Tuesday, June 2, 2020

Global Journal of Computer Networks and Applications

Worldwide Journal of Computer Networks and Applications (IJCNA) is an insightful open access online global diary, which plans to distribute peer-assessed unique research papers in the field of Computer Networks and its applications. IJCNA expects to bring the new application advancements among the scientists and academician and IJCNA establishes the framework of sharing exploration information among the specialists. All the submitted papers are peer-checked on by the specialists in the significant field of Computer Networks and acknowledged papers are distributed online following getting the last form of the original copy in the up and coming ongoing issue.

Recurrence: IJCNA Publishes one volume with 6 issues for every year. (February, April, June, August, October, December)

Accommodation Deadline: There is no cutoff time for paper accommodation. Original copies can be submitted consistently.

DOI Prefix: 10.22247Google Scholar Citations of IJCNA

Note: Uses of computer in business

*IJCNA has no tie-up with an organization(s).

*IJCNA doesn't distribute meeting papers as customary or extraordinary issue.

*Acceptance got from "editor@ijcna.org" is just legitimate.

Most Viewed Most Recent Most Download

MNP: Malicious Node Prevention in Vehicular Ad hoc Networks

Huge Data Analysis for M2M Networks: Research Challenges and Open Research Issues

A Novel Hybrid Approach for Detection of Web-Based Attacks in Intrusion Detection Systems

Use of Modified ACO Meta heuristic in Spray and Wait Routing

Assessment of the Effects of Measurement Interval on Artificial Neural Network-Based Prediction for Wireless Water Quality Monitoring Network

Portability Management Scheme Based on Smart Buffering for Vehicular Networks

A Survey on the Internet of Things Solutions for the Elderly and Disabled: Applications, Prospects, and Challenges

An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques

Examination of VBF convention in Underwater Sensor Network for Static and Moving Nodes

Improvement over AODV Considering QoS Support in Mobile Ad-hoc Networks

Assessment of TCP Congestion Control Modus Operandi in Mesh Networks

Investigating IOT Application Using Raspberry Pi

Availability Based Positioning System for Underground Vehicular Ad Hoc Networks

Plan and Security Simulation of Wi-Fi Networks

A Study of Machine Learning in Wireless Sensor Network

Execution Comparison among LTE and WiMAX Based on Link Level Simulation

Structure and Simulation of Wireless Sensor Network Topologies Using the ZigBee Standard

A Survey on Potential Applications of Honeypot Technology in Intrusion Detection Systems

Structure and Implementation of a Smart Home for the Elderly and Disabled

Mama LEACH: Energy Efficient Routing Protocol for WSNs utilizing Particle Swarm Optimization and Mobile Aggregator

Use of Machine Learning for Intrusion Detection in a Network

A Survey of Various Security Issues in Online Social Networks

Improved Route Discovery Mechanism of Ad-Hoc On Demand Distance Vector for MANET

The Influence of Smart Phones on Human Health and Behavior: Jordanians' Perceptions

Machine-to-Machine Communications for Smart Homes

Vitality Efficiency Optimization in Wireless Sensor Network Using Proposed Load Balancing Approach

A Delay and Spectrum Aware Fuzzy Logic Based Routing Protocol for CRN

Self-Correcting Localization Scheme for Vehicle to Vehicle Communication

Plan of a Monitor for Detecting Money Laundering and Terrorist Financing

Improved Signcryption Algorithm for Information Security in Networks

A Novel Approach for Data Privacy Using Attribute Based Scheme Algorithm for Cloud Computing

A Probabilistic Key Management Protocol dependent on Kryptograph for WSN

Obstruction Aware Cooperative Routing Algorithm for Wireless Ad Hoc Networks over Nakagami Fading and Lognormal Shadowing

A Study on 5G Evolution and Revolution

Open Key Cryptography Techniques Evaluation

Throughput and Delay Analysis of AODV, DSDV and DSR Routing Protocols in Mobile Ad Hoc Networks

A Fine-Grained Spatial Cloaking With Query Probability Levels for Privacy in LBS

Organized and Secured Data Dissemination Technique in VANET Based on Optimal Blowfish Algorithm and Signcryption Method

The Provision of Information Technology Security Considerations by Legal Prescripts: South African Case

Remote Sensor Network-Based Health Monitoring System for the Elderly and Disabled

Productive Collaborative Technique utilizing Intrusion Detection System for Preserving Privacy in Location-based Services

A Study on Topology based Vehicular Ad hoc Network Routing Protocols

Upgraded Firewall with Traffic Awareness

Dynamic Node Recovery in MANET for High Recovery Probability

Security and Fraud Issues of E-banking

Programmed Feedback Framework for Deriving Educational Ontologies

Impact of Quarantine and Vaccination on Infectious Nodes in Computer Network

Security Concerns at Various Levels of Cloud Computing Paradigm: A Review

Time Based Fault Detection and Isolation In Wireless Sensors Network

A Novel Routing Scheme to Avoid Link Error and Packet Dropping in Wireless Sensor Networks

