×
keyboard_arrow_up

Computer Science & Information Technology

S.No Volume Issue Paper Title Authors

International Journal of Computer Science & Information Technology (IJCSIT)

1 17 1 Artificial Intelligence and Machine Learning Algorithms Are Used to Detect and Prevent Cyber Threats as Well as Their Potential Impact on the Future of Cybersecurity Practices Md Al Amin, St. Francis College, United States Full Text
2 17 1 Enhancing Public Reputation Systems: Trust Scaling to Mitigate Voter Subjectivity Manh Hung Nguyen, Posts and Telecommunications Institute of Technologies (PTIT), Vietnam Full Text
3 17 2 The Study of Artificial Intelligent Building Automation Control System in Hong Kong Commercial Building Tony Tsang, Chang Kam Fai, Hong Kong College of Technology, China Full Text
4 17 3 Hybrid Transformer-Based Classification for Web-Based Injection Attack Detection: A Novel Roberta-XLNet Approach Ranuja Seethawaka, Chathurya Nambuwasam, D.K.W.G.G.T. Chandrasiri, K.A.S. Kavithma, Harinda Fernando and Ayesha Wijesooriya, Sri Lanka Institute of Information Technology, Sri Lanka Full Text
5 17 3 Applying Cfahp to Explore the Key Models of Semiconductor Pre-Sales Fei-Hon Kao, Chia-Hsiang Hsieh and Wen Pei, Chung Hua University, Taiwan Full Text
6 17 4 Hard-Soft Data Fusion with ChatGPT: Toward Structured Representations and Automated Reasoning Nicholas Gahman and Vinayak Elangovan, Penn State University Abington, USA Full Text
7 17 4 Developing an Intelligent System based on Machine Learning Technology for Electronic Waste Management in the Field of Education Amany Fathy Mohamed Ibrahim Metwaley 1, Elsaeed Elsaeed Mohamed Abd-ElRazik 2 and Rasha Kandil Mohamed Kandil Arafa 2, 1 Egypt, 2 Damietta University, Egypt Full Text
8 17 4 Analysis of Evaluation Indicators for the Friendliness of Sports Venues to Individuals with Lower Limb Disabilities Han-Chen Huang, Chung Hua University, Taiwan Full Text
9 17 4 AI-Driven Strategies of Mitigating Cybersecurity Threats in U.S. Small and Medium Enterprises (SMEs) Kemisola Kasali 1, Precious Orekha 2, Oluwaseun John Bamigboye 3, Afolabi Sabur Ajao 4, Peter O. Alawiye 5, Adeola Noheemot Raji 6, 1 University of Arkansas at Little Rock, USA, 2 Drexel University, USA, 3 California Miramar University, USA, 4 Northwestern University, USA, 5 New Mexico Highlands University, USA, 6 University of New Haven, USA Full Text
10 17 5 Optimizing Global Finance: SAP S/4HANA Central Payments & Reconciliation with Cloud Analytics Surendra Annanki, Numeric Technologies Inc., USA Full Text
11 17 5 AI-Native Wireless Networks: Transforming Connectivity, Efficiency, and Autonomy for 5G/6G and Beyond Akheel Mohammed 1, Zubair Ahmed Mohammed 2, Naveed Uddin Mohammed 2, Shravan Kumar Gunda 3, Mohammed Azmath Ansari 4 and Mohd Abdul Raheem 5, 1University of the Cumberlands, USA, 2Lindsey Wilson College, USA, 3Northwestern Polytechnic University, USA, 4Concordia University, USA, 5State University of New York Institute of Technology, USA Full Text
12 17 5 Architectural Effectuation of Convolutional Homeomorphic Error-Correcting Codes using Nano Controlled-Selectors and Lattice Networks Anas N. Al-Rabadi, The University of Jordan, Jordan Full Text
13 17 5 Harnessing Artificial Intelligence for Public Health and Epidemiology: Opportunities, Barriers, and Pathways to Equitable Global Impact Shanavaz Mohammed 1, Nasar Mohammed 2, Sruthi Balammagary 1, Sireesha Kolla 3, Srujan Kumar Ganta 4 and Shuaib Abdul Khader 5, 1University of the Cumberlands, USA, 2Valparaiso University, USA, 3National Institutes of Health, USA, 4JNTU, India, 5Concordia University, USA Full Text
14 17 5 Responsible AI Analytics for Real-World Impact: Navigating Ethics, Privacy and Trust Ghousia Sultana 1, Siraj Farheen Ansari 1, Mohammed Imran Ahmed 2, Abdul Faiyaz Shaik 1, Moin Uddin Khaja 3 and Bibhu Dash 4, 1Trine University, USA, 2Campbellsville University, USA, 3Lindsey Wilson College, USA, 4University of the Cumberlands, USA Full Text
15 17 5 AI-Driven CTI for Business: Emerging Threats, Attack Strategies, and Defensive Measures Mohammed Kashif 1, Mohammed Aasimuddin 2, Mubashir Ali Ahmed 3, Laxmi Bhavani Cheekatimalla 4, Eraj Farheen Ansari 5 and Ahwan Mishra 6, 1Jamia Millia Islamia University, India, 2Campbellsville University, USA, 3University of the People, USA, 4Kakatiya University, India, 5East-West University, USA, 6USA Full Text
16 17 5 AI-Augmented Safety Management in Construction Abdul Faisal Mohammed 1, Shahnawaz Mohammed 1, Abdul Raheman Mohammed 2 and Syed Abdullah Kamran 1, 1Trine University, USA, 2Lindsey Wilson College, USA Full Text
17 17 6 IOT-Based Smart Building Monitoring and Control Strategies with Intelligence Deep Neural Networks Tony Tsang and Yau Ka Hei, Hong Kong College of Technology, Hong Kong Full Text
18 17 6 Mastering Penetration Testing: The Ethical Hacker’s Toolkit for Uncovering Vulnerabilities Mohammad Abdus Salam and Amera Firdous, Chicago State University, USA Full Text
19 17 6 A Data-Driven Predictive Framework for Inventory Optimization using Context-Augmented Machine Learning Models Anees Fatima and Mohammad Abdus Salam, Chicago State University, USA Full Text
20 17 6 A Decentralized Academic Certificate Issuance System using Smart Contracts on the Tron Network Ana Julia Evangelista Andrade and Flavio Cezar Amate, Federal Institute of Education, Science and Technology of São Paulo (IFSP), Brazil Full Text

Computer Science & Engineering: An International Journal (CSEIJ)

