Current Issue

October 2024, Volume 16, Number 5

Baoulé Related Parallel Corpora for Machine Translation Tasks: Mtbci-1.0
Kouassi Konan Jean-Claude, Bircham International University, Spain

A Neural Network Approach to Understanding Employee Retention Dynamics: Insights from Feature Importance Analysis
Han-Chen Huang, Chung Hua University, Taiwan

Enhancing Organizational Efficiency of the Lantern Festival in Penghu, Taiwan Through Information Technology: Key
Factors Analysis

Shih-Ping Chang and Han-Chen Huang, Chung Hua University, Taiwan

Evaluating the Effect of Human Activity on Air Quality using Bayesian Networks and IDW Interpolation
Hema Durairaj1 and L Priya Dharshini2, 1Publicis Sapient Pvt. Ltd., India, 2Lady Doak College, India

Resources Price Adjustment in Cloud Computing for Load Balancing and Fairness Between Users and Suppliers
Lilia Chourou Gherir1, Ahmed Elleuch2 and Mohamed Jemni1, 1University of Tunis, Tunisia, 2University of Manouba, Tunisia

Exploring the Selection and Training of Tour Leaders: An Evaluation Model Based on the Analytic Hierarchy Process
Yuang-Liang Sun and Han-Chen Huang, Chung Hua University, Taiwan

Analysis of Key Factors Influencing Penghu Tourism Development using the Delphi Method and AHP
Pao-TsaiKuo and Han-Chen Huang, Chung Hua University, Taiwan

Malware Detection and Classification using Generative Adversarial Network
Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh, Shri Prakash Dwivedi and Paras, G. B. Pant University of
Agriculture and Technology, India

Utilizing Analytic Network Process for Evaluating Event Management Companies: A Case Study in Celebration Activities
Han-Chen Huang, Chung Hua University, Taiwan

AI-Driven Threat Intelligence: Transforming Cybersecurity for Proactive Risk Management in Critical Sectors
SA Mohaiminul Islam1, MD Shadikul Bari1, Ankur Sarkar1, A J M Obaidur Rahman Khan2 and Rakesh Paul1, 1Washington University Of Science & Technology (WUST), USA, 2Independent University (WUST), Bangladesh

August 2024, Volume 16, Number 4

Non-Deterministic and Risk Based Security Services
Srinivas Rao Doddi1 and Akshay Krishna Kotamraju2, 1University of Los Angeles, USA, 2Founder Non-profit, USA

Database Security Compliance with Anti-Money Laundering Status
Opeyemi Ayanbanjo, New England College, Boston

AI Strategy Formulation Across Various Game Genres - A Literature Review
Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA

Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems
Rashid Alakbarov and Mammad Hashimov, Institute of Information Technology, Azerbaijan

Exploring White Fragility in Large Language Models
Janga Bussaja, Independent Researcher, USA

A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods
Han-Chen Huang, Chung Hua University, Taiwan

The Role of Cloud Providers in IoT Services
Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University St. Klement of Ohrid, Macedonia

FIX Protocol: The Backbone of Financial Trading
Swapnil Kognole, UBS, USA

Shadowed AHP for Multi-Criteria Supplier Selection
Mohamed Abdel Hameed El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt

Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional
Responses, and Satisfaction

Han-Chen Huang, Chung Hua University, Taiwan

June 2024, Volume 16, Number 3

The Impact of Blockchain Technology on the Financial Services Industry
Kinil Doshi, Citibank, USA

Streamlining Compliance and Risk Management with RegTech Solutions
Chintamani Bagwe, Citibank, USA

A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis
Al-Mahmud and Kazutaka Shimada, Kyushu Institute of Technology, Japan

The Energy Storage Operation Under Stochastic Renewable Generation
Tony Tsang and Chung Kwok Leung, Hong Kong College of Technology, Hong Kong

Psychological and Graphic Aspects of Colors: Influence and Application in Product Design
Filip Popovski1, Hristina Dimova Popovska1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1University St.
Klement of Ohrid, Macedonia, 2Internacional Slavic University, Macedonia

Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights
Sanjay Moolchandani, Citibank N.A., USA

Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans
Rezaul Karim1,2, Md. Badiuzzaman Biplob1 and Mohammad Shamsul Arefin1, 1Chittagong University of Engineering
and Technology, Bangladesh, 2University of Chittagong, Bangladesh

Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications
Priyank Singh, Tanvi Hungund and Shobhit Kukreti, Rochester Institute of Technology, US

Player Strategy Modeling in Classic Roleplaying Game Battle Environments
Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA

Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and
Future Prospects

Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Emmanuel Hinneha and Samuel Attakorah, Carolina
University, USA

April 2024, Volume 16, Number 2

Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks
Saurabh Mishra1, Rakesh Ranjan1, Sonika Singh2 and Gagan Singh2, 1Sushant University, Inida, 2DIT University, India

The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States
Omolola F. Hassan1, Oluwadare O. Aderibigbe1, Oghenekome P. Efijemue1 and Tolulope D. Onasanya2, 1Austin Peay State University, USA, 2North Carolina Agricultural and Technical State University, USA

Big Data and Machine Learning in Defence
Yijie Weng1 and Jianhao Wu2, 1University of Maryland, USA, 2Cornell University, USA

AI-Based Home Security System
Syeda Lamima Farhat, Likhitha Tubati, Metrine Osiemo and Rushit Dave, Minnesota State University, USA

February 2024, Volume 16, Number 1

Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile
Application Infrastructure Security

Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi
Energy, USA

Image Segmentation and Classification using Neural Network
Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics
Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA

A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3
Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA

Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using
Machine Learning

Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA