CINXE.COM
Top Reearch Articles @ 2024
<!doctype html> <html> <head><meta http-equiv="Content-Type" content="text/html; charset=utf-8"> <!--Import Google Icon Font--> <link href="https://fonts.googleapis.com/icon?family=Material+Icons" rel="stylesheet"> <link rel="stylesheet" href="https://use.fontawesome.com/releases/v5.0.13/css/all.css" integrity="sha384-DNOHZ68U8hZfKXOrtjWvjxusGo9WQnrNx2sqG0tfsghAvtVlRW3tvkXWZh58N9jp" crossorigin="anonymous"> <link href="https://fonts.googleapis.com/css?family=Roboto" rel="stylesheet"> <!--Import materialize.css--> <link type="text/css" rel="stylesheet" href="/css/materialize.min.css" media="screen,projection" /> <link type="text/css" rel="stylesheet" href="/css/main.css" /> <!--Let browser know website is optimized for mobile--> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta http-equiv="X-UA-Compatible" content="ie=edge"> <meta name="title" content="Top read research articles in the field of Network Security @ 2019"> <meta name="description" content="Network Security"/> <meta name="keywords" content="Network Security, Mobile and Wireless Security, Network Management"/> <title>Top Reearch Articles @ 2024</title> <link rel="icon" type="image/ico" href="/img/cseij.png"> <style> .hov1:hover { background-color: rgba(253, 247, 247, 0); } </style> </head> <body> <!-- Responsive NavBar --> <div class="navbar-fixed"> <nav class="cyan lighten-2 z-depth-5"> <div class="container"> <div class="nav-wrapper"> <ul> <li id="b-logo"> <a class="brand-logo hov1" href="http://airccse.org" target="blank"><img id="brand-logo" class="hide-on-med-and-down" src="/img/logo.jpg"></a> </li> </ul> <a class="brand-logo" href="/index.html" style="margin-left:7%">CSEIJ</a> <a data-activates="side-nav" class="button-collapse show-on-small left"> <i class="material-icons">menu</i> </a> <ul class="right hide-on-med-and-down"> <li> <a href="/index.html">Home</a> </li> <li> <a href="/editorial.html">Editorial</a> </li> <li class="active"> <a href="/current.html">Current Issue</a> </li> <li> <a href="/submission.html">Submission</a> </li> <li> <a href="/indexing.html">Indexing</a> </li> <li> <a href="/special.html">Special Issue</a> </li> <li> <a href="/contact.html">Contacts</a> </li> </ul> </div> </div> </nav> </div> <!-- SIDE NAVBAR --> <ul class="side-nav" id="side-nav"> <li> <div class="user-view arc"> <a href="cseij_cited.html"> <i id="cl" class="material-icons cyan-text text-lighten-2 right">close</i> </a> <a href="/index.html"><h4 class="grey-text">CSEIJ</h4> </a> </div> </li> <li> <a href="/index.html">Home</a> </li> <li> <a href="/editorial.html">Editorial</a> </li> <li class="active"> <a href="/current.html">Current Issue</a> </li> <li> <a href="/submission.html">Submission</a> </li> <li> <a href="/indexing.html">Indexing</a> </li> <li> <a href="/special.html">Special Issue</a> </li> <li> <a href="/contact.html">Contacts</a> </li> </ul> <div class="fixed-action-btn" id="scrollTop"> <a class="btn btn-small btn-floating waves-effect waves-light blue lighten-1 pulse" onclick="topFunction()"> <i class="material-icons">keyboard_arrow_up</i> </a> </div> <!-- Main Section - Left --> <!-- Main Section - Left --> <section class="section-main"> <div class="container"> <div class="row"> <div class="col s12 m8"> <div class="card z-depth-2"> <div class="card-content"> <h5 class="cyan-text center text-darken-1">Top Read research articles in the field of Mobile Network Communications & Telematics @ 2024</h5> </div> </div> <!-- paper 1 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO REDUCTION TECHNIQUES FOR OFDM SIGNALS </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Z Wang, E Sun, YZ<sup>3</sup> <sup>1,2,3</sup>College of Electronics Information and Control Engineering, Beijing University of Technology, Beijing</p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;"> OFDM (Orthogonal Frequency Division Multiplexing) has been widely adopted for high data rate wireless communication systems due to its advantages such as extraordinary spectral efficiency, robustness to channel fading and better QoS (Quality of Service) performance for multiple users. However, some challenging issues are still unresolved in OFDM systems. One of the issues is the high PAPR (peak-toaverage power ratio), which results in nonlinearity in power amplifiers, and causes out of band radiation and in band distortion. This paper reviews some conventional PAPR reduction techniques and their modifications to achievebetter PAPR performance. Advantages and disadvantages of each technique are discussed in detail. And comparisons between different techniques are also presented. Finally, this paper makes a prospect forecast about the direction for further researches in the area of PAPR reduction forOFDM signals. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">OFDM, PAPR, Clipping, Companding.