signal-processing

Frontiers in Computer Science | New and Recent Articles

Next-generation communication systems demand uninterrupted mobility across heterogeneous access networks, where users regularly switch among technologies (e.g., Wi-Fi, 5G, and future 6G networks). Network-Based Distributed Mobility Management (NB-DMM) scales and routes better than centralized mobility solutions, but vertical handovers across heterogeneous access domains may still cause handover l…

technologytelecommunications
W
World Journal of Educational Studies

Taking the integration of specialty education with innovation and entrepreneurship education (specialty-innovation integration) as an opportunity, this paper analyzes the existing problems in the current teaching process of the “Computer Organization” course from three aspects — teachers, students, and the curriculum system. Through five measures — improving teachers’ professional competence, int…

Advanced Technologies and Applied ComputingComputer Networks and CommunicationsComputer SciencePhysical Sciences
R
Research Square
J
Journal of King Saud University - Computer and Information Sciences

The stringent energy constraints of sensor nodes in the Industrial Internet of Things (IIoT) pose a critical challenge to network sustainability. While clustering routing protocols are effective in mitigating energy dissipation, optimal Cluster Head (CH) selection remains an NP-hard optimization problem. Existing metaheuristic approaches often suffer from premature convergence and imbalanced expl…

Computer Networks and CommunicationsComputer ScienceEnergy Efficient Wireless Sensor NetworksPhysical Sciences
J
Journal of Network and Systems Management
R
Research Square
˜
˜The œBioscan.

The conceptualization of cybersecurity has fundamentally shifted from a reactive, perimeter-baseddefense posture to an intelligence-driven, proactive paradigm centered on the understanding of theadversarial lifecycle.1 At the nexus of this shift is the Cyber Kill Chain, a methodology adapted frommilitary targeting doctrine that identifies the structured phases an adversary must complete to achiev…

Computer Networks and CommunicationsComputer ScienceNetwork Security and Intrusion DetectionPhysical Sciences
C
Cambridge University Press eBooks
Z
Zenodo (CERN European Organization for Nuclear Research)

This paper defines the core structure of the Branch Admissibility System (BAS) and its governing constraint layer, Applied Semantic Dynamics (ASD). BAS represents decision spaces as branch-based structures governed by competition and capacity, while ASD provides the invariant constraints — Order, Capacity, Exit, Irreversibility, and Jurisdiction — that regulate admissibility under irreversible lo…

Computer Networks and CommunicationsComputer ScienceDistributed systems and fault tolerancePhysical Sciences
C
Cambridge University Press eBooks
Paper
Isabella Verdinelli·Larry Wasserman
1d ago

This comprehensive modern look at regression covers a wide range of topics and relevant contemporary applications, going well beyond the topics covered in most introductory books. With concision and clarity, the authors present linear regression, nonparametric regression, classification, logistic and Poisson regression, high-dimensional regression, quantile regression, conformal prediction and ca…

Advanced Statistical Modeling TechniquesComputer Networks and CommunicationsComputer SciencePhysical Sciences
Z
Zenodo (CERN European Organization for Nuclear Research)

Federated learning (FL) on O-RAN edge gNBs is a natural candidate for slice-level SLA-violation forecasting when raw per-user telemetry is undesirable or infeasible to pool centrally (FL itself does not provide formal privacy guarantees; see Section 8 L16). Yet the deployment design space — sequence backbone, federation algorithm, client-heterogeneity partition, commodity edge hardware — has been…

Computer Networks and CommunicationsComputer SciencePhysical SciencesSoftware-Defined Networks and 5G
R
Research Square
J
Journal of Network and Systems Management
I
International Journal of Academic and Industrial Research Innovations(IJAIRI)

Abstract: This study investigates a hybrid Quantum-AI framework for real-time cybersecurity threat detection and adaptive defense in high-velocity network environments. The central research problem concerns the increasing mismatch between dynamic cyberattacks and conventional intrusion-detection pipelines that are accurate under benchmark conditions but insufficiently reliable under latency, drif…

Computer Networks and CommunicationsComputer ScienceNetwork Security and Intrusion DetectionPhysical Sciences
U
Unmanned Systems

To address the coupled problem of cooperative search and attitude control faced by multi-UAV systems in complex uncertain environments, a unified control strategy based on hierarchical POMDP is proposed. This strategy effectively decomposes multi-scale decision-making problems by constructing a hierarchical architecture of upper-level task planning and lower-level attitude control. The upper leve…

Computer Networks and CommunicationsComputer ScienceDistributed Control Multi-Agent SystemsPhysical Sciences
Z
Zenodo (CERN European Organization for Nuclear Research)

Long-range synchronization of cardiomyocytes via purely elastic substrates is limited by the 1/r3 decay of mechanical interactions. Standard dipole models therefore predict only short-range phase coherence, leaving tissue-scale coordination unexplained. In this work, we introduce a state-dependent network model in which local phase coherence enhances contractile force through mechano-electric fee…

Computer Networks and CommunicationsComputer ScienceNonlinear Dynamics and Pattern FormationPhysical Sciences
C
Cybersecurity

Abstract Distributed Denial of Service attacks (DDoS) are a common and influential network malicious behavior. The timely and accurate detection of Distributed Denial-of-Service (DDoS) attacks constitutes a critically significant research imperative in cyber security. Most current research focuses on classification based on statistical characteristics of network traffic, but less considers the si…

Computer Networks and CommunicationsComputer ScienceNetwork Security and Intrusion DetectionPhysical Sciences
Z
Zenodo (CERN European Organization for Nuclear Research)

In distributed systems, event-driven architecture (EDA) is frequently employed to facilitate flexible and scalable communication between components. Existing research, however, mostly concentrates on infrastructure-level implementations, with little examination of event-driven concepts in whole, user-facing programs. SkillMesh, a web-based social platform created as a regulated experimental setti…

Computer Networks and CommunicationsComputer SciencePhysical SciencesSoftware System Performance and Reliability
Paper
Alice Sheppard
2d ago
Computer Networks and CommunicationsComputer ScienceDistributed systems and fault tolerancePhysical Sciences
research.ioresearch.io

Sign up to keep scrolling

Create your feed subscriptions, save articles, keep scrolling.

Already have an account?