IEEE 2015 NS2 Projects
Web : www.kasanpro.com Email : sales@kasanpro.com
List Link : http://kasanpro.com/projects-list/ieee-2015-ns2-projects
Title :Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/optimal-scheduling-multi-radio-multi-channel-cognitive-cellular-networks
Abstract : Due to the emerging various data services, current cellular networks have been experiencing a surge of
data traffic and already overloaded, thus not able to meet the ever exploding traffic demand. In this study, we first
introduce a Multi-radio Multi-channel Multi-hop Cognitive Cellular Network (M3C2N) architecture to enhance network
throughput. Under the proposed architecture, we then investigate the minimum length scheduling problem by
exploring joint frequency allocation, link scheduling, and routing. In particular, we first formulate a maximal
independent set based joint scheduling and routing optimization problem called Original Optimization Problem (OOP).
It is a Mixed Integer Non-Linear Programming (MINLP) and generally NP-hard problem. Then, employing a column
generation based approach, we develop an ?-bounded approximation algorithm which can obtain an ?-bounded
approximate result of OOP. Noticeably, in fact we do not need to find all the maximal independent sets in the
proposed algorithm, which are usually assumed to be given in previous works although finding all of them is
NP-complete. We also revisit the minimum length scheduling problem by considering uncertain channel availability.
Simulation results show that we can efficiently find the ?-bounded approximate results and the optimal result as well,
i.e., when ? = 0% in the algorithm.
Title :A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems
Language : NS2
Project Link :
http://kasanpro.com/p/ns2/en-route-filtering-scheme-false-data-injection-attacks-cyber-physical-networked-systems
Abstract : In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements to the
controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes
network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless
sensor networks in the past. However, these schemes either lack resilience to the number of compromised nodes or
depend on the statically configure routes and node localization, which are not suitable for CPNS. In this paper, we
propose a Polynomial-based Compromise-Resilient En-route Filtering scheme (PCREF), which can filter false injected
data effectively and achieve a high resilience to the number of compromised nodes without relying on static routes
and node localization. Particularly, PCREF adopts polynomials instead of MACs (Message Authentication Codes) for
endorsing measurement reports to achieve the resilience to attacks. Each node stores two types of polynomials:
authentication polynomial and check polynomial, derived from the primitive polynomial, and used for endorsing and
verifying the measurement reports. Via extensive theoretical analysis and experiments, our data show that PCREF
achieves better filtering capacity and resilience to the large number of compromised nodes in comparison to the
existing schemes.
Title :Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing
Language : NS2
Project Link : http://kasanpro.com/p/ns2/privacy-preserving-authentication-protocol-shared-authority-cloud
Abstract : Cloud computing is emerging as a prevalent data interactive paradigm to realize users' data remotely
stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand
cloud applications without considering the local infrastructure limitations. During the data accessing, different users
may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The
existing security solutions mainly focus on the authentication to realize that a user's privative data cannot be
unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other
users for data sharing. The challenged access request itself may reveal the user's privacy no matter whether or not it
can obtain the data access permissions. In this paper, we propose a shared authority based privacy-preserving
authentication protocol (SAPA) to address above privacy issue for cloud storage. In the SAPA, 1) shared access
authority is achieved by anonymous access request matching mechanism with security and privacy considerations
(e.g., authentication, data anonymity, user privacy, and forward security); 2) attribute based access control is adopted
to realize that the user can only access its own data fields; 3) proxy re-encryption is applied by the cloud server to
