Thursday, 23 September 2021
Correlation between Terms of 5G Networks, IoT and D2D Communication
Wednesday, 7 July 2021
Optical Network without Fiber Optical Cable for Communication
Fiber optic cable is in extensive use in present era for communication. But still there is need for up gradation of fiber optic communication network. Can we go for wireless without fiber optic cable optical network for communication by using waves length of visible spectrum or other waves
by Darnesh "Optical Network without Fiber Optical Cable for Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021,
URL: https://www.ijtsrd.com/papers/ijtsrd45215.pdf
Friday, 18 June 2021
Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey
In recent events of the pandemic situation there is a heavy surge in the demand for health care applications for monitoring the vitals of the patients through real time monitoring of the human body. The major concerns which we face in Wireless Body Area Network WBAN sensors are security, data privacy, data integrity, confidentiality and dependability. Moreover it has issues such as standardization, energy efficiency, and quality of service. We are more concerned about the security of the data. The main purpose of WBAN sensors is to monitor the patients continuously without any assistance. The sensors are meant to be worn by the patients and the data has to be sent to the Healthcare applications which hold the backend system through a secured network. In this paper we are discussing the various security mechanisms and routing challenges which we are facing and the attacks which could occur over the network and also the summary of certain mechanisms which are present to overcome them. We have analysed the security for the different attack scenarios. This survey is to summarize the major difficulties which we face while designing a network in WBANs which is an emerging field of science in this pandemic situation.
by M Ragul Vignesh | S Sivakumar "Healthcare Sensors Issues, Challenges & Security Threats in Wireless Body Area Network: A Comprehensive Survey"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
URL: https://www.ijtsrd.compapers/ijtsrd42454.pdf
callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics
Assessment of Neural Network and Goal Programming on Cross Cultural Management
For achieving success in a global arena cross cultural training should be provided to employees to settle down between the global business environment and culture as one of the factors contributing to economic success, revenue generation, surplus booking, goodwill enhancement, market fame and many more. More the revenue, more the profit booking leads to rise company’s goodwill and builds customers faith as well as provides employee satisfaction which motivates employees to be more productive, more efficient, more energetic, more enthusiastic, and never let employees to get stressed from their work.AI ANN and goal programming is being used a method to find something fruitful to mitigate cross cultural issues in an organization.
by Shefali G | Dr. Rajesh Singh "Assessment of Neural Network and Goal Programming on Cross Cultural Management"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
Monday, 14 June 2021
Study on Secure Cryptographic Techniques in Cloud
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Nowadays, many organizations have started using cloud garage because of its blessings. Even though the cloud keeps to advantage reputation in usability and attraction, the problems lie in statistics protection, statistics and different information safety issues. Security and privacy of information saved inside the cloud are major setbacks inside the area of Cloud Computing. Security and privateness are the important thing problems for cloud garage.Cloud computing is primarily based on the precept of virtualization, which means that there may be a single big system and multiple clients are sharing this gadget with a view that theyve their personal dedicated resources. It basically has 3 stage of services. First, Infrastructure as a carrier IaaS , on this method the hardware resources together with difficult disk, memory, networking assets etc. are furnished on rent and are charged as in line with the usage. Second, Platform as a provider PaaS , which now not simplest presents all the facilities as in IaaS but additionally presents running machine facilities, their updates, etc. for this reason make the overall work pretty clean.Cloud storage structures have become the primary garage space for cloud customers’ facts. Despite the big blessings and versatility of the cloud garage offerings, many demanding situations are hindering the migration of customers’ records into the cloud. Among them, the records privacy wishes to be considered.Cloud computing provider is valuable in diverse phase of human activities and it has been a future information generation layout for corporations, education sectors and other industrial sectors. Cloud garage services allows clients to place away information and experience the excessive quality on call for cloud programs without the stress of regular control of their personal software, hardware and data. It moves records maintained by cloud service company on the cloud storage servers which save you an excessive amount of burden on customers which include control of the bodily fact’s ownership. Although the welfares of cloud offerings are extra, however there are new threats related to facts safety because of bodily possession of outsourced facts. Users are setting away their touchy facts and for the reason that they havent any greater control over the offerings or their stored facts, there may be need to put into effect sturdy safety techniques so one can prevent unauthorized get admission to the machine functionalities and customers statistics. To deal with data safety threats at the same time as in cloud storage, sturdy authentication scheme and information encryption scheme became introduce in this paper the usage of Advanced Encryption Standard AES set of rules for the encryption of customers’ facts contents before setting into storage and Authentication scheme for legitimate person verification and safety of unauthorized get entry to all devices of system functionalities.Data integrity in the garage model of cloud computing is a massive safety subject. This could be due to the Multiple places wherein the facts are probably dwelling. After that privateness safety and security of this spread out facts may be at any stake. The facts at such multiple locations want to be relaxed in the cloud garage. What needs to be centered here is how a more relaxed version may be furnished to the cloud structure.
by Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf
internationaljournalsofcomputerscience, callforpapercomputerscience, ugcapprovedjournalsforcomputerscience
Friday, 4 June 2021
Neural Network and Applications An Overview
Models of the brain and nervous system for Highly parallel to the Process information much more like the brain than a serial computer like Learning and simple principles with complex behaviour as well Applications are powerful problem solvers and also used in biological models.
by Dr. Mukesh Kumar Lalji | Dr. Ashish Dongre | Rajeev Gupta | Dr. Deepak Paliwal | O. P. Shrivastava | N. K. Jain | Mukesh Katariya | Manoj Sonkusre | Gaurav Lalji | Divya Lalji | Arvind Jain | AR. Sandhya Ekbote "Neural Network & Applications- An Overview"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
URL: https://www.ijtsrd.compapers/ijtsrd41171.pdf
callforpaperlifesciences, lifesciencesjournal, researchpapers
Wednesday, 14 April 2021
Internet of Things IoT Anytime Anywhere Anything Connectivity
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system.
by Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021,
URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf
callforpaperpharmacy, pharmacyjournal, internationalpeerreviewedjournal
Sunday, 21 February 2021
Wireless Sensor Network Protocol with PEGASIS GA to Enhance the Network Lifetime
This paper discusses the need for energy efficient communication in wireless sensor networks and identifies the key energy dissipation sources as well as countermeasures to ensure a long lifetime of the network. In remote and dangerous settings, wireless sensor networks can collect trustworthy and reliable information and can be used in national defence, military affairs, industrial control, traffic management, medical care, smart home, etc. The sensor whose resources are reserved is low cost and relies on the battery to supply energy, so it is necessary to use its power efficiently for routing. In this research work, first we use the greedy chain to implement the LEACH and PEGASIS Protocol and then we use the Genetic Algorithm to construct the data routing chain, which uses its parameters of crossover and mutation and finds an optimised data collection routing route. For the same number of nodes, the Genetic Algorithm increases the network lifespan. Simulations are performed and, on the basis of energy consumption and number of rounds, the effects of PEGASIS and Genetic Algorithm are compared with each other.
by Dipak Prasad Poudel | Preeti Sondhi "Wireless Sensor Network Protocol with PEGASIS (GA) to Enhance the Network Lifetime"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021,
URL: https://www.ijtsrd.com/papers/ijtsrd38645.pdf
openaccessjournalofengineering, engineeringjournal, paperpublicationforengineering
Saturday, 13 February 2021
A Review of Wireless Body Area Network
In the age of today, technology pays attention to how it can be implemented in keeping people alive. It is clear that technology is offering the healthcare industry a much needed upgrade to mobile apps from medical translation resources that help patients lead healthier lives. One of the dizzying innovations that could change the healthcare industry is the wireless body area network WBAN .WBAN derives from the wireless sensor network WSN that deploys sensors over the human body. Wireless Body Area Network WBAN is a wireless networking system based on radio frequency RF that interconnects tiny nodes with sensor or actuator capabilities in, on, or around a human body. WBAN also links large and local area networks. As compared to WSN, WBAN has its own characteristics.
by Preeti Sondhi | Javaid Ahmad Malik "A Review of Wireless Body Area Network"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021,
URL: https://www.ijtsrd.com/papers/ijtsrd38384.pdf
callforpaperpapersinjournals, specialissuepublication, multidisciplinaryjournal
Friday, 5 February 2021
New Improved Simple Protocol for Wireless Body Area Network
The creation of Wireless Body Area Networks has been enabled by recent advancements in wearable computing and wearable sensor devices WBANs . The wireless body area network consists of remotely linked miniaturised sensors mounted in, on or around the human body, providing continuous monitoring of physiological signs to support applications for medicine, lifestyle and entertainment. We propose a secure, power efficient and high throughput routing protocol for Wireless Body Area Networks in this research work. To achieve minimum energy consumption and longer network lifespan, we use multi hop topology. In order to pick the parent node or forwarder, we propose a cost function. A parent node with high residual energy and a minimum distance to sink is selected by the pro posed cost function. The residual energy parameter balances the energy consumption between sensor nodes, while the distance parameter ensures that the packet is transmitted successfully to the sink.
by Javaid Ahmad Malik | Preeti Sondhi "New Improved Simple Protocol for Wireless Body Area Network"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021,
Monday, 1 February 2021
Creating an Effective Network Sniffer
BY Suyash Garg "Creating an Effective Network Sniffer"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd35802.pdf
callforpaperinternationaljournal, ugclistofjournals, bestinternationaljournal
Friday, 25 December 2020
A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers
The fundamental feature of the LMS Least Mean Squares algorithm is the step size, and it involvesa cautious adjustment. Large step size may lead to loss of stability which are required for fast adaptation. Small step size leads to low convergence which are needed for insignificant excess mean square error. Consequently, several changes of the LMS algorithm in which the step size modifications are made throughout the adaptation method which depend on certain specific features, were and are still under development. A new variable step size LMS algorithm is examined to solve the problem of LMS algorithm. The algorithm will be based on the sigmoid function which develops the non linear functional relation among error and step. The algorithm solves the problem of setting parameters in the function by introducing the error feedback strategy to adjust the parameters adaptively. Compared with other algorithms, simulation results show that the algorithm performs perfect at convergence rate and steady state error with a better applicability.
by B. R. Kavitha | P. T. Jamuna Devi "A New VSLMS Algorithm for Performance Analysis of Self Adaptive Equalizers"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd38229.pdf
callforpaperpapersinjournals, specialissuepublication, multidisciplinaryjournal
Tuesday, 15 December 2020
Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System
Network has brought convenience to the earth by permitting versatile transformation of information, however it conjointly exposes a high range of vulnerabilities. A Network Intrusion Detection System helps network directors and system to view network security violation in their organizations. Characteristic unknown and new attacks are one of the leading challenges in Intrusion Detection System researches. Deep learning that a subfield of machine learning cares with algorithms that are supported the structure and performance of brain known as artificial neural networks. The improvement in such learning algorithms would increase the probability of IDS and the detection rate of unknown attacks. Throughout, we have a tendency to suggest a deep learning approach to implement increased IDS and associate degree economical.
by Priya N | Ishita Popli "Comparative Study on Machine Learning Algorithms for Network Intrusion Detection System"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd38175.pdf
callforpapercommerce, ugcapprovedjournalsincommerce, commercejournal
Saturday, 21 November 2020
CipherKey Algorithm
Converting a plain text into non readable format to maintain a confidentiality and integrity of data is called Encoding. And the technique used to decode that into readable format, is called Decryption. To encrypt and decrypt, algorithms we have developed. This entire theory, The whole technology is called Cryptography. Many algorithms were developed, many are Decoded, and many of the algorithms are still running nowadays also. So, here I came up with the new algorithm, with new technique, with new idea in algorithm.
