Subjects -> COMMUNICATIONS (Total: 518 journals)
    - COMMUNICATIONS (446 journals)
    - DIGITAL AND WIRELESS COMMUNICATION (31 journals)
    - HUMAN COMMUNICATION (19 journals)
    - MEETINGS AND CONGRESSES (7 journals)
    - RADIO, TELEVISION AND CABLE (15 journals)

DIGITAL AND WIRELESS COMMUNICATION (31 journals)

Showing 1 - 31 of 31 Journals sorted alphabetically
Ada : A Journal of Gender, New Media, and Technology     Open Access   (Followers: 22)
Advances in Image and Video Processing     Open Access   (Followers: 24)
Communications and Network     Open Access   (Followers: 13)
E-Health Telecommunication Systems and Networks     Open Access   (Followers: 3)
EURASIP Journal on Wireless Communications and Networking     Open Access   (Followers: 14)
Future Internet     Open Access   (Followers: 87)
Granular Computing     Hybrid Journal  
IEEE Transactions on Wireless Communications     Hybrid Journal   (Followers: 26)
IEEE Wireless Communications Letters     Hybrid Journal   (Followers: 42)
IET Wireless Sensor Systems     Open Access   (Followers: 18)
International Journal of Communications, Network and System Sciences     Open Access   (Followers: 9)
International Journal of Digital Earth     Hybrid Journal   (Followers: 15)
International Journal of Embedded and Real-Time Communication Systems     Full-text available via subscription   (Followers: 6)
International Journal of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 2)
International Journal of Machine Intelligence and Sensory Signal Processing     Hybrid Journal   (Followers: 3)
International Journal of Mobile Computing and Multimedia Communications     Full-text available via subscription   (Followers: 2)
International Journal of Satellite Communications and Networking     Hybrid Journal   (Followers: 39)
International Journal of Wireless and Mobile Computing     Hybrid Journal   (Followers: 8)
International Journal of Wireless Networks and Broadband Technologies     Full-text available via subscription   (Followers: 2)
International Journals Digital Communication and Analog Signals     Full-text available via subscription   (Followers: 2)
Journal of Digital Information     Open Access   (Followers: 181)
Journal of Interconnection Networks     Hybrid Journal   (Followers: 1)
Journal of the Southern Association for Information Systems     Open Access   (Followers: 2)
Mobile Media & Communication     Hybrid Journal   (Followers: 10)
Nano Communication Networks     Hybrid Journal   (Followers: 5)
Psychology of Popular Media Culture     Full-text available via subscription   (Followers: 1)
Signal, Image and Video Processing     Hybrid Journal   (Followers: 11)
Ukrainian Information Space     Open Access  
Vehicular Communications     Full-text available via subscription   (Followers: 4)
Vista     Open Access   (Followers: 4)
Wireless Personal Communications     Hybrid Journal   (Followers: 6)
Similar Journals
Journal Cover
International Journals Digital Communication and Analog Signals
Number of Followers: 2  
 
  Full-text available via subscription Subscription journal
ISSN (Online) 2455-0329
Published by JournalsPub Homepage  [21 journals]
  • Streamlining Healthcare Operations- Exploring MedBed, an Advanced Hospital
           Management System

    • Free pre-print version: Loading...

      Authors: Ashish Dwivedi, Prafull Pandey, Sundaram Seth, Sharva Tripathi, Utkarsh Tripathi
      Pages: 1 - 5
      Abstract: MedBed is a hospital management system that runs on the web, aiming to optimize hospital operations, enhance productivity, and elevate the quality of patient care. Its interface is user-friendly and empowers medical personnel to manage patient information, book appointments, maintain electronic health records, track inventory, and manage billing. In this article, we will delve into the creation and deployment of the MedBed system, emphasizing its crucial aspects and advantages. Additionally, we will evaluate the system's performance and effectiveness in enhancing hospital operations. Medbed is a healthcare management system designed to streamline and optimize the medical care process. Medbed offers a wide range of features that enable healthcare professionals to manage patient data, schedule appointments, and communicate with patients efficiently. This paper provides an overview of Medbed's features, architecture, and implementation, as well as its potential applications in healthcare organizations.
      PubDate: 2023-10-23
      DOI: 10.37628/jdcas.v9i1.1868
      Issue No: Vol. 9, No. 1 (2023)
       
  • Improved Communication Security and Enhance Reliability Using Cryptography
           and Steganography

    • Free pre-print version: Loading...