provide data sharing among the multiple users. Meanwhile, universal composability (UC) model is established to
prove that the SAPA theoretically has the design correctness. It indicates that the proposed protocol realizing
privacy-preserving data access authority sharing, is attractive for multi-user collaborative cloud applications.
IEEE 2015 NS2 Projects
Title :Efficient and Cost-Effective Hybrid Congestion Control for HPC Interconnection Networks
Language : NS2
Project Link : http://kasanpro.com/p/ns2/efficient-cost-effective-hybrid-congestion-control
Abstract : Interconnection networks are key components in high-performance computing (HPC) systems, their
performance having a strong influence on the overall system one. However, at high load, congestion and its negative
effects (e.g., Head-of-line blocking) threaten the performance of the network, and so the one of the entire system.
Congestion control (CC) is crucial to ensure an efficient utilization of the interconnection network during congestion
situations. As one major trend is to reduce the effective wiring in interconnection networks to reduce cost and power
consumption, the network will operate very close to its capacity. Thus, congestion control becomes essential. Existing
CC techniques can be divided into two general approaches. One is to throttle traffic injection at the sources that
contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. However,
both approaches have different, but non-overlapping weaknesses: injection throttling techniques have a slow reaction
against congestion, while isolating traffic in special resources may lead the system to run out of those resources. In
this paper we propose EcoCC, a new Efficient and Cost-Effective CC technique, that combines injection throttling and
congested-flow isolation to minimize their respective drawbacks and maximize overall system performance. This new
strategy is suitable for current commercial switch architectures, where it could be implemented without requiring
significant complexity. Experimental results, using simulations under synthetic and real trace-based traffic patterns,
show that this technique improves by up to 55 percent over some of the most successful congestion control
techniques.
Title :Joint Power Splitting and Antenna Selection in Energy Harvesting Relay Channels
Language : NS2
Project Link : http://kasanpro.com/p/ns2/joint-power-splitting-antenna-selection
Abstract : The simultaneous wireless transfer of information and power with the help of a relay equipped with multiple
antennas is considered in this letter, where a "harvest-and-forward" strategy is proposed. In particular, the relay
harvests energy and obtains information from the source with the radio-frequent signals by jointly using the antenna
selection (AS) and power splitting (PS) techniques, and then the processed information is amplified and forwarded to
the destination relying on the harvested energy. This letter jointly optimizes AS and PS to maximize the achievable
rate for the proposed strategy. Considering that the joint optimization is according to the non-convex problem, a
two-stage procedure is proposed to determine the optimal ratio of received signal power split for energy harvesting,
and the optimized antenna set engaged in information forwarding. Simulation results confirm the accuracy of the
two-stage procedure, and demonstrate that the proposed "harvest-and-forward" strategy outperforms the
conventional amplify-and-forward (AF) relaying and the direct transmission.
Title :Detectors for Cooperative Mesh Networks With Decode-and-Forward Relays
Language : NS2
Project Link : http://kasanpro.com/p/ns2/detectors-cooperative-mesh-networks-with-decode-forward-relays
Abstract : We consider mesh networks composed of groups of relaying nodes which operate in decode-and-forward
mode. Each node from a group relays information to all the nodes in the next group. We study these networks in two
setups, one where the nodes have complete state information about the channels through which they receive the
signals, and anotherwhen they only have the statistics of the channels. We derive recursive expressions for the
probabilities of errors of the nodes and present several implementations of detectors used in these networks. We
compare the mesh networks with multihop networks formed by a set of parallel sections of multiple relaying nodes.
We demonstrate with numerous simulations that there are significant improvements in performance of mesh over
multihop networks in various scenarios.
IEEE 2015 NS2 Projects

