<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Volume-3 Issue-5, August 2023 &#8211; Indian Journal of Data Communication and Networking (IJDCN)</title>
	<atom:link href="https://www.ijdcn.latticescipub.com/portfolio_entries/volume-3-issue-5-august-2023/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ijdcn.latticescipub.com</link>
	<description>Exploring Innovation &#124; ISSN: 2582-760X (Online) &#124; A Periodical Journal &#124; Reg. No: C/1383209 &#124; Published by Lattice Science Publication (LSP)</description>
	<lastBuildDate>Thu, 31 Aug 2023 09:32:10 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.ijdcn.latticescipub.com/wp-content/uploads/2021/01/cropped-IJDCN-WF-S-32x32.png</url>
	<title>Volume-3 Issue-5, August 2023 &#8211; Indian Journal of Data Communication and Networking (IJDCN)</title>
	<link>https://www.ijdcn.latticescipub.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>F42500812623</title>
		<link>https://www.ijdcn.latticescipub.com/portfolio-item/f42500812623/</link>
		
		<dc:creator><![CDATA[IJDCN Journal]]></dc:creator>
		<pubDate>Thu, 31 Aug 2023 09:32:10 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijdcn.latticescipub.com/?post_type=portfolio&#038;p=1392</guid>

					<description><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/f42500812623/">F42500812623</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Data Communication and Networking (IJDCN) has ISSN 2582-760X (Online), an open-access, peer-reviewed, periodical bi-monthly international journal, which is published by Lattice Science Publication (LSP) in February, April, June, August, October and December. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Data Communication and Networking that covers Addressing, Routing, Switching and Location Management, Broadband, Mobile, Wired, Wireless Internet, Networks, Adhoc and Sensor Networks, High Speed Networks, Mobile and Wireless Networks, Network Architectures, Network Based Applications, Network Protocols, Network Operations &amp; Management, Network Security Trust &amp; Privacy, Cross Layer Design and Optimization, Internet and Web Applications, Network Measurement &amp; Performance Analysis, Next Generation Internet &amp; Web Architectures, Peer to Peer and Overlay Networks, QOS And Resource Management, Recent Trends &amp; Developments in Computer Networks, Self-Organizing Networks and Networked Systems, Ubiquitous Networks, Virtual &amp; Overlay Networks, Wireless Mesh Networks and Protocols, Wireless Multimedia Systems, Personal and Wearable Networks, Embedded Networks, Delay-Tolerant Networks, Cognitive Radio Networks, Vehicular Networks, Smart Grid Communications, Underwater Sensor Networks, Cyber-Physical Systems, Social Networks, Green Networking, Overlay and Peer-to-Peer Networks, Local-area and Metropolitan-Area Networks, Storage-Area Networks, Routing and Transport Protocols, Internet of Things, Link Technologies, Authentication, Authorization, Accounting, Security and Privacy, Cross-Layer Optimization, Multimedia and Real-Time Communication, Machine-to-Machine Communications for Smart Environments, Smart Cities, Network Traffic Characterization and Measurements, Network Management, Reliability and QoS, Performance Evaluation of Networks, Testbeds for Network Experiments, Network Coding, Optical and High-Speed access Networks, High Performance Computing, Digital System and Logic Design, Networked-Driven Multicourse Chips, Information-centric Networking, Opportunistic Networking, Mobile and Ubiquitous Networking, Big Data Networking, Cloud Computing and Networking, Software Defined Networking and Network Function Virtualization, Adaptive Networking Applications, IoT &amp; IoE &amp; Edge Computing, Distributed Mobile Applications Utilizing IoT, Security, Privacy and Trust in IoT &amp; IoE, Standards for IoT Applications, Ubiquitous Computing, Blockchain-Enabled