Computer Science & Information Technology
| S.No | Volume | Issue | Paper Title | Authors |
|---|
International Journal of Computer Science & Information Technology (IJCSIT)
| 1 | 17 | 1 | Artificial Intelligence and Machine Learning Algorithms Are Used to Detect and Prevent Cyber Threats as Well as Their Potential Impact on the Future of Cybersecurity Practices | Md Al Amin, St. Francis College, United States | Full Text |
| 2 | 17 | 1 | Enhancing Public Reputation Systems: Trust Scaling to Mitigate Voter Subjectivity | Manh Hung Nguyen, Posts and Telecommunications Institute of Technologies (PTIT), Vietnam | Full Text |
| 3 | 17 | 2 | The Study of Artificial Intelligent Building Automation Control System in Hong Kong Commercial Building | Tony Tsang, Chang Kam Fai, Hong Kong College of Technology, China | Full Text |
| 4 | 17 | 3 | Hybrid Transformer-Based Classification for Web-Based Injection Attack Detection: A Novel Roberta-XLNet Approach | Ranuja Seethawaka, Chathurya Nambuwasam, D.K.W.G.G.T. Chandrasiri, K.A.S. Kavithma, Harinda Fernando and Ayesha Wijesooriya, Sri Lanka Institute of Information Technology, Sri Lanka | Full Text |
| 5 | 17 | 3 | Applying Cfahp to Explore the Key Models of Semiconductor Pre-Sales | Fei-Hon Kao, Chia-Hsiang Hsieh and Wen Pei, Chung Hua University, Taiwan | Full Text |
| 6 | 17 | 4 | Hard-Soft Data Fusion with ChatGPT: Toward Structured Representations and Automated Reasoning | Nicholas Gahman and Vinayak Elangovan, Penn State University Abington, USA | Full Text |
| 7 | 17 | 4 | Developing an Intelligent System based on Machine Learning Technology for Electronic Waste Management in the Field of Education | Amany Fathy Mohamed Ibrahim Metwaley 1, Elsaeed Elsaeed Mohamed Abd-ElRazik 2 and Rasha Kandil Mohamed Kandil Arafa 2, 1 Egypt, 2 Damietta University, Egypt | Full Text |
| 8 | 17 | 4 | Analysis of Evaluation Indicators for the Friendliness of Sports Venues to Individuals with Lower Limb Disabilities | Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
| 9 | 17 | 4 | AI-Driven Strategies of Mitigating Cybersecurity Threats in U.S. Small and Medium Enterprises (SMEs) | Kemisola Kasali 1, Precious Orekha 2, Oluwaseun John Bamigboye 3, Afolabi Sabur Ajao 4, Peter O. Alawiye 5, Adeola Noheemot Raji 6, 1 University of Arkansas at Little Rock, USA, 2 Drexel University, USA, 3 California Miramar University, USA, 4 Northwestern University, USA, 5 New Mexico Highlands University, USA, 6 University of New Haven, USA | Full Text |
| 10 | 17 | 5 | Optimizing Global Finance: SAP S/4HANA Central Payments & Reconciliation with Cloud Analytics | Surendra Annanki, Numeric Technologies Inc., USA | Full Text |
| 11 | 17 | 5 | AI-Native Wireless Networks: Transforming Connectivity, Efficiency, and Autonomy for 5G/6G and Beyond | Akheel Mohammed 1, Zubair Ahmed Mohammed 2, Naveed Uddin Mohammed 2, Shravan Kumar Gunda 3, Mohammed Azmath Ansari 4 and Mohd Abdul Raheem 5, 1University of the Cumberlands, USA, 2Lindsey Wilson College, USA, 3Northwestern Polytechnic University, USA, 4Concordia University, USA, 5State University of New York Institute of Technology, USA | Full Text |
| 12 | 17 | 5 | Architectural Effectuation of Convolutional Homeomorphic Error-Correcting Codes using Nano Controlled-Selectors and Lattice Networks | Anas N. Al-Rabadi, The University of Jordan, Jordan | Full Text |
| 13 | 17 | 5 | Harnessing Artificial Intelligence for Public Health and Epidemiology: Opportunities, Barriers, and Pathways to Equitable Global Impact | Shanavaz Mohammed 1, Nasar Mohammed 2, Sruthi Balammagary 1, Sireesha Kolla 3, Srujan Kumar Ganta 4 and Shuaib Abdul Khader 5, 1University of the Cumberlands, USA, 2Valparaiso University, USA, 3National Institutes of Health, USA, 4JNTU, India, 5Concordia University, USA | Full Text |
| 14 | 17 | 5 | Responsible AI Analytics for Real-World Impact: Navigating Ethics, Privacy and Trust | Ghousia Sultana 1, Siraj Farheen Ansari 1, Mohammed Imran Ahmed 2, Abdul Faiyaz Shaik 1, Moin Uddin Khaja 3 and Bibhu Dash 4, 1Trine University, USA, 2Campbellsville University, USA, 3Lindsey Wilson College, USA, 4University of the Cumberlands, USA | Full Text |
| 15 | 17 | 5 | AI-Driven CTI for Business: Emerging Threats, Attack Strategies, and Defensive Measures | Mohammed Kashif 1, Mohammed Aasimuddin 2, Mubashir Ali Ahmed 3, Laxmi Bhavani Cheekatimalla 4, Eraj Farheen Ansari 5 and Ahwan Mishra 6, 1Jamia Millia Islamia University, India, 2Campbellsville University, USA, 3University of the People, USA, 4Kakatiya University, India, 5East-West University, USA, 6USA | Full Text |
| 16 | 17 | 5 | AI-Augmented Safety Management in Construction | Abdul Faisal Mohammed 1, Shahnawaz Mohammed 1, Abdul Raheman Mohammed 2 and Syed Abdullah Kamran 1, 1Trine University, USA, 2Lindsey Wilson College, USA | Full Text |
| 17 | 17 | 6 | IOT-Based Smart Building Monitoring and Control Strategies with Intelligence Deep Neural Networks | Tony Tsang and Yau Ka Hei, Hong Kong College of Technology, Hong Kong | Full Text |
| 18 | 17 | 6 | Mastering Penetration Testing: The Ethical Hacker’s Toolkit for Uncovering Vulnerabilities | Mohammad Abdus Salam and Amera Firdous, Chicago State University, USA | Full Text |
| 19 | 17 | 6 | A Data-Driven Predictive Framework for Inventory Optimization using Context-Augmented Machine Learning Models | Anees Fatima and Mohammad Abdus Salam, Chicago State University, USA | Full Text |
| 20 | 17 | 6 | A Decentralized Academic Certificate Issuance System using Smart Contracts on the Tron Network | Ana Julia Evangelista Andrade and Flavio Cezar Amate, Federal Institute of Education, Science and Technology of São Paulo (IFSP), Brazil | Full Text |
Computer Science & Engineering: An International Journal (CSEIJ)
| 21 | 15 | 1 | Exploring IoT and Machine Learning Integration for Soil Nutrients Monitoring and Crop Recommendation: A Survey | Vijaya R. Khemnar and Mininath R. Bendre, Pravara Rural Engineering College, India | Full Text |
| 22 | 15 | 1 | Machine Learning-based Classification of Indian Caste Certificates using GLCM Features | Subramani C, Suresh R and Muralidhara B L, Bangalore University, India | Full Text |
| 23 | 15 | 1 | Detection of Dyslexia and Dyscalculia in Children | Jawahar Jonathan, Bharathi K, Haripriya Khajuria, Lavanya J C, M Jyoshitha and Meghna Keshri, Acharya Institute of Technology, India | Full Text |
| 24 | 15 | 1 | A Survey on a Model for Pesticide Recommendation using Machine Learning | Vijaya lakshmi S Abbigeri and Geetha D Devanagavi, REVA University, India | Full Text |
| 25 | 15 | 1 | Comprehensive Privacy Preservation for Images and Videos using Machine Learning and Encryption | Abhishek Tanaji Halakate, Ayushma Shambhavi and Chhaya Suryabhan Dule, Acharya Institute of Technology, India | Full Text |
