<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Volume-1 Issue-2, April 2021 &#8211; Indian Journal of Data Communication and Networking (IJDCN)</title>
	<atom:link href="https://www.ijdcn.latticescipub.com/portfolio_entries/volume-1-issue-2-april-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ijdcn.latticescipub.com</link>
	<description>Exploring Innovation &#124; ISSN: 2582-760X (Online) &#124; A Periodical Journal &#124; Reg. No: C/1383209 &#124; Published by Lattice Science Publication (LSP)</description>
	<lastBuildDate>Fri, 29 Dec 2023 09:20:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.ijdcn.latticescipub.com/wp-content/uploads/2021/01/cropped-IJDCN-WF-S-32x32.png</url>
	<title>Volume-1 Issue-2, April 2021 &#8211; Indian Journal of Data Communication and Networking (IJDCN)</title>
	<link>https://www.ijdcn.latticescipub.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>E5018121521</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/e5018121521/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Wed, 20 Dec 2023 09:27:24 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=1480</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/e5018121521/">E5018121521</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:71,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.E5018.041221&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:72,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.E5018.041221&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.E5018.041221&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:73,&quot;href&quot;:&quot;https:\/\/zenodo.org\/records\/10440990&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250503112145\/https:\/\/zenodo.org\/records\/10440990&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 09:05:42&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 05:20:53&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-01-31 05:20:53&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>
<div  class='flex_column av-35noiw-46652b312bd64aee9042885681bc1706 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div  '     ><div  class='av_promobox av-lqdklfny-246577d338d7b9450e57f7b7fb7cfacf avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">A Comprehensive Study of IoT Enabled Smart Grid</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.E5018.041221&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Naveen Kumar<span style="font-size: 12pt;"><sup><strong>1</strong></sup></span>, Gopal Singh<span style="font-size: 12pt;"><sup><strong>2</strong></sup></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip="er.naveendahiya@gmail.com "></span></span><sup><strong>1</strong></sup>Naveen Kumar, Research Scholar, Department of Computer Science &amp; Applications, M.D. University, Rohtak (Haryana), India.<br />
</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-2-3ae328471a4f59b2ea3b248764ad0074">
.av_font_icon.av-84nue-2-3ae328471a4f59b2ea3b248764ad0074{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-2-3ae328471a4f59b2ea3b248764ad0074 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-2-3ae328471a4f59b2ea3b248764ad0074 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-2-3ae328471a4f59b2ea3b248764ad0074 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip="gsbhoria@gmail.com "></span></span><sup><strong>2</strong></sup>Dr. Gopal Singh, Assistant Professor, Department of Computer Science &amp; Applications, M.D. University, Rohtak, (Haryana), India.</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12px;"><span style="font-size: 12pt;">Manuscript received on 01 March 2021 <strong>|</strong> Revised Manuscript received on 13 April 2023<strong> |</strong> Manuscript Accepted on 15 April 2023<strong> |</strong> Manuscript published on 30 December 2023<strong> | </strong>PP: 35-38<strong> |</strong> Volume-1 Issue-2, April 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.E5018121521 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.E5018.041221" target="_blank" rel="noopener">10.54105/ijdcn.E5018.041221</a></span><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i> <span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i> <a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> <strong>| </strong><i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://zenodo.org/records/10440990" target="_blank" rel="noopener"> Zenodo</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> Systems that are used for monitoring and controlling are known as supervisory control and data acquisition systems. Not the entire control permissions, but rather the supervisory level is the primary focus of this. Several different kinds of sensors are being utilized in order to collect data in real-time. What is the Internet of Things (IoT)? It is a three-dimensional connectivity that can be used for anything, at any time, in any location. The comparison between the SCADA system and the Internet of Things is carried out in this study. In addition, this section of the study focused on the benefits of the Internet of Things (IoT) and offered some suggestions for integrating the IoT with the SCADA system.