You are currently viewing a new version of our website. To view the old version click .

Computers, Volume 9, Issue 2

June 2020 - 32 articles

Cover Story: This article explores the enhanced mobile broadband (eMBB) service class, defined within the new 5G communication paradigm, and evaluates the impact of the transition from 4G to 5G access technology on the radio access network and transport network. Simulation results are obtained with ns3 and performance analyses are focused on 6 GHz radio scenarios for the radio access network, where a non-standalone 5G configuration has been assumed, and on SDN-based scenarios for the transport network. Inspired by the 5G Transformer model, we describe and simulate each single element of the three main functional plains of the proposed architecture to implement a preliminary evaluation of the end-to-end system performances. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (32)

  • Article
  • Open Access
4 Citations
6,031 Views
11 Pages

Non-Fragmented Network Flow Design Analysis: Comparison IPv4 with IPv6 Using Path MTU Discovery

  • Thiago Lucas,
  • Maycon Ferreira,
  • Rychard Plachta,
  • Gabriel Ferreira and
  • Kelton Costa

With the expansion in the number of devices that connect to the Internet, a new area, known as the Internet of Things (IoT), appears. It was necessary to migrate the IPv4 protocol by the IPv6 protocol, due to the scarcity of IPv4 addresses. One of th...

  • Feature Paper
  • Article
  • Open Access
6 Citations
4,937 Views
24 Pages

Modern society is increasingly dependent on reliable performance of distributed systems. In this paper, we provide a precise definition of performance using the concept of quality attenuation; discuss its properties, measurement and decomposition; id...

  • Article
  • Open Access
14 Citations
9,722 Views
19 Pages

Cloud Computing for Climate Modelling: Evaluation, Challenges and Benefits

  • Diego Montes ,
  • Juan A. Añel ,
  • David C. H. Wallom ,
  • Peter Uhe ,
  • Pablo V. Caderno and
  • Tomás F. Pena

Cloud computing is a mature technology that has already shown benefits for a wide range of academic research domains that, in turn, utilize a wide range of application design models. In this paper, we discuss the use of cloud computing as a tool to i...

  • Article
  • Open Access
2 Citations
3,340 Views
13 Pages

This article is devoted to an approach to develop a safety system process according to functional safety standards. With the development of technologies and increasing the specific energy stored in the equipment, the issue of safety during operation...

  • Article
  • Open Access
6 Citations
3,773 Views
14 Pages

Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others. There are also studies suggesting the possibility of building a public key system ba...

  • Article
  • Open Access
4 Citations
3,445 Views
13 Pages

One of the important functions of cyberspace is to provide people and devices with access to global infocommunication resources, and as the network infrastructure develops, the number of access options increases, including those based on wireless tec...

  • Review
  • Open Access
6 Citations
9,171 Views
21 Pages

A Review of Memory Errors Exploitation in x86-64

  • Conor Pirry,
  • Hector Marco-Gisbert and
  • Carolyn Begg

Memory errors are still a serious threat affecting millions of devices worldwide. Recently, bounty programs have reached a new record, paying up to USD 2.5 million for one single vulnerability in Android and up to USD 2 million for Apple’s oper...

  • Article
  • Open Access
4 Citations
4,614 Views
26 Pages

Model Based Approach to Cyber–Physical Systems Status Monitoring

  • Alexander Vodyaho,
  • Saddam Abbas,
  • Nataly Zhukova and
  • Michael Chervoncev

The distinctive feature of new generation information systems is not only their complexity in terms of number of elements, number of connections and hierarchy levels, but also their constantly changing structure and behavior. In this situation the pr...

  • Article
  • Open Access
40 Citations
6,863 Views
14 Pages

Imagined speech is a relatively new electroencephalography (EEG) neuro-paradigm, which has seen little use in Brain-Computer Interface (BCI) applications. Imagined speech can be used to allow physically impaired patients to communicate and to use sma...

  • Article
  • Open Access
17 Citations
5,223 Views
20 Pages

GeoQoE-Vanet: QoE-Aware Geographic Routing Protocol for Video Streaming over Vehicular Ad-hoc Networks

  • Abdelkader Benmir,
  • Ahmed Korichi,
  • Abdelhabib Bourouis,
  • Mohammed Alreshoodi and
  • Laith Al-Jobouri

Video streaming is one of the challenging issues in vehicular ad-hoc networks (VANETs) due to their highly dynamic topology and frequent connectivity disruptions. Recent developments in the routing protocol methods used in VANETs have contributed to...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Computers - ISSN 2073-431XCreative Common CC BY license