More Related Content

PDF
IEEE 2015 NS2 Projects
PDF
M phil-computer-science-wireless-communication-projects
PDF
M phil-computer-science-networking-projects
PDF
M phil-computer-science-network-security-projects
PDF
IEEE Networking 2016 Title and Abstract
PDF
M.Phil Computer Science Mobile Computing Projects
PDF
M.Phil Computer Science Cloud Computing Projects
DOC
Java and .net IEEE 2012
IEEE 2015 NS2 Projects
M phil-computer-science-wireless-communication-projects
M phil-computer-science-networking-projects
M phil-computer-science-network-security-projects
IEEE Networking 2016 Title and Abstract
M.Phil Computer Science Mobile Computing Projects
M.Phil Computer Science Cloud Computing Projects
Java and .net IEEE 2012

What's hot (19)

DOCX
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
PDF
M.E Computer Science Secure Computing Projects
PDF
M.E Computer Science Wireless Communication Projects
PDF
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
PDF
I1102014953
PDF
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
PDF
M.Phil Computer Science Secure Computing Projects
PDF
M phil-computer-science-secure-computing-projects
PDF
M.Phil Computer Science Wireless Communication Projects
PDF
Networking project list for java and dotnet
PDF
A novel routing technique for mobile ad hoc networks (manet)
PDF
A Systematic Review of Congestion Control in Ad Hoc Network
PDF
AWN_FINAL_TERM_PAPER
PDF
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
PDF
M.E Computer Science Network Security Projects
DOCX
IEEE 2014 Title's list for computer science students
PDF
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
PDF
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
PDF
M.Phil Computer Science Network Security Projects
Ns2 2015 2016 ieee project list-(v)_with abstract(S3 Infotech:9884848198)
M.E Computer Science Secure Computing Projects
M.E Computer Science Wireless Communication Projects
Ieee projects 2011 ns 2 SBGC ( Trichy, Madurai, Chennai, Dindigul, Natham, Pu...
I1102014953
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
M.Phil Computer Science Secure Computing Projects
M phil-computer-science-secure-computing-projects
M.Phil Computer Science Wireless Communication Projects
Networking project list for java and dotnet
A novel routing technique for mobile ad hoc networks (manet)
A Systematic Review of Congestion Control in Ad Hoc Network
AWN_FINAL_TERM_PAPER
Modified PREQ in HWMP for Congestion Avoidance in Wireless Mesh Network
M.E Computer Science Network Security Projects
IEEE 2014 Title's list for computer science students
4 Sw 2009 Ieee Abstracts Dot Net, Ncct Chennai
[IJCT-V3I2P21] Authors: Swati Govil, Dr.Paramjeet Rawat
M.Phil Computer Science Network Security Projects
Ad

Viewers also liked (20)

PDF
December 20
PDF
IEEE 2015 Java Projects
PDF
Network Security IEEE 2015 Projects
PDF
Network Security IEEE 2015 Projects
DOCX
Maltrato de animales
PDF
Knowledge and Data Engineering IEEE 2015 Projects
DOCX
NHR Vol 10 Bastion of the Pen (Selected Portions)
PDF
IEEE 2015 ASP.NET with C# Projects
PDF
IEEE 2015 Matlab Projects
PDF
Big Data Analytics IEEE 2015 Projects
PDF
Networking IEEE 2015 Projects
PDF
IEEE 2015 C# Projects
PDF
Parallel and Distributed System IEEE 2015 Projects
PDF
Ma maison idéale
PDF
Image Processing IEEE 2015 Projects
PDF
Cryptography IEEE 2015 Projects
PDF
Data Mining IEEE 2015 Projects
PDF
Information Forensics and Security IEEE 2015 Projects
PDF
Tita Toys at Meet the makers, A-Lab Amsterdam. 31-01 2014
December 20
IEEE 2015 Java Projects
Network Security IEEE 2015 Projects
Network Security IEEE 2015 Projects
Maltrato de animales
Knowledge and Data Engineering IEEE 2015 Projects
NHR Vol 10 Bastion of the Pen (Selected Portions)
IEEE 2015 ASP.NET with C# Projects
IEEE 2015 Matlab Projects
Big Data Analytics IEEE 2015 Projects
Networking IEEE 2015 Projects
IEEE 2015 C# Projects
Parallel and Distributed System IEEE 2015 Projects
Ma maison idéale
Image Processing IEEE 2015 Projects
Cryptography IEEE 2015 Projects
Data Mining IEEE 2015 Projects
Information Forensics and Security IEEE 2015 Projects
Tita Toys at Meet the makers, A-Lab Amsterdam. 31-01 2014
Ad

Similar to IEEE 2015 NS2 Projects (20)

PDF
Parallel and Distributed System IEEE 2015 Projects
PDF
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
DOCX
Ns2 2015 2016 titles abstract
PDF
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
PDF
M.Phil Computer Science Parallel and Distributed System Projects
PDF
M phil-computer-science-parallel-and-distributed-system-projects
PDF
M.E Computer Science Parallel and Distributed System Projects
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
PDF
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
DOCX
Ieee transactions 2018 topics on wireless communications for final year stude...
DOCX
Harvesting aware energy management for time-critical wireless sensor networks
DOCX
JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
DOCX
Ieee transactions 2018 on wireless communications Title and Abstract
PDF
22 7404 latex power beaconb
PDF
22 7404 latex power beaconb
PDF
Physical security with power beacon assisted in half-duplex relaying networks...
PDF
IRJET- Optimization of a Power Splitting Protocol for Two-Way Multiple En...
PDF
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
PDF
M.Phil Computer Science Networking Projects
Parallel and Distributed System IEEE 2015 Projects
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
Ns2 2015 2016 titles abstract
User selection protocols in FD PSP EH cooperative network over rayleigh fadin...
M.Phil Computer Science Parallel and Distributed System Projects
M phil-computer-science-parallel-and-distributed-system-projects
M.E Computer Science Parallel and Distributed System Projects
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks
Ieee transactions 2018 topics on wireless communications for final year stude...
Harvesting aware energy management for time-critical wireless sensor networks
JAVA 2013 IEEE NETWORKING PROJECT Harvesting aware energy management for time...
Ieee transactions 2018 on wireless communications Title and Abstract
22 7404 latex power beaconb
22 7404 latex power beaconb
Physical security with power beacon assisted in half-duplex relaying networks...
IRJET- Optimization of a Power Splitting Protocol for Two-Way Multiple En...
OPTIMIZED ROUTING AND DENIAL OF SERVICE FOR ROBUST TRANSMISSION IN WIRELESS N...
M.Phil Computer Science Networking Projects

