scholarly journals Network Based Adaptation of Block Chain Technology

Online transactions are growing up day by day due to globalization factors. Threat victims rate also increasing due to lack of privacy protection and identity theft. The number of technologies have been using for maintaining the communication data like Torrent Technology, Databases, etc. Even though threat agents seeking new trends to attack the data. So a technology is required to do a secure transaction in the enterprise society. Recent technology, which can be played a vital role in data security, is Block chain. Once created a block lack of alter function in the block chain will helps to reduce the information attacks/forgery. This paper addresses block chain technology concepts with internal architecture and its applications along with the data communication over a network with block chain objective. The main strength of this work is simulation results with and it’s analysis.

Author(s):  
Er. Vishal Chauhan ◽  
Dr. Chandresh Parekh ◽  
Prof. Vivek Joshi

Authentication, Authorization, security and confidential information are number of foremost topics part in the Digital cyber - security Area. There are multiple solutions available in this virtualize cyber world that are presented to user’s strength as per digital security. Username and password base are common factor authentication methods. The growing-up popularity with compliance of second factorized methods those driven by the improvement of privacy and security as per the requirement during this digitalization of technological trend. The recognition and success of digital security various measures are big deal to obsessed with simple convenience. Its need more and more implementation for the user privacy, data confidentiality and network security’s system. mainly focus on this research Article into dealing with and analysing the implications of security part of 3FA proposal model for additional security in way of systematic manner to improvements of digital security in web-based Application. This paper will be presenting as web-based Application. so, we can create potentially ensure systems are authorized with authentication of user's assurance without loss of convenience between user-system data communication in network.


Author(s):  
Jasmeet Bedi

We are living in the world of 21st century which is known as the world of ‘Mental Stress’ in these circumstances, knowledge amplifies day by day. There is a knowledge explosion in the world, hence each and every person tries to get this knowledge by new andmost recent mediasand they also use it. In this direction there is a qualitative growing up in the person for in receipt of knowledge and its use by appreciative. In the same way, we notice the qualitative addition in the educational organization, teachers and students, which are going to get knowledge. In these circumstances teachers and students feel a perplexity. Learner or student of today is not only physically unhealthy but also mentally or emotionally. So it becomes duty or responsibility of a teacher to incorporate such practices in his classroom so that stress, tension, anxiety, frustration etc. of their students reduces which ultimately affect upon their academic as well as socio-psychological performance. The present paper throws light on benefits of yoga into classroom, studies conducted on the same, challenges before a teacher.


Author(s):  
Yan Cai ◽  
Liang Ran ◽  
Jun Zhang ◽  
Hongbo Zhu

AbstractEdge offloading, including offloading to edge base stations (BS) via cellular links and to idle mobile users (MUs) via device-to-device (D2D) links, has played a vital role in achieving ultra-low latency characteristics in 5G wireless networks. This paper studies an offloading method of parallel communication and computation to minimize the delay in multi-user systems. Three different scenarios are explored, i.e., full offloading, partial offloading, and D2D-enabled partial offloading. In the full offloading scenario, we find a serving order for the MUs. Then, we jointly optimize the serving order and task segment in the partial offloading scenario. For the D2D-enabled partial offloading scenario, we decompose the problem into two subproblems and then find the sub-optimal solution based on the results of the two subproblems. Finally, the simulation results demonstrate that the offloading method of parallel communication and computing can significantly reduce the system delay, and the D2D-enabled partial offloading can further reduce the latency.


2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


Agent technology has developed into a sturdy instrument for e-commerce approach in recent years. The use of agent technology in e-commerce systems may address traditional e-commerce weaknesses, respond to the intelligence and individual needs of users, and significantly improve the efficiency of online transactions. There are some weaknesses in the system designed in this paper. The system will be less efficient in order to complete decentralization of the system. Every decentralized node needs to redundantly preserve a huge volume of information that not only takes up a lot of storage space however, it also makes cross-requesting and detail verification ineffective. This writing presents the evaluation of integrity of the e-commerce systems using block-chain and large amounts of data analysis. The fast growth of the Internet, in particular in the well-developed field of e-commerce, has advanced to digital marketing. In order to understand the common code generating conventional file to identify the associated event configuration, we will analyze Improved Practical Byzantine IPBF source code algorithms. The simulation shows the efficiency of the model.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Ali Farki ◽  
Zahra Salekshahrezaee ◽  
Arash Mohammadi Tofigh ◽  
Reza Ghanavati ◽  
Behdad Arandian ◽  
...  