      Authors: Kamlesh Kumar singh, Urvi Dadu, Bramah Hazela, Deependra Pandey
      Pages: 6 - 15
      Abstract: Increased use of technologies and computers has profited humans in many ways but also have resulted in various security concerns. And these security concerns are breached onto the path over which the data is to be transferred. Sending normal messages over the Internet is no longer a secure method for data sharing. In this paper, we have determined how can we provide an encrypted
      message so that there will be no fear of data Integrity, Confidentiality, etc. The way of propagation of the data or the thing can be in any form such as sound, video, text message, audio, etc, but here we have focused on text messages. This project first sends the message which is taken in the text format and then that text data is encrypted by using some cryptographic techniques. Then the encrypted message or the data that has been encrypted using the cryptographic technique is embedded in the image form by using some of the steganographic techniques. Now whatever image we have taken up can be sent over the internet for transferring any hidden message or confidential message to the person. After that, we can decode it on the other side. We have also performed some comparison based studies by using some set of algorithms by comparing cryptographic and steganographic techniques. As focusing on security purposes, the combination of steganography with cryptography improves communication security and enhances reliability by encrypting the commencing message and hiding the same message. There are important tools that help utterly in cybersecurity. This paper comprises various algorithms used such as RSA, AES, DES, DCT, OTP, etc. These are the algorithms of symmetric, asymmetric cryptography, and steganography.
      PubDate: 2023-10-23
      DOI: 10.37628/jdcas.v9i1.1838
      Issue No: Vol. 9, No. 1 (2023)
       
  • Semantic Segmentation for Object Detection in Videos using Mask RCNN

    • Free pre-print version: Loading...

      Authors: Dharman J.
      Pages: 7 - 15
      Abstract: The segmentation of object instances is an essential step in real-time video detection. Object detection is the problem of detecting the information of all types of items in an image by designating their location with a rectangular box. Using its remarkable feature-learning capabilities, deep learning promotes object detection research. Numerous researchers have utilised various machine learning algorithms for object detection and have focused on enhancing the accuracy of feature extraction. Due to this inaccuracy that occurred during the detection of the object at a lower level, neither the lower-level nor higher-level features are presented appropriately. FPN is utilised for feature extraction, which extracts both lower-level and higher-level features for reliable object recognition, and the proposed model takes advantage of these extracted characteristics handles the classification process (Mask R-CNN). This paper aims to develop a persuasive framework for instance divides.
      PubDate: 2023-10-31
      Issue No: Vol. 9, No. 1 (2023)
       
  • Cyber Security: An Attack, Threat, Vulnerability

    • Free pre-print version: Loading...

      Authors: Soumen Chakraborty
      Pages: 16 - 21
      Abstract:
      The broad focus of this study is on an attack on, a risk to, and flaws in the digital foundation, which includes organisations, undertaking organisations, intranets, and their use of digital disruptions. To accomplish this goal, the paper endeavors to make sense of the significance g in network interruptions and digital robbery. Additionally, the reasons behind the rapid growth of cybercrime are examined in unique detail. The paper likewise incorporates a total depiction and meaning of digital protection, the job it plays in network interruption and digital perceive burglary, a conversation of the purposes behind the ascent in cybercrime and their effect. In shutting the creators suggest a few preventive measures and potential answers for the assault, dangers and weaknesses of network safety. The paper presumes that while innovation plays a part to play in lessening the effect of digital assaults, the weakness lives with human way of behaving and mental inclinations. While writing upholds the risks of mental susceptibilities in digital assaults interest in authoritative training efforts offer confidence that digital assaults can be decreased.
      PubDate: 2023-10-31
      DOI: 10.37628/jdcas.v8i2.1872
      Issue No: Vol. 9, No. 1 (2023)
       
  • Harnessing the Power of Information Technology in Libraries

    • Free pre-print version: Loading...