More from Vijay Karan (19)

PDF
IEEE 2014 Java Projects
PDF
IEEE 2015 Java Projects
PDF
IEEE 2014 NS2 Projects
PDF
IEEE 2014 Matlab Projects
PDF
IEEE 2015 Matlab Projects
PDF
IEEE 2014 C# Projects
PDF
IEEE 2015 C# Projects
PDF
IEEE 2014 ASP.NET with C# Projects
PDF
IEEE 2014 ASP.NET with VB Projects
PDF
M.E Computer Science Medical Imaging Projects
PDF
M.Phil Computer Science Server Computing Projects
PDF
M.E Computer Science Server Computing Projects
PDF
M.Phil Computer Science Remote Sensing Projects
PDF
M.E Computer Science Remote Sensing Projects
PDF
M.Phil Computer Science Biometric System Projects
PDF
M.E Computer Science Biometric System Projects
PDF
M.E Computer Science Mobile Computing Projects
PDF
M.Phil Computer Science Image Processing Projects
PDF
M.E Computer Science Image Processing Projects
IEEE 2014 Java Projects
IEEE 2015 Java Projects
IEEE 2014 NS2 Projects
IEEE 2014 Matlab Projects
IEEE 2015 Matlab Projects
IEEE 2014 C# Projects
IEEE 2015 C# Projects
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with VB Projects
M.E Computer Science Medical Imaging Projects
M.Phil Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
M.Phil Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
M.Phil Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
M.E Computer Science Mobile Computing Projects
M.Phil Computer Science Image Processing Projects
M.E Computer Science Image Processing Projects

Recently uploaded (20)

PDF
NGÂN HÀNG CÂU HỎI TÁCH CHỌN LỌC THEO CHUYÊN ĐỀ TỪ ĐỀ THI THỬ TN THPT 2025 TIẾ...
PDF
New_Round_Up_6_SB.pdf download for free, easy to learn
DOCX
OA 7- Administrative Office Procedure and Management.docx
PDF
17649-Learning By Doing_text-tailieu.pdf
PDF
Unleashing the Potential of the Cultural and creative industries
PDF
Jana-Ojana Finals 2025 - School Quiz by Pragya - UEMK Quiz Club
PPTX
Environmental Sciences and Sustainability Chapter 2
PDF
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
DOCX
HELMET DETECTION AND BIOMETRIC BASED VEHICLESECURITY USING MACHINE LEARNING.docx
PDF
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
PDF
BÀI GIẢNG POWER POINT TIẾNG ANH 6 - I LEARN SMART WORLD - CẢ NĂM - NĂM 2025 (...
PDF
V02-Session-4-Leadership-Through-Assessment-MLB.pdf
PDF
Jana Ojana 2025 Prelims - School Quiz by Pragya - UEMK Quiz Club
PPTX
chapter-1-221011141445-58f8b864sdfghj.pptx
PDF
IDA Textbook Grade 10 .pdf download link if 1st link isn't working so hard to...
PDF
Developing speaking skill_learning_mater.pdf
PDF
horaris de grups del curs 2025-2026 de l'institut
PDF
IS1343_2012...........................pdf
PPTX
Ppt obs emergecy.pptxydirnbduejguxjjdjidjdbuc
NGÂN HÀNG CÂU HỎI TÁCH CHỌN LỌC THEO CHUYÊN ĐỀ TỪ ĐỀ THI THỬ TN THPT 2025 TIẾ...
New_Round_Up_6_SB.pdf download for free, easy to learn
OA 7- Administrative Office Procedure and Management.docx
17649-Learning By Doing_text-tailieu.pdf
Unleashing the Potential of the Cultural and creative industries
Jana-Ojana Finals 2025 - School Quiz by Pragya - UEMK Quiz Club
Environmental Sciences and Sustainability Chapter 2
HSE 2022-2023.pdf الصحه والسلامه هندسه نفط
HELMET DETECTION AND BIOMETRIC BASED VEHICLESECURITY USING MACHINE LEARNING.docx
GIÁO ÁN TIẾNG ANH 7 GLOBAL SUCCESS (CẢ NĂM) THEO CÔNG VĂN 5512 (2 CỘT) NĂM HỌ...
BÀI GIẢNG POWER POINT TIẾNG ANH 6 - I LEARN SMART WORLD - CẢ NĂM - NĂM 2025 (...
V02-Session-4-Leadership-Through-Assessment-MLB.pdf
Jana Ojana 2025 Prelims - School Quiz by Pragya - UEMK Quiz Club
chapter-1-221011141445-58f8b864sdfghj.pptx
IDA Textbook Grade 10 .pdf download link if 1st link isn't working so hard to...
Developing speaking skill_learning_mater.pdf
horaris de grups del curs 2025-2026 de l'institut
IS1343_2012...........................pdf
Ppt obs emergecy.pptxydirnbduejguxjjdjidjdbuc