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> <span style="font-family: 'times new roman', times, serif; font-size: 14pt;">Automation, IoT, Vulnerability, Data Acquisition, Smart Grid</span></span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> <span style="font-family: 'times new roman', times, serif; font-size: 14pt;">IoT</span></span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-lqdklfny-f4a975ccb6f79e987886887264a766a5-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i2/E5018121521.pdf" class="avia-button av-lqdklfny-f4a975ccb6f79e987886887264a766a5 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/e5018121521/">E5018121521</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5011021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5011021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 09:31:40 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=454</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5011021221/">B5011021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:182,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5011.041221&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:183,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5011.041221&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5011.041221&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:184,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/0ab2368e-b9c3-3dc7-a23e-ed586fa713e2&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/0ab2368e-b9c3-3dc7-a23e-ed586fa713e2\/&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ffwp2-0be0307b686160967996cbea9aeeb4b1">
.flex_column.av-ffwp2-0be0307b686160967996cbea9aeeb4b1{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-ffwp2-0be0307b686160967996cbea9aeeb4b1 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1kv558-50cf83d4eaa2256667600150f40627e1">
.av_promobox.av-ks1kv558-50cf83d4eaa2256667600150f40627e1{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1kv558-50cf83d4eaa2256667600150f40627e1 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">An Efficient Cluster Based Routing Protocol (ECCRP) Technique Based on Weighted Clustering Algorithm for Different Topologies in Manets using Network Coding</span> <a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5011.041221&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Mirza Arif Baig</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" arifbaig_is@yahoo.co.in "></span></span>Mirza Arif Baig, Department of Computer Science and Engineering, Sri Satya Sai University of Technology &amp; Medical Sciences, Sehore, Bhopal (MP), India. </span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12px;"><span style="font-size: 12pt;">Manuscript received on 31 March 2021 <strong>|</strong> Revised Manuscript received on 06 April 2021 <strong>|</strong> Manuscript Accepted on 15 April 2021<strong> |</strong> Manuscript published on 30 April 2021 <strong>|</strong> PP: 31-34<strong> |</strong> Volume-1 Issue-2, April 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5011021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5011.041221" target="_blank" rel="noopener">10.54105/ijdcn.B5011.041221</a></span><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i> <span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i> <a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> <strong>| </strong><i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/0ab2368e-b9c3-3dc7-a23e-ed586fa713e2" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> All nodes are energy constrained in MANET. In such a scenario, reducing energy consumption is necessary. The goal of this study is to minimize the energy utilization of various types and environments in MANETs using network coding in a CBRP. Consider other CBRP such as energy-efficient unmanned aerial vehicle fitness (EEFUAV) and compare its performance with the ECCRP and CBRP by taking into account node mobility, traffic and transmission range. Network coding is a way to enhance the efficiency of wireless networks. Energy Requirements, of the EEFUAV approach is intended to be developed to improve the performance of the CBRP and Energy ECCRP.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Effective cluster-based routing protocol (ECCRP), clustered-based routing protocol (CBRP), energy-efficient fitness of unmanned aerial vehicles (EEFUAV) Mobile adhoc networks (MANET).</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Networks: Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1kv558-4b68ef90dd00fcd647c0db24966900e0-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i2/B5011021221.pdf" class="avia-button av-ks1kv558-4b68ef90dd00fcd647c0db24966900e0 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5011021221/">B5011021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5008021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5008021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 08:49:40 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=450</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5008021221/">B5008021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:185,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5008.041221&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:186,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5008.041221&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5008.041221&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:187,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/ee93d82e-a192-3368-adb1-9a27e39a965b&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155716\/https:\/\/www.mendeley.com\/catalogue\/ee93d82e-a192-3368-adb1-9a27e39a965b\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/ee93d82e-a192-3368-adb1-9a27e39a965b\/&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-01-15 09:06:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-01 03:50:26&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-01 03:50:26&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-8jyrm-7c52f3ad46dec3dde94302b0b4c8ad62">
