LOGO

Current Issue


Volume 15, Issue 2 April-June 2025

S.No Title of The Paper Page No Download
1 Energy-Aware Routing Protocols for Wireless Sensor Networks: A Meta-Analysis
Author(s): W.R. Heinzelman
DOI : https://ijcnwc.2017.v7.i04.pp23-29
23-29
2 Blockchain for Secure Distributed Logging in Multi-Tenant Systems
Author(s): Galina Schwartz
DOI : https://ijcnwc.2017.v7.i04.pp30-36
30-36
3 Cloud Security Automation: Best Practices for Engineers
Author(s): Naveen Kannegundla
DOI : https://ijcnwc.2018.v8.i03.pp70-75
70-75
4 Neural Architecture Search: Automation in Deep Learning Model Design
Author(s): Manuel Egele
DOI : https://ijcnwc.2019.v9.i04.pp26-32
26-32
5 Use of Machine Learning for Classification and Regression Models to Forecast Customers Purchase Intentions
Author(s): Masoom Jabri, J.A. Paulson
DOI : https://ijcnwc.2025.v15.i02.pp1094-1100
1094-1100
6 Cloud Disaster Recovery and Backup Security: Enhancing Data Protection with Zero-Trust Architecture and Blockchain-Based Integrity Verification
Author(s): Soledad Silva Guerín
DOI : https://ijcnwc.2023.v13.i02.pp75-87
75-87
7 Development and Launch of a Hand-Gesture Controlled Mouse
Author(s): Annaluri Durgabhavani, G.Hanumanthrao
DOI : https://ijcnwc.2025.v15.i02.pp1101-1107
1101-1107
8 A Voice-Based Approach to Predicting Gender and Age Using Deep Learning
Author(s): Nelaturi Sandhya Rani, M.Radhika
DOI : https://ijcnwc.2025.v15.i02.pp1108-1114
1108-1114
9 Machine Learning for Software Bug Prediction on the JM1 Dataset
Author(s): Pothuri Jyothi, Ch. Naveen
DOI : https://ijcnwc.2025.v15.i02.pp1115-1122
1115-1122
10 Enhancing Wireless Sensor Networks Security Against Emerging Cyber Threats
Author(s): K. Somasundaram
DOI : https://ijcnwc.2024.v14.i02.pp840-851
840-851
11 A Message Sharing System based on Task and Roles Characteristics in Mobile Environment
Author(s): Mr. Merugu Anand Kumar, Butukuru Rojalakshmi, Lankala Mounika, Dr. Inaganti Shylaja
DOI : https://ijcnwc.2023.v13.i04.pp80-83
80-83
12 A cross-layer loss discrimination scheme for DCCP over the wireless network
Author(s): Chevula Rekha, Arekatla Madhava Reddy, Vanapamula Veerabrahmachari, Gudipati Mohan Singh Yadav
DOI : https://ijcnwc.2023.v13.i04.pp84-89
84-89
13 A Quantum Swarm Evolutionary Algorithm for mining association rules in large databases
Author(s): Aremandla Sai Pujitha, Shaik Guntur Mahabub Subhani, Lankala Mounika, Mr. Merugu Anand Kumar
DOI : https://ijcnwc.2023.v13.i04.pp90-95
90-95
14 Detecting Sybil Attacks using Proofs of Work and Location in VANETs
Author(s): Butukuru Rojalakshmi, Vanapamula Veerabrahmachari, Chevula Rekha, Arekatla Jaganmohan Reddy
DOI : https://ijcnwc.2023.v13.i04.pp96-102
96-102
15 Composite Behavioural Modelling for Identity Theft Detection in Online Social Networks
Author(s): Nagam Aanjaneyulu, Mr. Merugu Anand Kumar, Shaik Guntur Mahabub Subhani, Dr. G. Samba Siva Rao
DOI : https://ijcnwc.2023.v13.i04.pp103-112
103-112
16 Web-Based Applications quality factors: A survey and a proposed conceptual model
Author(s): Arekatla Madhava Reddy, Nagam Aanjaneyulu, Butukuru Rojalakshmi, Mr. Merugu Anand Kumar
DOI : https://ijcnwc.2023.v13.i04.pp113-117
113-117
17 A Comprehensive Survey on Intelligent Firewall-Based Malware Detection Using Proactive and Quantum Approaches
Author(s): Ms Sai Kiranmai, Dr.P. Senthilkumar
DOI : https://ijcnwc.2025.v15.i02.pp1123-1143
1123-1143
18 Enhancing Web Application Security Using Machine Learning Based WAFs
Author(s): Ms. Kusumakumari Daram, Dr.P.Senthilkumar
DOI : https://ijcnwc.2025.v15.i02.pp1144-1156
1144-1156
19 AI-DRIVEN HEALTHCARE DATA FUSION: A COMPREHENSIVE REVIEW OF NLP AND EHR INTEGRATION FOR PREDICTIVE HEALTHCARE
Author(s): Bushra Siddiqua, Dr.Anjaiah Adepu
DOI : https://ijcnwc.2025.v15.i02.pp1157-1168
1157-1168
20 Study of “Breakthrough Technology” Free-Space Laser Satellite Communication
Author(s): Bachu Yesobu, M Aravind Kumar
DOI : https://ijcnwc.2025.v15.i02.pp1169-1174
1169-1174

We are working in partnership with