E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Social science and humanities view computermediated communication (CMC) as a hub for information dissemination. The development and diffusion of CMC can be divided into three phases: pre-Internet CMC (beginning in the 1980), Internet-focused CMC (roughly 1994 to date) and social-software-supported CMC (beginning around 2002). Email, online collaborative learning, and blogs (representing,...
Paper Information
Authors Anis Pervez
Read Journal Click Here
Read Paper Click Here
Page No. 59 to 64

In this paper, given a single mobile element and a time deadline, we investigate the problem of designing the mobile element tour to visit subset of nodes, such that the length of this tour is bounded by the time deadline and the communication cost between nodes outside and inside the tour is minimized. The nodes that the mobile element tour visits, works as cache points that store the d...
Paper Information
Authors Mohammad A. Almahameed, Mohammed Aalsalem, khaled Almiani, Ghazi Al-Naymat
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 50

Group Key Management Techniques
Published In: GJCST Part: E: Network, Web & Security Volume: 13 Issue: 11
The most widely used technique in a network is Group communication. This helps in the reduction of the bandwidth usage. The major concern in group communication is its security of messages. Group key provides security of messages and hence proper group key management is very important in a group communication. There are various classifications of group key management techniques. A survey...
Paper Information
Authors Mridula R D, Sreeja Rajesh
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 27

The broad objective of the research paper is to evaluate and compare the performance of two protocol stacks (IPv4 and IPv6) in OMNeT++ in terms of various parameters that have to be analyzed when the data is being transmitted from one client to another or to a server over a wired network. In this we have designed wired networks on basis of IPv4 and IPv6 protocols in OMNeT++, which is a n...
Paper Information
Authors Savita Shiwani, G.N. Purohit
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 40

A promising option to raising busty interchange in system communication could be Optical Burst Switched (OBS) networks among scalable and support routing effective. The routing schemes with disputation resolution got much interest, because the OBS network is buffer less in character. Because the deflection steering can use limited optical buffering or actually no buffering thus the choic...
Paper Information
Authors Venkata Rao Tavanam, Venkateswarlu.D.S, Karuna Sagar Dasari
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 20

The weakest link in any security plan or implementation is a human. The weak links include everyone from the hourly paid end user to the owner of the company. Even many of today’s security professionals may not have the time or ability to perform their current duties and keep up with an ever-growing number of threats. If someone is not aware of a threat then they are goi...
Paper Information
Authors Steven Thomason
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

Websites are the mean of exploring the information from the internet and have a significance role in the field of internet. Usability also plays an important role in the exploration of the websites. The objective of this paper is to highlight the usability issues in the Bangladesh universities websites and giving the suggestions about the usability of the websites regarding its fulfillme...
Paper Information
Authors Muhammad Shahid Khan, Muhammad Abid Khan
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

This paper incorporates a comprehensive study about the distributed power control algorithm in cellular communication systems. The algorithm requires only interference power estimations and/or signal-to-interference ratio (SIR) estimations form the base station, and converge even in cases where limits on available power render the target SIR unattainable. Power control plays an important...
Paper Information
Authors Md. Najmul Hossain, Md. Abdur Rahim, Iffat Ara
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 45

Mobile Adhoc Network (MANET) is a wireless network where nodes communicate through other nodes without the aid of a base station. Security is a major challenge in MANET as the packets are prone vulnerability and eavesdropping in wireless environment. Generally MAC layer provides the security in such wireless network through encryption and authentication and the protocol is called WEP. Ma...
Paper Information
Authors Gaurav Kulkarni, Brajesh Patel
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 39

Websites have a great role in the field of internet. Usability has also a precious value in navigating the websites. The objective of this paper is exploring the usability of Pakistani Medical Colleges/Universities and providing the idea of developing the websites in such a way that it fulfilled the user requirements and are easy for the user in using/accessing these sites. Different par...
Paper Information
Authors Muhammad Shahid Khan, Muhammad Abid Khan
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28