| 26 | 15 | 1 | Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm | Bharathi K, Jawahar Jonathan K, Satyabhama, Shobharani C N, Sridevi and Bhagyashree K Itagi, Acharya Institute of Technology, India | Full Text |
| 27 | 15 | 1 | Plant Leaf Diseases Detection using Deep Learning and Novel CNN | Vidya Bhushan and Reshma, Acharya Institutes of Technology, India | Full Text |
| 28 | 15 | 1 | Contrastive Learning in Image Style Transfer: A Thorough Examination using CAST and UCAST Frameworks | Raju Soniya and G Babu, Acharya Institute of Technology, India | Full Text |
| 29 | 15 | 1 | Smart Agriculture Irrigation System using IoT | Shiwali Yadav, Pawan Kumar, Aman Kumar Mishra, Monika Tiwari, Utkarsh Kumar and Gursahib Singh, Chandigarh University, India | Full Text |
| 30 | 15 | 1 | Hybrid Attention Mechanisms in 3D CNN for Noise-Resilient Lip Reading in Complex Environments | Prabhuraj Metipatil and Pranav SK, REVA University, India | Full Text |
| 31 | 15 | 1 | Screening Brain Tumors from MRI Images with Deep Learning Approaches | Savitha Shetty1, Saritha Shetty1, Sowmya M R2, Priya Kamath B3 and Sowmya M R4, 1NMAMIT (Nitte Deemed to be University), India, 2NMIT Bangalore, India, 3Manipal Institute of Technology, India, 4National Institute of Technology Karnataka, India | Full Text |
| 32 | 15 | 1 | Smart Hydroponics: Solar Powered Hydroponics System using Dual Axis Solar Tracker | Savitha Shetty1, Saritha Shetty1, Joshva Rodrigues1, Priya Kamath B2 and Sowmya M R3, 1NMAMIT (Nitte Deemed to be University), India, 2Manipal Institute of Technology, India, 3NMIT, India | Full Text |
| 33 | 15 | 1 | Enhancing Student Engagement and Personalized Learning through AI Tools: A Comprehensive Review | Boya Durga Bhavani, Rajeshwari Shetty and Mahesh D M, Acharya Institute of Graduate Studies, India | Full Text |
| 34 | 15 | 1 | RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparative Study for Visually Impaired Users | A R Deepti1, Vivek K1, Farzeen Basit1 and B Manimekala2, 1Acharya Institute of Graduate Studies, India, 2Christ University, India | Full Text |
| 35 | 15 | 1 | Artificial Intelligence and Machine Learning Based Plant Monitoring | Shrutika C Rampure, Bhavyashree S P and Rakshitha B T, Acharya Institute of Technology, India | Full Text |
| 36 | 15 | 1 | Enhancing Surveillance System through Edge Computing: A Framework For Real-Time Human Detection | Ranjan G, S Akshatha, Sandeep N and Vasanth A, Acharya Institute of Technology, India | Full Text |
| 37 | 15 | 1 | Mind-Balance: AI-Powered Mental Health Assistant | Hussana Johar R B, Yashaswini M, Yasin Malik, Yogashree B S and Vinay V, ATMECE, India | Full Text |
| 38 | 15 | 1 | AI-Enabled Fruit Decay Detection | Varalakshmi B D, Vijayalakshmi S A, M Kavya Sree, Ayushi Raj, Deepika Divya and Anubhav Tekriwal, Acharya Institute of Technology, India | Full Text |
| 39 | 15 | 1 | Sentiment Patterns in YouTube Comments: A Comprehensive Analysis | Savitha Shetty1, Saritha Shetty1, Priya Kamath B2 and Deepthi Shetty3, 1NMAMIT (Nitte Deemed to be University), India, 2Manipal Institute of Technology, India, 3NMIT, India | Full Text |
| 40 | 15 | 1 | Soil Analysis, Disease Detection and Pesticide Recommendation for Farmers using AI and ML | Vijayalakshmi S A, Varalakshmi B D, Rohith R, Sanjay L Y, Shashiraj Shetty and Prasad M J, Acharya Institute of Technology, India | Full Text |
| 41 | 15 | 1 | AI Powered Crop Recommendation and Yield Prediction System | Akash S, Harshitha B R, Nandini R and Kavya S, Acharya Institute of Technology, India | Full Text |
| 42 | 15 | 1 | Fake News Detection using Machine Learning Techniques | Sushmitha R, Rakshitha B T and Shrutika C Rampure, Acharya Institute of Technology, India | Full Text |
| 43 | 15 | 1 | AI Based Road Accident Detection and Alert System | Rahul Kumar, Karthik S and Manjunath B, REVA University, India | Full Text |
| 44 | 15 | 1 | A Smart Healthcare Monitoring System using IoT and Machine Learning | Priyanka S, Varsha K and Raghavendra B, Acharya Institute of Technology, India | Full Text |
| 45 | 15 | 1 | Handwritten Digit Recognition using Deep Neural Networks | Sanjana R, Divya S and Megha N, Acharya Institute of Technology, India | Full Text |
| 46 | 15 | 1 | AI Driven Traffic Management System for Smart Cities | Kiran Kumar H, Sagar B and Harsha V, Bangalore University, India | Full Text |
| 47 | 15 | 1 | AI Based Chatbot for Student Assistance in Universities | Sneha M, Pooja S and Nikhil R, REVA University, India | Full Text |
| 48 | 15 | 1 | IoT Based Smart Waste Management System | Arjun P, Rakesh Kumar and Nithin S, Acharya Institute of Technology, India | Full Text |
| 49 | 15 | 1 | Blockchain Based Secure Voting System | Harish Kumar, Deepak R and Varun S, Bangalore Institute of Technology, India | Full Text |
| 50 | 15 | 1 | Deep Learning Approach for Skin Disease Classification | Ananya Sharma, Pooja Verma and Ritu Singh, Delhi Technological University, India | Full Text |
| 51 | 15 | 1 | Speech Emotion Recognition using Deep Learning | Praveen Kumar, Sneha Gupta and Aditi Mishra, VIT University, India | Full Text |
| 52 | 15 | 1 | AI Based Intrusion Detection System for Network Security | Rahul Sharma, Akash Verma and Nitin Gupta, Chandigarh University, India | Full Text |
| 53 | 15 | 1 | Automated Attendance System using Face Recognition | Rohit Singh, Aman Gupta and Shubham Jain, Lovely Professional University, India | Full Text |
| 54 | 15 | 1 | Cloud Based E-Learning Platform with AI Recommendation System | Pallavi Desai, Nikhil Patil and Sneha Kulkarni, Pune University, India | Full Text |
| 55 | 15 | 2 | Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscillatory TQC/NMSI | Sergiu Vasili Lazarev, Researcher in Theoretical Physics and Cosmology, Romania | Full Text |
| 56 | 15 | 3 | Can We Trust Machines? A Critical Look at Some Machine Translation Evaluation Metrics | Muhammad Zayyanu Zaki and Nazir Ibrahim Abbas, Usmanu Danfodiyo University, Nigeria | Full Text |
| 57 | 15 | 4/5 | Secure Integration of LLMs with Production Databases through Context Based Data Anonymization | Hassane Tahir1 and Patrick Brezillon2, 1Université Paris Cité, France, 2LIP6 - Sorbonne Université, France | Full Text |
| 58 | 15 | 6 | Modeling and Simulation of Data Protection Systems for Business Continuity and Disaster Recovery | Sašo Nikolovski1 and Pece Mitrevski2, 1AUE-FON University, North Macedonia, 2University St. Kliment Ohridski, North Macedonia | Full Text |
International Journal of Computer Science and Engineering Survey (IJCSES)
| 59 | 16 | 1/2/3/4/5 | Steganography Research Landscape: A Brief Century-Long Bibliometric Study | Eltyeb Elsamani1 and Yousif Elsamani2, 1AL-Neelain University, Sudan, 2The University of Tokyo, Japan | Full Text |
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal of Computational Science and Information Technology (IJCSITY)
| 65 | 13 | 1 | Atlantis Protocol Private Succinct Transfers on Public Networks | Oleksandr Kurbatov, Kyrylo Riabov, Mykhailo Velykodnyi | Full Text |
| 66 | 13 | 2/3/4 | Dual Optimisation in Low-Resource Natural Language Processing: Integrating Meta-Learning and Efficient Deep Architectures for Sustainable AI Development | Israel Creleanor Mulaudzi, Ndivhudzannyi Michael Nndwamato, Rendani Mercy Makhwathana, University of Venda, South Africa | Full Text |
International Journal of Information Science & Techniques (IJIST)
| 67 | 15 | 1/2/3/4/5 | Development of an Innovative E-Learning System | Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University “St. Kliment Ohridski”, Macedonia | Full Text |
| 68 | 15 | 1/2/3/4/5 | A Smart City Model for an Intelligent Traffic Light Decision System | Darko Pajkovski, Marija Apostoloska – Kondoska and Hristina Dimova Popovska, University “St. Kliment Ohridski”, Republic of North Macedonia | Full Text |
| 69 | 15 | 6 | Revisiting IT Project Uncertainty: Operationalizing the Sambamurthy–Zmud Model for De-Risking Digital Transformation Project | Irshad Abdulla, Simon Fraser University, Canada | Full Text |
International Journal of Computer Science, Engineering and Information Technology (IJCSEIT)
| 70 | 15 | 3 | Harnessing AI for Data Privacy through a Multidimensional Framework | Prateik Mahendra, Meta, USA | Full Text |
| 71 | 15 | 1/2 | Discuss How AI and ML Can Optimize Lifecycle Management Practices within Pharmaceutical Companies from Development to Post-Market Surveillance | Jahnavi Vellanki, Industry Researcher, USA | Full Text |
The International Journal of Information Technology, Control and Automation (IJITCA)
| 72 | 15 | 1/2/3/4 | Obtaining Inverse Kinematics Equations for a Planar Ball-Plate Robot | Ricardo Francisco Martinez-Gonzalez, Jose Antonio Hernandez-Reyes and Guillermo Sanchez-Vazquez, Tecnológico Nacional de Mexico - IT Veracruz, Mexico | Full Text |
International Journal of Computer Networks & Communications (IJCNC)
| 73 | 17 | 1 | Performance of Aloha-Q with Adaptive Transmission Probability | Katsumi Sakakibara, Okayama Prefectural University, Japan | Full Text |
| 74 | 17 | 1 | Enhancing Congestion Control using a Load-Balanced Routing Algorithm for Distributed Networks | Jogendra Kumar, G.B.Pant Institute of Engineering and Technology, India | Full Text |
| 75 | 17 | 1 | A Novel Stable Path Selection Algorithm for Enhancing Qos and Network Lifetime in RPL-Contiki-based IoT Networks | Mohamed Achref BOUKHOBZA 1, Mehdi ROUISSAT 1 ,2, Mohammed BELKHEIR 3, Allel MOKADDEM 3 and Pascal LORENZ 4 1 NourBachir University Center, Algeria, 2 STICLaboratory,UniversityAboubekrBelkaid, Algeria , 3 Nour Bachir University Center El-Bayadh, Algeria, 4 Haute Alsace University, France | Full Text |
| 76 | 17 | 1 | Enhanced Papr Reduction in OFDM Systems using Adaptive Clipping with Dynamic Thresholds | Fatma Ben Salah 1, Abdelhakim Khlifi 2, Marwa Rjili 1, Amina Darghouthi 1 and Belgacem Chibani 1, 1 University of Gabes, Tunisia, 2 Sup’COM, University of Carthage, Tunisia | Full Text |
| 77 | 17 | 1 | Elliptic Curve Cryptography Algorithm with Recurrent Neural Networks for Attack Detection in Industrial IoT | Bebin Josey T and D.S.Misbha, Nesamony Memorial Christian College Marthandam, India | Full Text |
| 78 | 17 | 1 | Load Balanced Attack Defense System with Lightweight Authentication and Modified Blockchain in SDN for B5G | Ihsan H. Abdulqadder 1 and Israa T. Aziz 2, 1 University of Kirkuk, Iraq, 2 University of Mosul, Iraq | Full Text |
| 79 | 17 | 1 | FSHAHA: Feature Selection using Hybrid Ant Harris Algorithm for IoT Network Security Enhancement | Priyanka and Anoop Kumar, Banasthali Vidyapith, India | Full Text |
| 80 | 17 | 1 | A Novel Cluster Head Selection Algorithm to Maximize Wireless Sensor Network Lifespan | Almamoon Alauthman 1 and Wan NorShuhadah Wan Nik 2, 1 Al-Balqa Applied University, Jordan, 2 University Sultan Zainal Abidin, Malaysia | Full Text |
| 81 | 17 | 2 | Formal Abstraction & Interface Layer for Application Development in Automation-Focussed Distributed Systems | Vivek Ramji, Microsoft, USA | Full Text |
| 82 | 17 | 2 | Deadline-Aware Task Scheduling Strategy for Reducing Network Contention in NoC-Based Multicore Systems | Mohd Farooq, Aasim Zafar and Abdus Samad, Aligarh Muslim University, India | Full Text |
| 83 | 17 | 2 | Comparative Analysis of POX and RYU SDN Controllers in Scalable Networks | Chandimal Jayawardena, Jay Chen, Amay Bhalla and Lin Bu, University of South Australia, Australia | Full Text |
| 84 | 17 | 2 | Enhancement of Quality of Service in Underwater Wireless Sensor Networks | Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India | Full Text |
| 85 | 17 | 2 | Delay and Throughput Aware Cross-Layer TDMA Approach in WSN-based IoT Networks | BOUDI Raid1 GHERBI Chirihane2 and ALIOUAT Zibouda2, 1 Abdelhafid Boussouf University, Algeria, 2 Ferhat Abbas University of Setif, Algeria | Full Text |
| 86 | 17 | 2 | Efficient Algorithms for Isogeny Computation on Hyperelliptic Curves: Their Applications in Post-Quantum Cryptography | Mohammed El Baraka and Siham Ezzouak, Sidi Mohammed Ben Abdellah University, Morocco | Full Text |
| 87 | 17 | 2 | Visually Image Encryption and Compression using a CNN-Based Autoencoder | Mahdi Madani a and El-Bay Bourennane, Université Bourgogne Europe, France | Full Text |
| 88 | 17 | 2 | Developing a Secure and Transparent Blockchain System for Fintech with Fintrust Framework | Avinash Singh 1, Vikas Pareek 1 and Ashish Sharma 2, 1 Mahatma Gandhi Central University, India, 2 Manipal University, India | Full Text |
| 89 | 17 | 3 | A Framework for Securing Personal Data Shared by Users on the Digital Platforms | Nirjhor Anjum 1, Lamia Islam 2, Md Rubel Chowdhury 3 and Ariful Alam 4, 1 University of the Cumberlands, USA, 2 Washington State University, USA,3 London Metropolitan University, UK, 4 Trine University, USA | Full Text |
| 90 | 17 | 3 | Simulated Annealing-Salp Swarm Algorithm based Variational Autoencoder for Peakto-Average Power Ratio Reduction | Prabhakar Narasappa Kota 1, Pravin Balaso Chopade 1, Bhagvat D Jadhav 2, Shriram Sadashiv Kulkarni 3 and Pravin Marotrao Ghate 2, 1 M. E. S. Wadia College of Engineering, India, 2 JSPM's Rajarshi Shahu College of Engineering, India, 3 Sinhgad Academy of Engineering, India | Full Text |