by Sweety Gone | Kuldeep B. Vayadande "CipherKey Algorithm"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd37924.pdf
Paper URL : https://www.ijtsrd.com/computer-science/computer-network/37924/cipherkey-algorithm/sweety-gone
Sunday, 15 November 2020
Ecosystem of Virtualization Technologies
Virtualization technology, which forms the infrastructure of data centers and cloud technology, is constantly evolving. The process that started with machine virtualization has turned into taking applications into containers and virtualizing applications. Virtualization aims at efficient use of hardware by sharing resources. Today, hypervisor and container based virtualization approach are widely used. Powerful servers that are physically operated thanks to hypervisor platforms are operated by installing different operating systems according to the need. When virtual machines use all the resources of the operating system on which they run, the container is shared only with the kernel of the operating system on which it is located. Thus, it offers faster and more services using fewer system resources. Container technology is widely used to operate data centers with minimum energy consumption and maximum business capacity with an environmentally friendly approach that is becoming widespread today. The ecosystem of virtualization and container technologies that constitute the infrastructure of cloud computing is presented in our study.
by Atilla Erguzen | Ahmet Ozcan | Erdal Erdal "Ecosystem of Virtualization Technologies"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020,
Wednesday, 11 November 2020
Survey Paper on SDN and its Security Flaws
The Internet has prompted the production of an advanced society, where everything is associated and is open from anyplace. The conventional IP networks are brimming with intricacy and extremely difficult to oversee. It is both hard to design the organization as indicated by predefined strategies, and to reconfigure it to react to stack, blames and changes. To make things more troublesome current organizations are likewise vertically incorporated the control and information planes are packaged together. Programming characterized organizing is an arising worldview that vows to change this situation, by breaking vertical coordination, isolating the organizations control rationale from the switches a lot, advancing centralization of the organization control, and presenting programmability of the organization. The worries, presented between the meaning of organization approaches, their execution in exchanging equipment, and the sending of traffic, is vital to the adaptability by breaking the organization control issue into manageable pieces, SDN makes it simpler to make and present new deliberations in systems administration, streamlining network the board and empowering network advancement. In this paper, we present an overview on SDN and its security imperfections.
by Nirsen Amal. A | Mr. Kuldeep Baban Vayadande "Survey Paper on SDN and its Security Flaws"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020,
Friday, 30 October 2020
Review Paper on Predicting Network Attack Patterns in SDN using ML
by Dr. C. Umarani | Gopalshree Kushwaha "Review Paper on Predicting Network Attack Patterns in SDN using ML"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd35732.pdf
callforpapercommerce, ugcapprovedjournalsincommerce, commercejournal
Thursday, 29 October 2020
Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption
by Nandini HC | Feon Jaison "Cloud Control Evidence Access Authority and Secrecy with Completely Secretive Element Based Encryption"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd35715.pdf
callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics
Wednesday, 28 October 2020
Double Server Public Key Encryption with Keyword Search for Secure Cloud Storage
by A. Brahma Reddy | K. V. Ranga Rao | V. Vinay Kumar "Double Server Public-Key Encryption with Keyword Search for Secure Cloud Storage"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd35726.pdf
internationaljournalofmanagement, callforpapermanagement, managementjournal
Tuesday, 27 October 2020
Fraud and Malware Detection in Google Play by using Search Rank
by A. Brahma Reddy | K. V. Ranga Rao | V. Vinay Kumar "Fraud and Malware Detection in Google Play by using Search Rank"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020,
URL: https://www.ijtsrd.com/papers/ijtsrd35728.pdf
internationaljournalofscience, openaccessjournalofscience, ugcapprovedjournalsforscience