTENCE-LEVEL TEXT USING A NOVEL FUZZY RELATIONAL CLUSTERING ALGORITHM

228. CAM: CLOUD-ASSISTED PRIVACY PRESERVING MOBILE HEALTH MONITORING

229. MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISMS

230. ANOMALY DETECTION VIA ONLINE OVERSAMPLING PRINCIPAL COMPONENT ANALYSIS

231. A ROUGH-SET-BASED INCREMENTAL APPROACH FOR UPDATING APPROXIMATIONS UNDER DYNAMIC MAINTENANCE ENVIRONMENTS

232. A PROBABILISTIC APPROACH TO STRING TRANSFORMATION

233. A PRIVACY LEAKAGE UPPER-BOUND CONSTRAINT BASED APPROACH FOR COST-EFFECTIVE PRIVACY PRESERVING OF INTERMEDIATE DATASETS IN CLOUD

234. A NEW ALGORITHM FOR INFERRING USER SEARCH GOALS WITH FEEDBACK SESSIONS

235. A METHODOLOGY FOR DIRECT AND INDIRECT DISCRIMINATION PREVENTION IN DATA MINING

236. DATA INTEGRITY AND DATA DYNAMICS WITH SECURE STORAGE SERVICE IN CLOUD

237. ANNOTATING SEARCH RESULTS FROM WEB DATABASES

238. TOWARDS DIFFERENTIAL QUERY SERVICES IN COST-EFFICIENT CLOUDS

239. THE INTELLIGENT AGENTS IN THE STUDY OF WEB-BASED MEDICAL INFORMATION SEARCH SYSTEM

240. RANKING OF WEB DOCUMENTS USING SEMANTIC SIMILARITY

241. PRIVACY-PRESERVING PUBLIC AUDITING FOR SECURE CLOUD STORAGE

242. PRIVACY PRESERVING DELEGATED ACCESS CONTROL IN PUBLIC CLOUDS

243. PRIVACY PRESERVING DATA SHARING WITH ANONYMOUS ID ASSIGNMENT

244. ONLINE SEARCH AND BUYING BEHAVIOUR IN CONSUMER MARKETS

245. M-PRIVACY FOR COLLABORATIVE DATA PUBLISHNG

246. HIERARCHICAL CLUSTERING WITH MULTI VIEW POINT BASED SIMILARITY MEASURE

247. FACILITATING DOCUMENT ANNOTATION USING CONTENT AND QUERYING VALUE

248. CUSTOMER KNOWLEDGE CONTRIBUTION BEHAVIOR IN SOCIAL SHOPPING COMMUNITIES

249. CROWDSOURCING PREDICTORS OF BEHAVIORAL OUTCOMES

250. CLUSTERING SENTENCE-LEVEL TEXT USING A NOVEL FUZZY RELATIONAL CLUSTERING ALGORITHM

251. BIOMEDICAL DOCUMENT CLUSTERING USING ONTOLOGY BASED CONCEPT WEIGHT

252. AN EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMS IN DATA STREAMS

253. A FAST CLUSTERING-BASED FEATURE SUBSET SELECTION ALGORITHM FOR HIGH DIMENSIONAL DATA

254. LIFELONG PERSONAL HEALTH DATA AND APPLICATION SOFTWARE VIA VIRTUAL MACHINES IN THE CLOUD

255. FUTURE PREDICTIONS IN INDIAN STOCK MARKET THROUGH LINGUISTIC TEMPORAL APPROACH

256. EVOLVING INTELLIGENT AGENTS FOR HOSPITAL MANAGEMENT SYSTEM

257. CLOUD COMPUTING SECURITY: FROM SINGLE TO MULTI-CLOUDS

258. AN ONTOLOGY-BASED FRAMEWORK FOR MODELING USER BEHAVIOR—A CASE STUDY IN KNOWLEDGE MANAGEMENT

259. AN EFFICIENT SEMANTIC MODEL FOR CONCEPT BASED CLUSTERING AND CLASSIFICATION

260. EVOLUTIONARY MODEL SUPPORT FOR URBAN BICYCLES RENTING SYSTEMS

261. AN EFFICIENT CONCEPT-BASED MINING MODEL FOR ENHANCING TEXT CLUSTERING

262. A FRAMEWORK FOR EXTRACTING INFORMATION FROM WEB USING VTD-XMLS XPATH

263. ONE SIZE DOES NOT FIT ALL: TOWARD USER- AND QUERY-DEPENDENT RANKING FOR WEB DATABASES

264. LEARN TO PERSONALIZED IMAGE SEARCH FROM THE PHOTO SHARING WEBSITES

265. ENSURING DISTRIBUTED ACCOUNTABILITY FOR DATA SHARING IN THE CLOUD

266. AN ONTOLOGY-BASED TEXT-MINING METHOD TO CLUSTER PROPOSALS FOR RESEARCH PROJECT SELECTION

267. CLUSTERING WITH MULTIVIEWPOINT-BASED SIMILARITY MEASURE

268. EVALUATING DATA RELIABILITY: AN EVIDENTIAL ANSWER WITH APPLICATION TO A WEB-ENABLED DATA WAREHOUSE

269. RECOMMENDATION MODELS FOR OPEN AUTHORIZATION

270. RANKING MODEL ADAPTATION FOR DOMAIN-SPECIFIC SEARCH

271. SCALABLE AND SECURE SHARING OF PERSONAL HEALTH RECORDS IN CLOUD COMPUTING USING ATTRIBUTE-BASED ENCRYPTION

272. EFFICIENT AUDIT SERVICE OUTSOURCING FOR DATA INTEGRITY IN CLOUDS

273. COOPERATIVE PROVABLE DATA POSSESSION FOR INTEGRITY VERIFICATION IN MULTI-CLOUD STORAGE

274. MULTIPARTY ACCESS CONTROL FOR ONLINE SOCIAL NETWORKS: MODEL AND MECHANISM

275. RELIABLE RE-ENCRYPTION IN UNRELIABLE CLOUDS

276. ONLINE MODELING OF PROACTIVE MODERATION SYSTEM FOR AUCTION FRAUD DETECTION

277. A RECOMMENDATION MODEL FOR LEARNING OBJECTS IN A SERVICE ORIENTED E-LEARNING ENVIRONMENT

278. DIFFERENTIATED VIRTUAL PASSWORDS, SECRET LITTLE FUNCTIONS, AND CODEBOOKS FOR PROTECTING USERS FROM PASSWORD THEFT

279. MEDICAL KNOWLEDGE SHARING GUIDELINE

280. DEVELOPING AND DESIGNING THE CUSTOMER RELATIONSHIP MANAGEMENT SYSTEM OF SMALL AND MEDIUM ENTERPRISE BASED ON ACTIVEX DATA OBJECT TECHNOLOGY