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf" target="blank"> https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2016.html" target="blank">http://airccse.org/journal/ijmnct/current2016.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 1 --> <!-- paper 2 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">JOURNEY OF MOBILE GENERATION AND COGNITIVE RADIO TECHNOLOGY IN 5G</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Parnika De and Shailendra Singh, Department of Engineering and Application, National Institute of Technical Teacher Training and Research, Bhopal, India.</p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">The ever increasing number of smart network devices may reach up to 24 billion in year 2020 as stated in the recent survey conducted by Forbes magazine. This may obsolete the current 4G technology for handling smart bandwidth allocation to such a large number of devices. In order to cope the challenging need for fast and efficient data transfer over these devices, demands next generation mobile network technology. In literature 5G technology has been suggested that offers appropriate solution to the above issues. 5G is a futuristic technology that would solve many problem of day to day life. By using 5G high data rates can be achieved in the range of Gbps with minimal latency. But the question is how to make such futuristic technology realistic. This can be done by efficiently utilizing the bandwidth in the allotted spectrum. Despite numerous benefits, 5G may critically suffer from tedious implementation problems that have been discussed in this paper. Cognitive radio (CR) is an intelligent radio that works on the principle of dynamic spectrum allocation. Cognitive Radio is capable of learning and adapting to external environment and reuses the frequency when primary user is absent. This paper combine the advantage of two technology 5G terminal and Cognitive radio terminal where 5G provide quality of service and high data rate whereas Cognitive radio give flexibility and adaptability to 5G. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">5G, Cognitive Radio, Spectrum Sensing, Resource Allocation.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2016.html" target="blank">http://airccse.org/journal/ijmnct/current2016.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 2 --> <!-- paper 3 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">DESIGN AND IMPLEMENTATION A NEW ENERGY EFFICIENT CLUSTERING ALGORITHM USING THE FUZZY LOGIC AND GENETIC ALGORITHM FOR WIRELESS SENSOR NETWORKS</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Sayyed Hedayat Tarighinejad<sup>1</sup>Reza Alinaghian<sup>2,3</sup>Mehdi Sadeghzadeh<sup>2,3</sup>, <sup>1</sup>Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Najafabad,Iran<sup>2</sup>Faculty of Computer Engineering,Najafabad Branch,Islamic Azad University,Najafabad,Iran<sup>3</sup>Departmen of computer, Mobarakeh Branch, Islamic Azad University,Mobarakeh,Isfahan,Iran<sup>4</sup>Departmen of computer,Mahshahr Branch, Islamic AzadUniversity,Mahshahr,Iran.</p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Wireless Sensor Networks are consist of small battery powered devices with limited energy resources. Once deployed, the small sensor nodes are usually inaccessible to the user, and thus replacement of the energy source is not feasible. Hence, one of the most important issues that need to be enhanced in order to improve the life span of the network is energy efficiency. to overcome this demerit many research havebeen done. The clustering is the one of the representative approaches. In this paper, we introduce a dynamic clustering algorithm using Fuzzy Logic and genetic algorithm. In fact, using fuzzy system design and system optimization by genetic algorithm is presented approach to select the best cluster head in sensor networks. Using random data set has been addressed to evaluate of fuzzy-genetic system presented in this paper and finally, MSE rate or mean error of sending the messages using proposed fuzzy system in comparison with LEACH method is calculated in select the cluster head. The results of evaluations is representative of a reduction the MSE metric in proposed method in comparison with LEACH method for select the cluster head. Reduce of MSE directly is effective on energy consumption and lifetime of wireless sensor network and can cause the reduce energy consumption and increase network lifetime. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">Wireless sensor networks, fuzzy logic, fuzzy system, genetic algorithm, energy consumption, clustering.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf" target="blank"> https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2016.html" target="blank">http://airccse.org/journal/ijmnct/current2016.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 3 --> <!