E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Wireless sensor network comprises of a set of sensor nodes that communicate among each other using wireless links and work in an open and distributed manner due to which wireless sensor networks are highly prone to attacks. This is difficult to determine the position of the sensor nodes; therefore the sensor network protocols must inculcate self-organizing competence. Location awareness ...
Paper Information
Authors Kanchan Verma, Mansi Gupta
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 18

Ability to locate a specific object in a dynamic environment has several practical applications including security surveillance, navigation and search and rescue operations. The objective of this paper is to develop an object-tracking algorithm using a combination of fuzzy logic and neural networks. The aim is to originate an algorithm that matches the history locations of an object and ...
Paper Information
Authors Dr. Jawdat Jamil Alshaer
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 25

Recent advancement and grown up technologies has enabled the development and implementation of low-cost, energy efficient and versatile sensor networks. Sensor networks are built up with sensors that have the ability to sense physical or environmental property. Assumption can be made that Wireless Sensing Network (WSN) is able to sense environmental conditions at Nano and gaseous level. ...
Paper Information
Authors Md. Syful Islam Mahfuz, Suman Saha
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 12

TCP upon wireless networks is most challenging issue because of random losses and ACK interference. Also, TCP suffers from performance declination in terms of creating delay and overhead in network because of poor characteristics of wireless channel. In order to overcome these issues, we proposed a Smart Acknowledgement Distributed Channel Access (SADCA) scheme for TCP in MANETs. In the ...
Paper Information
Authors D.Sunitha, Dr. A.Nagaraju, Dr. G.Narsimha
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 39

The Internet has become an indispensable means of sourcing and storing information. In the future, the Internet will be used to control objects, not just information. This raises the issue of security. In the case of wireless sensor networks, the main challenge will be to provide secure lines of communication between devices on the same network. ...
Paper Information
Authors Sameer Alalawi, Zennon Chaczko
Read Journal Click Here
Read Paper Click Here
Page No. 41 to 47

Web-Commerce applications are now an indispensable aspect of businesses around the world. More businesses are now migrating from outdated applications to a new type of combined ebusiness designs. With such large volumes of applications that need to be put online, there is now a dire need for measurable and quantifiable metrics that can help in gauging the quality of these websites. The d...
Paper Information
Authors Qasim Zia
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 31

A MANET is considered as self administrating network in which nodes are free to come and join to communicate with various nodes. A network which has a lot of advantages for its characteristics also has disadvantage of being attacked by some malicious node. Since MANET requires that each node should posses a unique, distinct identity, Sybil attack is one of the major threat to MANET. A Sy...
Paper Information
Authors Gaurav Jain, Kalpana Jain, Rajdeep S. Shaktawat
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

A novel approach has been presented to compute the probabilities of unsuccessful handovers based number of free channels available in the target AP and number of free channels available plus based on the mobility of mobile device. The number of free channels in the AP is 16 and the mobility of the mobile device in the 8 different directions is considered. The directions of movement are 0...
Paper Information
Authors Subrahmanyam, K.Chennakesava Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Recently, the Rijndael algorithm has been uniform by the National Institute of Standards and Technology (NIST) as the Advanced Encryption Standard (AES). This makes AES a vital and necessary data-protection mechanism for federal agencies in the US and other countries. In AES, rotation occurs in key expansion, ciphering, and deciphering. Rotation is vital for confusion and diffusion, whic...
Paper Information
Authors Dr. Mohamed Abd Elhamid Ibrahim. Moustafa Mousa El Bahtity
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 45

In the Research paper I explained about working Google Web indexing, crawling and ranking algorithms. On every new day Google and other search Engines are changing their way to index and rank website. It explains the way to get ranks your website with safest way and keep your business moving towards top positions. The paper provides in-depth analysis of all big hits of Google by updates ...
Paper Information
Authors Muhammad Zahid Iqbal
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 32