IJCNC 04
NOISE MITIGATION METHODSFORDIGITALVISIBLE LIGHT COMMUNICATION Wataru Uemura 1 and Takumi Hamano 21 Faculty of Advanced Science and Technology, Ryukoku University, Shiga, Japan2 Faculty of Science and Technology, Ryukoku University, Shiga, … Continue reading
IJCNC 08
An Efficient Federated Forcart Algorithm for Predicting and Allocating Resources in Network Function Virtualization Kavitha.A 1 and Dr.Gobi.M 2 Research Scholar, Department of Computer Science, Chikkanna Government Arts College, Tirupur, … Continue reading
IJCNC 01
AI-Driven Multi-Agent System for QOS Optimization in 6g Industrial Networks Ndidi Nzeako Anyakora M.I.E.E.E and CajetanM. Akujuobi, P.E., S.M.I.E.E.E., F.I.A.A.M. Center of Excellence for Communication Systems Technology Research (CECSTR),Roy G. … Continue reading
IJNSA 04
MACHINE LEARNING FOR NETWORK INTRUSIONDETECTION IN USA CRITICAL INFRASTRUCTURE:CHALLENGES AND OPPORTUNITIES Joy Selasi Agbesi 1, Abigail Nanayaa Otchill 2, Raymond Horlalie Tay 3 and Noah K. Bamfo 4 1 Department; … Continue reading
IJCNC 02
Deep Q-Learing-Driven Power Control for Enhanced Noma User Performance Bach Hung Luu 1, Sinh Cong Lam 1, Nam Hoang Nguyen 2, 1 VNU University of Engineering and Technology, Vietnam, 2 East Asia University of Technology, … Continue reading
PROPOSED COMPREHENSIVE EAVESDROPPING DETECTION SOLUTION IN MULTI-VLAN SWITCHED NETWORK BASED ON IPFIX FLOW
Viet H. Le, Huy-Trung Nguyen, Cuong V. Trinh and Tran Minh Hieu Department of Cybersecurity and High-Tech Crime Prevention,People’s Security Academy, Hanoi, Vietnam Research Institute of Posts and Telecommunications, Data … Continue reading
IJCNC 04
Enhancing Manet Security Through Blockchain-Driven Multipath Route Authentication Gagan Bhatt, Krishna Kaniyal, Jayant Pal and Jogendra Kumar, GBPIET Ghurdauri Pauri Garhwal Uttarakhand, India ABSTRACT Mobile Ad-hoc Networks (MANETs) are wireless … Continue reading
IJNSA 03
Database and System Security Nikitha Merilena Jonnada, University of the Cumberlands, USA ABSTRACT Database and system security are critical components in modern information technology, underpinning the reliability and trustworthiness of … Continue reading
AN EXPLAINABLE GRAPH NEURAL NETWORK FRAMEWORK FOR ANTI–MONEY LAUNDERING IN CRYPTOCURRENCY TRANSACTIONS USING THE ELLIPTIC DATASET
Oluwatosin Lawal 1 , Awele Okolie 2 , Callistus Obunadike 3 1 Department of Mathematics Statistical Analytics, Computing and Modeling, Texas A&M University, Kingsville, USA 2 School of Computing and … Continue reading
IJCNC 03
RLSUAV: RELATIVE LOCALIZATION IN A SWARM OF UAVS Sara Benkouider, Nasreddine Lagraa, and Mohamed Bachir YagoubiLaboratoire d’Informatique et de Mathématiques, Université Amar Telidji de Laghouat,Laghouat, Algeria ABSTRACT A swarm or … Continue reading