.flex_column.av-8jyrm-7c52f3ad46dec3dde94302b0b4c8ad62{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-8jyrm-7c52f3ad46dec3dde94302b0b4c8ad62 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1jcg19-127bb7245a9b39a6492a307a3cab76d8">
.av_promobox.av-ks1jcg19-127bb7245a9b39a6492a307a3cab76d8{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1jcg19-127bb7245a9b39a6492a307a3cab76d8 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Double Layer Cryptography using Multiplicative Cipher and Chemical Periodic Table </span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5008.041221&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Anurag Sinha<strong><sup>1</sup></strong>, Amrit Kumar Bhadani<strong><sup>2</sup></strong></span></span><br />
<span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><strong><sup>1</sup></strong></span><span style="font-family: 'times new roman', times, serif;">Mr. Anurag Sinha, Department MCA, Amity University Jharkhand, </span><span style="font-family: 'times new roman', times, serif;">India.</span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"> <span style="font-family: 'times new roman', times, serif;"><strong><sup>2</sup></strong></span><span style="font-family: 'times new roman', times, serif;">Mr. Amrit Kumar Bhadani</span><span style="font-family: 'times new roman', times, serif;">, Department of information Technology in </span><span style="font-family: 'times new roman', times, serif;">Amity university Jharkhand, India.</span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 31 March 2021 <strong>|</strong> Revised Manuscript received on 06 April 2021 <strong>|</strong> Manuscript Accepted on 15 April 2021<strong> |</strong> Manuscript published on 30 April 2021 <strong>|</strong> PP: 21-30<strong> |</strong> Volume-1 Issue-2, April 2021<strong> |</strong> Retrieval Number: 100.1/ijdcn.B5008021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5008.041221" target="_blank" rel="noopener">10.54105/ijdcn.B5008.041221</a></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 8pt;"><span style="font-size: 14px;"><span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> | <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/ee93d82e-a192-3368-adb1-9a27e39a965b" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-size: 12px; font-family: 'times new roman', times, serif;"> © The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> According to the present communication system one of the main concerns is secured transformation of data. In this paper we be inclined to propose a two-level encryption in this paper in the first level encryption we use the multiplicative ciphers and Cesar cipher in this level the plain text letters, we shall multiply the key numbers in this level and the second layer encryption we use periodic table exploitation the properties if the quality table, and thus use it for encrypting and decrypting in the same manners. For the information of network security in the second level encryption we will differently types of periodic table properties like atomic no, mass no, IUPAC name, chemical formula, and their properties.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Periodic table, Multiplicative cipher, Double Layer cryptography, Random Cipher.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Network Security</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1jcg19-27f4cb04c8096012c6b35e64922da330-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i2/B5008021221.pdf" class="avia-button av-ks1jcg19-27f4cb04c8096012c6b35e64922da330 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5008021221/">B5008021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5006021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5006021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 08:37:10 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=447</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5006021221/">B5006021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:188,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5006.041221&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:189,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5006.041221&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5006.041221&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:190,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/01908380-4be3-392e-acb2-481872ebe8a6&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/01908380-4be3-392e-acb2-481872ebe8a6\/&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-85e2n-2b0be69b31fc34a878a7d48fd964f73a">
.flex_column.av-85e2n-2b0be69b31fc34a878a7d48fd964f73a{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-85e2n-2b0be69b31fc34a878a7d48fd964f73a av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1iwxpu-9a529527d502212945e7dacad6348d63">