      Authors: Prashant Bopapurkar
      Pages: 16 - 20
      Abstract: In an age characterized by rapid technological advancements and an ever-growing volume of digital information, libraries face the imperative to adapt and harness the power of information technology to remain relevant and fulfill their mission as information hubs. This abstract explores the transformative impact of information technology on libraries, highlighting key themes and challenges in this dynamic landscape. Libraries have evolved from traditional repositories of print materials into dynamic digital spaces where information is accessed, curated, and disseminated through sophisticated IT systems. Information technology integration has produced several noteworthy developments, including: 1. Digital collections: Libraries now offer extensive digital collections, encompassing e-books, academic journals, multimedia resources, and archival materials, making information more accessible to patrons worldwide. 2. Online Catalogs: Traditional card catalogs have been replaced by user-friendly online catalogs, improving search ability and discovery of materials within library collections. 3. Library Management Systems: Modern library management systems streamline administrative tasks, enhancing the efficiency of acquisitions, cataloging, circulation, and patron management. 4. Remote Access: Information technology enables remote access to library resources, facilitating learning, research, and collaboration beyond physical library boundaries. 5. Data Analytics: Libraries leverage data analytics to better understand user behavior, tailor services, and make data-driven decisions, thus improving overall library performance. 6. Digital Preservation: IT tools and strategies are employed to ensure the long-term preservation of digital collections, safeguarding cultural heritage for future generations. Despite these positive transformational effects, libraries nevertheless encounter many difficulties in utilizing information technology. These include problems with financial limitations, the digital divide, data privacy, cyber security, and the ongoing requirement for employee development. Libraries must also contend with changing user tastes and expectations in the digital age. In conclusion, a new era of creativity and accessibility has begun because of the integration of information technology into libraries. In addition to improving their services, libraries that successfully adopt these technological innovations establish themselves as essential sources of knowledge in an increasingly digital society. Libraries must maintain their agility, commitment to their mission, and responsiveness to the changing requirements of their varied user base to negotiate difficulties and take advantage of the opportunities given by information technology.
      PubDate: 2023-10-23
      DOI: 10.37628/jdcas.v9i1.1867
      Issue No: Vol. 9, No. 1 (2023)
       
  • TCP Security Action Prediction Algorithm based on Machine Learning: A
           Review

    • Free pre-print version: Loading...

      Authors: Mehrum Shaikh, Nakhate Pratiksha, Nitin Birajdar, Prachi Deshpande
      Pages: 21 - 26
      Abstract: The growing range of applications available on the Internet and continuous technological improvements have led to an increase in network security incidents and cyber-attacks. Consequently, computer network security is becoming more and more important. Network security can be allowed or prohibited by a TCP firewall; a device used for computer network security. When utilising classic firewalls, network managers must periodically choose which packets to admit and prohibit to keep computer networks secure. However, due to the vast amount of data on the internet, network managers have an extremely difficult duty. Consequently, it is imperative to use computer technology and machine learning to overcome this problem.
      PubDate: 2023-12-27
      Issue No: Vol. 9, No. 1 (2023)
       
  • Digital Voting System: A New Approach towards Election

    • Free pre-print version: Loading...

      Authors: Md Raj, Swapna Halder, Saswati Naskar
      Pages: 27 - 32
      Abstract: In this paper we have researched an online voting system but in a different approach. We used weightage to one’s vote where every voter will not have equal value of his vote, we read the introduction, research objectives, methodology, procedure, and result of the research. This kind of research is speculative. A digital platform known as a "online voting system" enables users to cast ballots online using an electronic device. It typically involves a web-based interface that guides users through the voting process and uses encryption and security protocols to ensure the integrity and confidentiality of the votes. Online voting systems are still in the experimental phase and have not been widely adopted due to concerns about security, privacy, and accessibility.
      PubDate: 2023-11-07
      Issue No: Vol. 9, No. 1 (2023)
       
  • E-Invoicing: A Comprehensive Solution For Small Business Owners

    • Free pre-print version: Loading...

      Authors: Gosavi Atharv Vijaykumar, Gore Krushna Nanasaheb, Jagdale Sudarshan Mahesh, Jawale Shantanu Abasaheb
      Pages: 28 - 37
      Abstract: Digital invoicing is a payment processing method that has gained popularity among businesses due to its convenience and efficiency. This method allows businesses to receive payment quickly and securely without the inconvenience of handling paper bills and check payments. By leveraging digital invoices, bill delivery and payment processing can occur entirely online, thus enhancing operational efficiency and minimizing costs. One of the key advantages of digital invoices is their ability to offer businesses an option to present invoices in electronic formats such as PDF or on websites. This allows customers to review invoices before making payments, thus increasing transparency and improving customer satisfaction. Furthermore, digital invoices can be customized to include branding and other relevant information, which can help reinforce the business's brand identity and improve recognition.
      PubDate: 2023-10-31
      DOI: 10.37628/jdcas.v8i2.1876
      Issue No: Vol. 9, No. 1 (2023)
       
  • Steganography on Audio File: A Review

    • Free pre-print version: Loading...

