E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

The capacity of controlling various electrical and electronics devices in a wireless and remote fashion has provided a great convenience to many people in life. Through a wireless distant control system, people can do remote operation without directly accessing the host of home appliances like fan, lamp, TV, washing machines and others. Pocket switch is one of these types of system which...
Paper Information
Authors Md. Hafizur Rahman, Jinia Afrin
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 44

This paper explores the potential of WSN in the area of agriculture in India. Aiming at the sugarcane crop, a multi-parameter monitoring system is designed based on low-power ZigBee wireless communication technology for system automation and monitoring. Real time data is collected by wireless sensor nodes and transmitted to base station using zigbee. Data is received, saved and displayed...
Paper Information
Authors Anjum Awasthi, S.R.N Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 28

Bluetooth technology unplugs the digital peripherals and comes as cable replacement technology. IEEE 802.11 and Bluetooth are two operating in the unlicensed 2.4 GHz frequency. WiMAX is operating both licensed and unlicensed frequencies (2-11GHz). The devices equipped with IEEE 802.11 and Bluetooth are mobiles, laptops, watches and many more and in future with WiMAX. Result is the number...
Paper Information
Authors Pankaj Garg, Ruby Verma
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 34

Over the past 25 years, the evolution of the internet and the advances of wireless technologies have made a tremendous impact on lifestyle of people around the world. Together, these two factors have changed the way people communicate, work, and get their entertainment.In order to be always best connected for various applications, the network selection procedure in heterogeneous multi-ac...
Paper Information
Authors Ruby Verma, Pankaj Garg
Read Journal Click Here
Read Paper Click Here
Page No. 35 to 39

The routing protocols are classified as reactive and proactive routing protocol. The reactive protocols are the protocols which establish route from source to destination when required on the other hand proactive routing protocols are protocols in which nodes store routing tables and on the basis of these routing tables route is established between source and destination. The simulation ...
Paper Information
Authors Shivali Katoch, Reena Aggarwal
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

To promote advanced low fees high quality education among the people of India within their reach and to promote continuous research program in all areas of Science & Technology. ...
Paper Information
Authors U. V. S. Seshavatharam
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 22

Intrusion detection in Wireless Sensor Network (WSN) is of practical interest in many applications such as detecting an intruder in a combat zone. The intrusion detection is defined as machinery for a WSN to detect the subsistence of unfortunate, incorrect, or anomalous moving attackers. For this purpose, it is a fundamental issue to differentiate the WSN parameters such as node density ...
Paper Information
Authors Srinivasaraju Dantuluri, P Poturaju
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 20

Technologies have always played a significant role in the development of human civilization. The contemporary information and communication technologies are also expected to play a similar role. These technologies facilitate of connectivity and cost-effectiveness are such characteristics of ICTs that help individual raise its political, economic and social capabilities. However, ICTs als...
Paper Information
Authors Muhammad Zubair Khan, Dr. Amanullah Khan Miankhel, Dr. Allah Nawaz
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

In mobile ad hoc networks, nodes can move freely and link/node failures occur frequently. This leads to frequent network partitions, which may significantly degrade the performance of data access in ad hoc networks. When the network partition occurs, mobile nodes in one network are not able to access data hosted by nodes in other networks. In mobile ad hoc network, some nodes may selfish...
Paper Information
Authors S.J.K. Jagadeesh Kumar, R.Saraswathi, R.Raja
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 65

Routing means to select path in a network and forward a packet through the network to another device on different network. Routing protocols play a vital role in computer network infrastructures. In this research comparison of various routing protocols is made. It been seen that OSPF and EIGRP are the protocols mostly used nowadays. On comparison, EIGRP is considered as the best routing ...
Paper Information
Authors Aditi Chadha, Anuj K. Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 44