IEEE 2015 NS2 Projects

  • 1. IEEE 2015 NS2 Projects Web : www.kasanpro.com Email : [email protected] List Link : http://kasanpro.com/projects-list/ieee-2015-ns2-projects Title :Optimal Scheduling for Multi-radio Multi-channel Multi-hop Cognitive Cellular Networks Language : NS2 Project Link : http://kasanpro.com/p/ns2/optimal-scheduling-multi-radio-multi-channel-cognitive-cellular-networks Abstract : Due to the emerging various data services, current cellular networks have been experiencing a surge of data traffic and already overloaded, thus not able to meet the ever exploding traffic demand. In this study, we first introduce a Multi-radio Multi-channel Multi-hop Cognitive Cellular Network (M3C2N) architecture to enhance network throughput. Under the proposed architecture, we then investigate the minimum length scheduling problem by exploring joint frequency allocation, link scheduling, and routing. In particular, we first formulate a maximal independent set based joint scheduling and routing optimization problem called Original Optimization Problem (OOP). It is a Mixed Integer Non-Linear Programming (MINLP) and generally NP-hard problem. Then, employing a column generation based approach, we develop an ?-bounded approximation algorithm which can obtain an ?-bounded approximate result of OOP. Noticeably, in fact we do not need to find all the maximal independent sets in the proposed algorithm, which are usually assumed to be given in previous works although finding all of them is NP-complete. We also revisit the minimum length scheduling problem by considering uncertain channel availability. Simulation results show that we can efficiently find the ?-bounded approximate results and the optimal result as well, i.e., when ? = 0% in the algorithm. Title :A Novel En-route Filtering Scheme against False Data Injection Attacks in Cyber-Physical Networked Systems Language : NS2 Project Link : http://kasanpro.com/p/ns2/en-route-filtering-scheme-false-data-injection-attacks-cyber-physical-networked-systems Abstract : In Cyber-Physical Networked Systems (CPNS), the adversary can inject false measurements to the controller through compromised sensor nodes, which not only threaten the security of the system, but also consumes network resources. To deal with this issue, a number of en-route filtering schemes have been designed for wireless sensor networks in the past. However, these schemes either lack resilience to the number of compromised nodes or depend on the statically configure routes and node localization, which are not suitable for CPNS. In this paper, we propose a Polynomial-based Compromise-Resilient En-route Filtering scheme (PCREF), which can filter false injected data effectively and achieve a high resilience to the number of compromised nodes without relying on static routes and node localization. Particularly, PCREF adopts polynomials instead of MACs (Message Authentication Codes) for endorsing measurement reports to achieve the resilience to attacks. Each node stores two types of polynomials: authentication polynomial and check polynomial, derived from the primitive polynomial, and used for endorsing and verifying the measurement reports. Via extensive theoretical analysis and experiments, our data show that PCREF achieves better filtering capacity and resilience to the large number of compromised nodes in comparison to the existing schemes. Title :Shared Authority Based Privacy-preserving Authentication Protocol in Cloud Computing Language : NS2 Project Link : http://kasanpro.com/p/ns2/privacy-preserving-authentication-protocol-shared-authority-cloud Abstract : Cloud computing is emerging as a prevalent data interactive paradigm to realize users' data remotely stored in an online cloud server. Cloud services provide great conveniences for the users to enjoy the on-demand cloud applications without considering the local infrastructure limitations. During the data accessing, different users may be in a collaborative relationship, and thus data sharing becomes significant to achieve productive benefits. The existing security solutions mainly focus on the authentication to realize that a user's privative data cannot be unauthorized accessed, but neglect a subtle privacy issue during a user challenging the cloud server to request other users for data sharing. The challenged access request itself may reveal the user's privacy no matter whether or not it can obtain the data access permissions. In this paper, we propose a shared authority based privacy-preserving authentication protocol (SAPA) to address above privacy issue for cloud storage. In the SAPA, 1) shared access authority is achieved by anonymous access request matching mechanism with security and privacy considerations (e.g., authentication, data anonymity, user privacy, and forward security); 2) attribute based access control is adopted to realize that the user can only access its own data fields; 3) proxy re-encryption is applied by the cloud server to provide data sharing among the multiple users. Meanwhile, universal composability (UC) model is established to prove that the SAPA theoretically has the design correctness. It indicates that the proposed protocol realizing privacy-preserving data access authority sharing, is attractive for multi-user collaborative cloud applications. IEEE 2015 NS2 Projects Title :Efficient and Cost-Effective Hybrid Congestion Control for HPC Interconnection Networks Language : NS2
