Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes
This system proposes a centralized system for replica identification. The network is divided into segments and an inspection node is chosen for each segment. Inspection node identifies a clone node by checking the nodes ID and cryptographic key. In this process, Chord algorithm is used to detect the clone node, every node is assigned with […]
A Review on the Impact of Artificial Intelligence and Internet of Things in the Transformation of E Business Sector
This study investigates the affect of Artificial Intelligence AI and Internet of Things IoT in the transformation of E Business Segment. AI and IoT are starting to shape the longer term of many industries universally by creating an unprecedented amount of information. The objective of this study isnt to reproduce tests, but to explore and […]
Cloud Computing Architecture, Services, Deployment Models, Storage, Benefits and Challenges
Cloud computing is known to all as one of the most popular technology in IT industries. Even non IT people are becoming habituated to use many applications of cloud computing day by day as well. New techniques of cloud computing are used to align information technology and business targets. So many opportunities are creating daily […]
Understanding the Need of Data Integration in E Healthcare
This paper discusses the current scenario of e healthcare and different dimensions of Big data in healthcare and the importance of data integration in e health care and the challenges associated with data integration and associated uses of data integration with respect to different use cases which might be helpful to physician’s decision making because […]
Auto Response System for Legal Consultation
The Auto response system for legal consultation will provide the knowledge of cyber laws. The objective is to implement the legal consultant system service by using chat bot Technology. It was implemented based on the information of the offence, previous records of cyber crimes and under sections of INDIAN IT ACT 2008 and their penalty […]