Sort by
Cryptographic Asset Discovery and Inventory for Embedded
Systems: A Framework for Post-Quantum Cryptography
Migration in Defense Applications
Robert Campbell
Posted: 19 January 2026
Implementation and Performance Optimization of a DPDK Packet Gateway on Manycore CPUs
Daisuke Sugisawa
Posted: 19 January 2026
Tactical Edge Triad Architecture: Adapting the Next-Generation Security Triad for DIL Autonomous Sensing Systems
Robert E. Campbell
Posted: 07 January 2026
Decentralized Payment Optimization for Scalable Microservice Transactions
Vimal Teja Manne
Posted: 07 January 2026
A Novel Hybrid VANET Routing Protocol with Dynamic Power Management for Performance Enhancement
Burke Geceyatmaz
,Fatma Tansu Hocanın
Posted: 01 January 2026
Evaluating Edge-Termination Buffer Effects for Real-Time AV1 over MPEG2-TS over HTTP/3 QUIC
Daisuke Sugisawa
Posted: 31 December 2025
HyperFabric Interconnect (HFI): A Unified, Scalable Communication Fabric for HPC, AI, Quantum, and Neuromorphic Workloads
Krishna Bajpai
Posted: 26 December 2025
Innovative Data Models for Smart Campus Management
Galia Novakova Nedeltcheva
,Denis Chikurtev
,Eugenia Kovatcheva
Posted: 26 December 2025
Operationalizing the Next-Generation Security Triad: AI Security, PQC, and Zero Trust in Federal Compliance
Robert E. Campbell
Posted: 25 December 2025
Toward Self-Sovereign Management of Subscriber Identities in 5G/6G Core Networks
Paul Scalise
,Michael Hempel
,Hamid Sharif
Posted: 24 December 2025
Joint Effect of Signal Strength, Bitrate, and Topology on Video Playback Delays of 802.11ax Gigabit Wi-Fi
Nurul I. Sarkar
,Sonia Gul
This paper presents a performance evaluation of IEEE 802.11ax (Wi-Fi 6) networks using a combination of real-world testbed measurements and simulation-based analysis. The paper investigates the combined effect of received signal strength (RSSI), application bitrate, and network topology on video playback delays of 802.11ax. The effect of frequency band and client density on system performance are also investigated. Testbed measurements and field experiments were conducted in indoor environments using dual-band (2.4 GHz and 5 GHz) ad hoc and infrastructure network configurations. OMNeT++ based simulations are conducted to explore scalability by increasing the number of wireless clients. Results obtained show that the infrastructure-based deployments consistently provide more stable video playback than ad hoc network, particularly under varying RSSI conditions. While the 5 GHz band delivers higher throughput at short range, the 2.4 GHz band offers improved coverage at reduced system performance. Simulation results further demonstrate significant degradation in throughput and latency as client density increases. To contextualize the observed performance, a baseline comparison with 802.11ac is incorporated, highlighting the relative improvements and remaining limitations of 802.11ax under comparable signal and load conditions. The findings provide practical deployment insights for video-centric wireless networks and inform the optimization of next-generation Wi-Fi.
This paper presents a performance evaluation of IEEE 802.11ax (Wi-Fi 6) networks using a combination of real-world testbed measurements and simulation-based analysis. The paper investigates the combined effect of received signal strength (RSSI), application bitrate, and network topology on video playback delays of 802.11ax. The effect of frequency band and client density on system performance are also investigated. Testbed measurements and field experiments were conducted in indoor environments using dual-band (2.4 GHz and 5 GHz) ad hoc and infrastructure network configurations. OMNeT++ based simulations are conducted to explore scalability by increasing the number of wireless clients. Results obtained show that the infrastructure-based deployments consistently provide more stable video playback than ad hoc network, particularly under varying RSSI conditions. While the 5 GHz band delivers higher throughput at short range, the 2.4 GHz band offers improved coverage at reduced system performance. Simulation results further demonstrate significant degradation in throughput and latency as client density increases. To contextualize the observed performance, a baseline comparison with 802.11ac is incorporated, highlighting the relative improvements and remaining limitations of 802.11ax under comparable signal and load conditions. The findings provide practical deployment insights for video-centric wireless networks and inform the optimization of next-generation Wi-Fi.
