Vol. 2024 (2024)

Articles

Sara salman Qasim, Sarah Mohammed NSAIF
9 - 17
Advancements in Time Series-Based Detection Systems for Distributed Denial-of-Service (DDoS) Attacks: A Comprehensive Review
https://doi.org/10.58496/BJN/2024/002
PDF
DOI: https://doi.org/10.58496/BJN/2024/002
G. Amirthayogam, N. Kumaran, S. Gopalakrishnan, K.R.Aravind Brito, S. RaviChand, Shruti Bhargava Choubey
88-97
Integrating Behavioral Analytics and Intrusion Detection Systems to Protect Critical Infrastructure and Smart Cities
https://doi.org/10.58496/BJN/2024/010
PDF
DOI: https://doi.org/10.58496/BJN/2024/010
T. Kavitha, M. Venkatesan , S. Gopalakrishnan , S.Ravi Chand, M Gopianand, S. Abirami
69-77
Underwater Wireless Sensors Increase Routing Performance using Impact Efficient localization-based Routing protocols
https://doi.org/10.58496/BJN/2024/008
PDF
DOI: https://doi.org/10.58496/BJN/2024/008
Janan Farag Yonan, Ayser Hadi Oleiwi
31-44
Using a Fuzzy Approach as an Assessment Method to Extend the Lifespan of Wireless Sensor Networks using the LEACH Protocol
https://doi.org/10.58496/BJN/2024/005
PDF
DOI: https://doi.org/10.58496/BJN/2024/005
sahar Mohammed, Thaaer kh.Asman, Hadeel M Salih, Alaa Mohammed Mahmood
18-24
A ELECTRIC VEHICLE BLOCKCHAIN: PROBLEMS AND OPPORTUNITIES
https://doi.org/10.58496/BJN/2024/003
PDF
DOI: https://doi.org/10.58496/BJN/2024/003
Raed Abdulkareem Hasan, Omar Ibrahim Obaid, Ans Ibrahim Mahameed AlQassab, Husniyah Jasim , Saad Ahmed Dheyab
98-110
Mapping Web Service Characteristics to Queueing Theory Models for Performance Analysis
https://doi.org/10.58496/BJN/2024/011
PDF
DOI: https://doi.org/10.58496/BJN/2024/011
Mounika Siluveru, Dharavath Nanda, Madhavi Kesoju
1-8
Evaluation of OFDM system in terms of PAPR and BER using PAPR Reduction Techniques : Windowing and Clipping
https://doi.org/10.58496/BJN/2024/001
PDF
DOI: https://doi.org/10.58496/BJN/2024/001
M.Sahaya Sheela, R. Suganthi, S. Gopalakrishnan, T. Karthikeyan, K. Jeevana Jyothi, K. Ramamoorthy
78-87
Secure Routing and Reliable Packets Transmission In MANET Using Fast Recursive Transfer Algorithm
https://doi.org/10.58496/BJN/2024/009
PDF
DOI: https://doi.org/10.58496/BJN/2024/009
Rasha Hameed Khudhur Al-Rubaye , AYÇA KURNAZ TÜRKBEN
45-56
Using Artificial Intelligence to Evaluating Detection of Cybersecurity Threats in Ad Hoc Networks
https://doi.org/10.58496/BJN/2024/006
PDF
DOI: https://doi.org/10.58496/BJN/2024/006
Sara salman Qasim, Lubna Mohammed Hasan
25-30
Mining Utilities Itemsets based on social network
https://doi.org/10.58496/BJN/2024/004
PDF
DOI: https://doi.org/10.58496/BJN/2024/004