Computer Network and Architecture

Dedicated to addressing challenges in networking, this research network seeks innovative solutions to bridge the gap between current limitations and the evolving demands of modern communication systems. A comprehensive review of existing research guides the identification of gaps and limitations. Clear objectives and specific goals drive the exploration of advanced networking technologies. Objectives: - Develop efficient, secure, and scalable networking solutions. - Propose innovative approaches to address contemporary challenges.

INTEREST(S)

Secure Networking SolutionsScalable Networking Solutions

MISSION

Innovate networking solutions to bridge current limitations, ensuring efficiency, security, and scalability in modern communication systems.

VISION

Lead the evolution of advanced networking technologies, envisioning a future where our solutions address contemporary challenges, setting new standards for efficient, secure, and scalable communication systems.

Analyzing the Impact of Nakagami-q Fading on MIMO Channel Capacity at High Signal-to-Noise Ratio.

The proposed research project aims to investigate the capacity characteristics of Multiple-Input Multiple-Output (MIMO) wireless communication channels operating under the influence of Nakagami-q fadi...

Adaptive Fractional Frequency Reuse for Cellular Communication: An approach to enhance the FFR scheme over urban and rural networks.

The cellular communication frequency reuse is a broader concern in modern communication technology. The focus of this proposal is to modify the Fractional Frequency Reuse (FFR) scheme in the Orthogona...

DDoS Attack Detection Using Machine Learning Techniques.

The proposed research project aims to detect DDos attacks using different machine learning algorithms. Distributed Denial of Service (DDoS) attacks have emerged as one of the most destructive and comm...

A novel approach for improving DDoS Attacks with the Application of Machine Learning algorithms

At present, botnets are thought to be among the most advanced vulnerability threats. Botnets generate significant control over a substantial amount of network traffic. According to information securit...

A Dynamic Solar LEACH protocol: A Brief Approach to Improving an Energy Efficient LEACH Routing Protocol.

A wireless network is made up of multiple sensors that participate in data communication inside a cluster framework. In order to extend the longevity of a sensor-based wireless network, it is necessa...

A Decentralized Blockchain Oriented Security Model for IoT-Based Healthcare Monitoring System.

The health system was developed based on economic development. Economic advancement prompts an epidemiological transition from the control of communicable diseases to chronic, non-communicable people....

Development of dynamic small cell sleep mode switching algorithm for ultra-dense cellular networks.

The demand for wireless services and ubiquitous access is increasing exponentially. The fifth generation~(5G) cellular network is introduced and successfully implemented to support the increased data ...