Get Latest Final Year Computer Projects in your Email

Your Email ID:
FYP.in Subs

Frame Transmission Efficiency-based Cross-Layer Congestion Notification Scheme in Wireless Ad Hoc Networks

ABSTRACT

Different from the traditional wired network, the fundamental cause of transmission congestion in wireless ad hoc networks is medium contention. How to utilize the congestion state from the MAC (Media Access Control) layer to adjust Continue reading

Study of comparison of OCS and Hybrid switching in FSO data centers

ABSTRACT

With the increase in big data applications, it has become the need of the hour to handle data efficiently to handle the growing traffic in the data centers. The popular mechanism is parallel processing using commodity hardware hence it is becoming Continue reading

Development of High Strength Nano-silica Modified Rubbercrete

ABSTRACT

Several research works have been carried out to study properties of concrete containing crumb rubber (rubbercrete) as a partial replacement to fine aggregate. Rubbercrete exhibits numerous benefits compared to conventional concrete such as lower Continue reading

A Robust Wireless Mesh Access Environment For Mobile Video Users

ABSTRACT

The rapid advances in networking technology have enabled large-scale deployments of online video streaming services in today’s Internet. In particular, wireless Internet access technology has been one of the most transforming and empowering technologies Continue reading

Extension to MAC 802.11 for performance improvement in MANET

ABSTRACT

In the last few years, the exploit of ad hoc wireless networks has increased thanks to their commercial and military potential. An application of wireless ad hoc networks is Bluetooth technology, which allows wireless communication among different devices Continue reading

BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks

ABSTRACT

Multi-hop wireless networks rely on node cooperation to provide unicast and multicast services. The multi-hop communication offers increased coverage for such services, but also makes them more vulnerable to insider (or Byzantine) attacks coming Continue reading

A Network-Aware Distributed Membership Protocol for Collaborative Defense

ABSTRACT

To counteract current trends in network malware, distributed solutions have been developed that harness the power of collaborative end-host sensors. While these systems greatly increase the ability to defend against attack, this comes at the cost Continue reading

Bluetooth-base Worm Modeling And Simulation

ABSTRACT

Bluetooth is one of the most popular technologies in the world in the new century. Meanwhile it attracts attackers to develop new worm and malicious code attacking Bluetooth wireless network. So far the growth of mobile malicious code is very fast Continue reading