A Robust Hybrid Steganography Mechanism for Security in Data Communication Networks

Clone Attack Detection Using Pair Access Witness Selection Technique

Errand planning for Cloud Using Hybrid Cuckoo Algorithm

Dynamic Transition of Bandwidth and Power Saving Mechanism to Support Multimedia Streaming Using H.264/SVC over the Wireless Networks

A Novel Efficient Rebroadcast Protocol for Minimizing Routing Overhead in Mobile Ad-Hoc Networks

Versatile Routing Protocol dependent on Cuckoo Search calculation (ARP-CS) for made sure about Vehicular Ad hoc arrange (VANET)

Structure and Develop an Approach for Integrating Compression and Encryption on Textual Data

Digests Evaluation for Quality Assurance in Scientific Journal

IP Address Lookup in an IP Router Based On a Reorganized Binary Prefixes Value Tree (RBPVT)

Article Offer Supportive Review to Fresh Authors

Disclosure of Multi-Objective Overlapping Communities inside Social Networks utilizing a Socially Inspired Metaheuristic Algorithm

A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

Structure and Implementation for SIP-based Push-to-Talk Services over 802.11 Networks

Dispersed File Systems Implementation on an Edge Router utilizing GlusterFS for Cloud Applications

Blockage Aware Packet Routing For Delay Sensitive Cloud Communications

Execution Evaluation of IPv4 and IPv6 Routing Protocols on Wired, Wireless and Hybrid Networks

A Novel Application based Generic Cluster Creation Mechanism in Ad Hoc Networks

Moderation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization

Vitality Efficient Routing (EER) For Reducing Congestion and Time Delay in Wireless Sensor Network

Usage of a Novel Protocol for Coordination of Nodes in Manet

Covering Community Detection in Social Networks Using Parliamentary Optimization Algorithm

A Novel Design of Instant Messaging Service Extended from Short Message Service with XMPP

TabSecure: An Anti-Phishing Solution with Protection against Tabnabbing

Similar Study of Adaptive Filter Algorithm of a QO-STBC Encoded MIMO CDMA System

A Framework for Effective Big information Analytics for Decision Support Systems

Security Enhancement in Shoulder Surfing Attacks utilizing Passpoints for Random Similar Images (PRSIm)

ZBLE: Zone Based Leader Election Energy Constrained AOMDV Routing Protocol

Virtualization and IoT Resource Management: A Survey

A Diffie-Hellman and Two Step Verification based Secure Cloud Computing Paradigm

Halfway Topology-Aware Data Distribution inside Large Unmanned Surface Vehicle Teams

Secure and Fast Handovers Authentication Methods for Wi-Fi Based Networks: A Review point of view

Literary Data Hiding in Digital Images Using Chaotic Maps

Framework and Cloud Computing Security: A Comparative Survey

Assessment of Optimum NPRACH Performance in NB-IoT Systems

QoS and Fuzzy Logic Based Routing Protocol for CRN

Versatile Power Transmission and Efficient Energy Scheme of DSR Protocol (APEE-DSR)

EDA-AODV: Energy and Distance Aware "AODV" Routing Protocol

Reevaluating Audience Clustering in Sports Market utilizing Gossip Protocol

Path Id based Selective Emergency Message Forwarding Scheme for VANET

Execution Analysis of Wireless Sensor Network Localization Algorithms

Remote Sensor Network Surveillance on Forest Illegal Mining utilizing 'Arranged Behavior Abortion Tower': Analytical Modeling

Execution Evaluation of SHA-3(KECCAK) on ARM Cortex-A9 and Comparison with ARM 7TDMI and Cortex-M4

An Analysis of Processing Multimedia Data in Mobile Ad Hoc Networks

Centroid Based Localization Utilizing Artificial Bee Colony Algorithm

Two-Level Grid Access Control Model Based on Resource Performance and Request Priority

A Survey on Edge-Based Internet-of-Things

Powerlessness Exploitations Using Steganography in PDF Files

A Review of Static Malware Detection for Android Apps Permission Based on Deep Learning

EEMCCP - A Novel Architecture Protocol Design for Efficient Data Transmission in Underwater Acoustic Wireless Sensor Network

An Empirical Review on Blockchain Smart Contracts: Application and Challenges in Implementation

Point and Scope:Vehicular Ad Hoc Network, Privacy in Vehicular Ad Hoc Network, Security in Vehicular Ad Hoc Network, Mobile Ad Hoc Network, Privacy in Mobile Ad Hoc Network, Security in Mobile Ad Hoc Network, Future Generation Networks and its Applications, Wireless Sensor Network, Security in Wireless Sensor Network, Social Networks, Privacy in Social Networks, Security in Social Networks, Web Services, Web Service Architecture, Web Protocol, Privacy in Web Communication, Security in Web Services, Human-Web Interaction, Network Protocol, Security in Network Protocol, Intrusion Detection and Prevention, Worm Propagation and Detection, Malware, Authenticatio

No comments:

Post a Comment