281. MOTIVATIONS UNDERLYING THE ADOPTION OF ERP SYSTEMS IN HEALTHCARE ORGANIZATIONS: AN ANALYSIS FROM “SUCCESS STORIES”

282. SOFTWARE FAULT PREDICTION USING QUAD TREE-BASED K-MEANS CLUSTERING ALGORITHM

283. PUBLISHING SEARCH LOGS—A COMPARATIVE STUDY OF PRIVACY GUARANTEES

284. MINING WEB GRAPHS FOR RECOMMENDATIONS

285. IMPROVING AGGREGATE RECOMMENDATION DIVERSITY USING RANKINGBASED TECHNIQUES

286. QUERY PLANNING FOR CONTINUOUS AGGREGATION QUERIES OVER A NETWORK OF DATA AGGREGATORS

287. ORGANIZING USER SEARCH HISTORIES

288. INCREMENTAL INFORMATION EXTRACTION USING RELATIONAL DATABASES

289. RESEARCH ON ANTI-MONEY LAUNDERING BASED ON CORE DECISION TREE ALGORITHM

290. MINING DEMAND CHAIN KNOWLEDGE FOR NEW PRODUCT DEVELOPMENT AND MARKETING

291. A LINGUISTIC SCREENING EVALUATION MODEL IN NEW PRODUCT DEVELOPMENT

292. EFFICIENT RECORD LINKAGE IN LARGE DATA SETS

293. MINING EDUCATIONAL DATA TO ANALYZE STUDENTS PERFORMANCE

294. TOWARDS SECURE AND DEPENDABLE STORAGE SERVICES IN CLOUD COMPUTING

295. ERP ADOPTION COST FACTORS IN SMES

296. A MACHINE LEARNING APPROACH FOR IDENTIFYING DISEASE-TREATMENT RELATIONS IN SHORT TEXTS

297. TRUTH DISCOVERY WITH MULTIPLE CONFLICTING INFORMATION PROVIDERS ON THE WEB

298. MONITORING ONLINE TESTS THROUGH DATA VISUALIZATION

299. THE SECURITY OF CLOUD COMPUTING SYSTEM ENABLED BY TRUSTED COMPUTING TECHNOLOGY

300. MINING CLUSTER-BASED TEMPORAL MOBILE SEQUENTIAL PATTERNS IN LOCATION-BASED SERVICE ENVIRONMENTS

301. EFFECTIVE NAVIGATION OF QUERY RESULTS BASED ON CONCEPT HIERARCHIES

302. FUZZY KEYWORD SEARCH OVER ENCRYPTED DATA IN CLOUD COMPUTING

303. AI AND OPINION MINING

304. UP IN THE AIR: MOVING YOUR APPLICATIONS TO THE CLOUD

305. USING WEB-REFERRAL ARCHITECTURES TO MITIGATE DENIAL-OF-SERVICE THREATS

306. PRIVACY AND SECURITY FOR ONLINE SOCIAL NETWORKS: CHALLENGES AND OPPORTUNITIES

307. IMPLEMENTATION OF INDONESIAN ELECTRONIC CITATION SYSTEM BASED ON WEB EXTRACTION TECHNIQUES

308. BUSINESS-TO-CONSUMER E-COMMERCE WEB SITES: VULNERABILITIES, THREATS AND QUALITY EVALUATION MODEL

309. RESEARCH OF NETWORK BANKS CUSTOMER TRUST ON THE VIEW OF WEB SITE

310. WASP: PROTECTING WEB APPLICATIONS USING POSITIVE TAINTING AND SYNTAX-AWARE EVALUATION

311. BUSINESS PROCESSES SOLUTION WITH APACHE STRUTS FRAMEWORK

312. SESSION FIXATION

313. A PRACTICAL PASSWORD-BASED TWO-SERVER AUTHENTICATION AND KEY EXCHANGE SYSTEM



For Computer Science 2014-2015 Project Titles,Please call: 9591912372 or Email to: [email protected]




Projects at Bangalore offers Final Year students Engineering projects - ME projects,M.Tech projects,BE Projects,B.Tech Projects, Diploma Projects,Electronics Projects,ECE Projects,EEE Projects,Mechanical projects,Bio-Medical Projects,Telecommunication Projects,Instrumentation Projects,Software Projects - MCA Projects,M.Sc Projects,BCA Projects,B.Sc Projects,Science Exhibition Kits,Seminars,Presentations,Reports and so on...

