<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>Volume-1 Issue-3, June 2021 &#8211; Indian Journal of Data Communication and Networking (IJDCN)</title>
	<atom:link href="https://www.ijdcn.latticescipub.com/portfolio_entries/volume-1-issue-3-june-2021/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ijdcn.latticescipub.com</link>
	<description>Exploring Innovation &#124; ISSN: 2582-760X (Online) &#124; A Periodical Journal &#124; Reg. No: C/1383209 &#124; Published by Lattice Science Publication (LSP)</description>
	<lastBuildDate>Fri, 18 Aug 2023 06:46:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.ijdcn.latticescipub.com/wp-content/uploads/2021/01/cropped-IJDCN-WF-S-32x32.png</url>
	<title>Volume-1 Issue-3, June 2021 &#8211; Indian Journal of Data Communication and Networking (IJDCN)</title>
	<link>https://www.ijdcn.latticescipub.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>C5015061321</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/c5015061321/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 11:18:10 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=493</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/c5015061321/">C5015061321</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:164,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.C5015.061321&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:165,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.C5015.061321&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.C5015.061321&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:166,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/bec656eb-5c57-3c2f-8952-a11863dc322f&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155052\/https:\/\/www.mendeley.com\/catalogue\/bec656eb-5c57-3c2f-8952-a11863dc322f\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/bec656eb-5c57-3c2f-8952-a11863dc322f\/&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-24 10:44:11&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-09 11:38:37&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-09 11:38:37&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-8ulil-450ca7ab1a404f6cec0e64ca3fce6c9d">
.flex_column.av-8ulil-450ca7ab1a404f6cec0e64ca3fce6c9d{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-8ulil-450ca7ab1a404f6cec0e64ca3fce6c9d av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1oo2ks-aea4f33cba285bd0c22bdc949f7c9aa8">
.av_promobox.av-ks1oo2ks-aea4f33cba285bd0c22bdc949f7c9aa8{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1oo2ks-aea4f33cba285bd0c22bdc949f7c9aa8 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Android Security Analysis using Mobile Sandbox</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.C5015.061321&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Munishka Vijayvergiya<strong><sup>1</sup></strong>, Abhignya Tayi<strong><sup>2</sup></strong></span></span><br />
<span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" munishka.vijayvergiya2019@vitstudent.ac.in "></span></span><sup><strong>1</strong></sup>Munishka Vijayvergiya, SCOPE, Vellore Institute of Technology, Chennai, India. </span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872">
.av_font_icon.av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" tayi.abhignya2019@vitstudent.ac.in "></span></span><sup><strong>2</strong></sup>Abhignya Tayi, SCOPE, Vellore Institute of Technology, Chennai, India.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;"> Manuscript received on 21 May 2021 <strong>|</strong> Revised Manuscript received on 03 June 2021<strong> |</strong> Manuscript Accepted on 15 June 2021<strong> |</strong> Manuscript published on 30 June 2021 <strong>|</strong> PP: 41-46<strong> |</strong> Volume-1 Issue-3, June 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.C5015061321 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.C5015.061321" target="_blank" rel="noopener">10.54105/ijdcn.C5015.061321</a><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i> <span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> <strong>| </strong><i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/bec656eb-5c57-3c2f-8952-a11863dc322f" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> Today, smartphones and Android devices are effectively in development like never before and have become the easiest cybercrime forum. It is necessary for security experts to investigate the vengeful programming composed for these frameworks if we closely observe the danger to security and defence. The main objective of this paper was to describe Mobile Sandbox, which is said to be a platform intended to periodically examine Android applications in new ways. First of all in the essence of the after-effects of static analysis that is used to handle the dynamic investigation, it incorporates static and dynamic examination and attempts to justify the introduction of executed code. On the other hand, to log calls to native APIs, it uses those techniques, and in the end, it combines the end results with machine learning techniques to collect the samples analysed into dangerous ones. We reviewed the platform for more than 69, 000 applications from multi-talented Asian international businesses sectors and found that about 21% of them officially use the local calls in their code.</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"><strong>Keywords: </strong>The Main Objective of This Paper Was To Describe Mobile Sandbox.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Internet and Web Applications</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1oo2ks-c78a8434d437fc78f13b6d449e0b1e4b-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i3/C5015061321.pdf" class="avia-button av-ks1oo2ks-c78a8434d437fc78f13b6d449e0b1e4b av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/c5015061321/">C5015061321</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5005021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5005021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 10:51:42 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=490</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5005021221/">B5005021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:167,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5005.061321&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:168,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5005.061321&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5005.061321&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:169,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/2f17368d-238a-3b32-808f-41baf4fc9e97&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155244\/https:\/\/www.mendeley.com\/catalogue\/2f17368d-238a-3b32-808f-41baf4fc9e97\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/2f17368d-238a-3b32-808f-41baf4fc9e97\/&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-bk6mq-a2189342225380fc3e2008ff41c60476">
