European Journal of Computer Science and Information Technology (EJCSIT)

EA Journals


Survey on Clustering Techniques for Wireless Sensor Networks and Cluster Head Selection Model (Published)

Low-powered wirelessly connected devices create a system that is self-contained and called Wireless sensor network (WSN), this system has a number of practical applications in the modern world. Nodes in WSN are spread out spatially and have wireless communication with other nodes in the network, these nodes are primarily dedicated to sensing the vicinity and recording the physical properties of the area, including collect observations pertaining to humidity, noise, load, temperature Sensors and other factors at a central station. From there, the end user analyzes the information. After distribution, a cluster is formed between nodes, called a cluster. One of the nodes is selected as the cluster’s head, which is used to migrate the data across the network. Clustering is essential in addressing many issues in WSN, particularly in regards to their lifetime, energy savings, and interoperability. Many approaches exist for clustering WSN, the difference between them is in the choice of CH, the number of clusters, the structure of clusters, the policy for data aggregation, the efficiency of communication between clusters, and the choice of communication between internal and external clusters. This article provides a comprehensive comparison of various methods of clustering and their advantages and disadvantages in WSNs. It also describes the principles of CH selection and how it works within each category. This helps the end user to choose the most suitable one protocol for their needs, and also will assist researchers in addressing the problems revealed in the process of clustering WSN.

Keywords: Survey, Wireless Sensor Networks, cluster head selection model, clustering techniques

Evaluation of ICT Security Implementation in Banks: Bangladesh Perspective (Published)

Nowadays, banks are the foundation of a strong economy in any country, whereas information and communication technology (ICT) has become the heart of any bank. As a result, one of the major challenges has become ensuring the security of the banks. Whenever ICT security comes up, the foremost thing that needs to be considered is” PAM, PCI DSS, SIEM, and ICT risk management,” which measures are improving immensely day by day. Under the ICT security guidelines of Bangladesh Bank, all banks are implementing many security measures to ensure ICT security standards. This paper mainly emphasis on the implementation of ICT security measures such as PAM, PCI DSS, SIEM, and ICT risk management through surveys from different banks. It also focuses on the challenges and future prospects of ICT security measures.

Keywords: ICT risk management, ICT security measures, PAM, PCI DSS, Python, SIEM, Survey

Scroll to Top

Don't miss any Call For Paper update from EA Journals

Fill up the form below and get notified everytime we call for new submissions for our journals.