Posted: 22 December 2025
The Next-Generation Security Triad: Unifying PQC, ZTA, and AI Security through a Shared Modernization Substrate
Robert Campbell
The U.S. Department of Defense (DoD) faces three concurrent cybersecurity modernization mandates that together constitute what we term the Next-Generation Security Triad: post-quantum cryptography (PQC) migration by 2030--2035, Zero Trust Architecture (ZTA) implementation by FY2027, and AI system security assurance under CDAO governance. These Triad components operate under distinct timelines, funding streams, workforce competencies, and compliance frameworks---creating significant coordination challenges for CIOs, Commanding Officers, Program Management Offices, and Authorizing Officials. Current approaches treat these as separate migrations, resulting in duplicative investments, architectural misalignment, and uncoordinated risk exposure. This paper argues that the solution is not to merge the three Triad programs---each serves distinct operational purposes---but to establish a shared modernization substrate. We present a unified architectural framework comprising four substrate layers: (1) cryptographic services infrastructure, (2) identity and access management fabric, (3) telemetry and analytics pipeline, and (4) policy orchestration engine. This substrate-based approach enables each Triad component to proceed at its own pace while ensuring interoperability, reducing lifecycle technical debt, and providing measurable compliance pathways.
The U.S. Department of Defense (DoD) faces three concurrent cybersecurity modernization mandates that together constitute what we term the Next-Generation Security Triad: post-quantum cryptography (PQC) migration by 2030--2035, Zero Trust Architecture (ZTA) implementation by FY2027, and AI system security assurance under CDAO governance. These Triad components operate under distinct timelines, funding streams, workforce competencies, and compliance frameworks---creating significant coordination challenges for CIOs, Commanding Officers, Program Management Offices, and Authorizing Officials. Current approaches treat these as separate migrations, resulting in duplicative investments, architectural misalignment, and uncoordinated risk exposure. This paper argues that the solution is not to merge the three Triad programs---each serves distinct operational purposes---but to establish a shared modernization substrate. We present a unified architectural framework comprising four substrate layers: (1) cryptographic services infrastructure, (2) identity and access management fabric, (3) telemetry and analytics pipeline, and (4) policy orchestration engine. This substrate-based approach enables each Triad component to proceed at its own pace while ensuring interoperability, reducing lifecycle technical debt, and providing measurable compliance pathways.
Posted: 09 December 2025
Optimizing Healthcare Patient Monitoring Through an Energy-Efficient Forward Greedy Algorithm (EEFGA) in WSN
Rafe Alasem
Posted: 09 December 2025
An Efficient and Automated Smart Healthcare System using Genetic Algorithm and 2-Level Filtering Scheme
Geetanjali Rathee
,Hemraj Saini
,Chaker Abdelaziz Kerrache
,Ramzi Djemai
,Mohamed Chahine Ghanem
Posted: 08 December 2025
A Comprehensive Survey on VANET–IoT Integration Toward the Internet of Vehicles
Khalid Kandali
,Said Nouh
,Lamyae Bennis
,Hamid Bennis
Posted: 02 December 2025
Object Detection and Predictive Maintenance in Autonomous Cars in YOLO, A Survey
Arshee Ahmed
,Tan Kim Geok
,Hajra Masood
Posted: 27 November 2025
Fail-Forward IIoT Routing via eBPF Packet Filters + Go Runtime
Michael Chen
,Sofia Martínez
,Daniel Hughes
Posted: 27 November 2025
Lightweight Go-Driven Multi-Protocol Gateway for OPC-UA and MQTT
Emma L. Carter
,Rui Zhang
,Daniel P. Morris
Posted: 26 November 2025
Estimating Migration Timelines for Enterprises Transitioning to Post-Quantum Cryptography: A Real-World Analysis of Dependencies and Interconnectedness
Robert Campbell
Posted: 24 November 2025
Researching Zero-Knowledge Proof in Blockchain Ecosystems for Enhanced Voting Transparency in Catalyst Voting Process—A Potential Application
Edet Ekpenyong
,Ubio Obu
,Godspower Emmanuel Achi
,Clement Umoh
,Duke Peter
,Udoma Obu
Posted: 21 November 2025
of 23