.flex_column.av-bk6mq-a2189342225380fc3e2008ff41c60476{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-bk6mq-a2189342225380fc3e2008ff41c60476 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1nq16b-f784347b2f08cc1a9dac93348066225c">
.av_promobox.av-ks1nq16b-f784347b2f08cc1a9dac93348066225c{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1nq16b-f784347b2f08cc1a9dac93348066225c avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Email Marketing: The Most Important Advantages and Disadvantages</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5005.061321&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Foued Sabbagh</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;"> 
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" fouedsabbagh_2010@yahoo.fr "></span></span></span><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Foued Sabbagh, Finance and Development, Faculty of Law and Economics and Politics Sciences/University of Sousse, Erriadh City, Tunisia.</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 14 May 2021 <strong>|</strong> Revised Manuscript received on 22 May 2021 <strong>|</strong> Manuscript Accepted on 15 June 2021 <strong>|</strong> Manuscript published on 30 June 2021 <strong>|</strong> PP: 32-40<strong> |</strong> Volume-1 Issue-3, June 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5005021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5005.061321" target="_blank" rel="noopener">10.54105/ijdcn.B5005.061321</a><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i> <span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a><strong> | </strong><i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/2f17368d-238a-3b32-808f-41baf4fc9e97" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract: </strong>This paper focuses primarily on the role of Email marketing and E-commerce. Email marketing is one of the most modern means and marketing methods in the world. The modern information and communication technologies also facilitate the circulation and sending of electronic messages with the highest quality and accuracy. In addition, Email marketing campaigns help to increase the sale of products in electronic shops and to target customers efficiently and legally. However, despite the benefits of Email marketing, there are also many negatives that constitute a real obstacle to promotion and marketing via this messaging system. This study focuses on discussing the most important advantages and disadvantages of Email marketing and analyzing the success factors of this marketing by avoiding these disadvantages and benefiting all these advantages.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords: </strong>Email Marketing, Advantages, Disadvantages, Marketing Campaigns, Factors of Success</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Social Networks</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1nq16b-1ede66cd1f2fbbdae42061ce1b84951e-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i3/B5005021221.pdf" class="avia-button av-ks1nq16b-1ede66cd1f2fbbdae42061ce1b84951e av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5005021221/">B5005021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5004021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5004021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 10:45:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=487</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5004021221/">B5004021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:170,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5004.061321&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:171,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5004.061321&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5004.061321&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:172,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/957b5c9c-947e-3378-b357-34397a536b22&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155315\/https:\/\/www.mendeley.com\/catalogue\/957b5c9c-947e-3378-b357-34397a536b22\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/957b5c9c-947e-3378-b357-34397a536b22\/&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-04-08 04:29:35&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-08 04:29:35&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-8xfd3-eb59dcaf298f13bda23929f765f1ada0">
.flex_column.av-8xfd3-eb59dcaf298f13bda23929f765f1ada0{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-8xfd3-eb59dcaf298f13bda23929f765f1ada0 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1nhewc-1fd9c58bfd3591de298570d11fd4ee77">
.av_promobox.av-ks1nhewc-1fd9c58bfd3591de298570d11fd4ee77{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1nhewc-1fd9c58bfd3591de298570d11fd4ee77 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Marketing and Campaign Management via Social Networks and the Effects of Electronic Advertising</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5004.061321&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Foued Sabbagh</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" fouedsabbagh_2010@yahoo.fr "></span></span></span><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Foued Sabbagh, Finance and Development, Faculty of Law and Economics and Politics Sciences/University of Sousse, Erriadh City, Tunisia. </span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 08 May 2021 <strong>|</strong> Revised Manuscript received on 25 May 2021 <strong>|</strong> Manuscript Accepted on 15 June 2021<strong> |</strong> Manuscript published on 30 June 2021 <strong>|</strong> PP: 23-31<strong> |</strong> Volume-1 Issue-3, June 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5004021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5004.061321" target="_blank" rel="noopener">10.54105/ijdcn.B5004.061321</a><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i><span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a><strong> | </strong><i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/957b5c9c-947e-3378-b357-34397a536b22" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> This paper aims to show that the marketing and management of advertising campaigns have contributed in a positive and growing way since the nineties until now bring in targeted customers and increase sales of electronic products. Social communication networks are transformed into the promoting and marketing advertising forum in order to automatically attract customers without the need for traditional sales methods. In this sense, electronic marketing represents the space of commercial transactions of the future. Therefore, this type of marketing and the management of campaigns promoting social media via social networks have a direct impact on internet users by the effect of electronic advertising.