IJCNC 04
ACTOR CRITIC APPROACH BASED ANOMALY DETECTION FOR EDGECOMPUTING ENVIRONMENTS Shruthi N1 and Siddesh G K2 1Department of Electronics & Communication, BNMIT, Bangalore, Karnataka, INDIA2Research Head, New Horizon College of Engineering, … Continue reading
IJCNC 08
Spectrum Sharing between Cellular and Wi-Fi Networks Based on Deep Reinforcement Learning Bayarmaa Ragchaa and Kazuhiko Kinoshita Department of Information Science and Intelligent Systems,Tokushima University, Japan ABSTRACT Recently, mobile traf … Continue reading
IJCNC 06
ADAPTIVE BANDWIDTH MANAGEMENT MODEL FOR WIRELESS MOBILE AD-HOC NETWORK Nibedita Jagadev1,Binod Kumar Pattanayak1,Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri3, Mahmoud Ali Al Shugran2 1Department of Computer Science and Engineering, Siksha’O’ Anusandhan Deemed … Continue reading
IJCNC 02
PHISHING URL DETECTION USING LSTM BASED ENSEMBLE LEARNING APPROACHES Bireswar Banik and Abhijit Sarma Department of Computer Science, Gauhati University, Guwahati, India ABSTRACT Increasing incidents of phishing attacks tempt a … Continue reading
IJCNC 01
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL NEURAL NETWORKS (ANNS) Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3 1College of Information Technology United Arab … Continue reading
IJCNC 03
A LIGHTWEIGHT METHOD FOR DETECTING CYBER ATTACKS IN HIGH-TRAFFIC LARGE NETWORKS BASED ON CLUSTERING TECHNIQUES Nguyen Hong Son1 and Ha Thanh Dung2 1Faculty of Information Technology Posts and Telecommunications Institute … Continue reading
IJCNC 01
AN INTRUSION DETECTION MECHANISM FOR MANETS BASED ON DEEP LEARNING ARTIFICIAL NEURAL NETWORKS (ANNS) Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3 1College of Information Technology United Arab … Continue reading
IJCNC 04
Design and Develop Machine Learning Based Frameworks for Combating the Covid-19 Ashenafi Tulu, Jemal Abate2, Tilahun Shiferaw3, Matiyos Alemayehu4 College of Computing and Informatics, P.O.Box 138, Haramaya University, Dire Dawa, … Continue reading
IJCNC 05
EFFICIENT SCRAMBLING-SUBSTITUTION IMAGE SECURITY SCHEME USING CHAOTIC ARNOLD-LOGISTIC MAPS IN THE DISCRETE COSINE TRANSFORM Mohammed A. AlZain Department of Information Technology, College of Computers and InformationTechnology, Taif University, P.O. Box … Continue reading
IJCNC 01
MACHINE LEARNING BASED FRAME SIZE OPTIMIZATION IN WLAN DOWNLINK MU-MIMO CHANNEL WITH THE LEAST COST OF DELAY Lemlem Kassa1, Jianhua Deng1, Mark Davis2 and Jingye Cai11School of Information and Software … Continue reading