| 91 | 17 | 3 | Evaluating OTFS Modulation for 6G: Impact of High Mobility and Environmental Noise | Abderrahim Mohammadi 1, Aziz Dkiouak 2, Mostafa Baghouri 3, Saad Chakkor 1, Ahmed EL Oualkadi 2 and Anass El Mamouni 1, 1 Abdelmalek Essaadi University Tetuan, Morocco,2 Chouaib Doukkali University, Morocco, 3 University of Hassan II, Morocco | Full Text |
| 92 | 17 | 3 | An Optimized Energy-Efficient Hello Routing Protocol for Underwater Wireless Sensor Network | Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India | Full Text |
| 93 | 17 | 3 | Energy Efficient Virtual MIMO Communication Designed for Cluster based on Cooperative WSN using Oleach Protocol | Shitiz Upreti, Mahaveer Singh Naruka, Maharishi University of Information Technology (MUIT), India | Full Text |
| 94 | 17 | 3 | A Cluster-Based Trusted Secure Multipath Routing Protocol for Mobile Ad Hoc Networks | Himanshu Bartwal 1, Himani Sivaraman 1 and Jogendra Kumar 2, 1 Jigyasa Univesity, India, 2 GBPIET, India | Full Text |
| 95 | 17 | 3 | Classification of Network Traffic using Machine Learning Models on the NetML Dataset | Mezati Messaoud, Kasdi Merbah University, Algeria | Full Text |
| 96 | 17 | 4 | Conflict Flow Avoided Proactive Rerouting Algorithm using Online Active Learning for Efficient Transmission of Datastream in Software Defined Networks | Kalaivani Subramaniam and Sumathi Arumugam, KPR College of Arts Science and Research, India | Full Text |
| 97 | 17 | 4 | QoS Based Reliable Route in MANET for Military Applications | Diksha Shukla and Raghuraj Singh, Harcourt Butler Technical University, India | Full Text |
| 98 | 17 | 4 | Performance of Multi-Hop FSO Systems Under Practical Conditions with Malaga Turbulence Channels and Pointing Errors | Ha Duyen Trung, Hanoi University of Science and Technology, Vietnam | Full Text |
| 99 | 17 | 4 | An Energy Hole Detection and Relay Repositioning in Cluster Based Routing Protocol for Improving Lifetime of WSN | Saranya Selvaraj and Anitha Damodaran, Sri Ramakrishna College of Arts and Science for Women, India | Full Text |
| 100 | 17 | 4 | Analysis of LTE/5G Network Performance Parameters in Smartphone Use Cases: A Study of Packet Loss, Delay, and Slice Types | Almamoon Alauthman and Abeer Al-Hyari, Al-Balqa Applied University, Jordan | Full Text |
| 101 | 17 | 4 | Enhancing IoT Cyberattack Detection via Hyperparameter Optimization Techniques in Ensemble Models | Otshepeng Kgote1, Bassey Isong1 and Tsapang Mashego2, 1 North-West University, South Africa, 2 University of Cape Town, South Africa | Full Text |
| 102 | 17 | 4 | Authenticated Key Agreement Protocol with Forward Secrecy for Securing Cyber Physical Systems | Sung-Woon Lee 1 and Hyunsung Kim 2, sup>1 Tongmyong University, Korea,2 Kyungil University, Korea | Full Text |
| 103 | 17 | 4 | Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks | Swathy Akshaya and Padmavathi, Avinashilingam University, India | Full Text |
| 104 | 17 | 5 | Synergy Analysis of Ensemble Feature Selection on Performance Amelioration of Intrusion Detection System | S.Vijayalakshmi and V.Prasanna Venkatesan, Pondicherry University, India | Full Text |
| 105 | 17 | 5 | Enhancing the Effectiveness of Encrypted Traffic Classification through Data Preservation and Input Alignment with Deep Neural Networks | Nguyen Hong Son and Nguyen Trung Hieu, Posts and Telecommunications Institute of Technology, Vietnam | Full Text |
| 106 | 17 | 5 | A Novel Intrusion Detection Model for Critical Healthcare Environments | Aishvarya shree.V.G 1, M.Thangaraj 1 and M. Nirmala Devi 2, 1 Madurai Kamaraj University, India, 2 Thiagarajar College of Engineering, India | Full Text |
| 107 | 17 | 5 | Dynamic Low-Power Traffic Pattern for Energy-Constrained Wireless Sensor Networks | Almamoon Alauthman, Al-Balqa Applied University, Jordan | Full Text |
| 108 | 17 | 5 | Optimizing QoS and Congestion in MANETs using XGBoost with Hybrid PSO and Beluga Whale Strategies | Diksha Shukla and Raghuraj Singh, Harcourt Butler Technical University, India | Full Text |
| 109 | 17 | 5 | Adaptive Q-Learning-Based Routing with Context-Aware Metrics for Robust Manet Routing (AQLR) | P. Tamilselvi 1, S. Suguna Devi 1, M. Thangam 2 and P. Muthulakshmi 1, 1 Cauvery College for Women, India, 2 Mount Carmel college, India | Full Text |
| 110 | 17 | 5 | Towards Efficient VM Placement: A Two-Stage ACO–PSO Approach for Green Cloud Infrastructure | Ali Baydoun 1 and Ahmed Zekri 2, 1 Beirut Arab University, Lebanon, 2 Alexandria University, Egypt | Full Text |
| 111 | 17 | 6 | Deep Reinforcement Learning-Based Resource Allocation in Massive MIMO NOMA Systems | Pham Hoai An 1,2, Nguyen Dung 1,2, Nguyen Thi Xuan Uyen 1,2, Nguyen Thai Cong Nghia 1,2 and Ngo Minh Nghia 1,2 1 VNUHCM - University of Science, Vietnam, 2 Vietnam National University, Vietnam | Full Text |
| 112 | 17 | 6 | Multimodal QOS Aware Load Balanced Clustering in 5G-Enabled IOT Sensor Network | Biswanath Dey 1, Sukumar Nandi 2, Sivaji Bandyopadhyay 3 and Samir Borgohain 1, 1 National Institute of Technology, India 2Indian Institute of Technology, India, 3 Jadavpur University, India | Full Text |
| 113 | 17 | 6 | RLSUAV: Relative Localization in a Swarm of UAVS | Sara Benkouider, Nasreddine Lagraa and Mohamed Bachir Yagoubi, Université Amar Telidji de Laghouat, Algeria | Full Text |
| 114 | 17 | 6 | Enhancing Manet Security Through Blockchain-Driven Multipath Route Authentication | Gagan Bhatt, Krishna Kaniyal, Jayant Pal and Jogendra Kumar, GBPIET Ghurdauri Pauri Garhwal Uttarakhand, India | Full Text |
| 115 | 17 | 6 | Proposed Comprehensive Eavesdropping Detection Solution in Multi-VLAN Switched Network Based on IPFIX Flow | Viet H. Le 1, Huy-Trung Nguyen 2, Cuong V. Trinh 1 and Tran Minh Hieu 2, 1 People’s Security Academy, Vietnam 2 Research Institute of Posts and Telecommunications, Vietnam | Full Text |
| 116 | 17 | 6 | Advanced Intrusion Detection and Classification using Transfer Learning with Squeeze and Excitation Network and Adaptive Optimization in Big Data | Anoop Mohana Kumar 1,2, Joseph Emerson Raja 1 and Chinnaiyan Senthilpari 1, 1 Multimedia University, Malaysia, 2 Saveetha School of Engineering, India | Full Text |
| 117 | 17 | 6 | Hybrid Anomaly Detection Mechanism for IOT Networks | Harish Kumar Saini, Monika Poriye, Kurukshetra University, India | Full Text |
| 118 | 17 | 6 | Enhancing Distributed Authorization with Lagrange Interpolation and Attribute-Based Encryption | Keshav Sinha 1, Sumitra 1, Richa Kumari 1, Akashdeep Bhardwaj 1 and Shawon Rahman 2, 1 University of Petroleum and Energy Studies (UPES), India, 2 University of Hawaii-Hilo, USA | Full Text |
International Journal of Wireless & Mobile Networks (IJWMN)
| 119 | 17 | 1 | Suboptimal Fluid Antenna Systems for Maximizing the Secrecy Rate with Untrusted Relays | Tamer Mekkawy, Military Technical College, Egypt | Full Text |
| 120 | 17 | 1 | Enhanced Signal Energy Detection Technique for Low SNR Spectrum Sensing in Cognitive Radio – Hybrid Approach | Khaja Kamaluddin 1, Masood Shareef Arif 2, 1 International Academic and Industrial Research Solutions, India, 2 Intelligent Pharmacy Computer Systems, USA | Full Text |
| 121 | 17 | 2 | A Systematic Review of Ad-Hoc On-Demand Distance Vector Routing Protocol for Performance Improvement in Mobile Ad-Hoc Networks | Patrick M. Njoroge, John G. Ndia and Peter M. Mwangi, Murang’a University of Technology/School of Computing and Information Technology, Kenya | Full Text |
| 122 | 17 | 2 | A Traffic Incident Management Framework for Vehicular Ad Hoc Networks | Rezvi Shahariar1 and Chris Phillips2, 1University of Dhaka, Bangladesh, 2Queen Mary University of London, England | Full Text |
| 123 | 17 | 3 | Enhancing WSN Intrusion Detection: Two-Tier Feature Selection and Optunaoptimized Ensemble Learning | Dilip Dalgade, NileshPatil, ManujJoshi and Dilendra Hiran, Pacific Academy of Higher Education and Research, India | Full Text |
| 124 | 17 | 4 | Optimized Cluster Based Energy Aware Routing (OCEAR) to Prolong Network Lifetime in WSNs | Rajkumar M Vadgave, Manjula S and Savitri Kanshete, Bheemanna Khandre Instituteof Technology, India | Full Text |
| 125 | 17 | 4 | Self-Healing Quantum Networks using Entanglement for Autonomous Troubleshooting | Vivek Bagmar, Arista Networks, USA | Full Text |
| 126 | 17 | 4 | Real-Time QGQG Phase Unwrapping and SAR/INSAS DEM Fusion for Autonomous Underwater Terrain-Aided Navigation | B.D. Jerushah Nissi and Sandhya Rachamalla, Osmania University, India | Full Text |
| 127 | 17 | 4 | Improving Channel Estimation in Vehicular Communication Networks with Diverse Mobility Patterns using BI-LSTM Model | Daniel Asuquo 1, Moses Ekpenyong 1, Enefiok Etuk 2, Kingsley Attai 3, Philip Asuquo 1 and Temple Nwaeboiwe 1, 1 University of Uyo, Nigeria, 2 Michael Okpara University of Agriculture, Nigeria,3 Ritman University, Nigeria | Full Text |
| 128 | 17 | 4 | Ant Colony Optimization in Ad Hoc Networks: A Comprehensive Survey | Prome Saha Resha 1, Hridoy Chandra Das 2 and Dulal Chakraborty 1, 1 Comilla University, Bangladesh, 2 Ostbayerische Technische Hochschule Amberg-Weiden University, Germany | Full Text |
| 129 | 17 | 4 | Systematic Review of Vehicular Ad-Hoc Networks Trust-Based Models | Samson Waweru Nyutu, John Gichuki Ndia and Peter Maina Mwangi, Murang’a University of Technology, Kenya | Full Text |
| 130 | 17 | 4 | Forecasting Future DDoS Attacks using Long Short Term Memory (LSTM) Model | SKong Mun Yeen 1, Rafidah Md Noor 1, Wahidah Md Shah 2, Aslinda Hassan 2 and Muhammad Umair Munir 1, 1 Universiti Malaya, Malaysia, 2 Universiti Teknikal Malaysia Melaka (UTeM), Malaysia | Full Text |
| 131 | 17 | 5 | A Hybrid YOLOv5–SSD IoT-Based Animal Detection System for Durian Plantation Protection | Anis Suttan Shahrir 1, Zakiah Ayop 1, Syarulnaziah Anawar 1 and Norulzahrah Mohd Zainudin 2, 1 Universiti Teknikal Malaysia Melaka (UTeM), Malaysia, 2 Universiti Pertahanan Nasional Malaysia (UPNM), Malaysia | Full Text |
International Journal of Next-Generation Networks (IJNGN)
| 132 | 17 | 1/2/3 | A Survey on Resource Management Solutions, Challenges, and Emerging Opportunities in Fog Computing | Firas Ghoneim, ATA Software Solutions, Egypt | Full Text |
International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks(GRAPH-HOC)
| 133 | 17 | 1 | The Importance of Machine Learning to Individuals' Rights to Protect their Data | Basma Mohamed and Khaled Eid Abdel Moneim Abdel Fattah, Giza Higher Institute for Managerial Sciences, Egypt | Full Text |
| 134 | 17 | 2/3/4 | Design, Implementation, and Analysis of a Reliable Datagram Protocol (ACK) for Low-Power Wireless Sensor Networks (WSN) | Ricardo Francisco Martinez-Gonzalez, Luis Fernando Gutierrez-Sandoval, Jose Antonio Hernandez-Reyes and Carlos Roberto Gonzalez-Escarpeta, Tecnológico Nacional de Mexico/ IT Veracruz, Mexico | Full Text |
International Journal of Security, Privacy and Trust Management (IJSPTM)
| 135 | 14 | 1/2 | Data Privacy and Digital Rights: Protecting Privacy through Law Surveillance and Consent | Sijuola Atanda Lawal, Institute of Advanced Legal Studies, United Kingdom | Full Text |
International Journal of Artificial Intelligence & Applications (IJAIA)
| 136 | 16 | 1 | AI-Based Early Prediction and Intervention for Student Academic Performance in Higher Education | Maram Khamis Al-Muharrami, Fatema Said Al-Sharqi, Al-Zahraa Khalid Al-Rumhi and Shamsa Said Al-Mamari and Ijaz Khan, Buraimi University College, Oman | Full Text |
| 137 | 16 | 1 | Divergent Ensemble Networks : Improving Predictive Reliability and Computational Efficiency | A. Chandorkar and A. Kharbanda, Indian Institute of Technology, India | Full Text |
| 138 | 16 | 1 | Exploring the Integration of Artificial Intelligence into the Functions of an Accounting Department | Angel R. Otero and Keiron Hylton, Florida Institute of Technology, USA | Full Text |
| 139 | 16 | 1 | AE-ViT: Token Enhancement for Vision Transformers via CNN-Based Autoencoder Ensembles | Heriniaina Andry RABOANARY, Roland RABOANARY and Nirina Maurice HASINA TAHIRIDIMBISOA, Universite d'Antananarivo, Madagascar | Full Text |
| 140 | 16 | 1 | Movie Recommendation System Based on Machine Learning using Profiling | Yacine ZERIKAT 1 and Mokhtar ZERIKAT 2, 1 CY Cergy Paris University, France, 2 LAAS research laboratory, Algeria | Full Text |
| 141 | 16 | 2 | Ethical Consideration in Artificial Intelligence Development and Deployment | Abdulrahman Alseqyani 1, Saad Alotaibi 2 and Saud Alotaibi 3, 1 Zulfi Technical College, Saudi Arabia, 2 Majma'ah Secondary Industrial Institute, Saudi Arabia, 3 Dawadmi Technical College, Saudi Arabia | Full Text |
| 142 | 16 | 2 | Optimizing Pricing Framework using Reasoning LLMs and Agents for Enhanced Deal Negotiations | Chirag Soni 1 and Swati Shah 2, 1 PayPal, India, 2PayPal, USA | Full Text |
| 143 | 16 | 2 | Advancing Privacy and Security in Generative AI-Driven Rag Architectures: A Next-Generation Framework | Meethun Panda 1 and Soumyodeep Mukherjee 2, 1 Bain & Company, UAE, 2Genmab, USA | Full Text |
| 144 | 16 | 2 | Revolutionizing Lead Qualification: The Power of LLMs Over Traditional Methods | Shantanu Sharma 1 and Naveed Afzal 2, 1 ZoomInfo, USA, 2Takeda Pharmaceuticals, USA | Full Text |
| 145 | 16 | 2 | Consciousness in AI Systems: A Review | Mosladdin Mohammad Shueb and Xiangdong Che, Eastern Michigan University, USA | Full Text |
| 146 | 16 | 2 | Boswell Test: Beyond the Turing Benchmark | Peter Luh, Retired Physicist, USA | Full Text |
| 147 | 16 | 3 | The Role of Artificial Intelligence in Ensuring the Cyber Security of SCADA Systems | Rashid Alakbarov and Mammad Hashimov, Ministry of Science and Education, Republic of Azerbaijan | Full Text |
| 148 | 16 | 3 | Balancing Privacy and Innovation – A VAE Framework for Synthetic Healthcare Data Generation | Saritha Kondapally, Senior Member IEEE, USA | Full Text |
| 149 | 16 | 3 | OWE-CVD: An Optimized Weighted Ensemble for Heart Disease Prediction | Fahad Almalki and Abdullah A Sheikh, Taif University, Kingdom of Saudi Arabia | Full Text |
| 150 | 16 | 3 | A Thorough Introduction to Multimodal Machine Translation | Kouassi Konan Jean-Claude, Bircham International University, Spain | Full Text |
| 151 | 16 | 3 | AI-Driven Vulnerability Analysis in Smart Contracts: Trends, Challenges and Future Directions | Mesut Ozdag, University of Central Florida, USA | Full Text |
| 152 | 16 | 3 | From Insight to Impact: The Evolution of Data-Driven Decision Making in the Age of AI | Paras Doshi, Opendoor, USA | Full Text |
| 153 | 16 | 3 | Augmented and Synthetic Data in Artificial Intelligence | Philip de Melo, Norfolk State University, USA | Full Text |
| 154 | 16 | 4 | Automatic Estimation of Region of Interest Area in Dermatological Images Using Deep Learning and Pixel-Based Methods: A Case Study on Wound Area Assessment | R-D. Berndt 1, C. Takenga 1, P. Preik 1, T. Siripurapu 1, T. Fuchsluger 2, C. Lutter 2, A. Arnold 2 and S. Lutze 2, 1 INFOKOM – Informations- und Kommunikationsgesellschaft mbH, Germany, 2 Medical University of Rostock, Germany | Full Text |
| 155 | 16 | 4 | Prediction of Diabetes from Electronic Health Records | Philip de Melo, Norfolk State University, USA | Full Text |
| 156 | 16 | 4 | Bio-Inspired Architecture for Parsimonious Conversational Intelligence : The S-AI-GPT Framework | Said Slaoui, University Mohammed V, Morocco | Full Text |
| 157 | 16 | 4 | Bio-Inspired Hormonal Modulation and Adaptive Orchestration in S-AI-GPT | Said Slaoui, University Mohammed V, Morocco | Full Text |
| 158 | 16 | 5 | A Hybrid CNN-LSTM Deep Learning Model for Intrusion Detection in Smart Grid | Abdulhakim Alsaiari and Mohammad Ilya, Florida Atlantic University, USA | Full Text |
| 159 | 16 | 5 | A Heterogeneous Deep Ensemble Approach for Anomaly Detection in Class Imbalanced Energy Consumption Data | David Kaimenyi Marangu and Stephen Kahara Wanjau, Murang’a University of Technology, Kenya | Full Text |
| 160 | 16 | 5 | Memory Architecture in S-AI-GPT: From Contextual Adaptation to Hormonal Modulation | Said Slaoui, Mohammed V University, Morocco | Full Text |
| 161 | 16 | 5 | LLM and MCP based Automated Deal Pricing Negotiation using Multi Modal Margin Forecasting and Pricing Scenario Simulation | Chirag Soni 1, Swati Shah 2, Avi Reddy 2, Mahesh Toro 2, Rishabh Rishi Sharma 2 and Kiran R 2, 1 PayPal, India, 2 PayPal, USA | Full Text |
| 162 | 16 | 5 | Calculable-Contents Identification Matrix: A Computerisable Key Format for Plant Identification | Adepoju Tunde Joseph Ogunkunle, Ladoke Akintola University of Technology, Nigeria | Full Text |
| 163 | 16 | 6 | S-AI-Anti Hallucination: A Bio-Inspired and Confidence-aware Sparse AI Framework for Reliable Generative Systems | Said Slaoui, Mohammed V University, Morocco | Full Text |
| 164 | 16 | 6 | Advancing Ethical Stewardship: A Green AI Framework for Optimizing Sustainable Investments in Islamic Financial Systems | Zahiduzzaman Zahid 1, Mohammad Enayet Hossain 2, Basharat Ali Khan Mohammed 3, 1 University of the Cumberlands, USA, 2 International Islamic University Malaysia, Malaysia, 3 Campbellsville University, USA | Full Text |
| 165 | 16 | 6 | Methods and Pathways for Effective Utilization of AI in Training of Computer Sciences: A Narrative Review | Abdullah Almutairi 1, Abdulrahman Alseqyani 1 and Khaled Alotaibi 2, 1 Zulfi Technical College, Saudi Arabia, 2 HautatSudair Technical College, Saudi Arabia | Full Text |
| 166 | 16 | 6 | AI-Enhanced E-Learning for Religious Leaders: A Framework for Sustainable Agricultural Empowerment and Economic Resilience in Rural Bangladesh | Mohammad Saiduzzaman 1, Md. Mehedi Morshed 2, Farhana Afroz 3, Zahiduzzaman Zahid 4, 1 Ministry of Textile & Jute, Bangladesh, 2 Ministry of Local Government, Bangladesh, 3 Rupali Bank PLC, Bangladesh, 4 University of the Cumberlands, USA | Full Text |
| 167 | 16 | 6 | Challenging Multi-Vector Exclusion by Improving ROI Adoption in Applied AI Systems: The E.A.S.E. Framework as a Systemic Evaluation Tool for Intersecting AI Bias and Digital Exclusion | Kevin J. Spellman, Tax & Legal - Digital Innovation, UK | Full Text |
| 168 | 16 | 6 | Knowledge Reuse Degree Asymmetry in Transfer Reinforcement Learning | Satoru Ikeda 1, Kohei Esaki 1, Hitoshi Kono 2, Shota Chikushi 3, Kaori Watanabe 4, and Hidekazu Suzuki 4, 1 Tokyo Denki University, Japan, 2 Kindai University, Japan, 3 New Technology Foundation, Japan, 4 Tokyo Polytechnic University, Japan | Full Text |
International Journal of Database Management Systems (IJDMS)
| 169 | 17 | 1/2 | Optimizing Data Interoperability in Agile Organizations: Integrating Nonaka’s Ba and Habermas’s Deliberation for Trust-Based Knowledge Management | Marina Özdemir 1 and Cihangir Deniz Özdemir 2, 1 University of São Paulo, Brazil, 2 Ozco Management and Training Ltd., Brazil | Full Text |
| 170 | 17 | 1/2 | Architecting Intelligent Decentralized Data Systems to Enable Analytics with Entropy-Aware Governance, Quantum Readiness and LLM-Driven Federation | DaMeethun Panda 1 and Soumyodeep Mukherjee 2, 1 Bain & Company, UAE, 2 Genmab, USA | Full Text |
| 171 | 17 | 3/4/5 | Optimization Techniques for SQL+ML Queries: A Performance Analysis of Realtime Feature Computation in OpenMLDB | Mashkhal A. Sidiq 1, Aras A. Salih 2 and Samrand M. Hassan 2, 1 Tianjin University, China, 2 Nankai University, China | Full Text |
| 172 | 17 | 6 | Architectural Patterns and Performance Analysis of Integer Surrogate Keys for Time-Series Data Warehousing | Sviatoslav Stumpf and Vladislav Povyshev, ITMO University, Russia | Full Text |
International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)
| 173 | 14 | 1 | Unlocking the Power of Artificial Intelligence in Accounting: Transformative Insights for Future Financial Leaders | Angel R. Otero, Florida Institute of Technology, USA | Full Text |
| 174 | 14 | 1 | Advxai in Malware Analysis Framework: Balancing Explainability with Security | Darring White, Marymount University, USA | Full Text |
| 175 | 14 | 2 | Pixelated Calculus: A Visually Intuitive Computational Method for Area and Rate Determination with Complex Geometries and Empirical Data | W.Houze, Independent Researcher, USA | Full Text |
