
Menu
IEEE MASTER – IEEE PROJECTS IN PONDICHERRY
NS2 IEEE Projects 2015-2016 We are offering ieee projects 2015-2016 in latest technology like Java, dot net, android, embedded, matlab, vlsi, hadoop, power elctronics, power system, mechanical, civil projects. IEEE Master is a unit of LeMeniz Technologies. We guide all final year M.E/M.Tech, B.E/B.Tech, MPhil, MCA, BCA, M.Sc, B.Sc, and Diploma students for their Academic Projects to get best results.
S.NO | Code | Title | Domain | Year |
---|---|---|---|---|
1 | LM_N015_01 | A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks | Dependable and Secure Computing | June 2015 |
2 | LM_N015_02 | Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks | Mobile Computing | April 2015 |
3 | LM_N015_03 | Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach | Systems Journal | March 2015 |
4 | LM_N015_04 | Wormhole Attack Detection Algorithms in Wireless Network Coding Systems | Mobile Computing | March 2015 |
5 | LM_N015_05 | Secure and Reliable Routing Protocols for Heterogeneous Multi hop Wireless Networks | Parallel And Distributed Systems | April 2015 |
6 | LM_N015_06 | Cost-Aware Secure Routing (CASER) Protocol Design for Wireless Sensor Networks | Parallel And Distributed Systems | April 2015 |
7 | LM_N015_07 | Power-Aware Computing in Wearable Sensor Networks: An Optimal Feature Selection | Mobile Computing | April 2015 |
8 | LM_N015_08 | Efficient and Truthful Bandwidth Allocation in Wireless Mesh Community Networks | Networking | February 2015 |
9 | LM_N015_09 | On Availability-Performability Tradeoff in Wireless Mesh Networks | Mobile Computing | March 2015 |
10 | LM_N015_10 | Opportunistic Routing with Congestion Diversity in Wireless Ad-hoc Networks | Networking | Preprint |
11 | LM_N015_11 | Secure and Distributed Data Discovery and Dissemination in Wireless Sensor Networks | Parallel And Distributed Systems | April 2015 |
12 | LM_N015_12 | Trust Management for Defending On-Off Attacks | Parallel Distributed Systems | April 2015 |
13 | LM_N015_13 | Energy Consumption Optimization for Multihop Cognitive Cellular Networks | Mobile Computing | February 2015 |
14 | LM_N015_14 | Path Reconstruction in Dynamic Wireless Sensor Networks Using Compressive Sensing | Networking | Preprint |
15 | LM_N015_15 | Link Capacity-energy Aware WDC for Network Lifetime Maximization | Mobile Computing | Aug 2015 |
16 | LM_N015_16 | REAL: A Reciprocal Protocol for Location Privacy in Wireless Sensor Networks | Dependable and Secure Computing | Aug 2015 |
17 | LM_N015_17 | Minimizing Transmission Cost for Third-Party Information Exchange with Network Coding | Mobile Computing | Aug 2015 |
18 | LM_N015_18 | Opportunistic Routing Algorithm for Relay Node Selection in Wireless Sensor Networks | Industrial informatics | Feb 2015 |
19 | LM_N015_19 | VGDRA: A Virtual Grid-Based Dynamic Routes Adjustment Scheme for Mobile Sink-Based Wireless Sensor Networks | Sensors journal | Jan 2015 |
20 | LM_N015_20 | An Efficient Distributed Trust Model for Wireless Sensor Networks | Parallel And Distributed Systems | May 2015 |
21 | LM_N015_21 | Real-Time Path Planning Based on Hybrid-VANET-Enhanced Transportation System | VANET | May 2015 |
22 | LM_N015_22 | Time-Delayed Broadcasting for Defeating Inside Jammers | Dependable and Secure Computing | Jun 2015 |
23 | LM_N015_23 | Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks | Dependable and Secure Computing | Feb 2015 |
24 | LM_N015_24 | Restricted Epidemic Routing in Multi-Community Delay Tolerant Networks | Mobile computing | Aug 2015 |
25 | LM_N015_25 | Neighbor Discovery in Wireless Networks with Multi packet Reception | Parallel And Distributed Systems | July 2015 |
26 | LM_N015_26 | E2R2: Energy-Efficient and Reliable Routing for Mobile Wireless Sensor Networks | Systems Journal | 2015 |
27 | LM_N015_27 | A Secure Scheme Against Power Exhausting Attacks in Hierarchical Wireless Sensor Networks | Sensors journal | Jun 2015 |
28 | LM_N015_28 | Effective Key Management in Dynamic Wireless Sensor Networks | Information forensics and security | Feb 2015 |
- Abstract
- Introduction
- Existing System
- Disadvantages
- Proposed System
- Advantages
- System Requirement
- References
- Power Point Presentation
- Abstract
- Modules Description
- System Architecture
- Data Flow Diagram
- Litreature Survey
- Referece Papers
- Power Point Presentation
Sample Coding
Sample Screen Shots
Power Point Presentation
Table Design
Screen Shot
Conclusiton
Final Document
Complete Source Code
Project Execution Video
+91 9566355386 | +91 9962588976 | projects@lemenizinfotech.com