IoT Device and Data Security and Privacy, Application of WSN in IoT, Cloud Resources Utilization in IoT, Wireless Access Technologies for IoT, Mobile Applications and Services for IoT, Machine/ Deep Learning with IoT &amp; IoE, Smart Sensors and Internet of Things for Smart City, Logic, Functional programming and Microcontrollers for IoT, Sensor Networks, Actuators for Internet of Things, Data Visualization using IoT, IoT Application and Communication Protocol, Big Data Analytics for Social Networking using IoT, IoT Applications for Smart Cities, Emulation and Simulation Methodologies for IoT, IoT Applied for Digital Contents, Microstrip Antenna, Microwave, Radar and Satellite, Smart Antenna, MIMO Antenna, Wireless Communication, RFID Network and Applications, 5G Communication, 6G Communication. #Network Architectures #Network Based Applications #Network Protocols #Network Operations &amp; Management #Network Security Trust &amp; Privacy #Cross Layer Design and Optimization #Internet and Web Applications #Network Measurement &amp; Performance Analysis #Next Generation Internet &amp; Web Architectures #Peer to Peer and Overlay Networks #QOS And Resource Management #Recent Trends &amp; Developments in Computer Networks #Self-Organizing Networks and Networked Systems #Ubiquitous Networks #Virtual &amp; Overlay Networks #Wireless Mesh Networks and Protocols #Wireless Multimedia Systems #Personal and Wearable Networks #Information-Centric Networking #Embedded Networks #Opportunistic Networking #Delay-Tolerant Networks #Cognitive Radio Networks #Vehicular Networks #Smart Grid Communications #Underwater Sensor Networks #Cyber-Physical Systems #Social Networks #Green Networking #Overlay and Peer-to-Peer Networks #Local-area and Metropolitan-Area Networks #Storage-Area Networks #Routing and Transport Protocols #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Internet of Things #Link Technologies #Adaptive Networking Applications #Authentication, Authorization, Accounting #Security and Privacy #Cross-Layer Optimization #Multimedia and Real-Time Communication #Machine-to-Machine Communications for Smart Environments #Smart Cities #Network Traffic Characterization and Measurements #Network Management, Reliability and QoS #Performance Evaluation of Networks #Testbeds for Network Experiments #Network Coding #Optical and High-Speed Access Networks #High Performance Computing #Digital System and Logic Design #Networked-Driven Multicourse Chips #Information-Centric Networking #Opportunistic Networking #Mobile and Ubiquitous Networking #Big Data Networking #Cloud Computing and Networking #Software Defined Networking and Network Function Virtualization #Adaptive Networking Applications #Internet of Things (IoT) #IoT &amp; IoE &amp; Edge Computing #Distributed Mobile Applications Utilizing IoT #Security, Privacy and Trust in IoT &amp; IoE #Standards for IoT Applications #Ubiquitous Computing #Blockchain-enabled IoT Device and Data Security and Privacy #Application of WSN in IoT #Cloud Resources Utilization in IoT #Wireless Access Technologies for IoT #Mobile Applications and Services for IoT #Machine/ Deep Learning with IoT &amp; IoE #Smart Sensors and Internet of Things for Smart City #Logic, Functional programming and Microcontrollers for IoT #Sensor Networks, Actuators for Internet of Things #Data Visualization using IoT #IoT Application and Communication Protocol #Big Data Analytics for Social Networking using IoT #IoT Applications for Smart Cities #Emulation and Simulation Methodologies for IoT #IoT Applied for Digital Contents #Antenna and Communications Devices #Microstrip Antenna #Microwave #Radar and Satellite #Smart Antenna #MIMO Antenna #Wireless Communication #RFID Network and Applications #5G Communication #6G Communication #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p><script