Volume 14, Issue 2, December 2025

  • Research Article

    Finding Type of ARP Request That Introducing the MAC Address Table Instability Results in Network Sensitivity

    Md. Abdullah Yusuf Imam, Prodip Kumar Biswas*

    Issue: Volume 14, Issue 2, December 2025
    Pages: 20-35
    Received: 24 May 2025
    Accepted: 16 June 2025
    Published: 7 July 2025
    Downloads:
    Views:
    Abstract: In network analysis, "looping" or "network loops" refers to situations where a path in a network returns to the same node or nodes multiple times, creating a closed circuit or cycle. In a loop, a single ARP (ARP or Address Resolution Protocol) is a networking protocol that translates Internet Protocol (IP) addresses to Media Access Control (MAC) ad... Show More
  • Research Article

    Reliability Assessment of Distribution Network for Improved Feeder Bule Hora University, West Guji, Oromiya Regional State, Ethiopia

    Kumilachew Chane*

    Issue: Volume 14, Issue 2, December 2025
    Pages: 36-46
    Received: 26 January 2025
    Accepted: 18 June 2025
    Published: 28 July 2025
    Downloads:
    Views:
    Abstract: The knowledge of the reliability of distribution networks and systems is important consideration in the system planning and operations for development and improvements of power distribution systems. To achieve the target as minimum interruptions as possible to customers, utilities must strive to improve the reliability but at the same time reduce c... Show More
  • Research Article

    Quantum-inspired Optimization for Efficient Vehicular Edge Computing Resource Allocation in Intelligent Transportation Systems

    Friday Oodee Philip-Kpae*, Nwazor Nkolika, Boona Stanley Toobari

    Issue: Volume 14, Issue 2, December 2025
    Pages: 47-58
    Received: 29 June 2025
    Accepted: 9 July 2025
    Published: 28 July 2025
    Downloads:
    Views:
    Abstract: The increasing adoption of smart mobility and connected vehicles necessitates significant improvements in underlying infrastructure, particularly in real-time data processing and decision-making. Vehicular Edge Computing (VEC) has emerged as a vital solution by enabling computation closer to data sources, thereby reducing latency and reliance on ce... Show More
  • Research Article

    A Practical Study of Naive Bayes and Weighted Naive Bayes Cybersecurity Models for Wireless Networks

    Oyinkansola Anuoluwapo Olagunju, Michael Abejide Adegoke, Gabriel Babatunde Iwasokun*, Adeleke Johnson Adeyiga, Stephen Ojo Aderibigbe

    Issue: Volume 14, Issue 2, December 2025
    Pages: 59-70
    Received: 14 August 2025
    Accepted: 26 August 2025
    Published: 15 September 2025
    Downloads:
    Views:
    Abstract: Intrusion Detection Systems (IDS) are essential for protecting wireless networks against an increasingly complex range of cyber threats. This study evaluates and compares the effectiveness of Naïve Bayes, Weighted Naïve Bayes, and Convolutional Neural Network (CNN) using the Network Security Laboratory-Knowledge Discovery and Data Mining (NSL-KDD) ... Show More