E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

We have come across various chat applications to instantly communicate with people. We have used various types of chat application in web-based applications. All these chat applications support text messages to be sent between the users in the instant they press Enter key. But if some problem has to be explained using diagrams, that is where most of these chats are helpless. The chat app...
Paper Information
Authors Dr. Avinash Bamane, Parikshit Bhoyar, Ashish Dugar, Lineesh Antony
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

Data mining based information processing in Wireless Sensor Network (WSN) is at its preliminary stage, as compared to traditional machine learning and WSN. Currently researches mainly focus on applying machine learning techniques to solve a particular problem in WSN. Different researchers will have different assumptions, application scenarios and preferences in applying machine learning ...
Paper Information
Authors Jagadeeswara rao.E, Nimmakayala.S.V.Srinivas,Dr.K.V.Ramana,Ph.d
Read Journal Click Here
Read Paper Click Here
Page No. 63 to 65

GIS, Feeder Manager, CCC, SCADA, HT Network, LT Network. ...
Paper Information
Authors Dr. Jalpesh Solanki, Utkarsh Seetha
Read Journal Click Here
Read Paper Click Here
Page No. 59 to 62

It is important to deliver appropriate services to requested users. In case of unavailability of a user requestedcomposite service, enforces the system to invoke service selection that involves choosing individual concrete services towards service composition. The services are selected based on two criteria: i) functional based and ii) nonfunctional based. The former entails selection of...
Paper Information
Authors Dr. Krithiga R.
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 57

In this fast developing world, the interchange of information is playing a key role. Everything needs information and processes them. This interchange of information needs an authentication, confidentiality and integrity. The security of information is provided many algorithms. There are vast numbers of algorithms for symmetry key cipher. All these algorithms have used either complicated...
Paper Information
Authors Dr. Raju Singh Kushwaha
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 51

Java File Security System JFSS
Published In: GJCST Part: E: Network, Web & Security Volume: 12 Issue: 10
Nowadays, storage systems are increasingly subject to attacks. So the security system is quickly becoming mendatory feature of the data storage systems. For the security purpose we are always dependent on the cryptography techniques. These techniques take the performance costs for the complete system. So we have proposed the Java File Security System(JFSS). It is based on the on-demand c...
Paper Information
Authors Mr. Brijender Kahanwal, Kanishak Dua, Dr. Girish Pal Singh
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 48

Mobile Adhoc Network (MANET) is characterized by mobile hosts, dynamic topology, multi-hop wireless connectivity and infrastructureless ad hoc environment. The adhoc environment is accessible to both legitimate network users and malicious attackers. Moreover, as the wireless links are highly error prone and can go down frequently due to mobility of nodes, therefore, energy efficient, sec...
Paper Information
Authors Dr. Sunil Taneja, Ashwani Kush
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 43

Adhoc wireless networks have emerged as one of the key growth areas for wireless3 networking and computing technology. Adhoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, adhoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. The nodes in ad-hoc networks are ...
Paper Information
Authors Dr.M.V.Subramanyam, P.V.Gopikrishna rao
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 30

Mobile Ad hoc networks (MANET) are considered as promising communication networks in situations where rapid deployment and self-configuration is essential. In ad hoc networks, nodes are allowed to communicate with each other without any existing infrastructure. Typically every node should also play the role of a router. This kind of networking can be applied to scenarios like conference ...
Paper Information
Authors Dr. Anupam Baliyan, Sanjeev Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

Human identification by gait has created a great deal of interest in computer vision community due to its advantage of inconspicuous recognition at a relatively far distance. Biometric systems are becoming increasingly important, since they provide more reliable and efficient means of identity verification. Biometric gait Analysis (i.e. recognizing people from the way they walk) is one o...
Paper Information
Authors Dr. M.Pushparani, D.Sasikala
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

Page 21 of 21