-- paper 4 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">TRUST BASED SECURITY MODEL TO WITHSTAND AGAINST BLACK HOLE AND GREY HOLE ATTACKS IN MILITARY BASED MOBILE AD HOC NETWORKS</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">S.Sivagurunathan<sup>1</sup>K.Prathapchandran<sup>2</sup>, Department of Computer Science and Applications Gandhigram Rural Institute-Deemed University, Gandhigram-624 302 Tamilnadu, India </p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Significant features of Mobile Ad Hoc Networks make it suitable for modern military communication. These characteristics also weaken the security aspects in terms of attacks. Among the attacks, black hole and grey hole attacks are notable since they are launched internally and cannot be identified easily. The military communication requires confidential information sharing, ensuring correct identity of soldiers but offering such facility in military based MANET is difficult due to its unique nature. As providing authentication is a first form of security, in this article we propose a trust based security model to identifying black hole and grey hole nodes that weaken or collapse the success of mission in military communication. To provide authentication, we incorporate soldier’s interpersonal characteristics in terms of Stereo trust, Situational Awareness trust and soldier’s operational things in terms of first-hand information, second hand information and soldier’s current trust. Simulation results show the efficiency of our proposed model in terms of identifying black hole and grey hole nodes and its performances are compared with an existing model. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">Mobile Ad hoc Networks, Authentication, Security, Black hole, Grey hole, direct trust, indirect trust,Situational Awareness, Stereo.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N3/6316ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2016.html" target="blank">http://airccse.org/journal/ijmnct/current2016.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 4 --> <!-- paper 5 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">MALWARE DETECTION TECHNIQUES FOR MOBILE DEVICES </p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Belal Amro, College of Information Technology, Hebron University</p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Mobile devices have become very popular nowadays, due to is portability and high performance, a mobiledevice became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most the needs of their users. Both software and hardware design focused on increasing performance and the working hours of a mobile device. Different mobile operating systems are being used today withdifferent platforms and different market shares. Like all information systems, mobile systems are prone to malware attacks. Due to the personality feature of mobile devices, malware detection is very important and is a must tool in each device to protect private data and mitigate attacks. In this paper, we will study and analyze different malware detection techniques used for mobile operating systems. We will focus on the to two competing mobile operating systems – Android and iOS. We will asset each technique summarizing itsadvantages and disadvantages. The aim of the work is to establish a basis for developing a mobile malware detection tool based on user profiling. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">Malware, malware detection, mobile device, mobile application, security, privacy</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2017.html" target="blank">http://airccse.org/journal/ijmnct/current2017.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 5 --> <!-- paper 6 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">AN OVERVIEW OF THE BANK FRAUD AND ITS DETECTION TECHNIQUES THROUGH DATA MINING</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">SeyyedHedayatTarighiNejad<sup>1</sup>MohammadNikbakht<sup>2</sup>Mohammad HosseinAfrakhteh<sup>2</sup>, <sup>1</sup>Faculty of Engineering, Islamic Azad University, Yasuj Branch<sup>2</sup>Keshavarzi Bank Staff Management, Kohgiluyeh and Boyer-Ahmad Province</p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Using modern methods of the electronic commerce in daily life transactions is increasing because of the growth and the comfortable access of the people to the internet and social networks. The electronic payment systems are one of the most important electronic commerce methods and the electronic payment fraud is a major problem.For example, the credit card fraud loss increases every year and is regarded as one of the important issues in the credit card institutes and corporations. Therefore, fraud detection is considered as an important research challenge. Fraud reduction is a complicated process requiring a body of knowledge in many scientific fields. Based on the kind of the fraud the banks or the credit card institutes face, different measures may be taken. This paper compares and analyzes the available recent findings on the credit card fraud detection techniques. The objectives of the present study are first to detect different credit card and electronic commerce fraud and then to investigate the strategies used for the purpose of detection.