Data Passing with High Security through Non Infected Nodes in Networks ijtsrd
Path based network diffusion kernel is its tenability, that it can consider different number of shortest paths in kernel computation. This resembles, vaguely, a Taylor expansion of network topology to form a diffusion kernel with different orders of expansion. One can extend this key idea to design other network diffusion kernels to approximate other general […]
Smart Protocol Loading for the IoT ijtsrd
The Internet of Things IoT infuses our everyday life, e.g., in the area of health monitoring, wearables, industry, and home automation. It comprises devices that provide only limited resources, operate in stimulating network conditions, and are often battery powered. To embed these devices into the Internet, they are intended to operate standard events. Yet, these […]
Application of Cloud Computing Models in Education ijtsrd
The cloud computing is a rapidly developing technology, which has brought significant changes and opportunities to various sectors in India. It is a pervasive computing paradigm that has revolutionized how Information Technology infrastructure and services can be delivered. There is a growing interest around the utilization of cloud computing in the education sector. Education plays […]
FPGA Based Wireless Jamming Networks ijtsrd
A mobile jammeris a device which is used to jam signals of cell phone from receiving signals from base stations. Mobile jammer is used majorly where the disturbances that are occurred with the cell phones. So, in this paper we are designing a new Mobile Jammer unit which is capable of blocking the cell phone […]
Ethical Hacking ijtsrd
Today’s security is that the main downside and every one the work is finished over the net mistreatment knowledge. whereas the information is out there, there square measure many varieties of users who act with knowledge and a few of them for his or her would like it all for his or her gaining data. […]