Skip to main content

You're using an out-of-date version of Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.

Weather is the most critical for human in many aspects of life. The study and knowledge of how weather Temperature evolves over time in some location or country in the world can be beneficial for several purposes. Processing, Collecting... more
The cloud computing is the decentralized network is much vulnerable to certain security attacks. The various security techniques are proposed by researchers to improve security of the network. The fully homomorphic and fully disk... more
What is a game engine anyway? A game engine is analogous to a car engine: the game engine is what drives the game. You will tell the engine what you want, and (using C++ code and the UE4 editor) the engine will be responsible for... more
A wireless network consists of a set of wireless nodes forming the network. The bandwidth allocation scheme used in wireless networks should automatically adapt to the network's environments, where issues such as mobility are highly... more
Fire alarms and building security systems are currently separate systems and are liable to monthly fees. Video recording for closed-circuit television (CCTV) is done locally subsequently requiring high storage space. Whenever there is a... more
WiFi offloading is becoming one of the key enablers to help the network operators dealing with the exponentially growing demand of mobile data. The idea of using WiFi to offload data traffic from cellular network has proposed for many... more
Face mining is characterized as the revelation of picture designs in a given gathering of pictures. It is an exertion that generally attracts upon information PC vision, picture handling, information mining, AI, database, and man-made... more
A data features selection and organization scheme is presented for future event predictions using historical event data. Most of the reported event prediction methods use data features in the form of time series. The proposed approach... more
Security is one of the imperative issues in an advanced local condition. The current center around formative and research issues of Wireless Sensor Network (WSN) based Smart Home. WSN based shrewd home detection system gives a safe and... more
The basic format of an internship report.
Hope It might give you some idea about writing an internship report.
It is our great pleasure to present the May 2019 issue (Volume 17 Number 5) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in... more
It is our great pleasure to present the May 2019 issue (Volume 17 Number 5) of the International Journal of Computer Science and Information Security (IJCSIS). High quality research, survey & review articles are proposed from experts in... more
• Distributed algorithms of mobile computing • OS and middleware support for mobile computing and networking • Routing, and communication primitives in ad-hoc and sensor networks • Synchronization and scheduling issues in mobile and ad... more
The application of the Internet of Things (IoT) in agriculture captures an enormous amount of data for decision making. However, hardest-to-detect abnormal data points that are transmitted can be harmful if not detected at an earlier... more
nous allons créer le serveur en utilisant une carte de développement appelée Raspberry, qui fonctionne comme un micro-ordinateur. Et nous le programmerons pour s’adapter à n’importe quel réseau, ADSL ou réseau mobile. Nous aborderons... more
In Network Security and Cryptography, hash functions play a very important role. To check the Integrity, Authenticity of information or data transmitting between the Seder and receiver party hash algorithms are used. Digital signature... more
This study is carried out to evaluate the effect of computer virus infection of files and productivity of business enterprises. Chi-square test, tables, graphs, percentage and other simple statistical tools were used in the analysis of... more
Vehicular ad-hoc networks (VANETs) technology has been emerged as a critical research area. Being ad-hoc in nature, VANET is a type of networks that is created from the concept of establishing a network of cars for a specific need or... more
ABSTRACT HTTP is a successful Internet technology on top of which a lot of the web resides. However, limitations with its current specification have encouraged some to look for the next generation of HTTP. In SPDY, Google has come up with... more