| 176 | 14 | 3 | Deep Learning-Based Rock Particulate Classification using Attention Enhanced ConvNeXt | Anthony Amankwah, Amankwah Consult, Germany | Full Text |
International Journal on Natural Language Computing(IJNLC)
Machine Learning and Applications: An International Journal (MLAIJ)
International Journal of Fuzzy Logic Systems (IJFLS)
| 200 | 15 | 1/2/3 | Development of a Single-Variable Fuzzy Controller in Python without Libraries | Ricardo Francisco Martínez-González, Tecnológico Nacional de Mexico – IT Veracruz, México | Full Text |
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
| 201 | 15 | 1 | Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems | Gaurav Samdani1, Ganesh viswanathan2and Abirami Dasu Jegadeesh3,1University of North Carolina, USA,2 AVP, USA 3Anna university, India | Full Text |
| 202 | 15 | 2/3 | Designing Fault-Tolerant Architectures for Resilient Oracle Cloud ERP and HCM Integrations | Anusha Atluri, SR Oracle Techno Functional consultant, USA | Full Text |
| 203 | 15 | 2/3 | Cloud-driven Transformation of Long-Term Care Insurance: A Data-Centric System Modernization Framework | Sangeeta Anand, Continental General, USA | Full Text |
International Journal of Managing Public Sector Information and Communication Technologies ( IJMPICT )
| 204 | 16 | 1/2 | Security, Defence and Cyber Security in the Digital Age | Zhiyuan Liu, Lancaster university, UK | Full Text |
| 205 | 16 | 3/4 | E-governance and Service Delivery In Nepal: Evidence from Nagarjun Municipality | Prem Bahadur Giri1,2, Uttam Raj Giri1, Bijay Raj Giri2, Ajay Giri2and Trilochana Pokhrel21Nagarjun Municipality, Nepal,2 Wisdom Academy and Research Center, Nepal | Full Text |
International Journal on Cryptography and Information Security (IJCIS)
| 206 | 15 | 1/2/3/4 | Decryption Through Polynomial Ambiguity: Noise-Enhanced High-Memory Convolutional Codes for Post-Quantum Cryptography | Meir Ariel, Tel Aviv University, Israel | Full Text |
International Journal of Information Technology, Modeling and Computing (IJITMC)
| 207 | 13 | 1/2/3 | Combinatorial Analysis of Routing Scenarios in the Multiple ‑ Start Connections Algorithm for Peer ‑ to ‑ Peer Networks | V.D. Zyuzin, N.A. Bashmurov and P.B. Boldyrevskii, Lobachevsky State University of Nizhni Novgorod, Russia | Full Text |
| 208 | 13 | 4 | MeVe: A Modular System for Memory Verification and Effective Context Control in Language Models | Andreas Ottem, Independent Researcher, Norway | Full Text |
Advanced Computational Intelligence: An International Journal (ACII)
| 209 | 12 | 1 | Validating Re-Clustering for Data Labeling with Human-in-the-Loop Feedback | Gloriana J. Monko and Masaomi Kimura, Shibaura Institute of Technology, Japan | Full Text |
| 210 | 12 | 2/3/4 | General Deep Learning Architectures for Multimodal Emotion Detection | Kurbanov Abdurahmon, National University of Uzbekistan named after Mirzo Ulugbek, Uzbekistan | Full Text |
Signal & Image Processing : An International Journal (SIPIJ)
International Journal of Software Engineering & Applications (IJSEA)
| 216 | 16 | 1 | Model Checking for Multi-Agent Systems Modeled by Epistemic Process Calculus | Qixian Yu 1, Zining Cao 1,2,3, Zong Hui 1,4 and Yuan Zhou 1, 1 Nanjing University of Aeronautics and Astronautics, China, 2 Ministry Key Laboratory for Safety-Critical Software Development and Verification, P. R. China, 3 Collaborative Innovation Center of Novel Software Technology and Industrialization, P. R. China, 4 Huaiyin Institute Of Technology, P. R. China | Full Text |
| 217 | 16 | 1 | Coupling Metrics for Aspect Oriented Software | Kelvin Mutunga Katonyi, John Gichuki Ndia and Geoffrey Muchiri Muketha, Murang'a University of Technology, Kenya | Full Text |
| 218 | 16 | 1 | Towards a Robust Quality Assurance Framework for Cloud Computing Environments | Mohammed Ahmad Alharbi and Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia | Full Text |
| 219 | 16 | 2/3 | Green and Sustainable Cloud Computing: Strategies for Carbon Footprint Reduction and Energy Optimization | Abirami Dasu Jegadeesh, Independant Researcher, USA | Full Text |
| 220 | 16 | 4/5 | Controller Synthesis Method for Multiagent System Based on Temporal Logic Specification | Ruohan Huang1,2 and Zining Cao1,2, 1 Nanjing University of Aeronautics and Astronautics, P. R. China 2 Collaborative Innovation Center of Novel Software Technology and Industrialization, China | Full Text |
| 221 | 16 | 4/5 | Why Does the Engineering Manager Still Exist in Agile Software Development? | Ravi Kalluri, Northeastern University, USA | Full Text |
| 222 | 16 | 6 | Intelligence as a Feature: Modeling ML in Software Product Lines | Luz-Viviana Cobaleda 1 , Andres Lopez 1,2 , Paola Vallejo 3 , Raul Mazo 2 and Julian Carvajal 1, 1 Universidad de Antioquia, Colombia, 2 Francia, 3 Universidad EAFIT, Colombia | Full Text |
| 223 | 16 | 6 | A Smart Framework for Aligning College Curricula with Labor Market Needs | Khaled Ebrahim Almajed, Hazem M. El-Bakry, Samir Abd Elrazez, Rasha Elhadri, Mansoura University, Egypt | Full Text |
International Journal on AdHoc Networking Systems (IJANS)
| 224 | 15 | 1/2 | Design and Analysis of the Performance of the IoT-Based Water Purity Identification System | Md. Ashraful Islam and Md. Matiqul Islam, Rajshahi University, Bangladesh | Full Text |
| 225 | 15 | 1/2 | A Microcontroller-Based Approach to Optimizing Soil Moisture for Increased Agricultural Productivity | Md. Faysal Ahmed 1, Md. Firoz Ahmed 1, M. Hasnat Kabir 1, Md. Arifur Rahman 2, Mirza A.F.M. Rashidul Hasan 1 Aurangzib Md. Abdur Rahman 1, Md. Matiqul Islam 1 and Mst. Shahida Akter 3, 1 University of Rajshahi, Bangladesh 2 First Capital University of Bangladesh, Bangladesh, 3 Upazila Office, Bangladesh | Full Text |
International Journal of UbiComp (IJU)
| 226 | 16 | 1/2/3 | Augmenting Missing Sensor Data for Robust Human Activity Recognition | Surya kangeyan Kandasamy Gowdaman and Sayma Akther, San Jose State University, USA | Full Text |
Applied Mathematics and Sciences: An International Journal (MathSJ )
| 233 | 12 | 3 | On Ideals via Generalized Reverse Derivation On Factor Rings | Zakia Z. Al-Amery, Aden University, Yemen | Full Text |
| 234 | 12 | 3 | Machine Learning-Guided Dynamic Sorting Algorithm Selection | Femi Ojo and Sowmya Guntupalli, Kennesaw State University, USA | Full Text |
International Journal on Soft Computing ( IJSC )
| 235 | 16 | 1 | Dynamic Cognitive Ontology Networks: Advanced Integration of Neuromorphic Event Processing and Tropical Hyper Dimensional Representations | Robert Mc Menemy, Glasgow, Scotland, United Kingdom | Full Text |
