Results (20)
Search Parameters:
Keyword: CommunicationAnalyzing the Impact of Optical Wireless Communication Technologies on 5G/6G and IoT Solutions: Prospects, Developments, and Challenges
by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 5, Page # 23-36, 2024; DOI: 10.55708/js0305003
Abstract: The imminent 5G and 6G communication systems are projected to exhibit substantial advancements in comparison to the current 4G communication system. Several critical and prevalent concerns pertaining to the service quality of 5G and 6G communication systems encompass elevated capacity, extensive connectivity, minimal latency, robust security measures, energy efficiency, superior quality of user experience, and… Read More
(This article belongs to the Special Issue on SP4 (Special Issue on Computing, Engineering and Sciences 2023-24) and the Section Telecommunications (TEL))
Model for Assessing Mobile Business Intelligence Readiness within South African Telecommunications Industry
by Philip Marothi Lemekwane and Nkqubela Ruxwana
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 213-222, 2022; DOI: 10.55708/js0105022
Abstract: To determine what needs to be done, organisations throughout the world need the capability to find out quickly, what is happening and why it happened. Therefore, having the intelligence to make informed decisions at the right time and place is the key to success in today's dynamic environment. As mobile systems become increasingly available, more… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
Competency Manifestation Clues within Interactions in Computer Mediated Communication
by Hocine Merzouki, Nada Matta, Hassan Atifi and Francois Rauscher
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 167-178, 2022; DOI: 10.55708/js0105018
Abstract: The notion of competence is multidimensional and polysemic. Several definitions of this notion are present in the literature according to disciplines such as industry, sociology, management, psychology, etc. It often refers to the experience, knowledge, abilities, skills, behaviors, and attitudes that allow valuable action in a workplace. Beyond its intrinsic value for the individual, competence… Read More
(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))
Bridging the Urban-Rural Broadband Connectivity Gap using 5G Enabled HAPs Communication Exploiting TVWS Spectrum
by Habib M. Hussien, Konstantinos Katzis, Luzango P. Mfupe and Ephrem T. Bekele
Journal of Engineering Research and Sciences, Volume 1, Issue 2, Page # 24-32, 2022; DOI: 10.55708/js0102003
Abstract: As with previous generations of mobile cellular networks, rural regions are projected to face financial and technological challenges in deploying 5G services. At the time, researchers all around the world are investigating the feasibility of utilizing TV White Spaces (TVWS). TVWS is an underutilized/unused section of television spectrum that might be used as a low-cost… Read More
(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Telecommunications (TEL))
Advanced Digital Twin of a Industrial Robotic System for Measuring Pipe Wall Thickness in Nuclear Power Plants
by Rogério Adas Pereira Vitalli and João Manoel Losada Moreira
Journal of Engineering Research and Sciences, Volume 3, Issue 12, Page # 14-23, 2024; DOI: 10.55708/js0312002
Abstract: This paper presents the development of the digital twin of an advanced industrial robotic system for pipe wall thickness inspection in the turbine building of nuclear power plants. The robotic inspection system consists of 3 units, the first being the mobile unit, the second a robotic unit for automatic pipe wall thickness measurement using the… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Robotics (ROB))
Exploring Challenges in Software Testing: A Structuration Theory Perspective
by Tefo Gordon Sekgweleo and Phathutshedzo Makovhololo
Journal of Engineering Research and Sciences, Volume 3, Issue 12, Page # 1-13, 2024; DOI: 10.55708/js0312001
Abstract: Developing software is a huge job, which is why digital product teams rely on the software development life cycle (SDLC). SDLC is a critical framework for digital product teams, and software testing is its most vital component. Testing evaluates software components to identify properties of interest, detect defects, and ensure alignment with requirements. If not… Read More
(This article belongs to the Section Software Engineering – Computer Science (SEC))
A Comparative Analysis of Interior Gateway Protocols in Large-Scale Enterprise Topologies
by Saleh Hussein Al-Awami, Emad Awadh Ben Srity and Ali Tahir Abu Raas
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 60-73, 2024; DOI: 10.55708/js0311005
Abstract: Interior gateway protocols (IGPs) have gained popularity in networking technologies due to their capacity to enable standardized and flexible communication among these algorithms. In autonomous systems (AS), network devices communicate with one another via IGPs. This work presents a fresh investigation into the performance of inner gateway protocols in large-scale enterprise topologies. Also, the experiment… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Electrical Engineering (ELE))
