Thursday, 23 September 2021
Correlation between Terms of 5G Networks, IoT and D2D Communication
Wednesday, 7 July 2021
Optical Network without Fiber Optical Cable for Communication
Fiber optic cable is in extensive use in present era for communication. But still there is need for up gradation of fiber optic communication network. Can we go for wireless without fiber optic cable optical network for communication by using waves length of visible spectrum or other waves
by Darnesh "Optical Network without Fiber Optical Cable for Communication" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021,
URL: https://www.ijtsrd.com/papers/ijtsrd45215.pdf
Friday, 18 June 2021
Healthcare Sensors Issues, Challenges and Security Threats in Wireless Body Area Network A Comprehensive Survey
In recent events of the pandemic situation there is a heavy surge in the demand for health care applications for monitoring the vitals of the patients through real time monitoring of the human body. The major concerns which we face in Wireless Body Area Network WBAN sensors are security, data privacy, data integrity, confidentiality and dependability. Moreover it has issues such as standardization, energy efficiency, and quality of service. We are more concerned about the security of the data. The main purpose of WBAN sensors is to monitor the patients continuously without any assistance. The sensors are meant to be worn by the patients and the data has to be sent to the Healthcare applications which hold the backend system through a secured network. In this paper we are discussing the various security mechanisms and routing challenges which we are facing and the attacks which could occur over the network and also the summary of certain mechanisms which are present to overcome them. We have analysed the security for the different attack scenarios. This survey is to summarize the major difficulties which we face while designing a network in WBANs which is an emerging field of science in this pandemic situation.
by M Ragul Vignesh | S Sivakumar "Healthcare Sensors Issues, Challenges & Security Threats in Wireless Body Area Network: A Comprehensive Survey"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
URL: https://www.ijtsrd.compapers/ijtsrd42454.pdf
callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics
Assessment of Neural Network and Goal Programming on Cross Cultural Management
For achieving success in a global arena cross cultural training should be provided to employees to settle down between the global business environment and culture as one of the factors contributing to economic success, revenue generation, surplus booking, goodwill enhancement, market fame and many more. More the revenue, more the profit booking leads to rise company’s goodwill and builds customers faith as well as provides employee satisfaction which motivates employees to be more productive, more efficient, more energetic, more enthusiastic, and never let employees to get stressed from their work.AI ANN and goal programming is being used a method to find something fruitful to mitigate cross cultural issues in an organization.
by Shefali G | Dr. Rajesh Singh "Assessment of Neural Network and Goal Programming on Cross Cultural Management"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
Monday, 14 June 2021
Study on Secure Cryptographic Techniques in Cloud
Cloud Computing is turning into an increasing number of popular day by day. If the safety parameters are taken care properly many organizations and authorities corporations will flow into cloud technology.one usage of cloud computing is statistics storage. Cloud affords considerable capability of garage for cloud users. It is more reliable and flexible to users to shop and retrieve their facts at whenever and everywhere. It is an increasingly more growing technology. Nowadays, many organizations have started using cloud garage because of its blessings. Even though the cloud keeps to advantage reputation in usability and attraction, the problems lie in statistics protection, statistics and different information safety issues. Security and privacy of information saved inside the cloud are major setbacks inside the area of Cloud Computing. Security and privateness are the important thing problems for cloud garage.Cloud computing is primarily based on the precept of virtualization, which means that there may be a single big system and multiple clients are sharing this gadget with a view that theyve their personal dedicated resources. It basically has 3 stage of services. First, Infrastructure as a carrier IaaS , on this method the hardware resources together with difficult disk, memory, networking assets etc. are furnished on rent and are charged as in line with the usage. Second, Platform as a provider PaaS , which now not simplest presents all the facilities as in IaaS but additionally presents running machine facilities, their updates, etc. for this reason make the overall work pretty clean.Cloud storage structures have become the primary garage space for cloud customers’ facts. Despite the big blessings and versatility of the cloud garage offerings, many demanding situations are hindering the migration of customers’ records into the cloud. Among them, the records privacy wishes to be considered.Cloud computing provider is valuable in diverse phase of human activities and it has been a future information generation layout for corporations, education sectors and other industrial sectors. Cloud garage services allows clients to place away information and experience the excessive quality on call for cloud programs without the stress of regular control of their personal software, hardware and data. It moves records maintained by cloud service company on the cloud storage servers which save you an excessive amount of burden on customers which include control of the bodily fact’s ownership. Although the welfares of cloud offerings are extra, however there are new threats related to facts safety because of bodily possession of outsourced facts. Users are setting away their touchy facts and for the reason that they havent any greater control over the offerings or their stored facts, there may be need to put into effect sturdy safety techniques so one can prevent unauthorized get admission to the machine functionalities and customers statistics. To deal with data safety threats at the same time as in cloud storage, sturdy authentication scheme and information encryption scheme became introduce in this paper the usage of Advanced Encryption Standard AES set of rules for the encryption of customers’ facts contents before setting into storage and Authentication scheme for legitimate person verification and safety of unauthorized get entry to all devices of system functionalities.Data integrity in the garage model of cloud computing is a massive safety subject. This could be due to the Multiple places wherein the facts are probably dwelling. After that privateness safety and security of this spread out facts may be at any stake. The facts at such multiple locations want to be relaxed in the cloud garage. What needs to be centered here is how a more relaxed version may be furnished to the cloud structure.
by Mariam Fatima | M Ganeshan | Saif Ulla Shariff "Study on Secure Cryptographic Techniques in Cloud"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
URL: https://www.ijtsrd.compapers/ijtsrd42363.pdf
internationaljournalsofcomputerscience, callforpapercomputerscience, ugcapprovedjournalsforcomputerscience
Friday, 4 June 2021
Neural Network and Applications An Overview
Models of the brain and nervous system for Highly parallel to the Process information much more like the brain than a serial computer like Learning and simple principles with complex behaviour as well Applications are powerful problem solvers and also used in biological models.
by Dr. Mukesh Kumar Lalji | Dr. Ashish Dongre | Rajeev Gupta | Dr. Deepak Paliwal | O. P. Shrivastava | N. K. Jain | Mukesh Katariya | Manoj Sonkusre | Gaurav Lalji | Divya Lalji | Arvind Jain | AR. Sandhya Ekbote "Neural Network & Applications- An Overview"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021,
URL: https://www.ijtsrd.compapers/ijtsrd41171.pdf
callforpaperlifesciences, lifesciencesjournal, researchpapers
Wednesday, 14 April 2021
Internet of Things IoT Anytime Anywhere Anything Connectivity
This paper presents the key challenges in the domain of IoT. The key challenges associated with the development of IoT, industry as well as government, Industrial IoT systems, the related security and privacy challenges has been reviewed and presented. Vulnerability of Internet of Things systems have been improved with the advent of new computational systems for IoT. However, the current design of IoT does not effectively address the higher security requirements posed by those vulnerabilities. Many recent attacks on IoT systems have shown that novel security solutions are needed to protect this emerging system.
by Nidhi Chadha | Ramandeep Kaur "Internet of Things (IoT): Anytime-Anywhere-Anything Connectivity"
Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021,
URL: https://www.ijtsrd.com/papers/ijtsrd40008.pdf
callforpaperpharmacy, pharmacyjournal, internationalpeerreviewedjournal