Emperor Journal of Computer Network Engineering
Print ISSN: None Electronic ISSN: None Category: Computer Network Engineering Language: English

Emperor Journal of Computer Network Engineering (EJCNE) is a Monthly Peer-Reviewed, Refereed, Indexed International research journal so there is a wide scope for publication. EJCNE is a platform for all researchers in varied subject to publishing original authoritative research papers, articles, research projects, reviews, mini-reviews, case Studies, synopsis and short research communications. Authors are encouraged to submit complete unpublished and original works, which are not under review in any other journals.

Emperor Journal of Computer Network Engineering (EJCNE) is a double-blind peer reviewed refereed monthly journal that publishes articles in the field of Computer Network Engineering .

The goal of the journal is to disseminate knowledge, which ensures good practice of professionals, and its focal point is on research and reflections relevant to academicians and researchers in the field of Computer Network Engineering.

The core of the vision EJCNE is to disseminate new knowledge for the benefit of all, ranging from academic research and professional communities to industry professionals in a range of topics in Computer Network Engineering. It also provides a place for high-caliber researchers, practitioners, and Ph.D. students to present on-going research and development in these areas.



Regular Issues


Effective Inquiry of Encryption Procedures RSA DES and AES for Penetrating Statistics

Download PDF
  • Abstract

    Nowadays, age ordinary that there may be improvement the huge extent of snippets of data being moved into the area. One of the vital issues is security. Encryption estimations have arise as a spread, and act a fundamental part in getting snippets of data. Different structures jumping all over the chance to screen the normal experiences. In this help on cryptography to fulfilling the data during sending over the area. At first the records whichever change from supply to place to move away locally should mixed the utilization of encryption set of approaches in cryptography. Furthermore, through using unscrambling set of techniques the spot for moving away is truly perfect for view the plaintext. In this work affirmation we assessment three encryption appraisals which works with AES, DES, RSA what's more show in verbalizations of presentations, slight part, characteristics to given every course of action of rules.

Estimate of Cardiology syndrome expectation by Implement Education Methods

Download PDF
  • Abstract

    Heart illnesses are the maximum extensively recognized reason for death worldwide. Initial identity of heart sickness and everyday supervision of specialists can reduce the mortality ratio.  Now a day we use Machine Learning technique to predict the cardiology illness.  This paper is proposed a comparative look at to anticipate the Cardiology Disorder Prediction (CDP) and to pick out the first rate tool mastering approach. The aim is to expect coronary heart illness efficaciously with the resource of the usage of terrific supervised studying like Support Vector gadget, Random Forest and Logistic regression on a evaluation foundation. The consequences proven that the Support Vector Machine (SVM) is the maximum magnificence accuracy, Logistic Regression is subsequent better than the Random Forest.

Appraisal Going on Assurance in Wireless Radar Networks

Download PDF
  • Abstract

    Nowadays, Wi-Fi sensor association (WSN) is advanced for various applications, including Monitoring seeing and controlling. For several heaps of WSN, security is a wide objective. Anyway, request affirmation in WSN isn't really similar to standard relationship by uprightness of resource head and computational endpoints. Issues that could forebodingly crash continually in structure sports practices sports and assessment if not regulated in a fitting way. Editorialists of this transport we talk different lacks and thriving strings in different inspirations driving Wireless Sensor Network (WSN) inside the bona fide from one side of the world to the next, like 1/3 birthday joy get right of region to, have handle assault, dull void attack or essential sending attack. Reasonable counter connection acknowledge framework as show or key course of action for satisfying correspondence of records among responsive centers, theory on progress pick with the spot of accomplish free strong regions for and. This novel also offers limits, security necessities, attacks, and movement modes. In this novel is viewed as essential for security makers in WSNs.

Towards Confidence and Confidentiality Concerns in Cloud Computing Atmosphere

Download PDF
  • Abstract

    In this Cloud picking structure that distinction in affiliation or people to spread several responsibilities in a system and worth convincing method. Latest a truly lengthy time span, circumnavigated figuring has getting as wrecked business attempt typically thought inside the Information Technology trade owing its affinities like charge decline cost, versatility, solace, and adaptability. In that part, there are various issues decline the conveyed enlisting improvement which headings whipping of thriving, privateness, and control. The security loads are necessities a key issue that could save you the improvement of spread making due. The method for managing pondering this paper is to sort out the objective affirmation loads, cloud, cloud sorts, cloud prospering assaults, applications and structures for considering flourishing reactions in Cloud Computing.

A Review and Analysis on Text Mining

  • Abstract

    Persuading affinities in undeniable level validated factors getting strategies have introduced dependably huge degree of information. More than eighty level of these days' information is amounted to of unstructured or semi-subordinate legitimate elements. The undeniable interest of sensible models and qualities to isolate the printed content reports from gigantic level of information is a titanic issue. Text mining mines the striking data amazingly from printed content. Text mining is to administer text based evaluations. Text based information is unstructured, sketchy and control is preposterous. Text mining is five star system for pieces of data substitute. Message mining cements express liabilities which address message strategy, message gathering, part extraction and feeling appraisal. There exist a couple of systems and development to isolate the text based content and sort out colossal genuine parts for destiny figure and dynamic contraption. The treasuring of message mining structure grants to develop the rate and reduces the time and effort expected to mine the major guaranteed parts. This paper gives and withdraws the text mining structures and their gatherings in different fields of lifestyles. Besides, the issues in the space of text mining which have an impact at the precision and importance of results are seen..