E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

In mobile ad-hoc networks Quality of Service (QoS) of a multicast routing protocol is one of the most key performance metrics. Slotconditions and network topology frequently change (Topology dynamic), and in order to achieve a certain level of QoS, complexalgorithms and protocols are needed. Network graph conditionsare neglected during the design of aexisting multicast protocol. However,...
Paper Information
Authors Sridhara S B, Dr. Ramesh B
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 60

IEEE 802.11 WLAN provides multimedia services like live telecast, video streaming, video conferencing, Voice over IP (VoIP) to its users. For deployment of these fast real time services, it needs stringent Quality of service (QoS) requirement such as delay time less than 150ms for VoIP, and packet loss rate of 1%. The mobility service for users come with cost of handoff process required ...
Paper Information
Authors Nidhi Sanghavi, Rajesh S. Bansode
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 40

Elliptic curve cryptography or ECC is a public-key cryptosystem. This paper introduces ECC and describes its present applications. A mathematical background is given initially. Then its’ major cryptographic uses are given. These include its’ use in encryption, key sharing and digital signatures. The security of these ECC-based cryptosystems are discussed...
Paper Information
Authors Koffka Khan
Read Journal Click Here
Read Paper Click Here
Page No. 25 to 35

In order to apply any machine learning algorithm or classifier, it is fundamentally important to first and foremost collect relevant features. This is most important in the field of dynamic analysis approach to anomaly malware detection systems.In this approach, the behaviour patterns of applications while in execution are analysed. The behaviour features that Android as a system allows ...
Paper Information
Authors Joshua Abah, Waziri O.V., Abdullahi M.B., Ume U.A., Adewale O.S.
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 8

Supporting multimedia application over wireless networks poses multiple challenges. Currently the use of cross layer architectures and Scalable Video Coding ( ) techniques are considered to support multimedia applications. The current architectures fail to address the tradeoff that exists between the end to end delay and the Quality of Service ( ) provisioning of the video data to be del...
Paper Information
Authors Vijayalakshmi M, Linganagouda Kulkarni
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 31

Network Security has a major role in the development of data communication system, where more randomization in the secret keys increases the security as well as the complexity of the cryptography algorithms. In the recent years network security has become an important issue. Cryptography has come up as a solution which plays a vital role in the information security system against various...
Paper Information
Authors Shraddha More, Mr.Rajesh Bansode
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 20

Mobile ad hoc networks is the future wireless communication systems have recently emerged as an important trend. Mobile adhoc network is self-configurable and adaptive. Due to the mobility of nodes, the network congestion occurs and it is difficult to predict load on the network which leads to congestion. Mobile adhoc network suffers from a severe congestion controlling problem due to th...
Paper Information
Authors Govardhan Reddy Kamatam, Podili V S Srinivas , Chandra Sekharaiah K
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 23

Wireless ad hoc network nodes together establish a network infrastructure without using any access points or base stations for communicates using multi hop schemes. It has significant characteristics like dynamic topologies, constrained in bandwidth and limited resource a high challenge in implementing security with optimized energy resource utilization which is the key aspects while des...
Paper Information
Authors D V Srihari Babu, Dr. P Chandrashekhar Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 9 to 15

In an age of cyber technology with it fast pacing and ever evolving, securing data in cyber space is a major enigmawhich needs to be resolved.With vulnerabilities everywhere, data security and privacy is always at risk. This specially comes in play when services of third party are used knowingly or unknowingly. Government and business organizations are testing and implementing security a...
Paper Information
Authors Rabea Masood, Mehreen Sirshar, Qaria Zainab
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 10

The growth of World Wide Web is incredible as it can be seen in present days. Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining techniques to discover Web access patterns from Web log data. In order to discover access patterns, Web log data should be reconstructed...
Paper Information
Authors Neha Sharma, Pawan Makhija
Read Journal Click Here
Read Paper Click Here
Page No. 15 to 17