</p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">credit card fraud, fraud detection, data mining techniques, electronic commerce, decision tree, electronic payment systems. </p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2017.html" target="blank">http://airccse.org/journal/ijmnct/current2017.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 6 --> <!-- paper 7 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">SECONDARY USER UNDERCOVER COOPERATIVE DYNAMIC ACCESS PROTOCOL FOR OVERLAY COGNITIVE RADIO NETWORKS</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">A. Masri1, Y. A. S. Dama ,N. Odeh1, F.Hasan,A. Mousa <sup>1</sup>N Eya <sup>2</sup>R. A. Abd-Alhameed,J. M. Noras <sup>2</sup><sup>1</sup>Dept. of Telecommunication Engineering, An-Najah National University, Nablus, Palestine <sup>2</sup>School of Engineering and Informatics, University of Bradford, Bradford, UK</p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Email is a channel of communication which is considered to be a confidential medium of communication for exchange of information among individuals and organisations. The confidentiality consideration about e-mail is no longer the case as attackers send malicious emails to users to deceive them into disclosing their private personal information such as username, password, and bank card details, etc. In search of a solution to combat phishing cybercrime attacks, different approaches have been developed. However, the traditional exiting solutions have been limited in assisting email users to identify phishing emails from legitimate ones. This paper reveals the different email and website phishing solutions in phishing attack detection. It first provides a literature analysis of different existing phishing mitigation approaches. It then provides a discussion on the limitations of the techniques, before concluding with an explorationin to how phishing detection can be improved. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;"> Cognitive Radio, Dynamic Spectrum Access, Resource Management, Cooperative Overlay.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2017.html" target="blank">http://airccse.org/journal/ijmnct/current2017.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 7 --> <!-- paper 8 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">BUSINESS MODELS FOR THE NEXT GENERATION OF MOBILE COMMUNICATIONS</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Ghoul Smail<sup>1</sup>Jia Weijia <sup>2</sup></p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;"> The Next Generation of mobile network 5G, which will be based on a high-speed wireless broadband connection, could bring important changes to the way individuals and businesses employ telecommunications services and solve the issues related to the explosive growth in demand for mobile traffic, and the profitability decreasing of the mobile Broadband market. Therefore, the OMNs (Operator Mobile Networks) should plan for deploying 5G mobile network beyond 2020, which is the expected year for launching 5G. A business analysis study and mathematic modelling approach was considered. Also, a new pricing model is proposed to be consistent with the growth of mobile broadband. The results show that 5G is very beneficial, not only because of its lower cost compared with 4G LTE, but also due to the increment of average data consumptions offered by 5G mobile technologies and the increasing growth of number of users. We also found that good analysis of Price Elasticity of Volume (PED) gives an important margin of benefit. We confirm that the reuse of existing sites have a large impact on reducing costs when a denser macro network deployed. However, we encountered a lack of the limited capacity related to the macro sites and coverage limited with small cell solutions like femtocells, picocells deployed with 5G millimeter Wave system and Wi-Fi. </p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">4G, 5G, Benefit, CAPEX, Cost, OMN, OPEX, Prediction, Techno-economic </p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2017.html" target="blank">http://airccse.org/journal/ijmnct/current2017.html <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 8 --> <!