Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
About
Current
Archives
Tech Articles
Editorial Board
Submissions
Join Our Team
Search
Register
Login
Home
/
Archives
/
Vol. 1 (2019): Year 2019 Reprint
Vol. 1 (2019): Year 2019 Reprint
Published:
2022-12-06
Articles
Implementation of Digital Signature Algorithm by using Elliptical Curve p-192
Namita Shah, Darshana Shah
Reprint
Exploratory Analysis of Block Chain Security Vulnerabilities
Pritam Shah, Pavan Manjunath, Saurabh Mishra, Harish Sudarsanan
Reprint
Solution of m – inputs and n-outputs control systems synthesis problem using the Lyapunov gradient speed vector function
М.А. Beisenbi, Zh.О. Basheyeva
Reprint
A Survey on Real Time Database
Krishna Shah, Devansh Jani
Reprint
A Domain Specific Modelling for Monitoring Operations in a Digital Oil Field
Julius Wosowei, Chandrasekar Shastry
Reprint
Advanced data analysis and data mining model for Internet of Things in smart city: A Survey
Seema S, Sushma B
Reprint
Machine to Machine Metamorphosis to the IOT
Pavan Manjunath, Pritam Gajkumar Shah
Reprint
Analysis of Task Scheduling in Hadoop MapReduce Framework
Kamalakant Bawankule, Anil Kumar Singh, Rupesh Kumar Dewaang
Reprint
A novel Diffie Hellman protocol based on NIST p 192 Curve for securing internet of Things
Manu Banga, Abhay Bansal, Pritam Gajkumar Shah
Reprint
An Empirical Study of Elliptic Curve Cryptography for the Resource Constrained Wireless Sensor Network
Pritam Gajkumar Shah
Reprint
A GAN model to produce Photo realistic Images via text command.
Chithra Apoorva D.A, Neetha KS, Brahmananda S H, Manmohan Kumar
Reprint
Cascading of RBFN, PNN and SVM for Improved Type-2 Diabetes Prediction Accuracy
Krishna Swaroop, Ramalingaswamy Cheruku, Damoder Reddy Edla
Reprint
A Survey: Prospects of Internet of Things (IoT) Using Cryptography Based on its Subsequent Challenges
Dhruvi Mewada, Nidhi Dave, Rohan Kumar Prajapati
Reprint
Intra-Optimised Lightweight Enciphering Algorithm based on MQTT Protocol for Internet of Things Secure Application
Ronald Chiwariro, S Rajendran
Reprint
Constructing an appropriate Neural Network for maximising Sugarcane Yield in a particular region
Rajesh S Budihal, S Krishna Anand
Reprint
issn_info
Journal ISSN
Print:
2200-1875
Online:
2200-1883
Verify on ISSN Portal
Make a Submission
Make a Submission
Current Issue
Information
For Readers
For Authors
For Librarians
Library Subscription Form (No Cost)
View Subscribed Institutions
Browse
Developed By
Open Journal Systems
Journal_policies
Journal Policies
Peer Review Process
Publication Ethics
Copyright, Cookies, and GDPR Policy
Archiving & Preservation
Open Access Policy
AI Usage & Authorship Policy
FAST TRACK PUBLICATIONS
Fast-Track Tech Articles
Publish Your Article Instantly
View Published Articles
Visitor Analytics Dashboard
CTF Challenge
CTF Challenge
CTF Challenge Overview
Request Access for PenTest Labs
Login to PenTest Labs
Submit Flags (By Email)
Top Flag Hunters
Sample Question Paper
Sample Question Paper Solutions
DOWNLOAD PenTest Labs
DVWA (Damn Vulnerable Web Application)
bWAPP (Buggy Web Application)
OWASP Juice Shop
Metasploitable 2
WebGoat (OWASP)
pentesting-tools-2025
Security Tools
Pen Testing Tools Recommended by AusJournal – 2025
We use cookies to enhance your experience on ausjournal.com.
Learn more
Accept