E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Survey on Incentive Mechanism
Published In: GJCST Part: E: Network, Web & Security Volume: 13 Issue: 5
P2P network have dramatically gain popularity for the past few years. However, these networks suffer from problem like free-riding, Tragedy of Common which degrades the performance of the network. Here, the authors present several approaches to overcome the problem of free-riding. They have categorized the approaches and have described each category’s important features ...
Paper Information
Authors Priyanker Shipley, Vinay Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 33

An ad-hoc network is a collection of mobile nodes, which communicate over radio. These networks have an important advantage; they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. This flexibility, however, comes at a price: communication is difficult to organize due to frequent topology...
Paper Information
Authors Dr. B. Narayana Babu, Dr. C.S. Ramanathan, Mr. M.Amenraj
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 30

Wireless mobile ad-hoc networks are classified as ad-hoc networks with logical connections. These types of networks do not have fixed topology (or physical connections) due to the mobility property of nodes, interference, propagation and loss of path. Because of all these problems the path established between sources to destination is not reliable and efficient path. Hence a dynamic sour...
Paper Information
Authors Zabi Ur Rahaman K, Dr. M. Giri,Dr. M S Shashidhara
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 24

The design of an antenna based on Substrate Integrated Waveguide (SIW) has been realized in this paper. The structure consists of an array of slot antenna designed to operate in Kuband applications. The effect of introducing arrays of slots has been extensively studied unlike any other recent publications in this field. The basic structure has been designed over a dielectric substrate wi...
Paper Information
Authors Sourav Moitra, Asish Kumar Mukhopadhyay, Anup Kumar Bhattacharjee
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 15

The necessity to bear real time and multimedia application for users of Mobile 𝑨𝒅𝒉𝒐𝒄 Network (𝑴𝑨𝑵𝑬𝑻) is becoming vital. Mobile 𝑨𝒅𝒉ð...
Paper Information
Authors GK Srinivasa Gowda, Pro CV Srikrishna, Kashyap D Dhruve
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

This paper proposes an enhanced mobile ad-hoc routing protocol FSR (Fast and Secure Routing), which is enhanced version of best features of ZBR (Zone Based routing Protocol). FSR deals with speed and security both at the same time. The ZBR enhances the speed of the network whether TCP has provided the primary means to transfer data reliably across the Internet. Modern networks routinely ...
Paper Information
Authors Vivek Anand Singh, Vineet Yadav
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 44

A mobilead hoc Network (MANET) is an infrastructure less, decentralized multi-hop network where the mobile nodes are free to move randomly, these making the network topology dynamic. MANET routing protocols show different performance in different mobile network scenarios. In this paper an attempt has been made to understand the characteristics/behavior of ad hoc on demand distance vector...
Paper Information
Authors M Ravi Kumar, Dr. N. Geethanjali,N. Ramesh Babu
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 34

Grid computing provides a way to execute applications over autonomous, distributed and heterogeneous nodes. The main goal of grid technology is to allow sharing of resources and services under a set of rules and policies, which govern the conditions for access to the resources. This paper reviews the state of security and access control for resources in grid environment and presents a se...
Paper Information
Authors Dr. Gulshan Ahuja
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 27

Security of the information in the computer networks has been one of the most important research area. To preserve the secure condition it is essential to be aware of the behavior of the incoming data. Network Security is becoming an important issue for all the organizations, and with the increase in knowledge of hackers and intruders they have made many successful attempts to bring down...
Paper Information
Authors Parul Chhikara, Arun K. Patel
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 22

Enhancing the lifetime of wireless sensor networks had baffled researchers for quite some time now. The authors of this research manuscript draw inspiration from the behavior of large elephant swarms and incorporate their behavior into wireless sensor networks. The complex elephant swarm behavior is incorporated using a cross layer approach. The elephant optimization discussed in this pa...
Paper Information
Authors Chandramouli.H, Dr. Somashekhar C Desai, K S Jagadeesh, Kashyap D Dhruve
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 17