E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

In the last few years UAVs systems have become relevant for many military applications including non military security work such as surveillance of pipelines. An autonomous UAVis often preferred for those missions that are dull, dirty or dangerous for manned aircraft. It has the ability to hover and it has free band GPS direction and tilt sensors for smooth navigation. There is no person...
Paper Information
Authors Mannika Garg, Abdul Wahid Ansari, Sushabhan Choudhury, Rajesh Singh, Ruchin Garg
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

Security is an essential feature of Information Communication Technology (ICT). Information has to be encrypted at the transmitter side to maintain secrecy and decrypted at the receiver side to retrieve the original information for secure data transmission over insecure computer data communication networks. This paper analyzes the performance metrics of blowfish algorithm with and withou...
Paper Information
Authors V. Kumara Swamy, Dr. Prabhu Benakop
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The Transmission Control Protocol (TCP) is the dominating end-to-end protocol on the internet today but still it faces congestion problems in some cases. To overcome congestion problems, several congestion control and avoiding mechanisms namely: Tahoe, Reno, Vegas, and Sack etc. all with different features and advantages but with maximal throughput as main objective, which are termed as ...
Paper Information
Authors A F M Zainul Abadin, Md. Anwar Hossain, Muntasir Ahmed, Purno Mohon Ghosh
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 61

Social networking sites like Facebook are not just an element of passing time but a platform for learning as well. The goal of this paper is to show the effectiveness of a Facebook application named “Wishdom” to teach English language based on cloud platform. This application tries to introduce English language in an authentic and communicative manner to the ...
Paper Information
Authors Md. Mahmudul Hasan, Mahmuda Akhter
Read Journal Click Here
Read Paper Click Here
Page No. 47 to 55

Wireless sensor network design is critical and resource allocation is a major problem which remains to be solved satisfactorily. The discrete nature of sensor networks renders the existing skeleton extraction algorithms inapplicable. 3D topologies of sensor networks for practical scenarios are considered in this paper and the research carried out in the field of skeleton extraction for t...
Paper Information
Authors S. K. Pushpa, S. Ramachandran, K. R. Kashwan
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 45

In cloud environment the role based access control (RBAC) system model has come up with certain promising facilities for security communities. This system has established itself as highly robust, powerful and generalized framework for providing access control for security management. There are numerous practical applications and circumstances where the users might be prohibited to consid...
Paper Information
Authors Levina T, Dr. S C Lingareddy
Read Journal Click Here
Read Paper Click Here
Page No. 5 to 19

Networks are being used in various areas and the demand of user’s nowadays has motivate the emergence of the mobile adhoc network (MANET). In this age of network, most challenging task is to deliver the packet successfully with dynamic network, delay, node and links fails restraint. And to fulfill the above required task, protocol should be used effectively and efficient...
Paper Information
Authors Mr. Brijesh Soni, Dr. Bhupesh Gour, Mr. Arjun Rajput, Dr. Asifullah Khan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 4

Mobile agents have special characteristics which can help intrusion detection in several ways. The use of mobile codes and mobile agent based computing paradigms has been proposed in several researches till date. In this paper we try to present a scope for the possible association of Mobile Agents in the field of network security and management. ...
Paper Information
Authors S. V. Patil,Dr. S. D. Khamitkar,S. N. Lokhande
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 21

In this paper, an improved energy efficient PEGASIS based protocol (PEGASIS-E) has been proposed. PEGASIS-E uses average distance among the sensor nodes as the criteria for chaining, thereby providing better performance in terms of energy dissipation and amount of information sent to BS. The simulation results obtained show that PEGASIS-E gives an increase in the network lifetime as comp...
Paper Information
Authors Vibha Nehra, Ajay K. Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 31

In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the netwo...
Paper Information
Authors Dr. Prerna Mahajan, Abhishek Sachdeva
Read Journal Click Here
Read Paper Click Here
Page No. 32 to 40