21 15 1 Exploring IoT and Machine Learning Integration for Soil Nutrients Monitoring and Crop Recommendation: A Survey Vijaya R. Khemnar and Mininath R. Bendre, Pravara Rural Engineering College, India Full Text
22 15 1 Machine Learning-based Classification of Indian Caste Certificates using GLCM Features Subramani C, Suresh R and Muralidhara B L, Bangalore University, India Full Text
23 15 1 Detection of Dyslexia and Dyscalculia in Children Jawahar Jonathan, Bharathi K, Haripriya Khajuria, Lavanya J C, M Jyoshitha and Meghna Keshri, Acharya Institute of Technology, India Full Text
24 15 1 A Survey on a Model for Pesticide Recommendation using Machine Learning Vijaya lakshmi S Abbigeri and Geetha D Devanagavi, REVA University, India Full Text
25 15 1 Comprehensive Privacy Preservation for Images and Videos using Machine Learning and Encryption Abhishek Tanaji Halakate, Ayushma Shambhavi and Chhaya Suryabhan Dule, Acharya Institute of Technology, India Full Text
26 15 1 Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm Bharathi K, Jawahar Jonathan K, Satyabhama, Shobharani C N, Sridevi and Bhagyashree K Itagi, Acharya Institute of Technology, India Full Text
27 15 1 Plant Leaf Diseases Detection using Deep Learning and Novel CNN Vidya Bhushan and Reshma, Acharya Institutes of Technology, India Full Text
28 15 1 Contrastive Learning in Image Style Transfer: A Thorough Examination using CAST and UCAST Frameworks Raju Soniya and G Babu, Acharya Institute of Technology, India Full Text
29 15 1 Smart Agriculture Irrigation System using IoT Shiwali Yadav, Pawan Kumar, Aman Kumar Mishra, Monika Tiwari, Utkarsh Kumar and Gursahib Singh, Chandigarh University, India Full Text
30 15 1 Hybrid Attention Mechanisms in 3D CNN for Noise-Resilient Lip Reading in Complex Environments Prabhuraj Metipatil and Pranav SK, REVA University, India Full Text
31 15 1 Screening Brain Tumors from MRI Images with Deep Learning Approaches Savitha Shetty1, Saritha Shetty1, Sowmya M R2, Priya Kamath B3 and Sowmya M R4, 1NMAMIT (Nitte Deemed to be University), India, 2NMIT Bangalore, India, 3Manipal Institute of Technology, India, 4National Institute of Technology Karnataka, India Full Text
32 15 1 Smart Hydroponics: Solar Powered Hydroponics System using Dual Axis Solar Tracker Savitha Shetty1, Saritha Shetty1, Joshva Rodrigues1, Priya Kamath B2 and Sowmya M R3, 1NMAMIT (Nitte Deemed to be University), India, 2Manipal Institute of Technology, India, 3NMIT, India Full Text
33 15 1 Enhancing Student Engagement and Personalized Learning through AI Tools: A Comprehensive Review Boya Durga Bhavani, Rajeshwari Shetty and Mahesh D M, Acharya Institute of Graduate Studies, India Full Text
34 15 1 RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparative Study for Visually Impaired Users A R Deepti1, Vivek K1, Farzeen Basit1 and B Manimekala2, 1Acharya Institute of Graduate Studies, India, 2Christ University, India Full Text
35 15 1 Artificial Intelligence and Machine Learning Based Plant Monitoring Shrutika C Rampure, Bhavyashree S P and Rakshitha B T, Acharya Institute of Technology, India Full Text
36 15 1 Enhancing Surveillance System through Edge Computing: A Framework For Real-Time Human Detection Ranjan G, S Akshatha, Sandeep N and Vasanth A, Acharya Institute of Technology, India Full Text
37 15 1 Mind-Balance: AI-Powered Mental Health Assistant Hussana Johar R B, Yashaswini M, Yasin Malik, Yogashree B S and Vinay V, ATMECE, India Full Text
38 15 1 AI-Enabled Fruit Decay Detection Varalakshmi B D, Vijayalakshmi S A, M Kavya Sree, Ayushi Raj, Deepika Divya and Anubhav Tekriwal, Acharya Institute of Technology, India Full Text
39 15 1 Sentiment Patterns in YouTube Comments: A Comprehensive Analysis Savitha Shetty1, Saritha Shetty1, Priya Kamath B2 and Deepthi Shetty3, 1NMAMIT (Nitte Deemed to be University), India, 2Manipal Institute of Technology, India, 3NMIT, India Full Text
40 15 1 Soil Analysis, Disease Detection and Pesticide Recommendation for Farmers using AI and ML Vijayalakshmi S A, Varalakshmi B D, Rohith R, Sanjay L Y, Shashiraj Shetty and Prasad M J, Acharya Institute of Technology, India Full Text
41 15 1 AI Powered Crop Recommendation and Yield Prediction System Akash S, Harshitha B R, Nandini R and Kavya S, Acharya Institute of Technology, India Full Text
42 15 1 Fake News Detection using Machine Learning Techniques Sushmitha R, Rakshitha B T and Shrutika C Rampure, Acharya Institute of Technology, India Full Text
43 15 1 AI Based Road Accident Detection and Alert System Rahul Kumar, Karthik S and Manjunath B, REVA University, India Full Text
44 15 1 A Smart Healthcare Monitoring System using IoT and Machine Learning Priyanka S, Varsha K and Raghavendra B, Acharya Institute of Technology, India Full Text
45 15 1 Handwritten Digit Recognition using Deep Neural Networks Sanjana R, Divya S and Megha N, Acharya Institute of Technology, India Full Text
46 15 1 AI Driven Traffic Management System for Smart Cities Kiran Kumar H, Sagar B and Harsha V, Bangalore University, India Full Text
47 15 1 AI Based Chatbot for Student Assistance in Universities Sneha M, Pooja S and Nikhil R, REVA University, India Full Text
48 15 1 IoT Based Smart Waste Management System Arjun P, Rakesh Kumar and Nithin S, Acharya Institute of Technology, India Full Text
49 15 1 Blockchain Based Secure Voting System Harish Kumar, Deepak R and Varun S, Bangalore Institute of Technology, India Full Text
50 15 1 Deep Learning Approach for Skin Disease Classification Ananya Sharma, Pooja Verma and Ritu Singh, Delhi Technological University, India Full Text
51 15 1 Speech Emotion Recognition using Deep Learning Praveen Kumar, Sneha Gupta and Aditi Mishra, VIT University, India Full Text
52 15 1 AI Based Intrusion Detection System for Network Security Rahul Sharma, Akash Verma and Nitin Gupta, Chandigarh University, India Full Text
53 15 1 Automated Attendance System using Face Recognition Rohit Singh, Aman Gupta and Shubham Jain, Lovely Professional University, India Full Text
54 15 1 Cloud Based E-Learning Platform with AI Recommendation System Pallavi Desai, Nikhil Patil and Sneha Kulkarni, Pune University, India Full Text
55 15 2 Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscillatory TQC/NMSI Sergiu Vasili Lazarev, Researcher in Theoretical Physics and Cosmology, Romania Full Text
56 15 3 Can We Trust Machines? A Critical Look at Some Machine Translation Evaluation Metrics Muhammad Zayyanu Zaki and Nazir Ibrahim Abbas, Usmanu Danfodiyo University, Nigeria Full Text
57 15 4/5 Secure Integration of LLMs with Production Databases through Context Based Data Anonymization Hassane Tahir1 and Patrick Brezillon2, 1Université Paris Cité, France, 2LIP6 - Sorbonne Université, France Full Text
58 15 6 Modeling and Simulation of Data Protection Systems for Business Continuity and Disaster Recovery Sašo Nikolovski1 and Pece Mitrevski2, 1AUE-FON University, North Macedonia, 2University St. Kliment Ohridski, North Macedonia Full Text

International Journal of Computer Science and Engineering Survey (IJCSES)

59 16 1/2/3/4/5 Steganography Research Landscape: A Brief Century-Long Bibliometric Study Eltyeb Elsamani1 and Yousif Elsamani2, 1AL-Neelain University, Sudan, 2The University of Tokyo, Japan Full Text

International Journal of Computer Science, Engineering and Applications (IJCSEA)

60 15 1/2 Applying Software Engineering Solutions to Law Firm Management, Nigeria as a Case Study Chinonyerem Eleweke and Kazeem Oluwakemi Oseni, UK Full Text
61 15 3/4/5 TopicMap-BN: Scalable and Explainable Framework for Cross-Source Bangla News Recommendation with BanglaBERT and BERTopic Md Hasan Hafizur Rahman and Sumaia Afrin Sunny, Bangladesh Full Text
62 15 3/4/5 Fault Analysis and Circuit Breakers Selection for Electrical Lines Protection: Case of Electrical Line from Lutchurukuru to Kindu (D.R. Congo) M N Audry1, H Shabani1,2, J Fisher2 and J Ngondo1,3, 1MAPON University, D.R. Congo, 2Papua New Guinea University of Technology, 3North China Electric Power University Full Text
63 15 6 Natural Language Processing Pipeline for Co-Designing Culturally Aware Health Chatbots From User Stories to System Specifications Oritsemeyiwa Gabriel Orugboh, United Kingdom Full Text
64 15 6 Geometric and Statistical Modeling of Large-Scale Spatial Similarity using Fibonacci-Based Metrics A Case Study of Terrestrial and Celestial Point Networks Sam Osmanagich, Bosnia-Herzegovina Full Text

International Journal of Computational Science and Information Technology (IJCSITY)

65 13 1 Atlantis Protocol Private Succinct Transfers on Public Networks Oleksandr Kurbatov, Kyrylo Riabov, Mykhailo Velykodnyi Full Text
66 13 2/3/4 Dual Optimisation in Low-Resource Natural Language Processing: Integrating Meta-Learning and Efficient Deep Architectures for Sustainable AI Development Israel Creleanor Mulaudzi, Ndivhudzannyi Michael Nndwamato, Rendani Mercy Makhwathana, University of Venda, South Africa Full Text

International Journal of Information Science & Techniques (IJIST)

