Academia.eduAcademia.edu

Computers and Networks Engineering

description282 papers
group8,923 followers
lightbulbAbout this topic
Computers and Networks Engineering is a multidisciplinary field that focuses on the design, development, and management of computer systems and network infrastructures. It encompasses hardware and software integration, network protocols, data communication, and cybersecurity, aiming to optimize performance, reliability, and security in computing environments.
lightbulbAbout this topic
Computers and Networks Engineering is a multidisciplinary field that focuses on the design, development, and management of computer systems and network infrastructures. It encompasses hardware and software integration, network protocols, data communication, and cybersecurity, aiming to optimize performance, reliability, and security in computing environments.

Key research themes

1. How can simulation and virtual tools enhance the teaching and practical understanding of network design and security?

This research theme addresses the challenge of effectively teaching complex networking concepts and security protocols using simulation environments and virtual tools. It highlights how integrating these tools in academic curricula bridges the gap between theoretical knowledge and practical skills, improves student engagement, and prepares students for real-world network management and security challenges. The focus is on evaluating different simulation platforms and virtual labs tailored for educational purposes.

Key finding: The paper evaluates three network simulation tools (Delite, NS-3, and Brite) for teaching network design emphasizing capacity, reliability, delay, and topology visualization. It establishes that no single tool suffices for... Read more
Key finding: This study demonstrates the use of virtual machines integrated with dynamic DNS to simulate fully functional Virtual Private Networks, overcoming limitations of traditional simulators. The solution provides students practical... Read more
Key finding: Introduces NS-2 as an open-source discrete event network simulator combining C++ and OTcl languages, facilitating rapid prototyping and detailed simulation of routing, multicast, and IP protocols. The paper offers... Read more

2. What are effective methods to optimize content placement and caching strategies in Content-Centric Networking to enhance overall network performance?

Focusing on the optimization of in-network caching within Content-Centric Networking (CCN), this theme investigates strategies to minimize content redundancy, maximize cache hit ratios, and improve latency and link load. The research explores mathematical and algorithmic content placement policies that consider request rates, node distances, and cache availability, aiming to achieve balanced, efficient data dissemination suitable for future networks such as IoT and vehicular networks.

Key finding: Proposed the COCP caching strategy that optimizes content placement by coupling request rate, distance, and available cache space to reduce content redundancy, resulting in up to 91.46% improvement in cache hits and nearly... Read more

3. How can security in wireless and computer networks be strengthened through advanced protocols, awareness, and infrastructure design?

This research area explores methodologies and practical implementations to enhance the security posture of wireless and computer networks. It covers secure communication protocols like WPA3, intrusion detection/prevention systems, user behavior analysis, regulatory compliance, simulation of secure network topologies, and awareness programs. Emphasis is placed on addressing both technological and human-factor vulnerabilities to safeguard network data, optimize privacy, and resist social engineering and cyber-attacks.

Key finding: This comprehensive work provides an in-depth analysis of the evolving landscape of cryptography and network security challenges in wired and wireless networks, highlighting the need for robust algorithmic implementations and... Read more
Key finding: The project integrates threat analysis, policy development, encryption standards (including WPA3), intrusion detection/prevention systems, and user behaviour analysis to establish a holistic wireless security framework. It... Read more
Key finding: Using robust quantitative methodology, this study uncovers varied cybersecurity awareness among female academics, identifying tailored social engineering vulnerability factors influenced by socio-cultural dynamics. It... Read more

