Computer Science & Information Technology
S.No | Volume | Issue | Paper Title | Authors |
---|
International Journal of Computer Science & Information Technology (IJCSIT)
1 | 16 | 1 | Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile Application Infrastructure Security | Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA | Full Text |
2 | 16 | 1 | Image Segmentation and Classification using Neural Network | Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh | Full Text |
3 | 16 | 1 | From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics | Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA | Full Text |
4 | 16 | 1 | A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 | Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA | Full Text |
5 | 16 | 1 | Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning | Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA | Full Text |
6 | 16 | 2 | Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks | Saurabh Mishra1, Rakesh Ranjan1, Sonika Singh2 and Gagan Singh2, 1Sushant University, Inida, 2DIT University, India | Full Text |
7 | 16 | 2 | The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States | Omolola F. Hassan1, Oluwadare O. Aderibigbe1, Oghenekome P. Efijemue1 and Tolulope D. Onasanya2, 1Austin Peay State University, USA, 2North Carolina Agricultural and Technical State University, USA | Full Text |
8 | 16 | 2 | Big Data and Machine Learning in Defence | Yijie Weng1 and Jianhao Wu2, 1University of Maryland, USA, 2Cornell University, USA | Full Text |
9 | 16 | 2 | AI-Based Home Security System | Syeda Lamima Farhat, Likhitha Tubati, Metrine Osiemo and Rushit Dave, Minnesota State University, USA | Full Text |
10 | 16 | 3 | The Impact of Blockchain Technology on the Financial Services Industry | Kinil Doshi, Citibank, USA | Full Text |
11 | 16 | 3 | Streamlining Compliance and Risk Management with RegTech Solutions | Chintamani Bagwe, Citibank, USA | Full Text |
12 | 16 | 3 | A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis | Al-Mahmud and Kazutaka Shimada, Kyushu Institute of Technology, Japan | Full Text |
13 | 16 | 3 | The Energy Storage Operation Under Stochastic Renewable Generation | Tony Tsang and Chung Kwok Leung, Hong Kong College of Technology, Hong Kong | Full Text |
14 | 16 | 3 | Psychological and Graphic Aspects of Colors: Influence and Application in Product Design | Filip Popovski1, Hristina Dimova Popovska1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1University St. Klement of Ohrid, Macedonia, 2Internacional Slavic University, Macedonia | Full Text |
15 | 16 | 3 | Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights | Sanjay Moolchandani, Citibank N.A., USA | Full Text |
16 | 16 | 3 | Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans | Rezaul Karim1,2, Md. Badiuzzaman Biplob1 and Mohammad Shamsul Arefin1, 1Chittagong University of Engineering and Technology, Bangladesh, 2University of Chittagong, Bangladesh | Full Text |
17 | 16 | 3 | Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications | Priyank Singh, Tanvi Hungund and Shobhit Kukreti, Rochester Institute of Technology, US | Full Text |
18 | 16 | 3 | Player Strategy Modeling in Classic Roleplaying Game Battle Environments | Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA | Full Text |
19 | 16 | 3 | Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and Future Prospects | Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Emmanuel Hinneha and Samuel Attakorah, Carolina University, USA | Full Text |
20 | 16 | 4 | Non-Deterministic and Risk Based Security Services | Srinivas Rao Doddi1 and Akshay Krishna Kotamraju2, 1University of Los Angeles, USA, 2Founder Non-profit, USA | Full Text |
21 | 16 | 4 | Database Security Compliance with Anti-Money Laundering Status | Opeyemi Ayanbanjo, New England College, Boston | Full Text |
22 | 16 | 4 | AI Strategy Formulation Across Various Game Genres - A Literature Review | Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA | Full Text |
23 | 16 | 4 | Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems | Rashid Alakbarov and Mammad Hashimov, Institute of Information Technology, Azerbaijan | Full Text |
24 | 16 | 4 | Exploring White Fragility in Large Language Models | Janga Bussaja, Independent Researcher, USA | Full Text |
25 | 16 | 4 | A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods | Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