.av_promobox.av-ks1iwxpu-9a529527d502212945e7dacad6348d63{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1iwxpu-9a529527d502212945e7dacad6348d63 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">SALP Swarm Optimization Approach for Maximization The Lifetime of Wireless Sensor Network </span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5006.041221&amp;domain=www.ijdcn.latticescipub.com"><img loading="lazy" decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Mohammed M. Ahmed</span></span><br />
<span style="font-size: 12pt;"> 
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-zgabs-5e0e8c04d87540840f21fab6cd6511f9">
.av_font_icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" mohammed.mostafa@fcai.usc.edu.eg "></span></span><span style="font-family: 'times new roman', times, serif;">Mohammed M. Ahmed, Faculty of Computers and Artifcial Intelligence, University of Sadat City, Egypt.<br />
</span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12px;"><span style="font-size: 12pt;">Manuscript received on 15 March 2021 <strong>|</strong> Revised Manuscript received on 22 March 2021 <strong>|</strong> Manuscript Accepted on 15 April 2021<strong> |</strong> Manuscript published on 30 April 2021 <strong>|</strong> PP: 16-20<strong> |</strong> Volume-1 Issue-2, April 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5006021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5006.041221" target="_blank" rel="noopener">10.54105/ijdcn.B5006.041221</a></span><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i><span style="font-size: 16px;"><span style="font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> <strong>| </strong><a href="https://citation.crosscite.org/" target="_blank" rel="noopener">Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/01908380-4be3-392e-acb2-481872ebe8a6" target="_blank" rel="noopener"> Mendeley</a></span> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> In recent years, the maximization of a lifetime for wireless sensor networks is considered an important area for researchers. The wireless sensor networks (WSNs) contain two types of sensors that called sensor nodes and sink nodes which sensor node send information to the central node (sink node) that collected its data. Choosing the best location of sink node considered the critical problem that faces the lifetime of wireless sensor networks. In this paper, we propose a method that choosing best location of a sink node by applying Salp Swarm Algorithm (SSA) after determining sink node location we create transmission paths between the sink node and rest of nodes using Prim&#8217;s minimum spanning tree to choose shortest paths. Accordingly, for fitness function that used to decrease energy consumption for a network. Simulation results clarify that our proposed algorithm that solves localization of sink node presents the best results for prolonging the network&#8217;s lifetime compared to Cat Swarm Optimization algorithm (CSA) and Particle Swarm Optimization (PSO).<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Wireless sensor networks (WSNs), sink node placement, Salp swarm algorithm (SSA).</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Network Protocols</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1iwxpu-888a7b7f7c91440b551b39bfd6b9c2e6-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i2/B5006021221.pdf" class="avia-button av-ks1iwxpu-888a7b7f7c91440b551b39bfd6b9c2e6 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5006021221/">B5006021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5002021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5002021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 08:23:55 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=443</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5002021221/">B5002021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:191,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5002.041221&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:192,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5002.041221&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5002.041221&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:193,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/89da270f-4717-3ff4-ab52-0dab82e74aa1&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/89da270f-4717-3ff4-ab52-0dab82e74aa1\/&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ao3i3-dec8bf3d0f2cabf292c1f5b8bc09e87b">
.flex_column.av-ao3i3-dec8bf3d0f2cabf292c1f5b8bc09e87b{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-ao3i3-dec8bf3d0f2cabf292c1f5b8bc09e87b av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1ifife-62835330277b31b065177fec46bf5b56">
.av_promobox.av-ks1ifife-62835330277b31b065177fec46bf5b56{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1ifife-62835330277b31b065177fec46bf5b56 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">VANET: Framework, Challenges and Applications</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5002.041221&amp;domain=www.ijdcn.latticescipub.com"><img loading="lazy" decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Kalaivani D</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;"> 
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-zgabs-5e0e8c04d87540840f21fab6cd6511f9">
