Results (52)
Search Parameters:
Keyword: NetworkA Cloud-Native Decision Intelligence Architecture for Sustainable CPG Supply Chain Networks
by Prahlad Chowdhury
Journal of Engineering Research and Sciences, Volume 5, Issue 1, Page # 35-45, 2026; DOI: 10.55708/js0501004
Abstract: Many retail and consumer packaged goods (CPG) companies use disconnected data pipelines, which can slow down decisions and increase costs. This paper introduces a cloud-native data architecture that brings together sell-in, sell-out, marketing, e-commerce, and financial data into one managed source of truth. This setup helps teams make timely and reliable decisions. Built on Snowflake,… Read More
(This article belongs to the Special Issue on SP8 (Special Issue on Digital and Engineering Transformations in Science and Technology (SI-DETST-26)) and the Section Information Systems – Computer Science (ISC))
Connecting Mobile Devices Transparently with the Customer Network in a User-Friendly Manner
by Dirk Henrici and Andreas Boose
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 1-8, 2025; DOI: 10.55708/js0410001
Abstract: The mobile data service in cellular networks can be more than just providing Internet access: it can connect mobile devices seamlessly and transparently to private networks like company intranets and home networks. Such a service is nowadays provided to usually larger customers based on customer-specific access point names and connecting the private data path via… Read More
(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Telecommunications (TEL))
Water Potability Prediction Using Neural Networks
by Ranyah Taha, Fuad Musleh and Abdel Rahman Musleh
Journal of Engineering Research and Sciences, Volume 4, Issue 5, Page # 1-9, 2025; DOI: 10.55708/js0405001
Abstract: The crucial need for maintaining specific water potability levels depending on the sector of utilization, this is becoming increasingly challenging due to the increased pollution. It is therefore important to have fast and reliable water potability assessment techniques. A subset of Machine Learning (ML); being Deep Learning (DL), can be utilized to develop models capable… Read More
(This article belongs to the Special Issue on SP6 (Special Issue on Computing, Engineering and Sciences (SI-CES 2024-25)) and the Section Artificial Intelligence – Computer Science (AIC))
Analysis of 5G Business Model Components for Mobile Network Operators in Sub-Saharan Africa
by Laurence Banda
Journal of Engineering Research and Sciences, Volume 4, Issue 2, Page # 1-10, 2025; DOI: 10.55708/js0402001
Abstract: The fierce race among mobile network operators (MNOs) to roll out fifth-generation (5G) networks has intensified. One of the potential markets where 5G deployment has increased tremendously is Sub-Saharan Africa. This is primarily due to rapid economic growth and the new opportunities that 5G networks and the associated technologies are expected to offer through sustainable… Read More
(This article belongs to the Section Operations Research and Management Science (ORM))
A Bibliometric Analysis Review on Energy Optimization while Designing Wireless Sensor Networks
by Makwena Idah Masopoga, Mbuyu Sumbwanyambe, Zenghui Wang and Nthambeleni Reginald Netshikweta
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 81-92, 2024; DOI: 10.55708/js0311007
Abstract: Energy optimisation algorithms play an essential role in reducing energy usage. Hence, it is mandatory to identify current themes and predict future research study in energy optimisation algorithms (EOAs) in wireless sensor networks (WSNs). Several reviews have been conducted on energy optimisation algorithms (EOAs) in WSNs, although many focused on narrative reviews. This study focuses… Read More
(This article belongs to the Section Electrical Engineering (ELE))
Secure Anonymous Acknowledgments in a Delay-Tolerant Network
by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))
Conceptual Business Model Framework for AI-based Private 5G-IoT Networks
by Laurence Banda
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 13-20, 2024; DOI: 10.55708/js0310002
Abstract: The fusion of fifth generation (5G) networks, Internet of Things (IoT) and artificial intelligence (AI), referred to as intelligent connectivity by most industry experts, can be seen as a crucial success factor for sustainable digitalization. Until recently, research into these key triad technologies has been conducted in isolation. One of the promising applications of intelligent… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Telecommunications (TEL))
An Integrated Approach to Manage Imbalanced Datasets using PCA with Neural Networks
by Swarup Kumar Mondal and Anindya Sen
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 1-12, 2024; DOI: 10.55708/js0310001
Abstract: Imbalanced dataset handling in real time is one of the most challenging tasks in predictive modelling. This work handles the critical issues arising in imbalanced dataset with implementation of artificial neural network and deep neural network architecture. The usual machine learning algorithms fails to achieve desired throughput with certain input circumstances due to mismatched class… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Artificial Intelligence – Computer Science (AIC))
Keratoconus Disease Prediction by Utilizing Feature-Based Recurrent Neural Network
by Saja Hassan Musa, Qaderiya Jaafar Mohammed Alhaidar and Mohammad Mahdi Borhan Elmi
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 44-52, 2024; DOI: 10.55708/js0307004
Abstract: Keratoconus is a noninflammatory disorder marked by gradual corneal thinning, distortion, and scarring. Vision is significantly distorted in advanced case, so an accurate diagnosis in early stages has a great importance and avoid complications after the refractive surgery. In this project, a novel approach for detecting Keratoconus from clinical images was presented. In this regard,… Read More
(This article belongs to the Section Biomedical Engineering (BIE))
Comprehensive Analysis of Software-Defined Networking: Evaluating Performance Across Diverse Topologies and Investigating Topology Discovery Protocols
by Nikolaos V. Oikonomou, Dimitrios V. Oikonomou, Eleftherios Stergiou and Dimitrios Liarokapis
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 23-43, 2024; DOI: 10.55708/js0307003
Abstract: Software-defined networking (SDN) represents an innovative approach to network architecture that enhances control, simplifies complexity, and improves operational efficiencies. This study evaluates the performance metrics of SDN frameworks using the Mininet simulator on virtual machines hosted on a Windows platform. The research objectives include assessing system performance across various predefined network topologies, investigating the impact… Read More
(This article belongs to the Special Issue on SP4 (Special Issue on Computing, Engineering and Sciences 2023-24) and the Section Software Engineering – Computer Science (SEC))
Educational Applications and Comparative Analysis of Network Simulators: Protocols, Types, and Performance Evaluation
by Nikolaos V. Oikonomou and Dimitrios V . Oikonomou
Journal of Engineering Research and Sciences, Volume 3, Issue 6, Page # 18-32, 2024; DOI: 10.55708/js0306003
Abstract: This work explores the role of simulation in computer networks, discussing various network types, communication protocols, and the utilization of network simulators, with a focus on educational settings. We specifically analyze and compare five prominent network simulators: Cisco Packet Tracer, Riverbed Modeler Academic Edition, GNS3, NS-3, and Mininet. These tools are examined in terms of… Read More
(This article belongs to the Special Issue on SP4 (Special Issue on Computing, Engineering and Sciences 2023-24) and the Section Software Engineering – Computer Science (SEC))
Graph-based Tool for Bandwidth Estimation, Health Monitoring and Update Planning in Broadband Networks
by Gian Paolo Jesi and Andrea Odorizzi
Journal of Engineering Research and Sciences, Volume 2, Issue 4, Page # 1-13, 2023; DOI: 10.55708/js0204001
Abstract: This paper focuses on the genesis and evolution of our specific Company tool. It is aimed to tackle the problem of verifying the health status and availability of residual bandwidth between any node over the Lepida ScpA broadband network. In fact, there must be a correspondence between active contractual obligations signed by local network operators… Read More
(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Telecommunications (TEL))
Hybrid Frameworks for the Multi-objective Optimization of Distributed Generation Units and Custom Power Devices with Simultaneous Distribution Network Reconfiguration
by Pamela Ramsami and Robert Tat Fung Ah King
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 186-197, 2022; DOI: 10.55708/js0105020