The COVID-19 epidemic is spreading day by day. Early diagnosis of this disease is essential to provide effective preventive and therapeutic measures. This process can be used by a computer-aided methodology to improve accuracy. In this study, a new and optimal method has been utilized for the diagnosis of COVID-19. Here, a method based on fuzzy C -ordered means (FCOM) along with an improved version of the enhanced capsule network (ECN) has been proposed for this purpose. The proposed ECN method is improved based on mayfly optimization (MFO) algorithm. The suggested technique is then implemented on the chest X-ray COVID-19 images from publicly available datasets. Simulation results are assessed by considering a comparison with some state-of-the-art methods, including FOMPA, MID, and 4S-DT. The results show that the proposed method with 97.08% accuracy and 97.29% precision provides the highest accuracy and reliability compared with the other studied methods. Moreover, the results show that the proposed method with a 97.1% sensitivity rate has the highest ratio. And finally, the proposed method with a 97.47% F 1 -score rate gives the uppermost value compared to the others.


2013 ◽  
Vol 756-759 ◽  
pp. 3183-3188
Author(s):  
Tao Lei ◽  
Deng Ping He ◽  
Fang Tang Chen

BLAST can achieve high speed data communication. Its signal detection directly affects performance of BLAST receiver. This paper introduced several signal detection algorithmsZF algorithm, MMSE algorithm, ZF-SIC algorithm and MMSE-SIC algorithm. The simulation results show that the traditional ZF algorithm has the worst performance, the traditional MMSE algorithm and the ZF-SIC algorithm is similar, but with the increase of the SNR, the performance of ZF-SIC algorithm is better than MMSE algorithm. MMSE-SIC algorithm has the best detection performance in these detection algorithms.


Author(s):  
Manju Lata Sahu ◽  
Mithilesh Atulkar ◽  
Mitul Kumar Ahirwal

The revolution in the Internet of Things (IoT) is redesigning and reshaping the healthcare system technologically, economically and socially. The emerging and rapidly growing IoT-based Smart Healthcare System (SHCS) is seen as a sustainable solution to reduce the burden on the existing healthcare system due to increasing diseases and limited medical infrastructure. IoT-based SHCS plays a vital role in delivery of healthcare services in rural and remote areas where the essential medical amenities, necessary infrastructures and qualified medical practitioners are not available. Therefore, in this paper, a comprehensive investigation of futuristic IoT-based SHCS and its constituents is presented. This paper provides exhaustive review on different techniques and technologies dealing with smart healthcare framework, physiological sensing, signal processing, data communication, cloud computing and data analytics used in IoT-based SHCS. A comparative analysis of existing literature has been carried out to identify the recent trends and advancements in this very dynamic field of global importance. In addition to this, it highlights different issues and challenges, along with the recommendation for further research in the field. The prime objective of this paper is to deliver the state-of-the-art understanding and update about IoT-based SHCS and its constituents by providing a good source of information to the researchers, service providers, technologists, medical practitioners and the general population.


2018 ◽  
pp. 236-257
Author(s):  
Shanmugapriya Loganathan

Risks in IT are described as a form of threat in context with data security, network transfer, system scheduled processes, critical applications, and business procedures. IT risk management is broadly defined as the process of managing IT risks, and must be executed on a regular basis. It is neither a product nor a purchase, but a policy of an organization implements to protect its business systems. Managing IT risk plays a vital role in administering any business in today's world. Irrespective of the business, deep knowledge of IT risk leads to increased data security, reduced business cost, and greater compliance. This chapter deals with methodologies to improve risk management in an IT organization, their impact, and some examples.


Sign in / Sign up

Export Citation Format

Share Document