.av_font_icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" dkalaivanisai@gmail.com "></span></span></span><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Dr. Kalaivani D, Department of Information Science and Engineering, New Horizon college of Engineering, Bengaluru, India.</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 17 March 2021 <strong>|</strong> Revised Manuscript received on 27 March 2021 <strong>|</strong> Manuscript Accepted on 15 April 2021 <strong>|</strong> Manuscript published on 30 April 2021 <strong>|</strong> PP: 10-15<strong> |</strong> Volume-1 Issue-2, April 2021<strong> |</strong> Retrieval Number: 100.1/ijdcn.B5002021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5002.041221" target="_blank" rel="noopener">10.54105/ijdcn.B5002.041221</a><br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 8pt;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i><span style="font-size: 16px;"><span style="font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i> <a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a><strong> |</strong> <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/89da270f-4717-3ff4-ab52-0dab82e74aa1" target="_blank" rel="noopener"> Mendeley</a></span> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-size: 12px; font-family: 'times new roman', times, serif;"> © The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> Vehicular Ad-Hoc Network (VANET) is one of the essential research field because of large increase in usage of vehicles on road. Many VANET applications are employed to improve road safety conditions, vehicle traffic, an emergency warning to vehicle drivers, collision avoidance and other non-safety applications for comfort. The main aim of these applications are to modernize the various processes associated with road traffic, vehicles, drivers, passengers and pedestrians by implementing smart transport systems. This study is to implement an intelligent vehicular transport design to improve the road safety, navigation and comfort. VANET communication technology is a combination of mobile vehicles with ad hoc networks. The purpose of this research is to predict and prevent road accidents by transmitting emergency messages using vehicular network technology. While transmitting emergency messages, the VANET has various challenges. They are High mobility of the vehicles, Dynamic topology, Wireless communication, Minimum transmission delay, Connectivity of the network, optimal usage of transmission power. These challenges leave the vehicular networking disconnected and make an exchange of information very difficult. Even though many researchers have done significant work during the last decade on vehicular networking, some problems have not yet been solved.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Clustering, Intelligent Transport System, Medium Access Control, Routing Protocols, Vehicular Ad-hoc Networks, Wireless Access in Vehicular Environment.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Networks: Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1ifife-71524ed2915fdd89b5d6012c5ff02537-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i2/B5002021221.pdf" class="avia-button av-ks1ifife-71524ed2915fdd89b5d6012c5ff02537 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5002021221/">B5002021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5001021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5001021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 07:47:50 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=440</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5001021221/">B5001021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:194,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5001.041221&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:195,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5001.041221&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5001.041221&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:196,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/cea589e5-9652-3968-8962-58693c03d84b&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-10qetk-435e97c03320cafe8668c044f0b739b8">
.flex_column.av-10qetk-435e97c03320cafe8668c044f0b739b8{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-10qetk-435e97c03320cafe8668c044f0b739b8 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1h5lkg-3bba8c05e9a384a35ef10f35035f71dc">
.av_promobox.av-ks1h5lkg-3bba8c05e9a384a35ef10f35035f71dc{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1h5lkg-3bba8c05e9a384a35ef10f35035f71dc avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Facebook Addiction among Afghan University Students: A Structural Equation Modelling </span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5001.041221&amp;domain=www.ijdcn.latticescipub.com"><img loading="lazy" decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Hassan Rahnaward Ghulami<strong><sup>1</sup></strong>, Abdul Samad Roesh<strong><sup>2</sup></strong>, Mohammad Reza Ibrahim<strong><sup>3</sup></strong>, <span style="font-family: 'times new roman', times, serif;">Mohammad Akbari<strong><sup>4</sup></strong>, Hossein Mohammadi<strong><sup>5</sup></strong></span></span></span><br />
<span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-zgabs-5e0e8c04d87540840f21fab6cd6511f9">
.av_font_icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-zgabs-5e0e8c04d87540840f21fab6cd6511f9 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" hassan.r.gh@bu.edu.af "></span></span><sup><strong>1</strong></sup>Hassan Rahnaward Ghulami, Mathematics Department, Faculty of Natural Science, Bamyan University, Bamyan, Afghanistan.<br />
