E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

As chip density keeps doubling during each course of generation, the use of NoC has become an integral part of modern microprocessors and a very prevalent architectural feature of all types of SoCs. To meet the ever expanding communication challenges, diverse and novel NoC solutions are being developed which rely on accurate modeling and simulations to evaluate the impact and analyze the...
Paper Information
Authors Kartika Vyas, Naveen Choudhary, Dharm Singh
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12

The Semantic Web is a mesh of data connected up in such a way as to be effortlessly method apply on a international scale .It as being efficient way of comprising data on World Broad Web, or as a globally connected Database. The significance of Semantic world wide web is to comprise the data at a lone or location. This can be done likely with the World Wide Web service methods, which all...
Paper Information
Authors Dr. Meenakshi Sharma, Vikas Goyal
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 53

In the present world scenario network-based computer systems have started to play progressively more vital roles. As a result they have become the main targets of our adversaries. To apply high security against intrusions and attacks, a number of software tools are being currently developed. To solve the problem of intrusion detection a number of pattern recognition and machine learning ...
Paper Information
Authors Deepika Veerwal, Naveen Choudhary, Dharm Singh
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 47

The focus of this research is to build a cloud based architecture to analyze the correlation between social media data and events predictions. From analytical point of view this study refurbishes the viability of models that treat public mode and emotion as a unitary phenomenon and suggest the needs to analyze those in predicting the market event status of the respective companies. The m...
Paper Information
Authors Jahidul Arafat, Chongomweru Halimu, Mohammad Ahsan Habib, Rajib Hossain
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 42

We proposed a secured e-voting system model by using blind signature. Our proposed model meets all security requirements which are: (authentication, privacy, integrity, non repetition). Our proposed model depends on these main entities that are involved within the voting processes (voter registration, voting, counting, audit), and these entities are: certificate authority, ministry of in...
Paper Information
Authors Reham Mohamed Kouta, Dr. Essam-Eldean F. Elfakharany, Dr. Wafaa Boghdady Mohamed
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

The advancement in miniature, lightweight, low-cost, and smart physiological sensor nodes should be done by the current development in sensor nodes and power efficient integrated circuits. The sensor nodes should have the capacity of sensing, processing, controlling and communication. The applications of these sensors for health monitoring includes Wireless Personal Area Networks (WPANs)...
Paper Information
Authors Dhivya. S. P, Renin. A. S, Dharanika.T
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 23

In wireless sensor networks (WSN), the single path routing may result in path failure during data transmission and re-establishment of alternate path might take more duration. Also, using architecture with single sink node can cause issues of energy dissipation and poor channel condition. In order to overcome these issues, in this paper, we propose a reliable and energy saving multipath ...
Paper Information
Authors Raminder Singh Uppal, Dr. Shakti Kumar, Dr. Harbhajan Singh
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 34

Peer to Peer Network for mobile is not centralized but self managing network with no specific topology. Topology of the Peer to Peer Network for mobile is change with change in time. In Mobile Peer to peer network various group communication protocols exists for multiparty conferencing. A mobile Peer to Peer network consisted of many security risks such as Decentralization of data storag...
Paper Information
Authors Amin Ul Haq
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 18

Internet userscontinuously make queries over web to obtain required information. They need information about various tasks and sub tasks for which they use search engines. Over a period of time they make plenty of related queries. Search engines save these queries and maintain user’s search histories. Users can view their search histories in chronological order. However,...
Paper Information
Authors Ravi Kumar Yandluri
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 14

Several studies in recent years have considered the use of mobile elements for data gathering in wireless sensor networks, so as to reduce the need for multi-hop forwarding among the sensor nodes and thereby prolong the network lifetime. Since, typically, practical constraints preclude a mobile element from visiting all nodes in the sensor network, the solution must involve a combination...
Paper Information
Authors Khaled Almiani, Ahmad A. Twaissi, Mohammed A. Abuhelaleh, Bassam A. Alqaralleh, Albara Awajan
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30