Abstract: Software-Defined Networking (SDN) is the next generation network architecture with exciting application prospects. The control function in SDN is decoupled from the data forwarding plane, hence it provides a new centralized architecture with flexible network resource management. Although SDN is attracting much attention from both industry and research, its advantage over the traditional networks has not been fully utilized. Multicast is designed to deliver content to multiple desti...
Abstract: The post-selection technique was proposed by Christandl, König, and Renner [Phys. Rev. Lett. 102, 020504 (2009)] to simplify the security of quantum-key-distribution schemes. This work applies this technique to derive the security bounds for the six-state Scarani-Acin-Rigbordy-Gisin 2004 quantum key distribution protocol. This protocol can extract secure keys from a source emitting multi-photons due to its robustness from photon number splitting attacks, making it a good candidate...
Abstract: In the current technology driven era, the use of devices that connect to the internet has increased significantly. Consequently, there has been a significant increase in internet traffic. Some of the challenges that arise from the increased traffic include, but are not limited to, multiple clients on a single server (which can result in denial of service (DoS)), difficulty in network scalability, and poor service availability. One of the solutions proposed in literature, to mitigat...
Abstract: Data mining (also called knowledge discovery in databases) represents the process of extracting interesting and previously unknown knowledge (patterns) from data. By applying artificial intelligence together with analytical methods data can be extracted. An association rule expresses the dependence of a set of attribute-value pairs, called items, upon another set of items (item set). . The association rule mining algorithms can be classified into two main groups: the level-wise alg...
In an era marked by technological advancements and a growing demand for secure and transparent electoral processes, the integration of blockchain technology into online voting systems has emerged as a promising solution. This research paper presents a comprehensive exploration of the design, implementation, and implications of an online voting system built upon blockchain technology. Through an in-depth analysis of existing electronic voting challenges and the potential of blockchain, this pa...
ABSTRACT DevOps is the collection of cultural practices, philosophies, mechanisms, and technology that assists in increasing the ability of an organization to distribute services and applications at a faster pace. Unlike the traditional software development and infrastructure management processes (also known as the Waterfall Model), DevOps is inspired from the Agile Project Management, meaning that the entire project is broken down into several phases, aiming for continuous improvement at eve...
In this research paper we are introducing how virtual experiments work in metaverse one of the topic is as above : Smart Factory Using Virtual Reality and Online Multi-User: Towards a Metaverse for Experimental Frameworks Virtual reality (VR) has been brought closer to the general public over the past decade as it has become increasingly available for desktop and mobile p...
Adaptive learning for individual learners has recently become popular in education. This study examines Adaptive E-learning system. Meanwhile, the purpose of this study is to examine if Adaptive E-learning system caters for the needs of students to personalize learning contents or materials tailored to the individual student. To achieve this, the descriptive research method was used. This study used an Adaptive E-learning System that is Google Classroom platform for learning Microsoft Excel. ...
Most commercial database systems do (or should) exploit many sorting techniques that are publicly known, but not readily available in the research literature. These techniques improve both sort performance on mod- ern computer systems and the ability to adapt gracefully to resource fluctuations in multiuser operations. This survey collects many of these techniques for easy reference by students, researchers, and product de- velopers. It covers in-memory sorting, disk-based external sorting, a...
This model will change the entire offline examination system as we developing a fully automated system using NLP.
Abstract “Unless and until our society recognizes cyber bullying for what it is, the suffering of thousands of silent victims will continue.” ~ Anna Maria Chavez. There had been series of research on cyber bullying which are unable to provide reliable solution to cyber bullying. In this research work, we were able to provide a permanent solution to this by developing a model capable of detecting and intercepting bullying incoming and outgoing messages with 92% accuracy. We also developed ...
Abstract Ever since the era of internet had ushered in cloud computing, there had been increase in the demand for the unlimited data available through cloud computing for data analysis, pattern recognition and technology advancement. With this also bring the problem of scalability, efficiency and security threat. This research paper focuses on how data can be dynamically mine in real time for pattern detection in a secure cloud computing environment using combination of decision tree algorith...
ABSTRACT Digital Technologies which include Cloud Computing and Mobile Applications have emerged as catalystsforrapideconomicgrowthandcitizenempowermentacrosstheglobe.Digitaltechnologies are being increasingly used by us in everyday lives from retail stores to government offices.Theyhelpustoconnectwitheachotherandalsotoshareinformationonissuesandconcerns faced by us. In some cases they also enable resolution of those issues in near real time. Digital Locker is one of the ambitious aspect...
Social networking sites engage millions of users around the world. The users' interactions with these social sites, such as Twitter and Facebook have a tremendous impact and occasionally undesirable repercussions for daily life. The prominent social networking sites have turned into a target platform for the spammers to disperse a huge amount of irrelevant and deleterious information. Twitter, for example, has become one of the most extravagantly used platforms of all times and therefore allo...
Tuberculosis is a type of chronic diseases, thus needs long term treatment. Each year, over 2 lakh people in India are affected by TB and on average around 20,000 people are infected every month in each state. According to WHO, primary statistics collated from 84 countries, approximately less than 1.4 million persons received tuberculosis (TB) treatment in 2020 than in 2019, (i.e. 21% decline from 2019). An early detection can significantly shorten the treatment period. In this study, we’ve...