E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

Distributed Denial-of-Service (DDoS) assaults are a developing danger crosswise over Internet, disturbing access to Information and administrations. Presently days, these assaults are focusing on the application layer. Aggressors are utilizing systems that are exceptionally hard to recognize and relieve. In this task propose another technique to recognize AL-DDoS assaults. This work sepa...
Paper Information
Authors R.Sreenath, E.S.Phalgunakrishna
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 14

Here in this paper we devised a novel orthogenesis evolution based GA technique for QoS fitness scope aware routing in Mobile Ad hoc Networks. The past decade research towards route discovery strategies for mobile ad hoc networks is continuing with magnitude speed. However, the majority of the routing solutions devised in past are dealing only with the optimality of the data transmission...
Paper Information
Authors M.L.Ravi ChandraDr.P.Chandra Sekhar Reddy
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 10

The Real time application of an embedded Linux is essential in the area of device driver platform. Device driver plays a vital role of both hardware and software. Configuration of raspberry Pi Processor in various commands sets in Embedded Linux by enabling of Wi-Fi Device by scratch Process of various units in hardware. More number of devices can be accessed without any problem enabling...
Paper Information
Authors K.Tamilsevan, Dr.A.Satheesh, u00e2u20acu0153Scientistu00e2u20acu009d Dr.S.Natarajan
Read Journal Click Here
Read Paper Click Here
Page No. 19 to 21

In MANET environment, the nodes are mobile i.e., nodes move in and out dynamically. This causes difficulty in maintaining a central trusted authority say Certification Authority CA or Key Generation Centre KCG. In addition most of cryptographic techniques need a key to be shared between the two communicating entities. So to introduce security in MANET environment, there is a basic need o...
Paper Information
Authors Ch. Asha Jyothi, G. Narsimha, J. Prathap, Gorti VNKV Subba Rao
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Third Party Web Advertisements
Published In: GJCST Part: E: Network, Web & Security Volume: 15 Issue: 2
Web is driving the evolution of the current system, allowing users to find, share and combine information more easily and delivery of web pages built for the content of websites. HTML, JavaScript and CSS no restrictions on a web page that includes elements or even delegating complete control of a fully decoupled website. These design options have contributed to a number of vulnerabilitie...
Paper Information
Authors Dr. D.Aruna Kumari, Ch.Maniteja, M.Hari Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 27

This project aims at creating an effective automated traffic control system to prevent ambulances/emergency service vehicles from getting caught up in traffic, there by decreasing hindrances to vital services both in regular and critical situations. The system is implemented by using the Zig Bee wireless communication protocol for wireless communication, IR speed sensors, GPS technology,...
Paper Information
Authors M Prasanth, G Sai Abhinay, Dr. J V N Ramesh
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 17

Intersection RSU in Vanet
Published In: GJCST Part: E: Network, Web & Security Volume: 15 Issue: 2
Vanet is most important and new type adhoc networking which needs attention. If research of scholars and technology of automobile industry combinely work in this area they can reduces accidents happening on roads. Basically Vanet is Adhoc network in which vehicles are treated as Node. And these nodes are communicating with each other as well as rsu [Road side unit] s on the road. In This...
Paper Information
Authors Rohini Avinash Nere,Uma Nagaraj
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 31

Vascular Innovation Science
Published In: GJCST Part: E: Network, Web & Security Volume: 15 Issue: 2
Vascular Innovation science are a standout amongst the most approaching innovations which is very secure. In this paperi introduces a study of machine learning techniques utilized for Vascular innovation development applications, and distinguishes significant exploration issues. Basic mission assets and applications require instruments to recognize when honest to goodness clients attempt...
Paper Information
Authors Anurag Pandey, Alpika Tripathi, Dr. Geetika Srivastava
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 11

QoS (Quality of Service) aware spectrum sensing and channel allocation in cognitive radio wireless mesh networks is a continuous practice due to the divergent scope of communication in wireless mesh networks. Henceforth the current research is moving in a direction to find effective solutions towards QoS aware spectrum sensing and channel allocation. But all of these solutions are specif...
Paper Information
Authors A.V.R. Mayuri, Dr. M.V Subramanyam
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

In this paper we have a tendency to study the energy value (protocol process and communication cost) and good output of different various of TCP (Transmission management Protocol) in unintended networks .We enforced a tested and measured the particular energy cost furthermore as good output of running communications protocol urban center, Newreno, SACK (Selective Acknowledgement). we see...
Paper Information
Authors JVN Ramesh, K. Bahvana
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 31