IEEE 2015 Dotnet Projects|IEEE 2015 Java Projects|2015 IEEE Data Mining Projects|2015 IEEE Image Processing Projects|2015 IEEE Network Security Projects|2015 IEEE Networking Projects|2015 IEEE Mobile Computing Projects|2015 IEEE Multimedia Projects|2015 IEEE Wireless Communications Projects|
ns2 projects bangalore,Download ns2 software for windows xp,Download NS2 Simulator,Download NS Software,ns2 tutorial,ns2 download,NS2 Projects,NS2 Projects,2016 IEEE NS2 Project,NS2 Projects in Bangalore,IEEE 2016 NS2 Projects
ns2 projects bangalore,Download ns2 software for windows xp,Download NS2 Simulator,Download NS Software,ns2 tutorial,ns2 download,NS2 Projects,NS2 Projects,2016 IEEE NS2 Project,NS2 Projects in Bangalore,IEEE 2017 NS2 Projects,IEEE Projects for CSE 2017 Titles,IEEE Projects for CSE 2016 free Download,IEEE Mini Projects for CSE 2016,IEEE Projects for CSE 2015 Titles,IEEE Projects for CSE 2017 free Download,IEEE Mini Projects for CSE 2015,IEEE Projects for CSE 2011,IEEE Projects for CSE 2017,IEEE Projects for CSE 2017,IEEE Projects for CSE 2016 Titles,IEEE Projects for CSE 2017 Titles,Diploma Projects for Computer Science Students,Diploma Projects For Computer Engineering,Diploma Level Projects For Computer Engineering,Diploma Projects For Computer Science,Engineering Project Ideas For Computer Engineering,MCA Projects,Android ieee projects application projects big data ieee projects bigdata project big data projects Cloud Computing Cloud Computing ieee projects Cloud Computing projects data mining ieee projects Data Mining projects Dependable and Secure Computing ieee projects Dependable and Secure Computing projects hadoop ieee projects hadoop projects ieee ns2 projects ieee project ieee projects ieee projects at bangalore ieee projects download ieee projects for cse ieee projects on image processing ieee projects on networking and network security ieee projects topics ieee projects with source code IEEE Student Projects image processing ieee projects image processing projects Java Projects Matab Projects Mobile Computing ieee projects Mobile Computing projects Networking ieee projects Networking projects Network Security ieee projects Network Security projects ns2 ieee projects demo ns2 project Ns2 Projects ns2 projects demo ns2 projects download ns2 projects in bangalore ns2 projects source code ns2 projects titles ns2 projects with source code Parallel Distributed System
ns2 projects bangalore,Download ns2 software for windows xp,Download NS2 Simulator,Download NS Software,ns2 tutorial,ns2 download,NS2 Projects,NS2 Projects,2016 IEEE NS2 Project,NS2 Projects in Bangalore,IEEE 2016 NS2 Projects,2016 IEEE Image Processing Projects|2016 IEEE Network Security Projects|2015 IEEE Networking Projects|2016 IEEE Mobile Computing Projects|2016 IEEE Multimedia Projects|2015 IEEE Wireless Communications Projects|2016 IEEE Data Mining Base Paper|2016 IEEE Image Processing Base Paper|2016 IEEE Network Security Base Paper|2016 IEEE Networking Base Paper|2016 IEEE Mobile Computing Base Paper|2016 IEEE Multimedia Base Paper|2017 IEEE Wireless Communications Base Paper|2016 IEEE Data Mining Projects|

Facebook Twitter