Abstract: The increased penetration of renewable energy sources in the distribution system affects the stability and efficiency of the system. To account for the intermittent nature of these sources, distribution network reconfiguration and the integration of custom power devices are important. This paper aims to identify the optimum location of photovoltaic systems and unified power quality… Read More
(This article belongs to the Section Electronic Engineering (EEE))
Surface Defect Detection using Convolutional Neural Network Model Architecture
by Sohail Shaikh, Deepak Hujare and Shrikant Yadav
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 134-144, 2022; DOI: 10.55708/js0105014
Abstract: With the dominance of a technical and volatile environment with enormous consumer demands, this study aims to investigate the advancements in quality assurance in the era of Industry 4.0. For better production efficiency, rapid and robust automated quality visual inspection is developing rapidly in product quality control. Deep neural network architecture is built for a… Read More
(This article belongs to the Section Artificial Intelligence – Computer Science (AIC))
Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network
by Yubaraj Gautam, Kazuhiko Sato and Bishnu Prasad Gautam
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 88-101, 2022; DOI: 10.55708/js0105010
Abstract: Software-Defined Networking (SDN) is an emerging Network technology that can augment the data plane with control plane by using programming technique. However, there are a numbers of security challenges which are required to address to achieve secured communication. Flooding attack is one of the most common threats on the internet for the last decades which… Read More
(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))
A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges
by Frederick Ojiemhende Ehiagwina, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem and Khadijat Mustapha
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Abstract: Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust… Read More
(This article belongs to the Section Multidisciplinary – Sciences (MLS))
Neural Networks and Digital Arts: Some Reflections
by Rômulo Augusto Vieira Costa and Flávio Luiz Schiavoni
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 10-18, 2022; DOI: 10.55708/js0101002
Abstract: The Constant advancement in the area of machine learning has unified some areas that until then di a of computing with the arts in general. With the emergence of digital art, people have become increasingly interested in the development of expressive techniques and algorithms for creating works of art, whether in the form of music,… Read More
(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Artificial Intelligence – Computer Science (AIC))
Harnessing the Power of Machine Learning and Sensor Detection in a Simulation for the Design of Smart Date Harvesting Robot
by Hanan Hassan Ali Adlan, Reham Al Zamanan, Leen Almufleh, Tala Almuqrin and Jory Alhassoun
Journal of Engineering Research and Sciences, Volume 5, Issue 2, Page # 1-8, 2026; DOI: 10.55708/js0502001
Abstract: The Traditional date harvesting is labor-intensive and inefficient, leading to losses and quality issues. This paper introduces an AI-powered robotic system that automates date harvesting using computer vision, LiDAR sensors, and a robotic arm with a suction mechanism. The robot is capable of perception, it detects, classifies, and harvests ripe dates autonomously, ensuring minimal damage… Read More
(This article belongs to the Section Automation and Control Systems (ACS))
Binary Image Classification with CNNs, Transfer Learning and Classical Models
by Nikolaos Vasileios Oikonomou, Dimitrios Vasileios Oikonomou, Sofia Panagiota Chaliasou and Nikolaos Rigas
Journal of Engineering Research and Sciences, Volume 5, Issue 1, Page # 66-75, 2026; DOI: 10.55708/js0501006
Abstract: This study presents a comprehensive comparative analysis of binary face classification utilizing Deep Learning and traditional Machine Learning approaches. We evaluate three distinct modeling strategies: (1) End-to-end Convolutional Neural Networks (CNNs), including a baseline TensorFlow model and an optimized PyTorch architecture; (2) Hybrid CNN-MLP networks; and (3) Feature extraction via a pre-trained ResNet50 coupled with… Read More
(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Artificial Intelligence – Computer Science (AIC))
A Vendor-Agnostic Multi-Cloud Integration Framework Using Boomi and SAP BTP
