Computer Networks
308,271 Followers
Weather is the most critical for human in many aspects of life. The study and knowledge of how weather Temperature evolves over time in some location or country in the world can be beneficial for several purposes. Processing, Collecting... more
The cloud computing is the decentralized network is much vulnerable to certain security attacks. The various security techniques are proposed by researchers to improve security of the network. The fully homomorphic and fully disk... more
What is a game engine anyway? A game engine is analogous to a car engine: the game engine is what drives the game. You will tell the engine what you want, and (using C++ code and the UE4 editor) the engine will be responsible for... more
A wireless network consists of a set of wireless nodes forming the network. The bandwidth allocation scheme used in wireless networks should automatically adapt to the network's environments, where issues such as mobility are highly... more
Fire alarms and building security systems are currently separate systems and are liable to monthly fees. Video recording for closed-circuit television (CCTV) is done locally subsequently requiring high storage space. Whenever there is a... more
WiFi offloading is becoming one of the key enablers to help the network operators dealing with the exponentially growing demand of mobile data. The idea of using WiFi to offload data traffic from cellular network has proposed for many... more
A data features selection and organization scheme is presented for future event predictions using historical event data. Most of the reported event prediction methods use data features in the form of time series. The proposed approach... more
Security is one of the imperative issues in an advanced local condition. The current center around formative and research issues of Wireless Sensor Network (WSN) based Smart Home. WSN based shrewd home detection system gives a safe and... more
The basic format of an internship report.
Hope It might give you some idea about writing an internship report.
Hope It might give you some idea about writing an internship report.
It is our great pleasure to present the May 2019 issue (Volume 17 Number 5) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in... more
It is our great pleasure to present the May 2019 issue (Volume 17 Number 5) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in... more
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
nous allons créer le serveur en utilisant une carte de développement appelée Raspberry, qui fonctionne comme un micro-ordinateur. Et nous le programmerons pour s’adapter à n’importe quel réseau, ADSL ou réseau mobile. Nous aborderons... more
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature... more
ABSTRACT HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with... more