  • 2. Project Link : http://kasanpro.com/p/ns2/efficient-cost-effective-hybrid-congestion-control Abstract : Interconnection networks are key components in high-performance computing (HPC) systems, their performance having a strong influence on the overall system one. However, at high load, congestion and its negative effects (e.g., Head-of-line blocking) threaten the performance of the network, and so the one of the entire system. Congestion control (CC) is crucial to ensure an efficient utilization of the interconnection network during congestion situations. As one major trend is to reduce the effective wiring in interconnection networks to reduce cost and power consumption, the network will operate very close to its capacity. Thus, congestion control becomes essential. Existing CC techniques can be divided into two general approaches. One is to throttle traffic injection at the sources that contribute to congestion, and the other is to isolate the congested traffic in specially designated resources. However, both approaches have different, but non-overlapping weaknesses: injection throttling techniques have a slow reaction against congestion, while isolating traffic in special resources may lead the system to run out of those resources. In this paper we propose EcoCC, a new Efficient and Cost-Effective CC technique, that combines injection throttling and congested-flow isolation to minimize their respective drawbacks and maximize overall system performance. This new strategy is suitable for current commercial switch architectures, where it could be implemented without requiring significant complexity. Experimental results, using simulations under synthetic and real trace-based traffic patterns, show that this technique improves by up to 55 percent over some of the most successful congestion control techniques. Title :Joint Power Splitting and Antenna Selection in Energy Harvesting Relay Channels Language : NS2 Project Link : http://kasanpro.com/p/ns2/joint-power-splitting-antenna-selection Abstract : The simultaneous wireless transfer of information and power with the help of a relay equipped with multiple antennas is considered in this letter, where a "harvest-and-forward" strategy is proposed. In particular, the relay harvests energy and obtains information from the source with the radio-frequent signals by jointly using the antenna selection (AS) and power splitting (PS) techniques, and then the processed information is amplified and forwarded to the destination relying on the harvested energy. This letter jointly optimizes AS and PS to maximize the achievable rate for the proposed strategy. Considering that the joint optimization is according to the non-convex problem, a two-stage procedure is proposed to determine the optimal ratio of received signal power split for energy harvesting, and the optimized antenna set engaged in information forwarding. Simulation results confirm the accuracy of the two-stage procedure, and demonstrate that the proposed "harvest-and-forward" strategy outperforms the conventional amplify-and-forward (AF) relaying and the direct transmission. Title :Detectors for Cooperative Mesh Networks With Decode-and-Forward Relays Language : NS2 Project Link : http://kasanpro.com/p/ns2/detectors-cooperative-mesh-networks-with-decode-forward-relays Abstract : We consider mesh networks composed of groups of relaying nodes which operate in decode-and-forward mode. Each node from a group relays information to all the nodes in the next group. We study these networks in two setups, one where the nodes have complete state information about the channels through which they receive the signals, and anotherwhen they only have the statistics of the channels. We derive recursive expressions for the probabilities of errors of the nodes and present several implementations of detectors used in these networks. We compare the mesh networks with multihop networks formed by a set of parallel sections of multiple relaying nodes. We demonstrate with numerous simulations that there are significant improvements in performance of mesh over multihop networks in various scenarios. IEEE 2015 NS2 Projects