type='application/json' class='__iawmlf-post-loop-links'>[{"id":77,"href":"https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijdcn.F4250.083523&domain=www.ijdcn.latticescipub.com","archived_href":"","redirect_href":"","checks":[],"broken":false,"last_checked":null,"process":"done"},{"id":78,"href":"http:\/\/doi.org\/10.54105\/ijdcn.F4250.083523","archived_href":"","redirect_href":"https:\/\/doi.org\/10.54105\/ijdcn.F4250.083523","checks":[],"broken":false,"last_checked":null,"process":"done"},{"id":32,"href":"https:\/\/www.openaccess.nl\/en\/open-publications","archived_href":"http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications","redirect_href":"","checks":[{"date":"2025-12-12 08:53:12","http_code":404},{"date":"2025-12-16 15:09:18","http_code":404},{"date":"2025-12-23 12:18:19","http_code":404},{"date":"2025-12-26 13:29:16","http_code":404},{"date":"2025-12-30 15:12:56","http_code":404},{"date":"2026-01-13 08:14:42","http_code":404},{"date":"2026-01-21 01:36:54","http_code":404},{"date":"2026-01-31 04:56:12","http_code":404},{"date":"2026-02-05 09:06:30","http_code":404},{"date":"2026-02-23 14:21:02","http_code":404},{"date":"2026-02-26 18:06:33","http_code":404},{"date":"2026-03-01 19:39:57","http_code":404},{"date":"2026-03-31 05:10:59","http_code":404},{"date":"2026-04-08 04:29:28","http_code":404},{"date":"2026-04-15 02:51:21","http_code":404},{"date":"2026-04-20 23:18:12","http_code":404},{"date":"2026-04-24 08:39:24","http_code":404},{"date":"2026-04-30 04:46:46","http_code":404},{"date":"2026-05-04 23:40:46","http_code":404}],"broken":true,"last_checked":{"date":"2026-05-04 23:40:46","http_code":404},"process":"done"},{"id":33,"href":"https:\/\/citation.crosscite.org","archived_href":"http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/","redirect_href":"","checks":[{"date":"2025-12-12 08:53:14","http_code":200},{"date":"2025-12-16 15:09:16","http_code":200},{"date":"2025-12-23 12:25:28","http_code":200},{"date":"2025-12-26 13:29:17","http_code":200},{"date":"2025-12-30 15:12:57","http_code":200},{"date":"2026-01-13 09:14:32","http_code":200},{"date":"2026-01-21 01:36:58","http_code":200},{"date":"2026-01-31 04:56:12","http_code":200},{"date":"2026-02-05 09:06:30","http_code":200},{"date":"2026-02-23 14:21:02","http_code":200},{"date":"2026-02-26 18:06:35","http_code":200},{"date":"2026-03-01 19:39:55","http_code":200},{"date":"2026-03-31 05:10:59","http_code":200},{"date":"2026-04-08 00:33:51","http_code":200},{"date":"2026-04-15 02:51:20","http_code":200},{"date":"2026-04-20 23:18:15","http_code":200},{"date":"2026-04-24 08:39:26","http_code":200},{"date":"2026-04-30 04:46:46","http_code":200},{"date":"2026-05-04 23:40:48","http_code":200}],"broken":false,"last_checked":{"date":"2026-05-04 23:40:48","http_code":200},"process":"done"},{"id":79,"href":"https:\/\/www.zenodo.org","archived_href":"http:\/\/web-wp.archive.org\/web\/20251212083029\/https:\/\/zenodo.org\/","redirect_href":"","checks":[{"date":"2025-12-12 09:06:06","http_code":200},{"date":"2025-12-19 01:33:08","http_code":200},{"date":"2025-12-28 06:57:19","http_code":200},{"date":"2025-12-31 21:35:43","http_code":503},{"date":"2026-01-10 19:25:27","http_code":200},{"date":"2026-01-17 22:58:12","http_code":200},{"date":"2026-01-31 14:35:41","http_code":200},{"date":"2026-02-04 04:09:47","http_code":200},{"date":"2026-02-08 12:13:43","http_code":200},{"date":"2026-03-02 18:19:26","http_code":200},{"date":"2026-04-08 20:57:16","http_code":503}],"broken":false,"last_checked":{"date":"2026-04-08 20:57:16","http_code":503},"process":"done"},{"id":36,"href":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0","archived_href":"","redirect_href":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0","checks":[{"date":"2026-02-05 20:32:27","http_code":206},{"date":"2026-03-03 04:05:33","http_code":206},{"date":"2026-04-08 07:33:04","http_code":206},{"date":"2026-04-15 10:42:46","http_code":206}],"broken":false,"last_checked":{"date":"2026-04-15 10:42:46","http_code":206},"process":"done"}]</script></p>
