International Journal of Trend in Scientific Research and Development: Computer Network

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Showing posts with label Computer Network. Show all posts
Showing posts with label Computer Network. Show all posts

Thursday, 23 September 2021

Correlation between Terms of 5G Networks, IoT and D2D Communication

September 23, 2021 0
Correlation between Terms of 5G Networks, IoT and D2D Communication
The proliferation of heterogeneous devices connected through large scale networks is a clear sign that the vision of the Internet of Things IoT is getting closer to becoming a reality. Many researchers and experts in the field share the opinion that the next to come fifth generation 5G cellular systems will be a strong boost for the IoT deployment. Device to...

Wednesday, 7 July 2021

Optical Network without Fiber Optical Cable for Communication

July 07, 2021 0
Optical Network without Fiber Optical Cable for Communication
Fiber optic cable is in extensive use in present era for communication. But still there is need for up gradation of fiber optic communication network. Can we go for wireless without fiber optic cable optical network for communication by using waves length of visible spectrum or other waves by Darnesh "Optical Network without Fiber Optical Cable for Communication"...

Friday, 18 June 2021

Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey

June 18, 2021 0
Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey
In recent events of the pandemic situation there is a heavy surge in the demand for health care applications for monitoring the vitals of the patients through real time monitoring of the human body. The major concerns which we face in Wireless Body Area Network WBAN sensors are security, data privacy, data integrity, confidentiality and dependability. Moreover...

Assessment of Neural Network and Goal Programming on Cross Cultural Management

June 18, 2021 0
Assessment of Neural Network and Goal Programming on Cross Cultural Management
For achieving success in a global arena cross cultural training should be provided to employees to settle down between the global business environment and culture as one of the factors contributing to economic success, revenue generation, surplus booking, goodwill enhancement, market fame and many more. More the revenue, more the profit booking leads to rise...

Monday, 14 June 2021

Study on Secure Cryptographic Techniques in Cloud

June 14, 2021 0
Study on Secure Cryptographic Techniques in Cloud
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users...

Friday, 4 June 2021

Neural Network and Applications An Overview

June 04, 2021 0
Neural Network and Applications An Overview
Models of the brain and nervous system for Highly parallel to the Process information much more like the brain than a serial computer like Learning and simple principles with complex behaviour as well Applications are powerful problem solvers and also used in biological models. by Dr. Mukesh Kumar Lalji | Dr. Ashish Dongre | Rajeev Gupta | Dr. Deepak Paliwal...

Wednesday, 14 April 2021

Internet of Things IoT Anytime Anywhere Anything Connectivity

April 14, 2021 0
Internet of Things IoT Anytime Anywhere Anything Connectivity
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems...

Sunday, 21 February 2021

Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime

February 21, 2021 0
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
This paper discusses the need for energy efficient communication in wireless sensor networks and identifies the key energy dissipation sources as well as countermeasures to ensure a long lifetime of the network. In remote and dangerous settings, wireless sensor networks can collect trustworthy and reliable information and can be used in national defence, military...

Saturday, 13 February 2021

A Review of Wireless Body Area Network

February 13, 2021 0
A Review of Wireless Body Area Network
In the age of today, technology pays attention to how it can be implemented in keeping people alive. It is clear that technology is offering the healthcare industry a much needed upgrade to mobile apps from medical translation resources that help patients lead healthier lives. One of the dizzying innovations that could change the healthcare industry is the wireless...

Friday, 5 February 2021

New Improved Simple Protocol for Wireless Body Area Network

February 05, 2021 0
New Improved Simple Protocol for Wireless Body Area Network
The creation of Wireless Body Area Networks has been enabled by recent advancements in wearable computing and wearable sensor devices WBANs . The wireless body area network consists of remotely linked miniaturised sensors mounted in, on or around the human body, providing continuous monitoring of physiological signs to support applications for medicine, lifestyle...

Monday, 1 February 2021

Creating an Effective Network Sniffer

February 01, 2021 0
Creating an Effective Network Sniffer
The sniffer catches these bundles by setting the NIC card in the promiscuous mode and inevitably unravels them. The decoded data can be utilized in any capacity relying on the expectation of the individual concerned who translates the information for example malevolent or useful reason . Contingent upon the organization structure one can sniff all or just pieces...

Friday, 25 December 2020

A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers

December 25, 2020 0
A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers
 The fundamental feature of the LMS Least Mean Squares algorithm is the step size, and it involvesa cautious adjustment. Large step size may lead to loss of stability which are required for fast adaptation. Small step size leads to low convergence which are needed for insignificant excess mean square error. Consequently, several changes of the LMS algorithm...

Tuesday, 15 December 2020

Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System

December 15, 2020 0
Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System
Network has brought convenience to the earth by permitting versatile transformation of information, however it conjointly exposes a high range of vulnerabilities. A Network Intrusion Detection System helps network directors and system to view network security violation in their organizations. Characteristic unknown and new attacks are one of the leading challenges...

Saturday, 21 November 2020

CipherKey Algorithm

November 21, 2020 0
CipherKey Algorithm
Converting a plain text into non readable format to maintain a confidentiality and integrity of data is called Encoding. And the technique used to decode that into readable format, is called Decryption. To encrypt and decrypt, algorithms we have developed. This entire theory, The whole technology is called Cryptography. Many algorithms were developed, many are...

Sunday, 15 November 2020

Ecosystem of Virtualization Technologies

November 15, 2020 0
Ecosystem of Virtualization Technologies
 Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into containers and virtualizing applications. Virtualization aims at efficient use of hardware by sharing resources. Today, hypervisor and container...

Wednesday, 11 November 2020

Survey Paper on SDN and its Security Flaws

November 11, 2020 0
Survey Paper on SDN and its Security Flaws
The Internet has prompted the production of an advanced society, where everything is associated and is open from anyplace. The conventional IP networks are brimming with intricacy and extremely difficult to oversee. It is both hard to design the organization as indicated by predefined strategies, and to reconfigure it to react to stack, blames and changes. To...

Friday, 30 October 2020

Review Paper on Predicting Network Attack Patterns in SDN using ML

October 30, 2020 0
Review Paper on Predicting Network Attack Patterns in SDN using ML
Software Defined Networking SDN provides several advantages like manageability, scaling, and improved performance. SDN has some security problems, especially if its controller is defense less over Distributed Denial of Service attacks. The mechanism and communication extent of the SDN controller is overloaded when DDoS attacks are performed against the SDN controller....

Thursday, 29 October 2020

Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption

October 29, 2020 0
Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption
Cloud computing is a drastically new enrolling point of view, which connects with flexible, on request, and straightforwardness utilization of figuring assets, anyway the information is given to some cloud workers, and assorted security concerns reach out of it. In this paper, a semi anonymous advantage control plot AnonyControl to address the information security,...

Wednesday, 28 October 2020

Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage

October 28, 2020 0
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Accessible encryption Technique is expanding the enthusiasm to ensure the information protection in secure accessible distributed storage. In this task, explore the security of a notable cryptographic crude, specifically, public key encryption with watchword search PEKS which is valuable in numerous utilizations of distributed storage. Tragically, it has been...

Tuesday, 27 October 2020

Fraud and Malware Detection in Google Play by using Search Rank

October 27, 2020 0
Fraud and Malware Detection in Google Play by using Search Rank
Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left behind by fraudsters, to detect both malware and apps...

Ad