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords: </strong>Electronic Marketing, Social Media, Campaign Management, Promotion, Electronic Advertising.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Social Networks</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1nhewc-d006d46dbdb355d0f5ca655d9124a730-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i3/B5004021221.pdf" class="avia-button av-ks1nhewc-d006d46dbdb355d0f5ca655d9124a730 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5004021221/">B5004021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5003021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5003021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 10:36:29 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=480</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5003021221/">B5003021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:173,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5003.061321&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:174,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5003.061321&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5003.061321&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:175,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/d279ad17-5811-319c-916e-3ace06913d0e&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155238\/https:\/\/www.mendeley.com\/catalogue\/d279ad17-5811-319c-916e-3ace06913d0e\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/d279ad17-5811-319c-916e-3ace06913d0e\/&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-04-01 11:19:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:47&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-08 00:33:47&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-96zhs-fd5df56dd1d927b5d3f4344df8885742">
.flex_column.av-96zhs-fd5df56dd1d927b5d3f4344df8885742{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-96zhs-fd5df56dd1d927b5d3f4344df8885742 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1n5wwm-d150f3a0c9d137a7e9d5f856e7280075">
.av_promobox.av-ks1n5wwm-d150f3a0c9d137a7e9d5f856e7280075{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1n5wwm-d150f3a0c9d137a7e9d5f856e7280075 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Digital Economy and Communication Technologies: Methods and Mechanisms of Promotion through E-Commerce and E-Marketing</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5003.061321&amp;domain=www.ijdcn.latticescipub.com"><img loading="lazy" decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Foued Sabbagh</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Foued Sabbagh, Finance and Development, Faculty of Law and Economics and Politics Sciences/University of Sousse, Erriadh City, Tunisia. 
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" fouedsabbagh_2010@yahoo.fr "></span></span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 11 May 2021 <strong>|</strong> Revised Manuscript received on 29 May 2021 <strong>|</strong> Manuscript Accepted on 15 June 2021 <strong>|</strong> Manuscript published on 30 June 2021 <strong>|</strong> PP: 10-22<strong> |</strong> Volume-1 Issue-3, June 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5003021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5003.061321" target="_blank" rel="noopener">10.54105/ijdcn.B5003.061321</a><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><i class="fa fa-unlock-alt" style="color: blue;"></i><span style="font-size: 16px;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> | <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/d279ad17-5811-319c-916e-3ace06913d0e" target="_blank" rel="noopener"> Mendeley</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> This paper focuses on the methods and the mechanisms of E-commerce and E-marketing, and the important role of international electronic companies in this vital and digital field. The spreaders of the digital economy and the techniques of information and communication technology are deployed with applications of E-commerce and E-marketing. Thus, the digital globalization opens the horizon of technological development and accelerates the growth of the use of modern techniques through the innovation of the digital economy in our daily lives. In addition, the modernization of companies in the field of E-marketing and E-commerce has a direct impact on the strategic relationship between internet users, information, technology and business. In this sense, my theoretical study determines methods and mechanisms of promotion through E-commerce and E-marketing during the revolution of the digital economy and the technologies of modern and social communication.<br />
</span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords: </strong>The Digital Economy, the Communication Technologies, E-marketing, E-commerce, Methods and Mechanisms.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Social Networks</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1n5wwm-ea2cb5fef78069b3ad7878d1c051be08-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i3/B5003021221.pdf" class="avia-button av-ks1n5wwm-ea2cb5fef78069b3ad7878d1c051be08 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5003021221/">B5003021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5009021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5009021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 10:10:20 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=469</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5009021221/">B5009021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:176,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5009.061321&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:177,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5009.061321&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5009.061321&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:178,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/d38bc879-beb6-39f4-b602-1e26575cab00&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155324\/https:\/\/www.mendeley.com\/catalogue\/d38bc879-beb6-39f4-b602-1e26575cab00\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/d38bc879-beb6-39f4-b602-1e26575cab00\/&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-06 11:25:21&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-02-06 11:25:21&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-a4pzp-a0a7b1f2bfb2fec40b6c993886d14c60">
