E: Network, Web & Security

E: Network, Web & Security (292)

GJCST: E

A Smart Narrow Field Communication (SNFC) deals with the wireless tag system which is developed through devices. Generally, on the internet it is hard to read long contents of the URL Present. On the internet these URL can be converted into QR code and NFC (Near Field Communication). First of all a device which is useful for wireless applications is given a name and considered as a tag. ...
Paper Information
Authors J.varsha Benarjee, B. Hemanth Kumar, K. Raghava Rao
Read Journal Click Here
Read Paper Click Here
Page No. 49 to 51

In this paper, we have implemented cluster based novel multihop stable election protocol extended (MSEP-E) which does multihop communication between CHs and sensor nodes towards the sink. The sensor nodes and CHs which are nearer to sink send data directly to the sink while the nodes which are farther from the sink send data to its nearest hop towards the sink. Multihop communication is ...
Paper Information
Authors Raju Pal, Ajay K. Sharma
Read Journal Click Here
Read Paper Click Here
Page No. 53 to 59

High quality video broad casting is of high demand both with DVB-2 (Digital Video Broad casting) and Internet services. But these broadcasted data is distributed without protection. Invisible mode of video watermarking is one of the solutions, here in this paper a novel approach of data embedding scheme is proposed for MPEG-4 videos with different parity check codes and processed in tran...
Paper Information
Authors S.Janardhana Rao.O Nagaraju
Read Journal Click Here
Read Paper Click Here
Page No. 45 to 48

For dictionary-based decompositions of certain types, it has been observed that there might be a link between sparsity in the dictionary and sparsity in the decomposition. Sparsity in the dictionary has also been associated with the derivation of fast and efficient dictionary learning algorithms. Therefore, in this paper we present a greedy adaptive dictionary learning algorithm that set...
Paper Information
Authors Maria G. Jafari, Mark D. Plumbley
Read Journal Click Here
Read Paper Click Here
Page No. 37 to 44

In this paper we study the energy cost (protocol processing and communication cost) and goodput of different flavors of TCP (Transmission Control Protocol) in ad hoc networks.We implemented a tes tbed and measured the actual energy cost as well as goodput of running TCP Reno, Newreno, SACK (Selective ACKnowledgement) and a version that combines Explicit Link Failure Noti_cation (ELFN)and...
Paper Information
Authors K.Bhavana, M.Himaja
Read Journal Click Here
Read Paper Click Here
Page No. 33 to 35

A MANET is a probable solution for this need to quickly establish interactions in a mobile and transient environment. Proposed congestion controlled adaptive multicasting routing protocol to achieve load balancing and avoid congestion in MANETs. The existing algorithm for finding multicasting routes computes fail-safe multiple paths, which provide all the intermediate nodes on the primar...
Paper Information
Authors R. Rajeshkanna, Dr. A.Saradha
Read Journal Click Here
Read Paper Click Here
Page No. 27 to 31

Air pollution is one of environmental issues that cannot be ignored. The heavy transportation and urbanization result in the air pollutants concentrated in certain areas. Inhaling pollutants for a long time causes damages in human health. Traditional air quality monitoring methods, such as building air quality monitoring stations, are typically expensive. In addition, monitoring stations...
Paper Information
Authors D.Yaswanth, B.Bhanu Satwik
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 26

There is always a possibility of errors to happen into the system when we transmit data over a data link or a network which may affect the integrity of the system leading into a compromised transmission, according to this The performance of the system can be estimated by bit error rate AS (BER)provides an ideal way to achieved such transmission. In this paper we present a graphical user ...
Paper Information
Authors Ahmed Alahdal, Dr.G. N. Shinde
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 19

Insider attacks formed the biggest threaten against database management systems. There are many mechanisms have been developed to detect and prevent the insider attacks called Detection of Malicious Activities in Database Systems DEMIDS. The DEMIDS consider as one of the last defenses mechanism of the database security system. There are many mechanisms that have been developed to detect ...
Paper Information
Authors Chitanlapudi Sai Charan,Varada Bharat Srinivas, Dr. K.V.Daya Sagar
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

Abstract- The rapid growth in the usage of the internet had led to many serious security issues in the network. The intrusion detection system (IDS) is one of the sophisticated defensive systems used to detect the malicious activities happening in the network services across the world.Hence, more advanced IDS are been developed in past few years. To improve the performance of the IDS, th...
Paper Information
Authors V. Jyothsna, V. V. Rama Prasad
Read Journal Click Here
Read Paper Click Here
Page No. 43 to 50