E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Many of the current Indian medical information and emergency systems are still paper-based and stand alone systems that do not fully utilize the Internet, multimedia, wireless and real time technologies. This project work focuses on developing an integrated Emergency, Healthcare, and Medical Information System (IEHMS) that can overcome many of the problems in the current systems. The mai...
Paper Information
Authors Dr. M. Lavanya, Dr.M.Usha Rani
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 29

In the Secure voice call, the human voice shall be digitized by the Android APIs and the VOIP packets will travel over the SIP layer. The digitization process also includes the encryption phase wherein secure call technique is used in order to generate unique keys every time a call handshake is done. During the Secure Call key exchange, the caller party sends a Secure Call hello packet. ...
Paper Information
Authors Dr. Saruchi Kukkar
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 21

Wireless Intrusion Detection System (IDS) performance metrics are used to measure the ability of a wireless IDS to perform a particular task and to fit within the performance constraints. These metrics measure and evaluate the parameters that impact the performance of a wireless IDS. Wireless IDS analyze wireless specific traffic including scanning for external users trying to connect to...
Paper Information
Authors Mr. Rupinder Singh, Dr. Jatinder Singh
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 9

Privacy and itegrity of packets on wireless adhoc netwoks should be expected by the algorithmic mechanisms. This privacy and integrity is very much is to be mandated by regulations. In tardition the security is only based on cryptographic techniques which is not so much secure and leads to unsecure and unauthenticated information. As the packets of information is to be routed on networks...
Paper Information
Authors Dr. Kuldeep Kherwal, Ramesh Kait, Dr.C. Nelson Kennedy Babu
Read Journal Click Here
Read Paper Click Here
Page No. 63 to 67

One of major problems in the wireless sensor networks is the barrier coverage problem. This problem deals with the ability to minimizing the probability of undetected penetration through the barrier (sensor network). The reliability and fault tolerance problems are very important for long strip barrier coverage sensor networks. Also, another design challenge in sensor networks is to save...
Paper Information
Authors Dr, Majid Masoudi Nezhad, Mohammad Kherandish, Mohammad Mosleh
Read Journal Click Here
Read Paper Click Here
Page No. 57 to 62

Telephony Calls over Bluetooth
Published In: GJCST Part: E: Network, Web & Security Volume: 12 Issue: 11
VoIP is born from the growing Internet infrastructure, which has over the years seen significant improvements in both bandwidth and end-to-end latency. Merging VoIP technologies with telephony infrastructures is of particular interest since it significantly reduces the costs. In this project, we are making voice calls over Intranet available on a mobile phone using Bluetooth as the acces...
Paper Information
Authors Dr. Ajinkya Salunke, Prashant Shelke, Apurva Sahasrabudhe
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 55

Due to the advancement of Web 2.0 technologies, a large volume of Web opinions is available on social media sites such as Web forums and Weblogs. These technologies provide a platform for Internet users around the world to communicate with each other and express their opinions. Web opinions are short and sparse text messages with noisy content. In this paper, we are using a sparse matrix...
Paper Information
Authors Dr.L.Venkateswara Reddy, B.R.Dileep Kumar
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 51

This paper propose a novel approach for modeling the end-to-end time delay dynamics of the internet using system identification, and use it for controlling real-time internet-based telerobotic operations. When a single model is used, it needs to adapt to the operating conditions before an appropriate control mechanism can be applied. Slow adaptation may result in large transient errors. ...
Paper Information
Authors Dr. Ehsan Kamrani
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

Most of Microsoft word documents were transfer or shared via internet by using e-mail or any electronic way. This facility is exploited to send any embedded secret data anywhere. In This paper an efficient method was proposed to hide any text massage with in Microsoft word documents.The initial idea of this method is to exploit the addition three spaces on end of paragraph using for hidd...
Paper Information
Authors Dr. Jassam .T. Sarsoh, Kadhem. M. Hashem, Hayder I. Hendi
Read Journal Click Here
Read Paper Click Here
Page No. 39 to 42

Nowadays computers education is necessary in every sector whether it is public or private. General applications like Word processor, Spread sheet, Presentations and email usage is demanded during hiring someone. Under development countries like Pakistan where literacy rate is already low, facing these challenges to produce a quality computer professional. Students have to pay huge amount...
Paper Information
Authors Dr. Muhammad Haris Abid, Zahid Javed, Shahbaz Shoukat, Muhammad Sohaib Ashraf, Muhammad Zia Qammar
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 40