</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-2qcgo-212627a2ecaed8f645b101d00cb6509b">
.av_font_icon.av-2qcgo-212627a2ecaed8f645b101d00cb6509b{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-2qcgo-212627a2ecaed8f645b101d00cb6509b svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-2qcgo-212627a2ecaed8f645b101d00cb6509b .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-2qcgo-212627a2ecaed8f645b101d00cb6509b avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" samadzarin37@gmail.com "></span></span><sup><strong>2</strong></sup>Abdul Sammad Roesh, Physics Department, Faculty of Natural Science, Bamyan University, Bamyan, Afghanistan.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-keq6o-b7383538ab28015315336e8bce8f8c58">
.av_font_icon.av-keq6o-b7383538ab28015315336e8bce8f8c58{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-keq6o-b7383538ab28015315336e8bce8f8c58 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-keq6o-b7383538ab28015315336e8bce8f8c58 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-keq6o-b7383538ab28015315336e8bce8f8c58 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" rezaibrahim.ibrahimi@gmail.com "></span></span><sup><strong>3</strong></sup>Mohammad Reza Ibrahim, Sociology Department, Faculty of Social Science, Bamyan University, Bamyan, Afghanistan.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-gdhsg-0f99a37f94bd95969dc6197b57a98b35">
.av_font_icon.av-gdhsg-0f99a37f94bd95969dc6197b57a98b35{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-gdhsg-0f99a37f94bd95969dc6197b57a98b35 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-gdhsg-0f99a37f94bd95969dc6197b57a98b35 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-gdhsg-0f99a37f94bd95969dc6197b57a98b35 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" bamianzarin@gmail.com "></span></span><sup><strong>4</strong></sup>Mohammad Akbari, Mathematics Department, Faculty of Natural Science, Bamyan University, Bamyan, Afghanistan.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-709cw-0aadd9116d8f239ba83100f987b4596a">
.av_font_icon.av-709cw-0aadd9116d8f239ba83100f987b4596a{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-709cw-0aadd9116d8f239ba83100f987b4596a svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-709cw-0aadd9116d8f239ba83100f987b4596a .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-709cw-0aadd9116d8f239ba83100f987b4596a avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" mohammadi8888@gmail.com "></span></span><sup><strong>5</strong></sup>Dr. Hossein Mohammadi, Agronomy Department, Faculty of Agriculture, Bamyan University, Bamyan, Afghanistan.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;"> Manuscript received on 15 March 2021 <strong>|</strong> Revised Manuscript received on 22 March 2021<strong> |</strong> Manuscript Accepted on 15 April 2021 <strong>|</strong> Manuscript published on 30 April 2021<strong> |</strong> PP: 1-9<strong> |</strong> Volume-1 Issue-2, April 2021<strong> | </strong>Retrieval Number: 100.1/ijdcn.B5001021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5001.041221" target="_blank" rel="noopener">10.54105/ijdcn.B5001.041221</a><br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 8pt;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i><span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a><strong> | </strong><i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="no noopener opener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/cea589e5-9652-3968-8962-58693c03d84b" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-size: 12px; font-family: 'times new roman', times, serif;"> © The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> The current research intends to evaluate the validity and reliability of the adopted model-BFAS, and investigate relationship between the motives and Facebook addiction in Afghanistan. The adopted instrument were online distributed to undergraduate and postgraduate students and only 431 responded across the country to determine their intentions for using Facebook. The software of RStudio used for descriptive analysis and SEM-PLS approach was applied to hypothesis the relationship between the constructs. Results showed that the BFAS measures intensity of Facebook addiction, although measurement model was reliable and structural model has discriminate validity. Further, the results show that students use Facebook for communication, social interaction and entertainment, and these motives positively predicted Facebook addiction. Based on the results, authors believe that the Facebook addiction is a phenomenon that exists across the countries, and greater use of Facebook would tend to create problem of addiction. In sum up, this research would help parents, serves provider, policy makers, current Facebook users, and students to control their excessive use of Facebook.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Facebook; Addiction; SEM; Motives.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Social Networks</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1h5lkg-37c218fe6e23ef44f62363d12e7277e3-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i2/B5001021221.pdf" class="avia-button av-ks1h5lkg-37c218fe6e23ef44f62363d12e7277e3 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5001021221/">B5001021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