Secure Anonymous Acknowledgments in a Delay-Tolerant Network
by Edoardo Biagioni
Journal of Engineering Research and Sciences, Volume 3, Issue 11, Page # 24-30, 2024; DOI: 10.55708/js0311002
Abstract: TCP and many other protocols use acknowledgments to provide reliable transmission of data over unreliable media. Secure acknowledgments offer a cryptographic guarantee that valid acknowledgments for a given message can only be issued by the intended receiver. In the context of an ad-hoc network, anonymous acknowledgments make it hard for an attacker to determine which… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Cybernetics – Computer Science (CYC))
Navigating the Autonomous Era: A Detailed Survey of Driverless Cars
by Vaibhavi Tiwari
Journal of Engineering Research and Sciences, Volume 3, Issue 10, Page # 21-36, 2024; DOI: 10.55708/js0310003
Abstract: The incorporation of cutting-edge technologies like sensor networks, artificial intelligence (AI), and vehicle-to everything (V2X) communication has hastened the rollout of autonomous vehicles (AVs), offering significant possibilities for the future of transportation. This document offers an extensive overview of AV technology, covering essential elements such as technological infrastructure, degrees of automation, cybersecurity threats, societal impacts,… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Transportation Science & Technology (TST))
A Thorough Examination of the Importance of Machine Learning and Deep Learning Methodologies in the Realm of Cybersecurity: An Exhaustive Analysis
by Ramsha Khalid and Muhammad Naqi Raza
Journal of Engineering Research and Sciences, Volume 3, Issue 7, Page # 11-22, 2024; DOI: 10.55708/js0307002
Abstract: In today's digital age, individuals extensively engage with virtual environments hosting a plethora of public and private services alongside social platforms. As a consequence, safeguarding these environments from potential cyber threats such as data breaches and system disruptions becomes paramount. Cybersecurity encompasses a suite of technical, organizational, and managerial measures aimed at thwarting unauthorized access… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Information Systems – Computer Science (ISC))
SimulatorBridger: System for Monitoring Energy Efficiency of Electric Vehicles in Real-World Traffic Simulations
by Reham Almutairi, Giacomo Berg and Graham Morgan
Journal of Engineering Research and Sciences, Volume 3, Issue 6, Page # 33-40, 2024; DOI: 10.55708/js0306004
Abstract: The increasing popularity and attention in Vehicular Ad-hoc Networks (VANETs) have prompted researchers to develop accurate and realistic simulation tools. Realistic simulation for VANETs is challenging due to the high mobility of vehicles and the need to integrate various communication modalities such as Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) interactions. Existing simulators lack the capability to… Read More
(This article belongs to the Special Issue on SP5 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2024) and the Section Transportation Science & Technology (TST))
Educational Applications and Comparative Analysis of Network Simulators: Protocols, Types, and Performance Evaluation
by Nikolaos V. Oikonomou and Dimitrios V . Oikonomou
Journal of Engineering Research and Sciences, Volume 3, Issue 6, Page # 18-32, 2024; DOI: 10.55708/js0306003
Abstract: This work explores the role of simulation in computer networks, discussing various network types, communication protocols, and the utilization of network simulators, with a focus on educational settings. We specifically analyze and compare five prominent network simulators: Cisco Packet Tracer, Riverbed Modeler Academic Edition, GNS3, NS-3, and Mininet. These tools are examined in terms of… Read More
(This article belongs to the Special Issue on SP4 (Special Issue on Computing, Engineering and Sciences 2023-24) and the Section Software Engineering – Computer Science (SEC))
Applied Salt Technique to Secure Steganographic Algorithm
by Bo Bo Oo
Journal of Engineering Research and Sciences, Volume 2, Issue 2, Page # 8-14, 2023; DOI: 10.55708/js0202002
Abstract: Digital multimedia assets, including photographs, movies, and audio files, have become a staple of contemporary life. Steganography is a method for undetectable information concealment in these files. One can communicate messages to another by modifying multimedia signals so that a human would be unable to tell the difference between the original signal and the altered… Read More
(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Information Systems – Computer Science (ISC))
CAPEF: Context-Aware Policy Enforcement Framework for Android Applications
by Saad Inshi, Mahdi Elarbi, Rasel Chowdhury, Hakima Ould-Slimane and Chamseddine Talhi
Journal of Engineering Research and Sciences, Volume 2, Issue 1, Page # 13-23, 2023; DOI: 10.55708/js0201002
Abstract: The notion of Context-Awareness of mobile applications is drawing more attention, where many applications need to adapt to physical environments of users and devices, such as location, time, connectivity, resources, etc. While these adaptive features can facilitate better communication and help users to access their information anywhere at any time, this however bring risks caused… Read More
(This article belongs to the Special Issue on SP2 (Special Issue on Computing, Engineering and Sciences 2022-23) and the Section Electrical Engineering (ELE))
The Current Trends of Deep Learning in Autonomous Vehicles: A Review
by Raymond Ning Huang, Jing Ren and Hossam A. Gabbar
Journal of Engineering Research and Sciences, Volume 1, Issue 10, Page # 56-68, 2022; DOI: 10.55708/js0110008
Abstract: Autonomous vehicles are the future of road traffic. In addition to improving safety and efficiency from reduced errors compared to conventional vehicles, autonomous vehicles can also be implemented in applications that may be inconvenient or dangerous to a human driver. To realize this vision, seven essential technologies need to be evolved and refined including path… Read More
(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))
An Approach for PAPR Reduction in OFDM System using RCF Technique
by Juhi Singh
Journal of Engineering Research and Sciences, Volume 1, Issue 10, Page # 13-18, 2022; DOI: 10.55708/js0110003
Abstract: OFDM is one of the important modulation techniques for wireless communication which is the advanced version of FDM. Now-a-days congestion networking is growing like AI, IoT, 5G etc. so there is a need of high data rate with low BER. For such a network there is requirement of high-speed secured data transmission that is multicarrier… Read More
(This article belongs to the Section Electronic Engineering (EEE))
Layer Based Firewall Application for Detection and Mitigation of Flooding Attack on SDN Network
by Yubaraj Gautam, Kazuhiko Sato and Bishnu Prasad Gautam
Journal of Engineering Research and Sciences, Volume 1, Issue 5, Page # 88-101, 2022; DOI: 10.55708/js0105010
Abstract: Software-Defined Networking (SDN) is an emerging Network technology that can augment the data plane with control plane by using programming technique. However, there are a numbers of security challenges which are required to address to achieve secured communication. Flooding attack is one of the most common threats on the internet for the last decades which… Read More
(This article belongs to the Special Issue on SP1 (Special Issue on Multidisciplinary Sciences and Advanced Technology 2022) and the Section Interdisciplinary Applications – Computer Science (IAC))
Call Admission Control for Real-Time Applications of TVWS Wireless Access from HAP
by Habib M. Hussien, Sultan F. Meko, Konstantinos Katzis, Luzango P. Mfupe and Ephrem T. Bekele
Journal of Engineering Research and Sciences, Volume 1, Issue 3, Page # 98-105, 2022; DOI: 10.55708/js0103010
Abstract: The rapid change in link capacity and user count induced by platform mobility in communication systems based on high altitude platform stations (HAPS) exploiting TV White Space (TVWS) spectrum may result in a high rate of handover failure and reduced resource utilization. In addition, in High Altitude Platform (HAP) wireless networks exploiting TV White Space… Read More
(This article belongs to the Section Electronic Engineering (EEE))
Analytical Framework to Minimize the Latency in Tele-herbal Healthcare Service
by Ogirima Sanni Abubakar Omuya and Arulogun Oladiran Tayo
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 39-50, 2022; DOI: 10.55708/js0101004
Abstract: Telemedicine is using telecommunications and IT and other ICT tools to widen healthcare services to remote rural areas. ICT global coverage, multicasting ability, and the high capacity of satellites in GEO can be served as an instrument to widen and enhance the high quality of healthcare service to remote rural areas. Long end-to-end latency could… Read More
(This article belongs to the Section Information Systems – Computer Science (ISC))
A State-of-the-Art Survey of Peer-to-Peer Networks: Research Directions, Applications and Challenges
by Frederick Ojiemhende Ehiagwina, Nurudeen Ajibola Iromini, Ikeola Suhurat Olatinwo, Kabirat Raheem and Khadijat Mustapha
Journal of Engineering Research and Sciences, Volume 1, Issue 1, Page # 19-38, 2022; DOI: 10.55708/js0101003
Abstract: Centralized file-sharing networks have low reliability, scalability issues, and possess a single point of failure, thus making peer-to-peer (P2P) networks an attractive alternative since they are mostly anonymous, autonomous, cooperative, and decentralized. Although, there are review articles on P2P overlay networks and technologies, however, other aspects such as hybrid P2P networks, modelling of P2P, trust… Read More
(This article belongs to the Section Multidisciplinary – Sciences (MLS))