The proliferation of heterogeneous devices connected through large scale networks is a clear sign that the vision of the Internet of Things IoT is getting closer to becoming a reality. Many researchers and experts in the field share the opinion that the next to come fifth generation 5G cellular systems will be a strong boost for the IoT deployment. Device to...
Showing posts with label Computer Network. Show all posts
Showing posts with label Computer Network. Show all posts
Thursday, 23 September 2021
Wednesday, 7 July 2021
Optical Network without Fiber Optical Cable for Communication
Team IJTSRD
July 07, 2021
0
Fiber optic cable is in extensive use in present era for communication. But still there is need for up gradation of fiber optic communication network. Can we go for wireless without fiber optic cable optical network for communication by using waves length of visible spectrum or other waves by Darnesh "Optical Network without Fiber Optical Cable for Communication"...
Friday, 18 June 2021
Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey
Team IJTSRD
June 18, 2021
0
In recent events of the pandemic situation there is a heavy surge in the demand for health care applications for monitoring the vitals of the patients through real time monitoring of the human body. The major concerns which we face in Wireless Body Area Network WBAN sensors are security, data privacy, data integrity, confidentiality and dependability. Moreover...
Assessment of Neural Network and Goal Programming on Cross Cultural Management
Team IJTSRD
June 18, 2021
0
For achieving success in a global arena cross cultural training should be provided to employees to settle down between the global business environment and culture as one of the factors contributing to economic success, revenue generation, surplus booking, goodwill enhancement, market fame and many more. More the revenue, more the profit booking leads to rise...
Monday, 14 June 2021
Study on Secure Cryptographic Techniques in Cloud
Team IJTSRD
June 14, 2021
0
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users...
Friday, 4 June 2021
Neural Network and Applications An Overview
Team IJTSRD
June 04, 2021
0
Models of the brain and nervous system for Highly parallel to the Process information much more like the brain than a serial computer like Learning and simple principles with complex behaviour as well Applications are powerful problem solvers and also used in biological models. by Dr. Mukesh Kumar Lalji | Dr. Ashish Dongre | Rajeev Gupta | Dr. Deepak Paliwal...
Wednesday, 14 April 2021
Internet of Things IoT Anytime Anywhere Anything Connectivity
Team IJTSRD
April 14, 2021
0
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems...
Sunday, 21 February 2021
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
Team IJTSRD
February 21, 2021
0
This paper discusses the need for energy efficient communication in wireless sensor networks and identifies the key energy dissipation sources as well as countermeasures to ensure a long lifetime of the network. In remote and dangerous settings, wireless sensor networks can collect trustworthy and reliable information and can be used in national defence, military...
Saturday, 13 February 2021
A Review of Wireless Body Area Network
Team IJTSRD
February 13, 2021
0
In the age of today, technology pays attention to how it can be implemented in keeping people alive. It is clear that technology is offering the healthcare industry a much needed upgrade to mobile apps from medical translation resources that help patients lead healthier lives. One of the dizzying innovations that could change the healthcare industry is the wireless...
Friday, 5 February 2021
New Improved Simple Protocol for Wireless Body Area Network
Team IJTSRD
February 05, 2021
0
The creation of Wireless Body Area Networks has been enabled by recent advancements in wearable computing and wearable sensor devices WBANs . The wireless body area network consists of remotely linked miniaturised sensors mounted in, on or around the human body, providing continuous monitoring of physiological signs to support applications for medicine, lifestyle...
Monday, 1 February 2021
Creating an Effective Network Sniffer
Team IJTSRD
February 01, 2021
0
The sniffer catches these bundles by setting the NIC card in the promiscuous mode and inevitably unravels them. The decoded data can be utilized in any capacity relying on the expectation of the individual concerned who translates the information for example malevolent or useful reason . Contingent upon the organization structure one can sniff all or just pieces...
Friday, 25 December 2020
A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers
Team IJTSRD
December 25, 2020
0
The fundamental feature of the LMS Least Mean Squares algorithm is the step size, and it involvesa cautious adjustment. Large step size may lead to loss of stability which are required for fast adaptation. Small step size leads to low convergence which are needed for insignificant excess mean square error. Consequently, several changes of the LMS algorithm...
Tuesday, 15 December 2020
Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System
Team IJTSRD
December 15, 2020
0
Network has brought convenience to the earth by permitting versatile transformation of information, however it conjointly exposes a high range of vulnerabilities. A Network Intrusion Detection System helps network directors and system to view network security violation in their organizations. Characteristic unknown and new attacks are one of the leading challenges...
Saturday, 21 November 2020
CipherKey Algorithm
Team IJTSRD
November 21, 2020
0
Converting a plain text into non readable format to maintain a confidentiality and integrity of data is called Encoding. And the technique used to decode that into readable format, is called Decryption. To encrypt and decrypt, algorithms we have developed. This entire theory, The whole technology is called Cryptography. Many algorithms were developed, many are...
Sunday, 15 November 2020
Ecosystem of Virtualization Technologies
Team IJTSRD
November 15, 2020
0
Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into containers and virtualizing applications. Virtualization aims at efficient use of hardware by sharing resources. Today, hypervisor and container...
Wednesday, 11 November 2020
Survey Paper on SDN and its Security Flaws
Team IJTSRD
November 11, 2020
0
The Internet has prompted the production of an advanced society, where everything is associated and is open from anyplace. The conventional IP networks are brimming with intricacy and extremely difficult to oversee. It is both hard to design the organization as indicated by predefined strategies, and to reconfigure it to react to stack, blames and changes. To...
Friday, 30 October 2020
Review Paper on Predicting Network Attack Patterns in SDN using ML
Team IJTSRD
October 30, 2020
0
Software Defined Networking SDN provides several advantages like manageability, scaling, and improved performance. SDN has some security problems, especially if its controller is defense less over Distributed Denial of Service attacks. The mechanism and communication extent of the SDN controller is overloaded when DDoS attacks are performed against the SDN controller....
Thursday, 29 October 2020
Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption
Team IJTSRD
October 29, 2020
0
Cloud computing is a drastically new enrolling point of view, which connects with flexible, on request, and straightforwardness utilization of figuring assets, anyway the information is given to some cloud workers, and assorted security concerns reach out of it. In this paper, a semi anonymous advantage control plot AnonyControl to address the information security,...
Wednesday, 28 October 2020
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
Team IJTSRD
October 28, 2020
0
Accessible encryption Technique is expanding the enthusiasm to ensure the information protection in secure accessible distributed storage. In this task, explore the security of a notable cryptographic crude, specifically, public key encryption with watchword search PEKS which is valuable in numerous utilizations of distributed storage. Tragically, it has been...
Tuesday, 27 October 2020
Fraud and Malware Detection in Google Play by using Search Rank
Team IJTSRD
October 27, 2020
0
Fraudulent behaviors in Google Play, the most popular Android app market, fuel search rank abuse and malware proliferation. To identify malware, previous work has focused on app executable and permission analysis. In this paper, we introduce FairPlay, a novel system that discovers and leverages traces left behind by fraudsters, to detect both malware and apps...