All papers in Computers and Networks Engineering

This project presents the design and simulation of a secure and scalable Virtual Local Area Network (VLAN) tailored for small enterprise environments, with a specific focus on I CAN South Sudan as a case study. The primary objective is to... more
This paper presents the techniques for the development of a web-based interactive virtual laboratory simulation software with a case study of basic Physics experiments to determine the acceleration due to gravity. The virtual learning... more
Service Recommender systems are nothing but the guide for a user or tools that provide appropriate recommendations to users in a personalized way. Now-a-days the amount of customers, services and online information is increasing rapidly... more
In today's digital era, local government units (LGUs) depend on reliable networks to manage data and deliver public services efficiently. The Municipality of Barobo in Surigao del Sur faces communication delays, data management... more
The Information Centric Networking (ICN) approach proposes to rebuild the Internet communication model and to focus entirely on the data content. Although the Named Data Networking (NDN) architecture is considered as one of the most... more
In this document, we present a conceptual model of network slicing, we then formulate analytically some aspects of the model and the optimization problem to address. Next, we propose to use a reinforcement learning SARSA agent to solve... more
The popularity of cloud computing has been growing where the cloud became an attractive alternative rather than classic information processing system. The distributed denial of service (DDoS) attack is one of the famous attacks to cloud... more
Wireless networks have emerged as a fundamental component of modern communication systems, facilitating ubiquitous connectivity and data exchange. However, this convenience comes with an inherent vulnerability to security threats, ranging... more
Nowadays, delivery is mainly done by humans which includes a lot of manual work. The existing way is good but lacks faster deliveries. In the present context the deliveries are not possible 24*7 by humans, especially in the case of... more
In response to challenges identified in the existing network infrastructure at ISAT Annex Senior High School, this study employed the Prepare, Plan, Design, Implement, Operate and Optimize (PPDIOO) model to propose a strategic network... more
In recent years, the rapid growth of information technology and digital communication has become very important to secure information transmission between the sender and receiver. Therefore, steganography introduces strongly to hide... more
Ce document, Les Réseaux et IA, explore la relation complexe entre les réseaux informatiques et l'intelligence artificielle (IA). L'objectif principal est d'analyser comment les technologies de réseau servent de fondation au déploiement,... more
This study explores cybersecurity awareness and resilience among women at Women Online University in Afghanistan, focusing on social engineering threats. The introduction highlights the dynamic cybersecurity landscape, emphasizing the... more
The aim of recommender system is to provide services and product to the user to improve the customer-relationship management. Researchers recognize that recommendation is a great challenge in the field of Business, education, government... more
О. А. Akulova, V. D. Kharchenko. INFORMATION MODELING TECHNOLOGY IN THE DESIGN OF VENTILATION SYSTEMSЦифровая трансформация строительной отрасли является важным и актуальным направлением исследований. Она предполагает широкое внедрение и... more
The Land use/ Land cover changes in urban areas, forest cover, coastal line and the surface of the earth is changing everyday due to natural and manmade causes. Change detection involves quantifying remarkable effect on multi temporal... more
This study aimed to evaluate the cybersecurity management challenges encountered by state universities and colleges in the Zamboanga Peninsula region during the 2021-2022 academic year. The findings revealed that the key challenges... more
Security surveillance is an integral part of any community and must be implemented by governing bodies. The designers, after thorough assessment and consultation, have identified gaps and weaknesses within Barangay Camias of Magalang,... more
This study explores cybersecurity awareness and resilience among women at Women Online University in Afghanistan, focusing on social engineering threats. The introduction highlights the dynamic cybersecurity landscape, emphasizing the... more
The LOFAR radio telescope, which is currently being developed, can be considered as a massive digital data processing instrument for astronomy. The telescope requires an aggregated data transport bandwidth of order twenty Terabits per... more
Artificial Intelligence (AI) has transformed education, raised significant ethical concerns and influenced student perceptions. This study examined the perceptions, awareness, and ethical concerns of AI among students in Zamboanga City.... more
The popularity of cloud computing has been growing where the cloud became an attractive alternative rather than classic information processing system. The distributed denial of service (DDoS) attack is one of the famous attacks to cloud... more
