networking


Secure Remote User Authenticated Key

Secure Remote User Authenticated Key Establishment Protocol for Smart Home Environment Abstract—The Information and Communication Technology (ICT) has been used in wide range of applications, such as smart living, smart health and smart transportation. Among all these applications, smart home is most popular, in which the users/residents can control the […]


Web Data Extraction of Dynamic Content

Towards Data Extraction of Dynamic Content from JavaScript Web Applications Abstract—: An enormous data in World Wide Web and social media has open opportunities for business and organization to get the significant value that leads to efficient operations. As a result, Web Data Extraction has become an important tool for […]


Indexing Evolving Events from Tweet Streams

Indexing Evolving Events from Tweet Streams Abstract—:Tweet streams provide a variety of real-time information on dynamic social events. Although event detection has been actively studied, most of the existing approaches do not address the issue of efficient event monitoring in the presence of a large number of events detected from […]

Indexing Evolving Events from Tweet Streams

Android-based application

Android-based application for first responders monitoring Abstract— The Vital Responded project aims at exploring the synergies between wearable technologies, scattered sensor network, intelligent building technology and precise localization services to provide secure, reliable and effective first-response systems in emergency scenarios. One of the components required in this technological setting is […]


Traffic Detection with vehicular ad-hoc network

Traffic Congestion Detection using Data Mining in VANET Abstract – Traffic Congestion Detection One of the most interesting areas of research is the analysis of road traffic. This includes vehicle path tracking, path prediction, intelligent vehicles, congestion detection and many more. Most of the research that has been done to […]

Traffic Congection detection with VNET

IoT Architecture for an Operating Room Environment

NFV Enabled IoT Architecture for an Operating Room Environment The Internet of Things (IoTs) refers to the interconnection of billions of smart devices. The steadily increasing number of IoT devices with heterogeneous characteristics requires that future networks evolve to provide a new architecture to cope with the expected increase in […]


Device-to-Device Networking

Device-to-Device Networking Meets Cellular via Network Coding The increasing popularity of diverse applications in today’s mobile devices introduces higher demand for throughput, and puts a strain on network resources especially on cellular links. In fact, cellular traffic is growing exponentially, and it is expected to remain so for the foreseeable […]


Fault Cascade in the Network Virtualization Environment

A Backup Algorithm for Power Communication Network Based on Fault Cascade in the Network Virtualization Environment. Network modeling and topological characteristics of a three-tier power grid in NV. We use the degree sorting algorithm as the control group which is widely used in power grid.Server unreasonable phenomena were reported in […]


ME project in .net for secure data retrieval for decentralized disruption tolerant military network

ME project in .net for secure data retrieval   Email:  I am doing ME project in .net for secure data retrieval for decentralized disruption tolerant military network .firstly i want research component or enhancement or new idea that are not publish right nowPlease contact me on below given contact number and email.Disclaimer:  This […]