E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Networks intrusion detection systems allow to detect attacks which cannot be detected by firewalls. The false positive and false negative problem tend to make IDS inefficient. To improve those systems’ performances, it is necessary to select the most relevant that will lead to characterize a normal profile or an attack. We have proposed in this paper a new intrusion dete...
Paper Information
Authors Berlin H. Lekagning Djionang, Dr. Gilbert Tindo
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 47

SDN (Software Defined Network) is a new networking approach towards current networking industry. S.D.N has attarcted the researchers attention, because there is wide scope of innovation and research. The main concept behind the SDN networks is the separation of controller from data plane. This natural feature makes SDN adaptive of being flexible and scalable. We are mentioning some of th...
Paper Information
Authors Deepak Kumar, Manu Sood
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 38

Wireless Sensor Networks (WSNs) are characterized by multi-hop wireless connectivity, frequently changing network topology and need for efficient routing protocols. The purpose of this paper is to evaluate performance of routing protocolDSDV in wireless sensor network (WSN) scales regarding the End-to-End delay and throughput PDR withmobility factor .Routing protocols are a critical aspe...
Paper Information
Authors Mohammed Zaid Ghawy, Dr.Maher Ali Al-sanabani
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 26

Gait is a biometric trait that has been used for user authentication or verification on the basis of various attributes of gait. Gait of an individual get affected due to variation in mood, emotions, age and weight, due to these variation a perfect model is not possible that can be developed so that these all factors can be eliminated. In the proposed work, CASIA dataset has been used as...
Paper Information
Authors Drishty, Jasmeen Gill
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 16

WebGIS is a kind of distributed information system which holds the potential to make geographic information available worldwide. It is cost effective and provides an easy way of disseminating geospatial data. This paper outlines the design and development of a WebGIS based Decision Support System (DSS) for disseminating Nowcasting of Extreme Orographic Rain events generated at regular in...
Paper Information
Authors Shweta Mishra, Neha Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 64

Consideration of energy consumption in the case of wireless ad hoc networks leads to effective reduction of energy consumption by the nodes and increases the lifetime of the batteries for nodes. It is imperative from the existing models that there is significant scope for improvement in the energy-consumption based route discovery models. A model of Fuzzy based marginal energy disbursed ...
Paper Information
Authors K.Seshadri Ramana,Dr.A.A Chari
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 56

WBASN is an effective solution that has been proposed in terms of improving the solutions and there are varied benefits that have been achieved from the usage of WBASN solutions in communication, healthcare domain. From the review of stats on rising number of wireless devices and solutions that are coming up which is embraced by the people as wearable devices, implants for medical diagno...
Paper Information
Authors V.T. Venkateswarlu, Dr. P. V. Naganjaneyulu, Dr. D.N.Rao
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 30

Wireless Sensor network routing protocols are prone to various attacks as these protocols mainly provide the function of routing data towards the sink. LEACH is a one of the routing protocol used for clustered implementation of wireless sensor network with Received Signal Strength based dynamic selection of Cluster Heads. But, as with other routing protocols, LEACH is also prone to HELLO...
Paper Information
Authors Rupinder Singh, Dr. Jatinder Singh, Dr. Ravinder Singh
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 40

In this study, a contemporary method of scheduling algorithm has been proposed for working on scheduling of varying size data-frames transmission in CR based wireless networks. The objective of the proposed model is to achieve maximum throughput, and also reduction of loss of dataframes in the transmission. Some of the key elements that are considered in the development of the model are ...
Paper Information
Authors N Shribala, Dr. P.Srihari, Dr. B. C. Jinaga
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

The world is undergoing a dramatic rapid transformation from isolated systems to ubiquitous Internet-based-enabled ‘things’ capable of interacting each other and generating data that can be analyzed to extract valuable information. This highly interconnected global network structure known as Internet of Things will enrich everyone’s life, i...
Paper Information
Authors Muhammad A. Iqbal, Oladiran G. Olaleye, Magdy A. Bayoumi
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Page 1 of 21