.flex_column.av-a4pzp-a0a7b1f2bfb2fec40b6c993886d14c60{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-a4pzp-a0a7b1f2bfb2fec40b6c993886d14c60 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1m8qat-58f52bdc9bcbd7ddc5ae9ec4087e53a5">
.av_promobox.av-ks1m8qat-58f52bdc9bcbd7ddc5ae9ec4087e53a5{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1m8qat-58f52bdc9bcbd7ddc5ae9ec4087e53a5 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">Design and Implementation of a Efficient Router using X Y Algorithm</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5009.061321&amp;domain=www.ijdcn.latticescipub.com"><img loading="lazy" decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Geethanjali N<strong><sup>1</sup></strong>, Rekha K.R<strong><sup>2</sup></strong></span></span><br />
<span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ctln9-663d213d096804c2db554cacc366d15d">
.av_font_icon.av-ctln9-663d213d096804c2db554cacc366d15d{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-ctln9-663d213d096804c2db554cacc366d15d svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-ctln9-663d213d096804c2db554cacc366d15d .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-ctln9-663d213d096804c2db554cacc366d15d avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" geethanjaligowda167@gmail.com "></span></span><sup><strong>1</strong></sup>Geethanjali.N, Research Scholar, SJBIT Research Center, Bengaluru (Karnataka), India.</span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-701nx-18ff8911b34c943040baa45869f2aaa1">
.av_font_icon.av-701nx-18ff8911b34c943040baa45869f2aaa1{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-701nx-18ff8911b34c943040baa45869f2aaa1 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-701nx-18ff8911b34c943040baa45869f2aaa1 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-701nx-18ff8911b34c943040baa45869f2aaa1 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" rekha.sjbit@gmail.com "></span></span><sup><strong>2</strong></sup></span><span style="font-family: 'times new roman', times, serif;">Dr. Rekha K.R, Professor, Department of ECE, SJBIT Research Center, Bengaluru (Karnataka), India.<br />
</span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12pt;"> Manuscript received on 11 April 2021 <strong>|</strong> Revised Manuscript received on 29 May 2021 <strong>|</strong> Manuscript Accepted on 15 June 2021 <strong>|</strong> Manuscript published on 30 June 2021 <strong>|</strong> PP: 5-9<strong> |</strong> Volume-1 Issue-3, June 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5009021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5009.061321" target="_blank" rel="noopener">10.54105/ijdcn.B5009.061321</a><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i><span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i> <a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a><strong> |</strong> <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/d38bc879-beb6-39f4-b602-1e26575cab00" target="_blank" rel="noopener"> Mendeley</a></span></span><span style="font-size: 16px;"> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> The engineering for on chip network configuration utilizing dynamic reconfiguration is an answer for Communication Interfaces, Chip cost, Quality of Service, ensure adaptability of the organization. The proposed engineering powerfully arrange itself concerning Hardware Modules like switches, Switch based packet , information to a packet size with changing the correspondence situation and its prerequisites on run time. The NOC Architecture assumes urgent part while planning correspondence frameworks intended for SOC. The NOC engineering be better over traditional transport, mutual transport plan , cross bar interconnection design intended for on chip organizations. In a greater part of the NO C engineering contains lattice, torus or different geographies to plan solid switch. In any case, the greater part of the plans are neglects to advance a Quality of Service, blocking issues, cost, Chip as well as mostly plan throughput, region transparency with inactivity. Proposed plan we are planning a reconfigurable switch for network on chip plan that improve the correspondence performance. The proposed configuration dodges the restrictions of transport based interconnection plans which are frequently applied in part progressively reconfigurable FPGA plans. With the assistance of this switch plan we can accomplish low inactivity and high information throughput.<br />
</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Network On Chip, Router, System On Chip, Multiplexer.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Wireless Communication</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1m8qat-4bbf6f0ec90f7935512cc6553959d308-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i3/B5009021221.pdf" class="avia-button av-ks1m8qat-4bbf6f0ec90f7935512cc6553959d308 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5009021221/">B5009021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B5007021221</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/b5007021221/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 09:59:18 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=467</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5007021221/">B5007021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:179,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.B5007.061321&amp;domain=www.ijdcn.