      Authors: Rahul R, R Apoorva, Rajath Rajath, Sakshith Varambally, K. S. Shivaprakasha
      Pages: 1 - 6
      Abstract: Security of the message is more crucial and significant since the majority of real-time applications employ digital communication. One such method that can be used to conceal the information is steganography. Steganography is the method of hiding secret information such as image, text, audio in a carrier file such as Audio File, Video file or Image. Audio Steganography is preferred over other cover files due to its large redundancy. In this paper, we have made an attempt in studying research based on audio steganographic techniques. Different types of audio steganography have been compared and analysed.
      PubDate: 2023-03-10
      Issue No: Vol. 8, No. 2 (2023)
       
  • Implementation of IoT-based AI-assistant for Home Automation

    • Free pre-print version: Loading...

      Authors: Cholke Dnyaneshwar Ramdas, Varode Shivani Sharad, Pawar Atharv Babasaheb, Pawar Siddharth Anil, Gite Shubham Narayan
      Pages: 22 - 27
      Abstract: Smart devices have been an essential part of our daily lives for a few years now. As a result, providing amenities and security is becoming increasingly crucial on smart gadgets. This article aims to build an Android mobile device compatible home automation system. The system and mobile devices can communicate with one another thanks to Wi-Fi. Recent research examines IoT-based smart home automation. The mobile application can be loaded and used on any compatible device to communicate with the system. Via a simple and appealing GUI application that is easy to use for the typical user, commands to turn on/off electrical equipment, such as lights, fans, and air conditioners, as well as set timers, may be sent quickly and easily from mobile devices.
      PubDate: 2023-07-28
      DOI: 10.37628/jdcas.v8i2.1845
      Issue No: Vol. 8, No. 2 (2023)
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.220.62.183
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-
JournalTOCs
 
 
  Subjects -> COMMUNICATIONS (Total: 518 journals)
    - COMMUNICATIONS (446 journals)
    - DIGITAL AND WIRELESS COMMUNICATION (31 journals)
    - HUMAN COMMUNICATION (19 journals)
    - MEETINGS AND CONGRESSES (7 journals)
    - RADIO, TELEVISION AND CABLE (15 journals)

DIGITAL AND WIRELESS COMMUNICATION (31 journals)

Showing 1 - 31 of 31 Journals sorted alphabetically
Ada : A Journal of Gender, New Media, and Technology     Open Access   (Followers: 22)
Advances in Image and Video Processing     Open Access   (Followers: 24)
Communications and Network     Open Access   (Followers: 13)
E-Health Telecommunication Systems and Networks     Open Access   (Followers: 3)
EURASIP Journal on Wireless Communications and Networking     Open Access   (Followers: 14)
Future Internet     Open Access   (Followers: 87)
Granular Computing     Hybrid Journal  
IEEE Transactions on Wireless Communications     Hybrid Journal   (Followers: 26)
IEEE Wireless Communications Letters     Hybrid Journal   (Followers: 42)
IET Wireless Sensor Systems     Open Access   (Followers: 18)
International Journal of Communications, Network and System Sciences     Open Access   (Followers: 9)
International Journal of Digital Earth     Hybrid Journal   (Followers: 15)
International Journal of Embedded and Real-Time Communication Systems     Full-text available via subscription   (Followers: 6)
International Journal of Interactive Communication Systems and Technologies     Full-text available via subscription   (Followers: 2)
International Journal of Machine Intelligence and Sensory Signal Processing     Hybrid Journal   (Followers: 3)
International Journal of Mobile Computing and Multimedia Communications     Full-text available via subscription   (Followers: 2)
International Journal of Satellite Communications and Networking     Hybrid Journal   (Followers: 39)
International Journal of Wireless and Mobile Computing     Hybrid Journal   (Followers: 8)
International Journal of Wireless Networks and Broadband Technologies     Full-text available via subscription   (Followers: 2)
International Journals Digital Communication and Analog Signals     Full-text available via subscription   (Followers: 2)
Journal of Digital Information     Open Access   (Followers: 181)
Journal of Interconnection Networks     Hybrid Journal   (Followers: 1)
Journal of the Southern Association for Information Systems     Open Access   (Followers: 2)
Mobile Media & Communication     Hybrid Journal   (Followers: 10)
Nano Communication Networks     Hybrid Journal   (Followers: 5)
Psychology of Popular Media Culture     Full-text available via subscription   (Followers: 1)
Signal, Image and Video Processing     Hybrid Journal   (Followers: 11)
Ukrainian Information Space     Open Access  
Vehicular Communications     Full-text available via subscription   (Followers: 4)
Vista     Open Access   (Followers: 4)
Wireless Personal Communications     Hybrid Journal   (Followers: 6)
Similar Journals
Similar Journals
HOME > Browse the 73 Subjects covered by JournalTOCs  
SubjectTotal Journals
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.220.62.183
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-