<div  class='flex_column av-av_one_full-a93934ecd89fbb8a9566d39e89cd3725 av_one_full  avia-builder-el-0  avia-builder-el-no-sibling  first flex_column_div  '     ><div  class='av_promobox av-llyyvuo2-2c8987fb07f555e4cc7ca5a66d8314e8 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 24px;">Using Cloud Transforming for Big Network Management Procedure</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijdcn.F4250.083523&amp;domain=www.ijdcn.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignnone" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Nikolay N. Hranov</span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-84nue-e9fd1374e2319a3ce84a2f07baffe899">
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-84nue-e9fd1374e2319a3ce84a2f07baffe899 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-84nue-e9fd1374e2319a3ce84a2f07baffe899 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip=" niki.nnh@gmail.com, nikienbu@gmail.com"></span></span>Nikolay Hranov, Ph.D. Scholer, New Bulgarian University, Bulgaria.</span></span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 09 July 2023<strong> |</strong> Revised Manuscript received on 14 July 2023<strong> |</strong> Manuscript Accepted on 15 August 2023 <strong>|</strong> Manuscript published on 30 August 2023 <strong>|</strong> PP: 1-4<strong> |</strong> Volume-3 Issue-5 August 2023 <strong>|</strong> Retrieval Number: 100.1/ijdcn.F42500812623 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijdcn.F4250.083523" target="_blank" rel="noopener">10.54105/ijdcn.F4250.083523</a><br />
</span><br />
<span style="font-size: 12pt;"> <span style="font-family: 'times new roman', times, serif;"><i class="fa fa-unlock-alt" style="color: blue;"></i><span style="font-size: 12pt;"><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijdcn.latticescipub.com/ethics-policies/"> Editorial and Publishing Policies</a><strong> |</strong> <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.zenodo.org/" target="_blank" rel="noopener">Zenodo</a> <strong> |</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijdcn.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 10pt;"> © The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 16px;"><strong><br />
<span style="font-size: 14pt;">Abstract:</span></strong><span style="font-size: 14pt;"> This research is addressed on an overview of a specialized system for the migration/assimilation of a hybrid enterprise network system with the possibility of embedded identification, through a remote encrypted connection to a new cyber ecosystem, without the active process ceasing to function until the first system is finally assimilated into the new one, without being disturbed the balance of its cyber security. </span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14pt;"><br />
<strong>Keywords: </strong><span style="font-family: 'times new roman', times, serif; font-size: 16px;"><span style="font-size: 14pt;">Cloud, Big Network, Management, Network System Cyber Security</span></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 14pt;"> <strong>Scope of the Article: </strong>Internet of Things</span></p>
<p>
</div><div  class='avia-button-wrap av-llyyvuo2-50141855b86db57dc7f9ed7a7c7e48b7-wrap avia-button-right '><a href="https://www.ijdcn.latticescipub.com/wp-content/uploads/papers/v3i5/F42500812623.pdf" class="avia-button av-llyyvuo2-50141855b86db57dc7f9ed7a7c7e48b7 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div>
<p>The post <a rel="nofollow" href="https://www.ijdcn.latticescipub.com/portfolio-item/f42500812623/">F42500812623</a> appeared first on <a rel="nofollow" href="https://www.ijdcn.latticescipub.com">Indian Journal of Data Communication and Networking (IJDCN)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
