You are on page 1of 3

ECWAY TECHNOLOGIES

ECWAY TECHNOLOGIES

2015-16 IEEE Software | Embedded | Mechanical Projects Development

IEEE PROJECTS DEVELOPMENTS


OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE
BANGALORE / HYDRABAD
CELL: 9894917187 | 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111
Visit: www.ecwaytechnologies.com | www.ecwayprojects.com Mail to: ecwaytechnologies@gmail.com

IEEE 2015-2016 NS2 TITLES


BE, B.TECH, ME, M.TECH, MSC, MCA PROJECTS

***Document Format***

Abstract:

Introduction:
System Analysis:

Disadvantages:

Existing System:
Proposed System:

Advantages:

System Requirements:

Block Diagram:

Dataflow Diagram:

Use Case Diagram:


Diagram:

UML Diagrams:

Class Diagram:
Activity Diagram:

Modules Description:
System Testing:
Sample code:

Literature Survey:

Sequence
Implementation:
System Study:

Software Description:
Conclusion:

References:

OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 98949 17187 | +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111

ECWAY TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development

***Complete Document ***

NS2 PROJECT TITLES

DOMAIN

YEAR

Delay Optimization and Cross-Layer Design in Multihop Wireless Networks With

NS2

APR/2015

Network Coding and Successive Interference Cancelation


Power Control and Soft Topology Adaptations in Multihop Cellular Networks

NS2

MAR/2015

With Multi-Point Connectivity


Statistical Dissemination Control in Large Machine-to-Machine Communication

NS2

APR/2015

Networks
Dynamic Openflow-Controlled Optical Packet Switching Network
Toward Transparent Coexistence for Multihop Secondary Cognitive Radio

NS2
NS2

APR/2015
MAY/2015

Networks
Distributed Denial of Service Attacks in Software-Defined Networking with

NS2

APR/2015

Cloud Computing
Privacy-Preserving Detection of Sensitive Data Exposure
Authentication Handover and Privacy Protection in 5G HetNets Using Software-

NS2
NS2

APR/2015
APR/2015

Defined Networking
Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce
Security-Aware Relaying Scheme for Cooperative Networks With Untrusted

NS2
NS2

MAR/2015
MAR/2015

Relay Nodes
Improving Physical-Layer Security in Wireless Communications Using Diversity

NS2

MAR/2015

Techniques
Game-Theoretic Topology Controlfor Opportunistic Localizationin Sparse

NS2

MAY/2015

Underwater Sensor Networks


Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad

NS2

APR/2015

Hoc Networks
Self-Organizing Resource Management Framework in OFDMA Femtocells
Joint Optimal Data Rate and Power Allocation in Lossy Mobile Ad Hoc Networks

NS2
NS2

APR/2015
APR/2015

with Delay-Constrained Traffics


Max Contribution An Online Approximation of Optimal Resource Allocation in

NS2

MAR/2015

Delay Tolerant Networks


A Distributed Fault-Tolerant Topology Control Algorithm for Heterogeneous

NS2

APR/2015

Wireless Sensor Networks


Adaptive Algorithms for Diagnosing Large-Scale Failures in Computer Networks
Authenticated Key Exchange Protocols for Parallel Network File Systems
Distributed Sensing for High-Quality Structural Health Monitoring Using WSNs
Exploiting Efficient and Scalable Shuffle Transfers in Future Data Center

NS2
NS2
NS2
NS2

MAR/2015
APR/2015
APR/2015
APR/2015

Networks
Improving the Network Lifetime of MANETs through Cooperative MAC Protocol

NS2

APR/2015

Design
OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 98949 17187 | +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111

ECWAY TECHNOLOGIES
2015-16 IEEE Software | Embedded | Mechanical Projects Development

Joint Virtual MIMO and Data Gathering for Wireless Sensor Networks
Secrecy Capacity Optimization via Cooperative Relaying and Jamming for

NS2
NS2

APR/2015
MAR/2015

WANETs
Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless

NS2

MAR/2015

Networks
Shared Authority Based Privacy-Preserving Authentication Protocol in Cloud

NS2

MAR/2015

Computing
Cost-Aware SEcure Routing (CASER) Protocol Design for Wireless Sensor

NS2

APR/2015

Networks
Routing Pressure A Channel-Related and Traffic-Aware Metric of Routing

NS2

MAR/2015

Algorithm
Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
Passive IP Traceback Disclosing the Locations of IP Spoofers From Path

NS2
NS2

MAR/2015
MAR/2015

Backscatter

..connecting you to the


power of IT

OUR OFFICES @ CHENNAI / TRICHY / KARUR / ERODE / MADURAI / SALEM / COIMBATORE /BANGALORE / HYDRABAD
Contact: +91 98949 17187 | +91 875487 1111 / 2111 / 3111 / 4111 / 5111 / 6111

You might also like