67 15 1/2/3/4/5 Development of an Innovative E-Learning System Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University “St. Kliment Ohridski”, Macedonia Full Text
68 15 1/2/3/4/5 A Smart City Model for an Intelligent Traffic Light Decision System Darko Pajkovski, Marija Apostoloska – Kondoska and Hristina Dimova Popovska, University “St. Kliment Ohridski”, Republic of North Macedonia Full Text
69 15 6 Revisiting IT Project Uncertainty: Operationalizing the Sambamurthy–Zmud Model for De-Risking Digital Transformation Project Irshad Abdulla, Simon Fraser University, Canada Full Text

International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)

70 15 3 Harnessing AI for Data Privacy through a Multidimensional Framework Prateik Mahendra, Meta, USA Full Text
71 15 1/2 Discuss How AI and ML Can Optimize Lifecycle Management Practices within Pharmaceutical Companies from Development to Post-Market Surveillance Jahnavi Vellanki, Industry Researcher, USA Full Text

The International Journal of Information Technology, Control and Automation (IJITCA)

72 15 1/2/3/4 Obtaining Inverse Kinematics Equations for a Planar Ball-Plate Robot Ricardo Francisco Martinez-Gonzalez, Jose Antonio Hernandez-Reyes and Guillermo Sanchez-Vazquez, Tecnológico Nacional de Mexico - IT Veracruz, Mexico Full Text

International Journal of Computer Networks & Communications (IJCNC)

73 17 1 Performance of Aloha-Q with Adaptive Transmission Probability Katsumi Sakakibara, Okayama Prefectural University, Japan Full Text
74 17 1 Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Distributed Networks Jogendra Kumar, G.B.Pant Institute of Engineering and Technology, India Full Text
75 17 1 A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetime in RPL-Contiki-based IoT Networks Mohamed Achref BOUKHOBZA 1, Mehdi ROUISSAT 1 ,2, Mohammed BELKHEIR 3, Allel MOKADDEM 3 and Pascal LORENZ 4 1 NourBachir University Center, Algeria, 2 STICLaboratory,UniversityAboubekrBelkaid, Algeria , 3 Nour Bachir University Center El-Bayadh, Algeria, 4 Haute Alsace University, France Full Text
76 17 1 Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic Thresholds Fatma Ben Salah 1, Abdelhakim Khlifi 2, Marwa Rjili 1, Amina Darghouthi 1 and Belgacem Chibani 1, 1 University of Gabes, Tunisia, 2 Sup’COM, University of Carthage, Tunisia Full Text
77 17 1 Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Attack Detection in Industrial IoT Bebin Josey T and D.S.Misbha, Nesamony Memorial Christian College Marthandam, India Full Text
78 17 1 Load Balanced Attack Defense System with Lightweight Authentication and Modified Blockchain in SDN for B5G Ihsan H. Abdulqadder 1 and Israa T. Aziz 2, 1 University of Kirkuk, Iraq, 2 University of Mosul, Iraq Full Text
79 17 1 FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network Security Enhancement Priyanka and Anoop Kumar, Banasthali Vidyapith, India Full Text
80 17 1 A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network Lifespan Almamoon Alauthman 1 and Wan NorShuhadah Wan Nik 2, 1 Al-Balqa Applied University, Jordan, 2 University Sultan Zainal Abidin, Malaysia Full Text
81 17 2 Formal Abstraction & Interface Layer for Application Development in Automation-Focussed Distributed Systems Vivek Ramji, Microsoft, USA Full Text
82 17 2 Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in NoC-Based Multicore Systems Mohd Farooq, Aasim Zafar and Abdus Samad, Aligarh Muslim University, India Full Text
83 17 2 Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks Chandimal Jayawardena, Jay Chen, Amay Bhalla and Lin Bu, University of South Australia, Australia Full Text
84 17 2 Enhancement of Quality of Service in Underwater Wireless Sensor Networks Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India Full Text
85 17 2 Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks BOUDI Raid1 GHERBI Chirihane2 and ALIOUAT Zibouda2, 1 Abdelhafid Boussouf University, Algeria, 2 Ferhat Abbas University of Setif, Algeria Full Text
86 17 2 Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their Applications in Post-Quantum Cryptography Mohammed El Baraka and Siham Ezzouak, Sidi Mohammed Ben Abdellah University, Morocco Full Text
87 17 2 Visually Image Encryption and Compression using a CNN-Based Autoencoder Mahdi Madani a and El-Bay Bourennane, Université Bourgogne Europe, France Full Text
88 17 2 Developing a Secure and Transparent Blockchain System for Fintech with Fintrust Framework Avinash Singh 1, Vikas Pareek 1 and Ashish Sharma 2, 1 Mahatma Gandhi Central University, India, 2 Manipal University, India Full Text
89 17 3 A Framework for Securing Personal Data Shared by Users on the Digital Platforms Nirjhor Anjum 1, Lamia Islam 2, Md Rubel Chowdhury 3 and Ariful Alam 4, 1 University of the Cumberlands, USA, 2 Washington State University, USA,3 London Metropolitan University, UK, 4 Trine University, USA Full Text
90 17 3 Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Peakto-Average Power Ratio Reduction Prabhakar Narasappa Kota 1, Pravin Balaso Chopade 1, Bhagvat D Jadhav 2, Shriram Sadashiv Kulkarni 3 and Pravin Marotrao Ghate 2, 1 M. E. S. Wadia College of Engineering, India, 2 JSPM's Rajarshi Shahu College of Engineering, India, 3 Sinhgad Academy of Engineering, India Full Text
91 17 3 Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental Noise Abderrahim Mohammadi 1, Aziz Dkiouak 2, Mostafa Baghouri 3, Saad Chakkor 1, Ahmed EL Oualkadi 2 and Anass El Mamouni 1, 1 Abdelmalek Essaadi University Tetuan, Morocco,2 Chouaib Doukkali University, Morocco, 3 University of Hassan II, Morocco Full Text
92 17 3 An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless Sensor Network Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India Full Text
93 17 3 Energy Efficient Virtual MIMO Communication Designed for Cluster based on Cooperative WSN using Oleach Protocol Shitiz Upreti, Mahaveer Singh Naruka, Maharishi University of Information Technology (MUIT), India Full Text
94 17 3 A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc Networks Himanshu Bartwal 1, Himani Sivaraman 1 and Jogendra Kumar 2, 1 Jigyasa Univesity, India, 2 GBPIET, India Full Text
95 17 3 Classification of Network Traffic using Machine Learning Models on the NetML Dataset Mezati Messaoud, Kasdi Merbah University, Algeria Full Text
96 17 4 Conflict Flow Avoided Proactive Rerouting Algorithm using Online Active Learning for Efficient Transmission of Datastream in Software Defined Networks Kalaivani Subramaniam and Sumathi Arumugam, KPR College of Arts Science and Research, India Full Text
97 17 4 QoS Based Reliable Route in MANET for Military Applications Diksha Shukla and Raghuraj Singh, Harcourt Butler Technical University, India Full Text
98 17 4 Performance of Multi-Hop FSO Systems Under Practical Conditions with Malaga Turbulence Channels and Pointing Errors Ha Duyen Trung, Hanoi University of Science and Technology, Vietnam Full Text
99 17 4 An Energy Hole Detection and Relay Repositioning in Cluster Based Routing Protocol for Improving Lifetime of WSN Saranya Selvaraj and Anitha Damodaran, Sri Ramakrishna College of Arts and Science for Women, India Full Text
100 17 4 Analysis of LTE/5G Network Performance Parameters in Smartphone Use Cases: A Study of Packet Loss, Delay, and Slice Types Almamoon Alauthman and Abeer Al-Hyari, Al-Balqa Applied University, Jordan Full Text
101 17 4 Enhancing IoT Cyberattack Detection via Hyperparameter Optimization Techniques in Ensemble Models Otshepeng Kgote1, Bassey Isong1 and Tsapang Mashego2, 1 North-West University, South Africa, 2 University of Cape Town, South Africa Full Text
102 17 4 Authenticated Key Agreement Protocol with Forward Secrecy for Securing Cyber Physical Systems Sung-Woon Lee 1 and Hyunsung Kim 2, sup>1 Tongmyong University, Korea,2 Kyungil University, Korea Full Text
103 17 4 Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks Swathy Akshaya and Padmavathi, Avinashilingam University, India Full Text
104 17 5 Synergy Analysis of Ensemble Feature Selection on Performance Amelioration of Intrusion Detection System S.Vijayalakshmi and V.Prasanna Venkatesan, Pondicherry University, India Full Text
105 17 5 Enhancing the Effectiveness of Encrypted Traffic Classification through Data Preservation and Input Alignment with Deep Neural Networks Nguyen Hong Son and Nguyen Trung Hieu, Posts and Telecommunications Institute of Technology, Vietnam Full Text
106 17 5 A Novel Intrusion Detection Model for Critical Healthcare Environments Aishvarya shree.V.G 1, M.Thangaraj 1 and M. Nirmala Devi 2, 1 Madurai Kamaraj University, India, 2 Thiagarajar College of Engineering, India Full Text
107 17 5 Dynamic Low-Power Traffic Pattern for Energy-Constrained Wireless Sensor Networks Almamoon Alauthman, Al-Balqa Applied University, Jordan Full Text
108 17 5 Optimizing QoS and Congestion in MANETs using XGBoost with Hybrid PSO and Beluga Whale Strategies Diksha Shukla and Raghuraj Singh, Harcourt Butler Technical University, India Full Text
109 17 5 Adaptive Q-Learning-Based Routing with Context-Aware Metrics for Robust Manet Routing (AQLR) P. Tamilselvi 1, S. Suguna Devi 1, M. Thangam 2 and P. Muthulakshmi 1, 1 Cauvery College for Women, India, 2 Mount Carmel college, India Full Text
110 17 5 Towards Efficient VM Placement: A Two-Stage ACO–PSO Approach for Green Cloud Infrastructure Ali Baydoun 1 and Ahmed Zekri 2, 1 Beirut Arab University, Lebanon, 2 Alexandria University, Egypt Full Text
111 17 6 Deep Reinforcement Learning-Based Resource Allocation in Massive MIMO NOMA Systems Pham Hoai An 1,2, Nguyen Dung 1,2, Nguyen Thi Xuan Uyen 1,2, Nguyen Thai Cong Nghia 1,2 and Ngo Minh Nghia 1,2 1 VNUHCM - University of Science, Vietnam, 2 Vietnam National University, Vietnam Full Text
112 17 6 Multimodal QOS Aware Load Balanced Clustering in 5G-Enabled IOT Sensor Network Biswanath Dey 1, Sukumar Nandi 2, Sivaji Bandyopadhyay 3 and Samir Borgohain 1, 1 National Institute of Technology, India 2Indian Institute of Technology, India, 3 Jadavpur University, India Full Text
113 17 6 RLSUAV: Relative Localization in a Swarm of UAVS Sara Benkouider, Nasreddine Lagraa and Mohamed Bachir Yagoubi, Université Amar Telidji de Laghouat, Algeria Full Text
114 17 6 Enhancing Manet Security Through Blockchain-Driven Multipath Route Authentication Gagan Bhatt, Krishna Kaniyal, Jayant Pal and Jogendra Kumar, GBPIET Ghurdauri Pauri Garhwal Uttarakhand, India Full Text
115 17 6 Proposed Comprehensive Eavesdropping Detection Solution in Multi-VLAN Switched Network Based on IPFIX Flow Viet H. Le 1, Huy-Trung Nguyen 2, Cuong V. Trinh 1 and Tran Minh Hieu 2, 1 People’s Security Academy, Vietnam 2 Research Institute of Posts and Telecommunications, Vietnam Full Text
116 17 6 Advanced Intrusion Detection and Classification using Transfer Learning with Squeeze and Excitation Network and Adaptive Optimization in Big Data Anoop Mohana Kumar 1,2, Joseph Emerson Raja 1 and Chinnaiyan Senthilpari 1, 1 Multimedia University, Malaysia, 2 Saveetha School of Engineering, India Full Text
117 17 6 Hybrid Anomaly Detection Mechanism for IOT Networks Harish Kumar Saini, Monika Poriye, Kurukshetra University, India Full Text
118 17 6 Enhancing Distributed Authorization with Lagrange Interpolation and Attribute-Based Encryption Keshav Sinha 1, Sumitra 1, Richa Kumari 1, Akashdeep Bhardwaj 1 and Shawon Rahman 2, 1 University of Petroleum and Energy Studies (UPES), India, 2 University of Hawaii-Hilo, USA Full Text

International Journal of Wireless & Mobile Networks (IJWMN)

119 17 1 Suboptimal Fluid Antenna Systems for Maximizing the Secrecy Rate with Untrusted Relays Tamer Mekkawy, Military Technical College, Egypt Full Text
120 17 1 Enhanced Signal Energy Detection Technique for Low SNR Spectrum Sensing in Cognitive Radio – Hybrid Approach Khaja Kamaluddin 1, Masood Shareef Arif 2, 1 International Academic and Industrial Research Solutions, India, 2 Intelligent Pharmacy Computer Systems, USA Full Text
121 17 2 A Systematic Review of Ad-Hoc On-Demand Distance Vector Routing Protocol for Performance Improvement in Mobile Ad-Hoc Networks Patrick M. Njoroge, John G. Ndia and Peter M. Mwangi, Murang’a University of Technology/School of Computing and Information Technology, Kenya Full Text
122 17 2 A Traffic Incident Management Framework for Vehicular Ad Hoc Networks Rezvi Shahariar1 and Chris Phillips2, 1University of Dhaka, Bangladesh, 2Queen Mary University of London, England Full Text
123 17 3 Enhancing WSN Intrusion Detection: Two-Tier Feature Selection and Optunaoptimized Ensemble Learning Dilip Dalgade, NileshPatil, ManujJoshi and Dilendra Hiran, Pacific Academy of Higher Education and Research, India Full Text
124 17 4 Optimized Cluster Based Energy Aware Routing (OCEAR) to Prolong Network Lifetime in WSNs Rajkumar M Vadgave, Manjula S and Savitri Kanshete, Bheemanna Khandre Instituteof Technology, India Full Text
125 17 4 Self-Healing Quantum Networks using Entanglement for Autonomous Troubleshooting Vivek Bagmar, Arista Networks, USA Full Text
126 17 4 Real-Time QGQG Phase Unwrapping and SAR/INSAS DEM Fusion for Autonomous Underwater Terrain-Aided Navigation B.D. Jerushah Nissi and Sandhya Rachamalla, Osmania University, India Full Text
127 17 4 Improving Channel Estimation in Vehicular Communication Networks with Diverse Mobility Patterns using BI-LSTM Model Daniel Asuquo 1, Moses Ekpenyong 1, Enefiok Etuk 2, Kingsley Attai 3, Philip Asuquo 1 and Temple Nwaeboiwe 1, 1 University of Uyo, Nigeria, 2 Michael Okpara University of Agriculture, Nigeria,3 Ritman University, Nigeria Full Text
128 17 4 Ant Colony Optimization in Ad Hoc Networks: A Comprehensive Survey Prome Saha Resha 1, Hridoy Chandra Das 2 and Dulal Chakraborty 1, 1 Comilla University, Bangladesh, 2 Ostbayerische Technische Hochschule Amberg-Weiden University, Germany Full Text
129 17 4 Systematic Review of Vehicular Ad-Hoc Networks Trust-Based Models Samson Waweru Nyutu, John Gichuki Ndia and Peter Maina Mwangi, Murang’a University of Technology, Kenya Full Text
130 17 4 Forecasting Future DDoS Attacks using Long Short Term Memory (LSTM) Model SKong Mun Yeen 1, Rafidah Md Noor 1, Wahidah Md Shah 2, Aslinda Hassan 2 and Muhammad Umair Munir 1, 1 Universiti Malaya, Malaysia, 2 Universiti Teknikal Malaysia Melaka (UTeM), Malaysia Full Text
131 17 5 A Hybrid YOLOv5–SSD IoT-Based Animal Detection System for Durian Plantation Protection Anis Suttan Shahrir 1, Zakiah Ayop 1, Syarulnaziah Anawar 1 and Norulzahrah Mohd Zainudin 2, 1 Universiti Teknikal Malaysia Melaka (UTeM), Malaysia, 2 Universiti Pertahanan Nasional Malaysia (UPNM), Malaysia Full Text

International Journal of Next-Generation Networks (IJNGN)

132 17 1/2/3 A Survey on Resource Management Solutions, Challenges, and Emerging Opportunities in Fog Computing Firas Ghoneim, ATA Software Solutions, Egypt Full Text

International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks(GRAPH-HOC)

133 17 1 The Importance of Machine Learning to Individuals' Rights to Protect their Data Basma Mohamed and Khaled Eid Abdel Moneim Abdel Fattah, Giza Higher Institute for Managerial Sciences, Egypt Full Text
134 17 2/3/4 Design, Implementation, and Analysis of a Reliable Datagram Protocol (ACK) for Low-Power Wireless Sensor Networks (WSN) Ricardo Francisco Martinez-Gonzalez, Luis Fernando Gutierrez-Sandoval, Jose Antonio Hernandez-Reyes and Carlos Roberto Gonzalez-Escarpeta, Tecnológico Nacional de Mexico/ IT Veracruz, Mexico Full Text

International Journal of Security, Privacy and Trust Management (IJSPTM)

135 14 1/2 Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance and Consent Sijuola Atanda Lawal, Institute of Advanced Legal Studies, United Kingdom Full Text

International Journal of Artificial Intelligence & Applications (IJAIA)

136 16 1 AI-Based Early Prediction and Intervention for Student Academic Performance in Higher Education Maram Khamis Al-Muharrami, Fatema Said Al-Sharqi, Al-Zahraa Khalid Al-Rumhi and Shamsa Said Al-Mamari and Ijaz Khan, Buraimi University College, Oman Full Text
137 16 1 Divergent Ensemble Networks : Improving Predictive Reliability and Computational Efficiency A. Chandorkar and A. Kharbanda, Indian Institute of Technology, India Full Text
138 16 1 Exploring the Integration of Artificial Intelligence into the Functions of an Accounting Department Angel R. Otero and Keiron Hylton, Florida Institute of Technology, USA Full Text
139 16 1 AE-ViT: Token Enhancement for Vision Transformers via CNN-Based Autoencoder Ensembles Heriniaina Andry RABOANARY, Roland RABOANARY and Nirina Maurice HASINA TAHIRIDIMBISOA, Universite d'Antananarivo, Madagascar Full Text
140 16 1 Movie Recommendation System Based on Machine Learning using Profiling Yacine ZERIKAT 1 and Mokhtar ZERIKAT 2, 1 CY Cergy Paris University, France, 2 LAAS research laboratory, Algeria Full Text
141 16 2 Ethical Consideration in Artificial Intelligence Development and Deployment Abdulrahman Alseqyani 1, Saad Alotaibi 2 and Saud Alotaibi 3, 1 Zulfi Technical College, Saudi Arabia, 2 Majma'ah Secondary Industrial Institute, Saudi Arabia, 3 Dawadmi Technical College, Saudi Arabia Full Text
142 16 2 Optimizing Pricing Framework using Reasoning LLMs and Agents for Enhanced Deal Negotiations Chirag Soni 1 and Swati Shah 2, 1 PayPal, India, 2PayPal, USA Full Text
143 16 2 Advancing Privacy and Security in Generative AI-Driven Rag Architectures: A Next-Generation Framework Meethun Panda 1 and Soumyodeep Mukherjee 2, 1 Bain & Company, UAE, 2Genmab, USA Full Text
144 16 2 Revolutionizing Lead Qualification: The Power of LLMs Over Traditional Methods Shantanu Sharma 1 and Naveed Afzal 2, 1 ZoomInfo, USA, 2Takeda Pharmaceuticals, USA Full Text
145 16 2 Consciousness in AI Systems: A Review Mosladdin Mohammad Shueb and Xiangdong Che, Eastern Michigan University, USA Full Text
146 16 2 Boswell Test: Beyond the Turing Benchmark Peter Luh, Retired Physicist, USA Full Text
147 16 3 The Role of Artificial Intelligence in Ensuring the Cyber Security of SCADA Systems Rashid Alakbarov and Mammad Hashimov, Ministry of Science and Education, Republic of Azerbaijan Full Text
148 16 3 Balancing Privacy and Innovation – A VAE Framework for Synthetic Healthcare Data Generation Saritha Kondapally, Senior Member IEEE, USA Full Text
149 16 3 OWE-CVD: An Optimized Weighted Ensemble for Heart Disease Prediction Fahad Almalki and Abdullah A Sheikh, Taif University, Kingdom of Saudi Arabia Full Text
150 16 3 A Thorough Introduction to Multimodal Machine Translation Kouassi Konan Jean-Claude, Bircham International University, Spain Full Text
151 16 3 AI-Driven Vulnerability Analysis in Smart Contracts: Trends, Challenges and Future Directions Mesut Ozdag, University of Central Florida, USA Full Text
152 16 3 From Insight to Impact: The Evolution of Data-Driven Decision Making in the Age of AI Paras Doshi, Opendoor, USA Full Text
153 16 3 Augmented and Synthetic Data in Artificial Intelligence Philip de Melo, Norfolk State University, USA Full Text
154 16 4 Automatic Estimation of Region of Interest Area in Dermatological Images Using Deep Learning and Pixel-Based Methods: A Case Study on Wound Area Assessment R-D. Berndt 1, C. Takenga 1, P. Preik 1, T. Siripurapu 1, T. Fuchsluger 2, C. Lutter 2, A. Arnold 2 and S. Lutze 2, 1 INFOKOM – Informations- und Kommunikationsgesellschaft mbH, Germany, 2 Medical University of Rostock, Germany Full Text
155 16 4 Prediction of Diabetes from Electronic Health Records Philip de Melo, Norfolk State University, USA Full Text
156 16 4 Bio-Inspired Architecture for Parsimonious Conversational Intelligence : The S-AI-GPT Framework Said Slaoui, University Mohammed V, Morocco Full Text
157 16 4 Bio-Inspired Hormonal Modulation and Adaptive Orchestration in S-AI-GPT Said Slaoui, University Mohammed V, Morocco Full Text
158 16 5 A Hybrid CNN-LSTM Deep Learning Model for Intrusion Detection in Smart Grid Abdulhakim Alsaiari and Mohammad Ilya, Florida Atlantic University, USA Full Text
159 16 5 A Heterogeneous Deep Ensemble Approach for Anomaly Detection in Class Imbalanced Energy Consumption Data David Kaimenyi Marangu and Stephen Kahara Wanjau, Murang’a University of Technology, Kenya Full Text
160 16 5 Memory Architecture in S-AI-GPT: From Contextual Adaptation to Hormonal Modulation Said Slaoui, Mohammed V University, Morocco Full Text
161 16 5 LLM and MCP based Automated Deal Pricing Negotiation using Multi Modal Margin Forecasting and Pricing Scenario Simulation Chirag Soni 1, Swati Shah 2, Avi Reddy 2, Mahesh Toro 2, Rishabh Rishi Sharma 2 and Kiran R 2, 1 PayPal, India, 2 PayPal, USA Full Text
162 16 5 Calculable-Contents Identification Matrix: A Computerisable Key Format for Plant Identification Adepoju Tunde Joseph Ogunkunle, Ladoke Akintola University of Technology, Nigeria Full Text
163 16 6 S-AI-Anti Hallucination: A Bio-Inspired and Confidence-aware Sparse AI Framework for Reliable Generative Systems Said Slaoui, Mohammed V University, Morocco Full Text
164 16 6 Advancing Ethical Stewardship: A Green AI Framework for Optimizing Sustainable Investments in Islamic Financial Systems Zahiduzzaman Zahid 1, Mohammad Enayet Hossain 2, Basharat Ali Khan Mohammed 3, 1 University of the Cumberlands, USA, 2 International Islamic University Malaysia, Malaysia, 3 Campbellsville University, USA Full Text
165 16 6 Methods and Pathways for Effective Utilization of AI in Training of Computer Sciences: A Narrative Review Abdullah Almutairi 1, Abdulrahman Alseqyani 1 and Khaled Alotaibi 2, 1 Zulfi Technical College, Saudi Arabia, 2 HautatSudair Technical College, Saudi Arabia Full Text
166 16 6 AI-Enhanced E-Learning for Religious Leaders: A Framework for Sustainable Agricultural Empowerment and Economic Resilience in Rural Bangladesh Mohammad Saiduzzaman 1, Md. Mehedi Morshed 2, Farhana Afroz 3, Zahiduzzaman Zahid 4, 1 Ministry of Textile & Jute, Bangladesh, 2 Ministry of Local Government, Bangladesh, 3 Rupali Bank PLC, Bangladesh, 4 University of the Cumberlands, USA Full Text
167 16 6 Challenging Multi-Vector Exclusion by Improving ROI Adoption in Applied AI Systems: The E.A.S.E. Framework as a Systemic Evaluation Tool for Intersecting AI Bias and Digital Exclusion Kevin J. Spellman, Tax & Legal - Digital Innovation, UK Full Text
168 16 6 Knowledge Reuse Degree Asymmetry in Transfer Reinforcement Learning Satoru Ikeda 1, Kohei Esaki 1, Hitoshi Kono 2, Shota Chikushi 3, Kaori Watanabe 4, and Hidekazu Suzuki 4, 1 Tokyo Denki University, Japan, 2 Kindai University, Japan, 3 New Technology Foundation, Japan, 4 Tokyo Polytechnic University, Japan Full Text

International Journal of Database Management Systems (IJDMS)

169 17 1/2 Optimizing Data Interoperability in Agile Organizations: Integrating Nonaka’s Ba and Habermas’s Deliberation for Trust-Based Knowledge Management Marina Özdemir 1 and Cihangir Deniz Özdemir 2, 1 University of São Paulo, Brazil, 2 Ozco Management and Training Ltd., Brazil Full Text
170 17 1/2 Architecting Intelligent Decentralized Data Systems to Enable Analytics with Entropy-Aware Governance, Quantum Readiness and LLM-Driven Federation DaMeethun Panda 1 and Soumyodeep Mukherjee 2, 1 Bain & Company, UAE, 2 Genmab, USA Full Text
171 17 3/4/5 Optimization Techniques for SQL+ML Queries: A Performance Analysis of Realtime Feature Computation in OpenMLDB Mashkhal A. Sidiq 1, Aras A. Salih 2 and Samrand M. Hassan 2, 1 Tianjin University, China, 2 Nankai University, China Full Text
172 17 6 Architectural Patterns and Performance Analysis of Integer Surrogate Keys for Time-Series Data Warehousing Sviatoslav Stumpf and Vladislav Povyshev, ITMO University, Russia Full Text

International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

173 14 1 Unlocking the Power of Artificial Intelligence in Accounting: Transformative Insights for Future Financial Leaders Angel R. Otero, Florida Institute of Technology, USA Full Text
174 14 1 Advxai in Malware Analysis Framework: Balancing Explainability with Security Darring White, Marymount University, USA Full Text
175 14 2 Pixelated Calculus: A Visually Intuitive Computational Method for Area and Rate Determination with Complex Geometries and Empirical Data W.Houze, Independent Researcher, USA Full Text
176 14 3 Deep Learning-Based Rock Particulate Classification using Attention Enhanced ConvNeXt Anthony Amankwah, Amankwah Consult, Germany Full Text

International Journal on Natural Language Computing(IJNLC)

177 14 1 Enhancing Educational QA Systems: Integrating Knowledge Graphs and Large Language Models for Context-Aware Learning Ayse Arslan, USA Full Text
178 14 1 Inventory Classification with AI: Evaluating How Large Language Modelsenhance Categorization using UNPSC Codes Anmolika Singh and Yuhang Diao, Data Scientist, USA Full Text
179 14 2 Mathematical Formulas for Generating Syllables used in Arabic Speech Synthesis Chegrani Lamari, Guerti Mhania and Boudraa Bachir, Algeria Full Text
180 14 2 Making Medical Experts Fit4ner: Transforming Domain Knowledge through Machine Learning-Based Named Entity Recognition Florian Freund, Philippe Tamla, Frederik Wilde and Matthias Hemmje, University of Hagen, Germany Full Text
181 14 3/4 Text Analysis in Mongolian Language Chuluundorj Begz, University of the Humanities, Mongolia Full Text
182 14 5 Cross-Lingual Statistical Parsing with Tree-Adjoining Grammar: A POS Enriched Extension for Robust Natural Language Processing Pavan Kurariya, Prashant Chaudhary, Jahnavi Bodhankar and Lenali Singh, Centre for Development of Advanced Computing, India Full Text
183 14 5 Presentation of Corporate Knowledge During the Transition to Highly Automated Systems Ekaterina Mashina, Germany Full Text

Machine Learning and Applications: An International Journal (MLAIJ)

184 12 1 Revolutionizing Big Data with AI-Driven Hybrid Soft Computing Techniques Praveen Kumar Myakala, Anil Kumar Jonnalagadda and Prudhvi Naayini, Independent Researchers, USA Full Text
185 12 1 Understanding the Heterogeneous Impact of Remittances on Saving Behaviour in Uzbekistan: A Machine Learning Approach Masuda Isaeva, Asakabank, Uzbekistan Full Text
186 12 1 Cluster-Specific Propensity Score Weighting To Stabilize Treatment Effect Estimation Hardev Ranglani, EXL Service Inc, USA Full Text
187 12 1 Artificial Intelligence and Cloud Computing in Healthcare: Innovations and Impacts Mohammad Amir Salari, Saint Louis University, USA Full Text
188 12 1 Artificial Intelligence Based Business Transformation Projects-the Role of Data Sciences in Mixed-Methods Patterns (RDSMMP) Antoine Trad, IBISTM, France Full Text
189 12 1 Estimating the Accuracy of a Bagged Ensemble Eugene Pinsky and Siddhant Shah, Boston University, USA Full Text
190 12 1 Analyzing Fashion Trends Using Hierarchical Clustering and Temporal Analysis PShivani Parab and Eugene Pinsky, Boston University, USA Full Text
191 12 1 Quantile Regression with Q1/Q3 Anchoring: A Robust Alternative for Outlier-Resistant Modeling Xiaoying Zeng and Eugene Pinsky, Boston University, USA Full Text
192 12 1 An Adaptive Hierarchical Tree-Based Clustering Approach to Outlier Detection in ETF-Focused Financial Time-Series Shlok Mandloi, Aryaman Jalali, and Eugene Pinsky, Boston University, USA Full Text
193 12 1 Detection of Alzheimer’s Disease using Bidirectional LSTM and Attention Mechanisms Mehdi Ghayoumi and Kambiz Ghazinour, SUNY, USA Full Text
194 12 1 Analysis of Unsupervised Clustering Algorithms and Impact of Dimensionality Reduction: A Data Driven Approach Palak Narula, Adobe Inc., India Full Text
195 12 2 Comparing Classifiers in the Presence of Errors in True Label Assignment in Medical Datasets Vishwa Vallabh Angampally and Eugene Pinsky, Metropolitan College Boston University, USA Full Text
196 12 3 Preserving Employees' Personal Knowledge During the Transition to Automated Production Ekaterina Mashina, Germany Full Text
197 12 4 About an Automating Annotation Method for Robot Markers Wataru Uemura and Takeru Nagashima, Ryukoku University, Japan Full Text
198 12 4 AI Based Transformation Projects-Language Processing Environments for Audit and Governance (LPE_AG) - the Proof of Concept Antoine Trad , Paris La-Defense France, France Full Text
199 12 4 AI Based Transformation Projects-ML and NLP Managed Audit, Control, and Governance (ML_ACG) - the Basics Antoine Trad , Paris La-Defense France, France Full Text

International Journal of Fuzzy Logic Systems (IJFLS)

200 15 1/2/3 Development of a Single-Variable Fuzzy Controller in Python without Libraries Ricardo Francisco Martínez-González, Tecnológico Nacional de Mexico – IT Veracruz, México Full Text

International Journal on Cloud Computing: Services and Architecture (IJCCSA)

201 15 1 Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems Gaurav Samdani1, Ganesh viswanathan2and Abirami Dasu Jegadeesh3,1University of North Carolina, USA,2 AVP, USA 3Anna university, India Full Text
202 15 2/3 Designing Fault-Tolerant Architectures for Resilient Oracle Cloud ERP and HCM Integrations Anusha Atluri, SR Oracle Techno Functional consultant, USA Full Text
203 15 2/3 Cloud-driven Transformation of Long-Term Care Insurance: A Data-Centric System Modernization Framework Sangeeta Anand, Continental General, USA Full Text

International Journal of Managing Public Sector Information and Communication Technologies ( IJMPICT )

204 16 1/2 Security, Defence and Cyber Security in the Digital Age Zhiyuan Liu, Lancaster university, UK Full Text
205 16 3/4 E-governance and Service Delivery In Nepal: Evidence from Nagarjun Municipality Prem Bahadur Giri1,2, Uttam Raj Giri1, Bijay Raj Giri2, Ajay Giri2and Trilochana Pokhrel21Nagarjun Municipality, Nepal,2 Wisdom Academy and Research Center, Nepal Full Text

International Journal on Cryptography and Information Security (IJCIS)

206 15 1/2/3/4 Decryption Through Polynomial Ambiguity: Noise-Enhanced High-Memory Convolutional Codes for Post-Quantum Cryptography Meir Ariel, Tel Aviv University, Israel Full Text

International Journal of Information Technology, Modeling and Computing (IJITMC)

207 13 1/2/3 Combinatorial Analysis of Routing Scenarios in the Multiple ‑ Start Connections Algorithm for Peer ‑ to ‑ Peer Networks V.D. Zyuzin, N.A. Bashmurov and P.B. Boldyrevskii, Lobachevsky State University of Nizhni Novgorod, Russia Full Text
208 13 4 MeVe: A Modular System for Memory Verification and Effective Context Control in Language Models Andreas Ottem, Independent Researcher, Norway Full Text

Advanced Computational Intelligence: An International Journal (ACII)

209 12 1 Validating Re-Clustering for Data Labeling with Human-in-the-Loop Feedback Gloriana J. Monko and Masaomi Kimura, Shibaura Institute of Technology, Japan Full Text
210 12 2/3/4 General Deep Learning Architectures for Multimodal Emotion Detection Kurbanov Abdurahmon, National University of Uzbekistan named after Mirzo Ulugbek, Uzbekistan Full Text

Signal & Image Processing : An International Journal (SIPIJ)

211 16 1 Laplacian Pyramid and Dempster-Shafer with Alpha Stable Distance in Multi-Focus Image Fusion Rachid Sabre 1 and Ias Wahyuni 2, 1 University of Burgundy/Agrosup Dijon, France, 2 Universitas Gunadarma, Indonesia Full Text
212 16 1 Contemporary Features Extraction Techniques for Detecting Malicious Drones Ali Y. Al-Zahrani, University of Jeddah, Saudi Arabia Full Text
213 16 2 Integrating Large Language Models for Biomedical Image Segmentation: A Computational Paradigm for Enhanced Interpretability and Decision Support Soumyodeep Mukherjee 1 and Meethun Panda 2, 1 Genmab, USA, 2 Bain & Company, UAE Full Text
214 16 2 Low-Cost Digital Data Transmission Technique using FM-RDS Protocol for the Agricultural Sector in Developing Countries Ndangoh Dam Arantes and Michael Ekonde Sone, University of Buea, Cameroon Full Text
215 16 3/4/5 Wideband Cooperative Spectrum Sensing in 5G via MRC-Aided Energy Detection and K-out-of-N Decision Fusion: A Scalable Noise Resilient Framework for Dynamic Spectrum Accesst Blessing C. Dike, Cajetan M. Akujuobi, Justin Foreman, Suxia Cui and Lin Li, Prairie View A&M University Prairie View, USA Full Text

International Journal of Software Engineering & Applications (IJSEA)

216 16 1 Model Checking for Multi-Agent Systems Modeled by Epistemic Process Calculus Qixian Yu 1, Zining Cao 1,2,3, Zong Hui 1,4 and Yuan Zhou 1, 1 Nanjing University of Aeronautics and Astronautics, China, 2 Ministry Key Laboratory for Safety-Critical Software Development and Verification, P. R. China, 3 Collaborative Innovation Center of Novel Software Technology and Industrialization, P. R. China, 4 Huaiyin Institute Of Technology, P. R. China Full Text
217 16 1 Coupling Metrics for Aspect Oriented Software Kelvin Mutunga Katonyi, John Gichuki Ndia and Geoffrey Muchiri Muketha, Murang'a University of Technology, Kenya Full Text
218 16 1 Towards a Robust Quality Assurance Framework for Cloud Computing Environments Mohammed Ahmad Alharbi and Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia Full Text
219 16 2/3 Green and Sustainable Cloud Computing: Strategies for Carbon Footprint Reduction and Energy Optimization Abirami Dasu Jegadeesh, Independant Researcher, USA Full Text
220 16 4/5 Controller Synthesis Method for Multiagent System Based on Temporal Logic Specification Ruohan Huang1,2 and Zining Cao1,2, 1 Nanjing University of Aeronautics and Astronautics, P. R. China 2 Collaborative Innovation Center of Novel Software Technology and Industrialization, China Full Text
221 16 4/5 Why Does the Engineering Manager Still Exist in Agile Software Development? Ravi Kalluri, Northeastern University, USA Full Text
222 16 6 Intelligence as a Feature: Modeling ML in Software Product Lines Luz-Viviana Cobaleda 1 , Andres Lopez 1,2 , Paola Vallejo 3 , Raul Mazo 2 and Julian Carvajal 1, 1 Universidad de Antioquia, Colombia, 2 Francia, 3 Universidad EAFIT, Colombia Full Text
223 16 6 A Smart Framework for Aligning College Curricula with Labor Market Needs Khaled Ebrahim Almajed, Hazem M. El-Bakry, Samir Abd Elrazez, Rasha Elhadri, Mansoura University, Egypt Full Text

International Journal on AdHoc Networking Systems (IJANS)

224 15 1/2 Design and Analysis of the Performance of the IoT-Based Water Purity Identification System Md. Ashraful Islam and Md. Matiqul Islam, Rajshahi University, Bangladesh Full Text
225 15 1/2 A Microcontroller-Based Approach to Optimizing Soil Moisture for Increased Agricultural Productivity Md. Faysal Ahmed 1, Md. Firoz Ahmed 1, M. Hasnat Kabir 1, Md. Arifur Rahman 2, Mirza A.F.M. Rashidul Hasan 1 Aurangzib Md. Abdur Rahman 1, Md. Matiqul Islam 1 and Mst. Shahida Akter 3, 1 University of Rajshahi, Bangladesh 2 First Capital University of Bangladesh, Bangladesh, 3 Upazila Office, Bangladesh Full Text

International Journal of UbiComp (IJU)

226 16 1/2/3 Augmenting Missing Sensor Data for Robust Human Activity Recognition Surya kangeyan Kandasamy Gowdaman and Sayma Akther, San Jose State University, USA Full Text

Applied Mathematics and Sciences: An International Journal (MathSJ )

227 12 1 On a Diophantine Proofs of FLT: The First Case and the Secund Case z≡0 (mod p) and Significant Related Problems Kimou Kouadio Prosper 1, Kouakou Kouassi Vincent 2, 1 1 Felix Houphouet-Boigny National Polytechnic Institute, Ivory Coast, 2 Nangui Abrogoua University, Ivory Coast Full Text
228 12 1 A Mathematical Model in Public Health Epidemiology: Covid-19 Case Resolution Among Veterans Using Public-Use Surveillance Data and First-Order Differential Equations GV Fant, Veterans Health Administration, USA Full Text
229 12 1 On Nano Semi Generalized B - Neighbourhood in Nano Topological Spaces K. Kavipriya and T. Indira, Seethalakshmi Ramaswami College, India Full Text
230 12 2 The Vortex Impulse Theory for Finite Wings Shiang Yu Lee, LW Aero science, USA Full Text
231 12 2 Multipoint Moving Nodes for Parabolic Equations Dalabaev Umurdin and Xasanova Dilfuza, University of World Economy and Diplomacy, Uzbekistan Full Text
232 12 2 Did Fishing Nets with Calculated Shell Weights Precede the Bow and Arrow? Digitally Edited Photographs Model Another Use for Prehistoric Punctured Shells and Early Mathematical Ability Silvia Stein 1 and Susana Pacheco 2, 1Independent Communication and Psychophysiology Researcher, Italy, 2 Universidade NOVA de Lisboa, Portugal Full Text
233 12 3 On Ideals via Generalized Reverse Derivation On Factor Rings Zakia Z. Al-Amery, Aden University, Yemen Full Text
234 12 3 Machine Learning-Guided Dynamic Sorting Algorithm Selection Femi Ojo and Sowmya Guntupalli, Kennesaw State University, USA Full Text

International Journal on Soft Computing ( IJSC )

235 16 1 Dynamic Cognitive Ontology Networks: Advanced Integration of Neuromorphic Event Processing and Tropical Hyper Dimensional Representations Robert Mc Menemy, Glasgow, Scotland, United Kingdom Full Text
236 16 2/3/4 AI-powered Models for Early Detection of CAD P. Jothi, RVS College of Arts and Science, India Full Text

International Journal of Network Security & Its Applications (IJNSA)

237 17 1 Performance of Aloha-Q with Adaptive Transmission Probability Katsumi Sakakibara, Okayama Prefectural University, Japan Full Text
238 17 1 A Trust-Based Multipath Congestion-Aware Routing Technique to Curb Wormhole Attacks for Mobile Nodes in WSNs Fortine Mwihaki Mata, Geoffrey Muchiri Muketha and Gabriel Ndung’u Kamau, Murang’a University of Technology, Kenya Full Text
239 17 2 Enhancing Malware Detection and Analysis using Deep Learning and Explainable AI (XAI) MSamah Alajmani 1, Ebtihal Aljuaid 1, Ben Soh 2,and Raneem Y. Alyami 1 1 Taif University, Saudi Arabia, 2 La Trobe University, Australia Full Text
240 17 2 Delay Testing in Integrated Circuits: Methodologies for Path Delay Fault Detection and Hardware Security Palanichamy Manikandan, Østfold University College, Norway Full Text
241 17 2 Analysing the Impact of Password Length and Complexity on the Effectiveness of Brute Force Attacks Lama A. AlMalki 1,Samah H. Alajmani1, Ben Soh 2,and Raneem Y. Alyami 1 1 Taif University, Saudi Arabia, 2 La Trobe University, Australia Full Text
242 17 3 Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia Full Text
243 17 3 Access Detection System on Web Cameras and Microphones Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia Full Text
244 17 3 Deep Learning Solutions for Source Code Vulnerability Detection Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam Full Text
245 17 3 Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya Full Text
246 17 3 Static Testing Tools Architecture in OpenMP for Exascale Systems Samah Alajmani, Taif University, Saudi Arabia Full Text
247 17 3 A Lightweight Network Intrusion Detection System for SMEs Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia Full Text
248 17 4 Smart Meter Security Issues: A Review Paper Osama Alshannaq 1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip 1, Hairol Nizam Mohd Shah 1 and Áine MacDermott 2, 1 Universiti Teknikal Malaysia Melaka, Malaysia, 2 Liverpool John Moores University, United Kingdom Full Text
249 17 4 Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection Amin Dastanpour1 Raja Azlina Raja Mahmood2, 1 Kerman Institute of Higher Education, Iran, 2 University Putra Malaysia, Malaysia Full Text
250 17 4 A Systematic Review of Applications in Fraud Detection Hashim Jameel Shareef Jarrar, Middle East University, Jordan Full Text
251 17 4 Trust Without Exposure: Verifiable Observability with Capability-Native Webassembly at the Edge Bala Subramanyan, Verifoxx, UK Full Text
252 17 5/6 Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection Sudhanshu Sekhar Tripathy and Bichitrananda Behera, C.V. Raman Global University, India Full Text
253 17 5/6 An Explainable Graph Neural Network Framework for Anti–Money Laundering in Cryptocurrency Transactions using the Elliptic Dataset Oluwatosin Lawal 1, Awele Okolie 2, Callistus Obunadike 3 , 1 1Texas A&M University, USA, 2 Wentworth Institute of Technology, USA,3 Austin Peay State University, USA Full Text
254 17 5/6 Database and System Security Nikitha Merilena Jonnada, University of the Cumberlands, USA Full Text
255 17 5/6 A Novel Trust-based DDOS Cyberattack Detection Model for Smart Business Environments Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma, Nottingham Trent University, United Kingdom Full Text

International Journal of Computer Graphics & Animation (IJCGA)

256 15 1/2 Implicit Set Blends with Bounded Primitives for Zero Implicit Surface Pi-Chung Hsu, Shu-Te University, Taiwan Full Text
257 15 3 The Role of Emojis in Digital Communication: Emotional Expression, Demographic and Social Dynamics Among Young Adults on Whatsapp Malini Mahalingam and Lakshmi Priya Daniel, University of Madras, India Full Text

International Journal of Multimedia & Its Applications (IJMA)

258 17 1/2 The Impact of Album Layout on User Experience in Smartphone Music Applications Molly Scott and Damian Schofield, State University of New York, USA Full Text
259 17 3 Exploring Learning Engagement Factors Influencing Behavioral, Cognitive, and Emotional Engagement and Challenges in Learning Management Systems Maizan Mat Amin, Syadiah Nor Wan Shamsuddin and Wan Mohd Amir Fazamin Wan Hamzah, Universiti Sultan Zainal Abidin, Malaysia Full Text
260 17 3 Editing Fashion Images with Precision: A Controlled in Painting Method Tasnim Charaa 1, Tasnime Hamdeni 2 and Ines Abdeljaoued-Tej 2, 1 University of Carthage, Tunisia, 2 University Tunis-El-Manar, Tunisia Full Text
261 17 3 Audio Steganography using Least Significant Bit Method for Confidential Data Embedding Muhd Izzul Haziq Rahim, Nazirah Abd Hamid, Siti Dhalila Mohd Satar, Mohd Fadzil Abdul Kadir, Ahmad Faisal Amri Abidin @ Bharun, Mohamad Afendee Mohamed and Mumtazimah Mohamad, Tembila Campus, Malaysia Full Text
262 17 3 Exploring Game Based Learning: A Systematic Literature Review (2021-2025) Siti Sakinah Mohd Yusof, Haslinda Hashim and Erni Marlina Saari, Universiti Pendidikan Sultan Idris, Malaysia Full Text
263 17 3 Immersive vs Desktop VR in Hotel English Education: Effects on Engagement of Chinese University Students Meng Huan, Mageswaran A/l Sanmugam, Universiti Sains Malaysia, Malaysia Full Text

International Journal on Information Theory (IJIT)

264 14 1/2 The Weapon - The Use of Kolmogorov Complexity to Combat Plagiarism in the Classroom George Sturm, Radio Logos, Albania Full Text
265 14 1/2 Generative Design as a Simulation of Quantum Field Properties Stephen W. Marshall and Bruce R. Roberts, Ora.Systems, USA Full Text

International Journal of Advanced Information Technology (IJAIT)

266 15 1/2 Types of Authentications in Web Based Frontend Lakshmanarao Kurapati, Individual Researcher, United States Full Text
267 15 1/2 AI Agents Ganesh Viswanathan, Gaurav Samdani and Yawal Dixit, USA Full Text
268 15 1/2 A Conceptual Framework for the Cooperation Of AI Algorithms in Intelligent Systems Garima Goyal Chauhan, Data Scientist, USA Full Text
269 15 3 Engineering Leadership in High-growth Startups: Frameworks for Scaling Teams and Technology Naga Ravi Teja Vadrevu, Chief Technology Officer, USA Full Text
270 15 4 The Study of Incremental Procedure with Deep LSTM for Multiclass Sentiment Analysis Context with on Educational Data Munawar Yusuf Sayed and Yashwant Waykar, Dr. Babasaheb Ambedkar Marathwada University, India Full Text
271 15 4 Design and Development of a Privacy-Preserving Semi-Public Blockchain-Based Ride-sharing System using Raft Consensus with IPFS-Enabled Secure Distributed Storage Rayhan Ferdous Srejon, Mostafizur Rahman Fahim, Sk. Md. Shadman Ifaz, Md. Khairul Hasan, Rafiul Awal Nafi and Nabila Rahman, Ahsanullah University of Science and Technology (AUST), Bangladesh Full Text
272 15 5 Prompt Engineering Pipelines for Legacy Modernization: COBOL, PL/I and Bidirectional Code-Natural Language Transformation using LLMs Sivakumar Arigela and Gaurav Virwal, IBM India Pvt Ltd, India Full Text





menu
Reach Us

emailsecretary@airccse.org


emailjsecretary@airccj.org

close