Electronic Commerce, Multimedia Entertainment, Online Education, and similar applications have virtually pushed the need for adapting high speed Giga Bit Ethernet, even at homes and small businesses. There is considerable confusion and... more
In this paper, we devise and evaluate a new Grid-Based Priority Routing (GBPR) protocol for Underwater Wireless Sensor Networks (UWSNs). GBPR utilizes a 3D logical grid view of the monitored area to deliver data packets to sink nodes.... more
Suguru YOSHIMIZU †a) , Student Member, Hiroyuki KOGA †b) , Member, Katsushi KOUYAMA † †c) , Nonmember, Masayoshi SHIMAMURA † † †d) , Kazumi KUMAZOE † † †e) , and Masato TSURU † † †f) , Members SUMMARY With the emergence of... more
Heat Equation Driven Area Coverage (HEDAC) is a state-of-the-art multi-agent ergodic motion control guided by a gradient of a potential field. A finite element method is hereby implemented to obtain a solution of the Helmholtz partial... more
Analog audio needs a separate physical circuit for each channel. Each microphone in a studio or on a stage, for example, must have its own circuit back to the mixer. Routing of the signals is inflexible. Digital audio is frequently wired... more
The current work proposes a novel information theoretic based sensor network design (SND) approach for data reconciliation in a steady state linear process. The proposed approach is based on Kullback-Leibler divergence (KLD), which... more
The current work proposes a novel information theoretic based sensor network design (SND) approach for data reconciliation in a steady state linear process. The proposed approach is based on Kullback-Leibler divergence (KLD), which... more
The objective of this research work focus towards the identification of best variant between decision tree algorithm such as Weighted Decision Trees (WDT), C4.5 Decision Trees and C5.0. Methods: Decision tree has a number of variants such... more
This research investigates students' knowledge in the use of Artificial Intelligence (AI) in education through the administration of a formulated questionnaire. Drawing upon insights from thematic analysis of qualitative responses and... more
Pendahuluan Pada era digital saat ini, komunikasi melalui email telah menjadi bagian integral dari kehidupan kita. Email memungkinkan kita untuk berkomunikasi dengan cepat, mengirim pesan, berbagi informasi, dan berkolaborasi dengan orang... more
The popularity of cloud computing has been growing where the cloud became an attractive alternative rather than classic information processing system. The distributed denial of service (DDoS) attack is one of the famous attacks to cloud... more
In recent years, Micro-Electro-Mechanical System (MEMS) has successfully enabled the development of IPv6 over Low power Wireless Personal Area Network (6LoWPAN). This network is equipped with lowcost, low-power, lightweight and varied... more
This comprehensive research article explores the transformative potential and multifaceted challenges of integrating Artificial Intelligence (AI) consciousness and technological advancements into the higher education system in Bangladesh.... more
Aircraft networks are used to service mission-critical avionics systems as well as cabin systems such as in-flight entertainment. These networks require that the switches used offer line-rate switching as well as bounded latency and... more
One of the major problems of delay tolerant network is the absence of complete path in between the source and destination. In the open literature, these networks are known as challenged network/Intermittently Connected Networks (ICNs).... more
This paper studies the effect of out-of-order packets on the MPTCP performance when using different access technologies, modelled to represent path diversity in terms of delay and reliability. The study identifies trade-offs between... more
IPv6 is an ultimate solution to the Internet address exhaustion. It is believed, the protocol will be requested by not only human but also everything on the earth surface. Furthermore, the improvement on the protocol is important to... more
In-network caching is a key feature of contentcentric networking. It is however a relatively costly mechanism with hardware requirements besides placement/replication strategies elaboration. As content-centric networking is proposed in... more
Esta tese é sobre um método de fatiamento de rede entre múltiplos Sistemas Autônomos. Eu acredito que ela é também sobre transformação. Perseguir o título Ph. D. é se transformar. A transformação profissional e pessoal são as conquistas... more
Today, most of the IT companies are moving towards Cloud infrastructure and technology due to its flexibility, scalability, and cost-effective features. But security is still the main hinderance to accept cloud computing on large scale.... more
We consider the definition of the Expedited Forwarding Per-Hop Behaviour (EF PHB) as given in RFC 2598 [1], and its impact on worst case end-to-end delay jitter. On one hand, the definition in RFC 2598 can be used to predict extremely low... more
This is a work-in-progress report on our work on designing realistic evaluation suites for testing high-speed TCP variants. In this work, we have created an experimental network model that captures some of the complex characteristics of... more
The development of modern computer networks for internet access makes routing protocols needed, and it has an essential role in a real-time system. Therefore, the best and most effective routes can be reached. In this short article, we... more
Download research papers for free!