E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others. These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. While OSNs allow users to restrict access to shared data, they currently...
Paper Information
Authors P. Amrutha, R. Sathiyaraj
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

The use of Wireless Sensor Networks (WSNs) is estimated to bring enormous changes in data gathering, processing and distribution for different environments and applications. However, a WSN is a powerful controlled system, since nodes run on limited power batteries. Prolong the lifetime of sensor networks depends on efficient management of sensing node of energy. Hierarchical routing prot...
Paper Information
Authors C. Divya, N. Krishnan, A.Petchiammal
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 62

Websites are playing a very important role in field of information Technology. Usability is also of much importance in exploring the websites. The objective of this paper is assessing the usability of the websites of the Pakistani Universities and giving the idea of developing the websites of the universities/institutions fulfilling the user needs. Different parameters were analyzed in l...
Paper Information
Authors Muhammad Shahid Khan,Muhammad Abid Khan
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 19

Virtual Private Network framework provides Confidentiality, Integrity, Availability, Authentication and Anti- Replay services to the packets travelling through the shared medium like Internet. With the latest Advancement in the technology, Internet is available to the users thru all means like Wireless networks, GPRS, Satellite. When the VPN user roams or switches from one network to oth...
Paper Information
Authors Md. Hashmathur Rehman
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 39

In this paper, a state feedback H∞ controller has been proposed in order to design an active queue management (AQM) system based on congestion control algorithm for networks supporting TCP protocols. In this approach, the available link bandwidth is modeled as a time-variant disturbance. The objective of this paper is to design controller which capable of achieving the queue ...
Paper Information
Authors Aakanksha Shirbhate
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 7

A Botnet is a network of compromised hosts, called as bots that are used for malicious activity. These bots are then controlled by single master termed as Botmaster. A Botmaster may inject commands though any bot to launch DDoS attack. In this paper, we have demonstrated the behavior of Botnet on network in real time Internet environment.This will be helpful for researcher to detect the ...
Paper Information
Authors Rathod R.P., Bhalchandra P.U., Dr. Khamitkar S.D, Lokhande S.N.
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 11

The aim of this study has been to identify Human- Computer Interaction (HCI) design methods and techniques for the development of cross-platform e-commerce websites that can be used on multiple devices with different screen sizes and web browsers. The findings presented here are based on a theoretical framework consisting of three categorizations: composition, continuity and consistency....
Paper Information
Authors Coen de Natris, Lelia Livadas
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 46

A mobile peer-to-peer computer network is the one in which each computer in the network can act as a client or server for the other computers in the network. The communication process among the nodes in the mobile peer to peer network requires more no of messages. Due to this large number of messages passing, propose an interconnection structure called distributed Spanning Tree (DST) and...
Paper Information
Authors S.J.K. Jagadeesh Kumar, R.Saraswathi
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 31

Last-generation and future wireless communication standards, such as DVB-T2 or DVB-NGH, are including multi-antenna transmission and reception in order to increase bandwidth efficiency and receiver robustness. The main goal is to combine diversity and spatial multiplexing in order to fully exploit the multiple-input multiple output (MIMO) channel capacity. Full-rate full-diversity (FRFD)...
Paper Information
Authors Eugin E, Jeno Paul P
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 40

Due to the advancement in mobile devices and wireless networks mobile cloud computing, which combines mobile computing and cloud computing has gained momentum since 2009. The characteristics of mobile devices and wireless network makes the implementation of mobile cloud computing more complicated than for fixed clouds. This section lists some of the major issues in Mobile Cloud Computing...
Paper Information
Authors Preetha Theresa Joy, K.Pouloe Jacob
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 24