26 | 16 | 4 | The Role of Cloud Providers in IoT Services | Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University St. Klement of Ohrid, Macedonia | Full Text |
27 | 16 | 4 | FIX Protocol: The Backbone of Financial Trading | Swapnil Kognole, UBS, USA | Full Text |
28 | 16 | 4 | Shadowed AHP for Multi-Criteria Supplier Selection | Mohamed Abdel Hameed El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt | Full Text |
29 | 16 | 4 | Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional Responses, and Satisfaction | Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
30 | 16 | 5 | Baoulé Related Parallel Corpora for Machine Translation Tasks: Mtbci-1.0 | Kouassi Konan Jean-Claude, Bircham International University, Spain | Full Text |
31 | 16 | 5 | A Neural Network Approach to Understanding Employee Retention Dynamics: Insights from Feature Importance Analysis | Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
32 | 16 | 5 | Enhancing Organizational Efficiency of the Lantern Festival in Penghu, Taiwan Through Information Technology: Key Factors Analysis | Shih-Ping Chang and Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
33 | 16 | 5 | Evaluating the Effect of Human Activity on Air Quality using Bayesian Networks and IDW Interpolation | Hema Durairaj1 and L Priya Dharshini2, 1Publicis Sapient Pvt. Ltd., India, 2Lady Doak College, India | Full Text |
34 | 16 | 5 | Resources Price Adjustment in Cloud Computing for Load Balancing and Fairness Between Users and Suppliers | Lilia Chourou Gherir1, Ahmed Elleuch2 and Mohamed Jemni1, 1University of Tunis, Tunisia, 2University of Manouba, Tunisia | Full Text |
35 | 16 | 5 | Exploring the Selection and Training of Tour Leaders: An Evaluation Model Based on the Analytic Hierarchy Process | Yuang-Liang Sun and Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
36 | 16 | 5 | Analysis of Key Factors Influencing Penghu Tourism Development using the Delphi Method and AHP | Pao-TsaiKuo and Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
37 | 16 | 5 | Malware Detection and Classification using Generative Adversarial Network | Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh, Shri Prakash Dwivedi and Paras, G. B. Pant University of Agriculture and Technology, India | Full Text |
38 | 16 | 5 | Utilizing Analytic Network Process for Evaluating Event Management Companies: A Case Study in Celebration Activities | Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
39 | 16 | 5 | AI-Driven Threat Intelligence: Transforming Cybersecurity for Proactive Risk Management in Critical Sectors | SA Mohaiminul Islam1, MD Shadikul Bari1, Ankur Sarkar1, A J M Obaidur Rahman Khan2 and Rakesh Paul1, 1Washington University Of Science & Technology (WUST), USA, 2Independent University (WUST), Bangladesh | Full Text |
40 | 16 | 6 | Attention Mechanism for Attacks and Intrusion Detection | Angham Alsuhaimi and Jehan janbi, Taif University, Kingdom of Saudi Arabia | Full Text |
41 | 16 | 6 | Digital Interventions for Anxiety Management using AI-Driven Mobile Applications | Mohammed Majid Bakhsh 1, Abu Saleh Muhammad Saimon 1 and A J M Obaidur Rahman Khan 2, 1 Washington University of Science & technology, USA, 2 Independent University Bangladesh, Bangladesh | Full Text |
42 | 16 | 6 | Exploring Fault Tolerance Strategies in Big Data Infrastructures and Their Impact on Processing Efficiency | Akaash Vishal Hazarika 1 and Mahak Shah 2, 1 North Carolina State University, USA, 2 Columbia University, USA | Full Text |
43 | 16 | 6 | Analysis of Random Distortions in the Elements of the Basic Cell for an Analog-Digital Pipelined Converter | Ricardo Francisco Martinez Gonzalez, Tecnologico Nacional de Mexico / IT Veracruz, Mexico | Full Text |
44 | 16 | 6 | The Installation Design of Solar Panels for Village Houses HK with Optimization-based Efficiency for Sustainable Environmental | Tony Tsang 1, Fong Lun Chuen 1, Gary Mok 2, Steven Poon 2 and Samuel Lip 2, 1 Hong Kong College of Technology, China, 2 Lordray Engineering Company Limited, Hong Kong | Full Text |
45 | 16 | 6 | AI-Driven Test Case Optimization: Enhancing Efficiency in Software Testing Life Cycle | K M Yaqub Ali and Sumi Akter, Washington University Of Science & Technology (WUST), USA | Full Text |
46 | 16 | 6 | Unveiling Patterns: Advanced Data Mining Techniques for Accurate Predictive Analytics | Sumi Akter and K M Yaqub Ali, Washington University of Science & Technology (WUST), USA | Full Text |
International Journal of Computer Science and Engineering Survey (IJCSES)