| 236 | 16 | 2/3/4 | AI-powered Models for Early Detection of CAD | P. Jothi, RVS College of Arts and Science, India | Full Text |
International Journal of Network Security & Its Applications (IJNSA)
| 237 | 17 | 1 | Performance of Aloha-Q with Adaptive Transmission Probability | Katsumi Sakakibara, Okayama Prefectural University, Japan | Full Text |
| 238 | 17 | 1 | A Trust-Based Multipath Congestion-Aware Routing Technique to Curb Wormhole Attacks for Mobile Nodes in WSNs | Fortine Mwihaki Mata, Geoffrey Muchiri Muketha and Gabriel Ndung’u Kamau, Murang’a University of Technology, Kenya | Full Text |
| 239 | 17 | 2 | Enhancing Malware Detection and Analysis using Deep Learning and Explainable AI (XAI) | MSamah Alajmani 1, Ebtihal Aljuaid 1, Ben Soh 2,and Raneem Y. Alyami 1 1 Taif University, Saudi Arabia, 2 La Trobe University, Australia | Full Text |
| 240 | 17 | 2 | Delay Testing in Integrated Circuits: Methodologies for Path Delay Fault Detection and Hardware Security | Palanichamy Manikandan, Østfold University College, Norway | Full Text |
| 241 | 17 | 2 | Analysing the Impact of Password Length and Complexity on the Effectiveness of Brute Force Attacks | Lama A. AlMalki 1,Samah H. Alajmani1, Ben Soh 2,and Raneem Y. Alyami 1 1 Taif University, Saudi Arabia, 2 La Trobe University, Australia | Full Text |
| 242 | 17 | 3 | Detecting Malicious URLs: Trends, Challenges and the Role of Browser Extensions | Homam Eltaj and Maria Ajaj, Dar Al-Hekma University, Saudi Arabia | Full Text |
| 243 | 17 | 3 | Access Detection System on Web Cameras and Microphones | Homam El-Taj, Amena Khoja, Basmah Alsharif, Dana Alsulami and Jumaina Abdulmajed, Dar Al-Hekma University, Saudi Arabia | Full Text |
| 244 | 17 | 3 | Deep Learning Solutions for Source Code Vulnerability Detection | Nin Ho Le Viet, Long Phan, Hieu Ngo Van and Tin Trinh Quang, Duy Tan University, Vietnam | Full Text |
| 245 | 17 | 3 | Scalability Analysis of IoT-DAG Distributed Ledgers using Preferential Attachment Topology: A Simulation Approach | Peter Kimemiah Mwangi, Stephen T. Njenga and Gabriel Ndung’u Kamau, Murang’a University of Technology, Murang’a, Kenya | Full Text |
| 246 | 17 | 3 | Static Testing Tools Architecture in OpenMP for Exascale Systems | Samah Alajmani, Taif University, Saudi Arabia | Full Text |
| 247 | 17 | 3 | A Lightweight Network Intrusion Detection System for SMEs | Homam El-Ta, Mawadah Fahhad, Reeman Abumlha, Shadan Showman and Zaina Saab, Dar Al-Hekma University, Saudi Arabia | Full Text |
| 248 | 17 | 4 | Smart Meter Security Issues: A Review Paper | Osama Alshannaq 1, Mohd Rizuan Baharon1, Shekh Faisal Abdul Latip 1, Hairol Nizam Mohd Shah 1 and Áine MacDermott 2, 1 Universiti Teknikal Malaysia Melaka, Malaysia, 2 Liverpool John Moores University, United Kingdom | Full Text |
| 249 | 17 | 4 | Using Combination of Fuzzy Set and Gravitational Algorithm for Improving Intrusion Detection | Amin Dastanpour1 Raja Azlina Raja Mahmood2, 1 Kerman Institute of Higher Education, Iran, 2 University Putra Malaysia, Malaysia | Full Text |
| 250 | 17 | 4 | A Systematic Review of Applications in Fraud Detection | Hashim Jameel Shareef Jarrar, Middle East University, Jordan | Full Text |
| 251 | 17 | 4 | Trust Without Exposure: Verifiable Observability with Capability-Native Webassembly at the Edge | Bala Subramanyan, Verifoxx, UK | Full Text |
| 252 | 17 | 5/6 | Hyperparameter Tuning-Based Optimized Performance Analysis of Machine Learning Algorithms for Network Intrusion Detection | Sudhanshu Sekhar Tripathy and Bichitrananda Behera, C.V. Raman Global University, India | Full Text |
| 253 | 17 | 5/6 | An Explainable Graph Neural Network Framework for Anti–Money Laundering in Cryptocurrency Transactions using the Elliptic Dataset | Oluwatosin Lawal 1, Awele Okolie 2, Callistus Obunadike 3 , 1 1Texas A&M University, USA, 2 Wentworth Institute of Technology, USA,3 Austin Peay State University, USA | Full Text |
| 254 | 17 | 5/6 | Database and System Security | Nikitha Merilena Jonnada, University of the Cumberlands, USA | Full Text |
| 255 | 17 | 5/6 | A Novel Trust-based DDOS Cyberattack Detection Model for Smart Business Environments | Oghenetejiri Okporokpo, Funminiyi Olajide, Nemitari Ajienka and Xiaoqi Ma, Nottingham Trent University, United Kingdom | Full Text |
International Journal of Computer Graphics & Animation (IJCGA)
| 256 | 15 | 1/2 | Implicit Set Blends with Bounded Primitives for Zero Implicit Surface | Pi-Chung Hsu, Shu-Te University, Taiwan | Full Text |
| 257 | 15 | 3 | The Role of Emojis in Digital Communication: Emotional Expression, Demographic and Social Dynamics Among Young Adults on Whatsapp | Malini Mahalingam and Lakshmi Priya Daniel, University of Madras, India | Full Text |
International Journal of Multimedia & Its Applications (IJMA)
| 258 | 17 | 1/2 | The Impact of Album Layout on User Experience in Smartphone Music Applications | Molly Scott and Damian Schofield, State University of New York, USA | Full Text |
| 259 | 17 | 3 | Exploring Learning Engagement Factors Influencing Behavioral, Cognitive, and Emotional Engagement and Challenges in Learning Management Systems | Maizan Mat Amin, Syadiah Nor Wan Shamsuddin and Wan Mohd Amir Fazamin Wan Hamzah, Universiti Sultan Zainal Abidin, Malaysia | Full Text |
| 260 | 17 | 3 | Editing Fashion Images with Precision: A Controlled in Painting Method | Tasnim Charaa 1, Tasnime Hamdeni 2 and Ines Abdeljaoued-Tej 2, 1 University of Carthage, Tunisia, 2 University Tunis-El-Manar, Tunisia | Full Text |
| 261 | 17 | 3 | Audio Steganography using Least Significant Bit Method for Confidential Data Embedding | Muhd Izzul Haziq Rahim, Nazirah Abd Hamid, Siti Dhalila Mohd Satar, Mohd Fadzil Abdul Kadir, Ahmad Faisal Amri Abidin @ Bharun, Mohamad Afendee Mohamed and Mumtazimah Mohamad, Tembila Campus, Malaysia | Full Text |
| 262 | 17 | 3 | Exploring Game Based Learning: A Systematic Literature Review (2021-2025) | Siti Sakinah Mohd Yusof, Haslinda Hashim and Erni Marlina Saari, Universiti Pendidikan Sultan Idris, Malaysia | Full Text |
| 263 | 17 | 3 | Immersive vs Desktop VR in Hotel English Education: Effects on Engagement of Chinese University Students | Meng Huan, Mageswaran A/l Sanmugam, Universiti Sains Malaysia, Malaysia | Full Text |
International Journal on Information Theory (IJIT)
| 264 | 14 | 1/2 | The Weapon - The Use of Kolmogorov Complexity to Combat Plagiarism in the Classroom | George Sturm, Radio Logos, Albania | Full Text |
| 265 | 14 | 1/2 | Generative Design as a Simulation of Quantum Field Properties | Stephen W. Marshall and Bruce R. Roberts, Ora.Systems, USA | Full Text |
International Journal of Advanced Information Technology (IJAIT)