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:180,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijdcn.B5007.061321&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijdcn.B5007.061321&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:32,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-16 15:09:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-23 12:18:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-26 13:29:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-30 15:12:56&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-13 08:14:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-21 01:36:54&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-26 18:06:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-01 19:39:57&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-08 04:29:28&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:21&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:33,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-12 08:53:14&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-16 15:09:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 12:25:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-26 13:29:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 15:12:57&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-13 09:14:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-21 01:36:58&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 04:56:12&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-05 09:06:30&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-23 14:21:02&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-26 18:06:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 19:39:55&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-31 05:10:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-08 00:33:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 02:51:20&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:181,&quot;href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/bba590e6-f8b7-38a2-b1af-2705ef771a65&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251212155430\/https:\/\/www.mendeley.com\/catalogue\/bba590e6-f8b7-38a2-b1af-2705ef771a65\/&quot;,&quot;redirect_href&quot;:&quot;https:\/\/www.mendeley.com\/catalogue\/bba590e6-f8b7-38a2-b1af-2705ef771a65\/&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-06 13:30:51&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-02-06 13:30:51&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:36,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2026-02-05 20:32:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 04:05:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-08 07:33:04&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-04-15 10:42:46&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>

<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-142hn-860dddc8d946485c3ea5b1edf94481ad">
.flex_column.av-142hn-860dddc8d946485c3ea5b1edf94481ad{
border-radius:0px 0px 0px 0px;
padding:0px 0px 0px 0px;
}
</style>
<div  class='flex_column av-142hn-860dddc8d946485c3ea5b1edf94481ad av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-ks1lul9k-655e8f1da1277e31542808063b8602a6">
.av_promobox.av-ks1lul9k-655e8f1da1277e31542808063b8602a6{
color:#000000;
}
</style>
<div  class='av_promobox av-ks1lul9k-655e8f1da1277e31542808063b8602a6 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">An Enhanced Data Storage Technique on Cloud Computing</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.B5007.061321&amp;domain=www.ijdcn.latticescipub.com"><img loading="lazy" decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Kamlesh Sharma<strong><sup>1</sup></strong>, Nidhi Garg<strong><sup>2</sup></strong></span></span><br />
<span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" kamlesh.fet@mriu.edu.in "></span></span><sup><strong>1</strong></sup>Dr. Kamlesh Sharma, Associate Professor, Department of Computer Science &amp; Engineering, Manav Rachna International Institute of Research &amp; Studies, Faridabad, India.</span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872">
.av_font_icon.av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-1-e1210d80a7ac0aff51cc7cf53b947872 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" nidhigarg.fet@mriu.edu.in "></span></span><sup><strong>2</strong></sup>Nidhi Garg, Assistant Professor, Department of Computer Science &amp; Engineering, Manav Rachna International Institute of Research &amp; Studies, Faridabad, India.<br />
</span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 11 May 2021 <strong>|</strong> Revised Manuscript received on 29 May 2021 <strong>|</strong> Manuscript Accepted on 15 June 2021 <strong>|</strong> Manuscript published on 30 June 2021 <strong>|</strong> PP: 1-4<strong> |</strong> Volume-1 Issue-3, June 2021 <strong>|</strong> Retrieval Number: 100.1/ijdcn.B5007021221 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.B5007.061321" target="_blank" rel="noopener">10.54105/ijdcn.B5007.061321</a><br />
</span><br />
<span style="font-size: 12px;"> <span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14px;"><i class="fa fa-unlock-alt" style="font-size: 12px; color: blue;"></i> <span style="font-size: 16px; font-family: 'times new roman', times, serif;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Ethics and Policies</a> | <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noo noopener pener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.mendeley.com/catalogue/bba590e6-f8b7-38a2-b1af-2705ef771a65" target="_blank" rel="noopener"> Mendeley</a></span></span><span style="font-size: 16px;"> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 12px;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><strong>Abstract:</strong> Exercising a collection of similar numerous easy to get sources and resources over the internet is termed as Cloud Computing A Cloud storage system is basically a storage system over a large scale that consist of many independent storage servers. During recent years a huge changes and adoption is seen in cloud computing so security has become one of the major concerns in it. As Cloud computing works on third party system so security concern is there not only for customers but also for service providers. In this paper we have discussed about Cryptography i.e., encrypting messages into certain forms, it’s algorithms including symmetric and asymmetric algorithm and hashing, its architecture, and advantages of cryptography.<br />
</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 14px;"><span style="font-size: 14pt;"> <strong>Keywords:</strong> Cloud storage system, Cryptography, Robustness, Hashing.</span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Cloud Computing and Networking</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-ks1lul9k-fe14af091687a45bc7b00000e30c01c7-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v1i3/B5007021221.pdf" class="avia-button av-ks1lul9k-fe14af091687a45bc7b00000e30c01c7 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/b5007021221/">B5007021221</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
