E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Ontology is a shared conceptualization of knowledge representation of particular domain. These are used for the enhancement of semantic information explicitly. It is considered as a key element in semantic web development. Creation of global web data sources is impossible because of the dynamic nature of the web. Ontology Interoperability provides the reusability of ontologies. Different...
Paper Information
Authors R.Lakshmi Tulasi, Dr M.Srinivasa Rao
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 62

Efficient mobility management techniques are critical to the success of next-generation wireless systems. Handoff management, which is one of the two basic functions of mobility management, has become more critical in fourth generation wireless networks which support multimedia services. The paper treats basic issues involved in handoff management aspect of general mobility management in...
Paper Information
Authors Chiwetalu, Barth. N., Nwachi-Ikpor, Juliana O.
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28

An approach is proposed that can be used to make these arch adaptive according to each user’s need using ontology .Our approach is distinct because it allows each user to perform more fine-grained search by capturing changes of each user’s preferences without any user effort. Such a method is not performed in typical search engines. ...
Paper Information
Authors Dr. V S Dhaka, Aditi Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21

Voice Over Internet Protocol (VOIP) is a rapidlygrowing Internet service for telephone communication. However, while it offers a number of cost advantages over traditional telephone service, it can pose a security threat, especially when used over public networks. In the absence of sufficient security, users of public networks are open to threats such as identity theft, man-in-the-middle...
Paper Information
Authors Md. Shahidul Islm
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 56

SQL Injection attacks are the most common attacks on the web applications. Statistical analysis says that so many web sites which interact with the database are prone to SQL Injection/XSS attacks. Different kinds of vulnerability detection system and attack detection systems exist, there is no efficient system for detecting these kinds of attacks. SQL Injection attacks are possible due t...
Paper Information
Authors Venkatramulu Sunkari, Dr. C.V Guru Rao
Read Journal Click Here
Read Paper Click Here
Page No. 77 to 82

Next Generation Network (NGN) is envisioned to be an inter-working environment of heterogeneous networks of wired and wireless access networks, PSTN, satellites, broadcasting, etc., all interconnected through the service provider’s IP backbone and the Internet. NGN uses multiple broadband, QoS-enabled transport technologies and servicerelated functions independent from u...
Paper Information
Authors Salavadi Ananda Kumar, Dr. K.E.Sreenivasa Murthy
Read Journal Click Here
Read Paper Click Here
Page No. 63 to 70

The wireless sensor networks (WSNs) has been grown immensely in the past few decades. Researcher had proposed a number of routing protocols for WSN. WSN has two type of architecture layered and cluster architecture. We classify various clustering approaches based on different criterion in section [3]. Hierarchical Clustering protocols discussed in section [4] have extensively been used t...
Paper Information
Authors Neha Saini, Jasmeet singh
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 39

Wireless Sensor Networks refers to a multi-hop packet based network that contains a set of mobile sensor nodes. Every node is free to travel separately on any route and can modify its links to other nodes. Therefore, the network is self organizing and adaptive networks which repeatedly changes its topology. The relations among nodes are restricted to their communication range, and teamwo...
Paper Information
Authors Akanksha Gupta, Anuj K. Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 31

A network is defined to be a congested networkif the load on the network exceeds the capacity of the network. The traditional congestion control technique of slow-start and AIMD was adopted when the aim was more on the stability of the Internet. But as more and more time critical applications such as multimedia applications are being used, we need alternate technique that reduces the dra...
Paper Information
Authors Abhay Kumar 1, Smriti Agrawal 2, A. Gowardhan 3
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 22

In present scenario, choosing the routing protocol is vital task in mobile ad-hoc networks. These type of networks is collection of nodes which are connected dynamically and situated without using any infrastructure. There are various types of routing protocols have been implemented such as OLSR, DSR, DYMO, AODV, DSDV, BATMAN etc. These are implemented in specific simulation environments...
Paper Information
Authors Trapti Jain, Savita Shiwani
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10