by Padmanabhan Venkiteela
Journal of Engineering Research and Sciences, Volume 4, Issue 12, Page # 1-14, 2025; DOI: 10.55708/js0412001
Abstract: The shift toward multi-cloud strategies has made a vendor-agnostic integration framework indispensable for seamlessly orchestrating workflows across heterogeneous platforms. Modern enterprises increasingly rely on a mix of cloud ecosystems leveraging Amazon Web Services (AWS) for elasticity, Google Cloud Platform (GCP) for advanced AI/ML capabilities, Azure Cloud and Oracle Cloud Infrastructure (OCI) for critical enterprise workloads… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Unveiling the Evolving Threat Landscape of Distributed Denial-of-Service (DDoS) Attacks Methodology and Security Measures
by Eman Eyadat, Mohammad Eyadat and Abedalrahman Alfaqih
Journal of Engineering Research and Sciences, Volume 4, Issue 10, Page # 9-20, 2025; DOI: 10.55708/js0410002
Abstract: This paper proposes a concrete severity classification framework and an evaluation lens for DDoS defenses (not a descriptive survey) and contributes two specific advancements. First, it introduces a quartile-based severity classification framework for Distributed Denial of Service (DDoS) attacks that extends beyond conventional binary detection. The framework classifies observed traffic into four categories (Q1–Q4) using… Read More
(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Information Systems – Computer Science (ISC))
Blending Bio Inspired Algorithm and Cross Layering for Optimal Route in MANETS; 6G Scenario
by Sadanand Ramchandrarao Inamdar and Jayashree Irappa Kallibaddi
Journal of Engineering Research and Sciences, Volume 4, Issue 9, Page # 22-29, 2025; DOI: 10.55708/js0409003
Abstract: In order to find the best path in 6G scenario, this paper suggests a directional routing approach for Mobile Ad hoc NETworks (MANETs) that investigates clubbing of updated Tunicate Swarm Algorithm (TSA), an updated intensification technique inspired by biology and Cross Layer Interaction (CLI). To address its previous shortcoming of trapping into local optima, updated… Read More
(This article belongs to the Section Interdisciplinary Applications – Computer Science (IAC))
An Optimized Algorithm for Solving the Maximum Independent Set Problem
by Hager Hussein
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 24-30, 2025; DOI: 10.55708/js0408003
Abstract: Software engineering plays an important role in computer science. Novel quantum algorithms can efficiently solve software-engineering problems. Not only software engineering but also many industries including logistics, finance, genomics, resource allocation, logistics, bioinformatics, mobile agents and more have optimization problems. Such problems may have long time solutions. Research has been conducted to improve the performance… Read More
(This article belongs to the Section Quantum Science and Technology (QST))
AI-Enhanced Endpoint Compliance and Automated Vulnerability Management Framework for Essential Government Infrastructure
by Harshavardhan Malla
Journal of Engineering Research and Sciences, Volume 4, Issue 8, Page # 18-23, 2025; DOI: 10.55708/js0408002
Abstract: Public sector IT infrastructures that underpin essential services, such as transportation and law enforcement, are becoming progressively susceptible to advanced cyber attacks and encounter heightened regulatory demands, especially in accordance with CJIS and NIST standards. Regrettably, existing methods for compliance enforcement and patch management are primarily manual or only slightly automated, thereby constraining their scalability,… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Enhancing Breast Cancer Detection through a Hybrid Approach of PCA and 1D CNN
by Samet Aymaz
Journal of Engineering Research and Sciences, Volume 4, Issue 4, Page # 20-30, 2025; DOI: 10.55708/js0404003
Abstract: Breast cancer is a prevalent disease, particularly among women. Unlike many other cancers, early diagnosis and treatment can significantly improve patients’ quality of life. This study develops a hybrid approach for breast cancer detection using the Wisconsin datasets by combining Principal Component Analysis (PCA) and 1D Convolutional Neural Network (CNN) architectures to effectively separate and… Read More
(This article belongs to the Special Issue on SP7 (Special Issue on Multidisciplinary Sciences and Advanced Technology (SI-MSAT 2025)) and the Section Artificial Intelligence – Computer Science (AIC))