-- paper 9 --> <div class="card"> <h5 id="is" class="cyan lighten-2"><p style="text-align: center;">INVESTIGATION A NEW APPROACH TO DETECT AND TRACK FRAUD IN VIRTUAL LEARNING ENVIRONMENTS BY USING CHAYD MODEL</p></h5> <div class="card-content grey-text"> <ul> <div> <p style="text-align: center;font-size:20px;line-height: 22px;">Sayyed Jalalaldin Gharibi Karyak<sup>1</sup>Sayyed Hedayat Tarighinejad<sup>2</sup></p> <h5 style="color:#c11f1f">ABSTRACT</h5> <p style="text-align: justify;">Virtual University is the environment that with utilizes the appropriate multimedia tools and having good communication infrastructure is a provider of e-learning services, so that usually does not have require to physical location as a traditional university and students are able in any place and at any time be willing to use a lot of services provided, such as e-courses or electronic tests. There are many solutions in order to identify and detect fraud in the online environment that use of these methods can be identified took place fraud, but still is great importance of avoid discussion and fraud detection in virtual university. In this research, we aimed are to investigate a new approach to detect and track fraud in virtual learning environments by using decision tree. (Chayd model). The results showed that the accuracy of the model is 84.54% which is indicative of high performance and high precision in predicting fraud from the teachers, students and hackers.</p> <h5 style="color:#c11f1f">KEYWORDS</h5> <p style="text-align: justify;">E-learning, fraud, Chayd, data mining, decision tree.</p> <br> <p style="text-align: justify;font-size:13px;">For More Details : <br><a href="https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf" target="blank">https://wireilla.com/papers/ijmnct/V6N6/6616ijmnct01.pdf</a></p> <br> <p style="text-align: justify;font-size:13px;">Volume Link : <br><a href="http://airccse.org/journal/ijmnct/current2017.html" target="blank">http://airccse.org/journal/ijmnct/current2017.html</a></p> <br> </div> <br> <div> </div> <br> </ul> </div> </div> <!-- paper 9 --> <br> <br> <br> <br> </div> <!--End Main Section - Left --> <!-- Right Side Bar --> <div id="side-bar" class="col s12 m4"> <div id="section-main"> <div class="card side cyan lighten-2"> <div class="card-content center"> <a href="/index.html" class="ax white-text">Scope & Topics</a> <br><br> <div class="divider"></div> <br> <a href="http://airccse.org/ethics.html" target="blank" class="ax white-text">Ethics</a> <br><br> <div class="divider"></div> <br> <a href="/archives.html" class="ax white-text">Archives</a> <br><br> <div class="divider"></div> <br> <a href="/cseij_cited.html" class="ax white-text">Most Cited Articles</a> <br><br> <div class="divider"></div> <br> <a href="/leaflet.pdf" target="blank" class="ax white-text">Download Leaflet</a> <br> <br><div class="divider"></div> <br> <a href="http://airccse.org/faq.html" target="blank" class="ax white-text">FAQ</a> <br> </div> </div> </div> </div> <!-- end Right Side Bar --> </div> </div> </section> <div class="fixed-action-btn"> <a id="menu" class="btn btn-floating cyan lighten-2 waves-effect waves-light pulse" onmouseover="$('.tap-target').tapTarget('open')"> <i class="material-icons white-text">menu</i> </a> </div> <div class="tap-target-wrapper right-align"> <div class="tap-target cyan" data-activates="menu"> <div class="tap-target-content white-text"> <h5>Reach Us</h5> <br> <i class="material-icons right">email</i>secretary@cseij.org <br> <br> <br> <i class="material-icons right">email</i>cseijsecretary@yahoo.com <br> <br> </div> </div> <div class="tap-target-wave "> <a class="btn-floating cyan tap-target-origin waves-effect waves-light" onmousewheel="$('.tap-target').tapTarget('close')"> <i class="material-icons cyan">close</i> </a> </div> </div> <!-- Dummy Div--> <div id="txtcnt"></div> <!-- Section: Footer --> <footer class="page-footer cyan lighten-3"> <div class="container"> <div class="row"> <div class="footer-m col m3 s12 offset-m2"> <ul> <li> <a class="white-text" href="/contact.html">Contact</a> </li> <li> <a href="mailto:secretary@cseij.org"><b>secretary@cseij.org</b></a> </li> </ul> </div> <div class="social col m4 offset-m3 s12"> <ul> <li> <a class="blue-text text-darken-4" href="https://www.facebook.com/profile.php?id=100009807545171" target="blank"> <i class="fab fa-facebook"> </i> </a> </li> <li> <a class="cyan-text " href="https://twitter.com/cseijjournal" target="blank"> <i class="fab fa-twitter"></i> </a> </li> <li> <a class="red-text text-darken-4" href="https://www.youtube.com/watch?v=7VsiljEK1Rk&list=PLyRzxgBWNe1GJCVYdNdH7pBGiqtF5T7d7" target="blank"> <i class="fab fa-youtube"></i> </a> </li> </ul> </div> </div> </div> <div class="footer-copyright grey darken-2"> <div class="container center-align"> <large class="white-text"> All Rights Reserved ® CSEIJ </large> </div> </div> </footer> <!--Import jQuery before materialize.js--> <script type="text/javascript" src="https://code.jquery.com/jquery-3.2.1.min.js"></script> <script type="text/javascript" src="/js/materialize.min.js"></script> <script src="/js/scrolltop.js"></script> <script src="/js/main.jquery.js"></script> </body> </html>