47 | 15 | 1 | Integration of Latex Formula in Computer-Based Test Application for Academic Purposes | Ikechukwu E. Onyenwe, Ebele Onyedinma, Onyedika O. IkechukwuOnyenwe, Obinna Agbata , and Faustinah N. Tubo, Nnamdi Azikiwe University, Nigeria | Full Text |
48 | 15 | 2/3/4 | Cite_Stema SA Atendansiya: Modernizing Cite Students Attendance System with RFID Technology | Rezzie R. Cadungog, Ryan L. Nambong, Nero L. Hontiveros, Mark Bryan C. Tenebroso, Michaelangelo R. Serrano, Notre Dame of Midsayap College, Philippines | Full Text |
49 | 15 | 5 | A Survey on Machine Learning Applications in VLSI CAD | K Shekar and Sandhya Rachamalla, Osmania University, India | Full Text |
50 | 15 | 6 | Anemia Detection from Eyes, Palm and Fingernails with Machine Learning Models | A.S.Nousir, Aya.M.Attia, M. Salama, A. Mostafa, M. Osama, H. A. Khalil, B. Mohamed and Dina Darwish Ahram Canadian University, Egypt | Full Text |
Computer Science & Engineering: An International Journal (CSEIJ)
51 | 14 | 1 | Data Mining for Students’ Employability Prediction | S.M.M Malika, SLIATE, Sri Lanka | Full Text |
52 | 14 | 2 | IoT Solutions for Smart Parking- Sigfox Technology | Rachel John Robinson, IU University of Applied Sciences, Germany | Full Text |
53 | 14 | 3 | Transforming Worlds: The Intersection of Translation Technology and Transformers in the Digital Age | Zaki Muhammad Zayyanu, Usmanu Danfodiyo University, Nigeria | Full Text |
54 | 14 | 1 | Revolutionising Translation Technology: A Comparative Study of Variant Transformer Models - BERT, GPT, and T5 | Zaki Muhammad Zayyanu, Usmanu Danfodiyo University, Nigeria | Full Text |
International Journal of Computer Science, Engineering and Applications (IJCSEA)
55 | 14 | 1/2/3/4 | Estimation Formula for Indirect Value Realization of Virtual Meetings | Fatima A. Al Roomi and Hafed A. Al Ghamdi, Saudi Arabia | Full Text |
International Journal on Computational Science & Applications (IJCSA)
56 | 14 | 1/2/3/4/5/6 | Machine Learning Classification using Motif Based Graph Databases Created from UWF-ZeekData22 | Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Jadarius Hill, Farooq Mahmud and Michael Plain, University of West Florida, USA | Full Text |
International Journal on Natural Language Computing (IJNLC)
57 | 13 | 1 | Evaluation of Medium-Sized Language Models in German and English Language | Rene Peinl and Johannes Wirth, Hof University of Applied Sciences, Germany | Full Text |
58 | 13 | 1 | Performance, Energy Consumption and Costs: A Comparative Analysis of Automatic Text Classification Approaches in the Legal Domain | Leonardo Rigutini1, Achille Globo1, Marco Stefanelli2, Andrea Zugarini1, Sinan Gultekin1, Marco Ernandes1, 1expert.ai spa, Italy, 2University of Siena, Italy | Full Text |
59 | 13 | 1 | Rag-Fusion: A New Take on Retrieval Augmented Generation | Zackary Rackauckas, Infineon Technologies, California | Full Text |
60 | 13 | 1 | Document Author Classification using Parsed Language Structure | Todd K. Moon and Jacob H. Gunther, Utah State University, USA | Full Text |
61 | 13 | 1 | Improving Dialogue Management Through Data Optimization | Miguel Ángel Medina-Ramírez, Cayetano Guerra-Artal and Mario HernándezTejera, University of Las Palmas de Gran Canarias, Spain | Full Text |
62 | 13 | 2 | Identifying Key Terms in Prompts for Relevance Evaluation with GPT Models | Jaekeol Choi, Hankuk University of Foreign Studies, South Korea | Full Text |
63 | 13 | 3 | Fine-Tuning of Small/Medium LLMs for Business QA on Structured Data | Rasha Ragab and Abdulrahman Altahhan, University of Leeds, UK | Full Text |
64 | 13 | 3 | Human Intention Space - Natural Language Phrase Driven Approach to Place Social Computing Interaction in a Designed Space | Pronab Pal, KeyByte Systems, Australia | Full Text |
65 | 13 | 4 | A Review of Prompt-Free Few-Shot Text Classification Methods | Rim Messaoudi, Achraf Louiza and Francois Azelart, Akkodis Research, France | Full Text |
66 | 13 | 4 | Interlingual Syntactic Parsing: An Optimized Head-Driven Parsing for English to Indian Language Machine Translation | Pavan Kurariya, Prashant Chaudhary, Jahnavi Bodhankar, Lenali Singh and Ajai Kumar, Centre for Development of Advanced Computing, India | Full Text |
67 | 13 | 5/6 | Neural and Statistical Machine Translation: Confronting the State of the Art | Daniel Rojas Plata and Noe Alejandro Castro Sanchez, Cenidet/TecNM, Mexico | Full Text |
68 | 13 | 5/6 | Data-Driven Part-of-Speech Tagging for the Gikuyu Language: Development, Challenges, and Prospects | Gabriel Kamau, Dedan Kimathi University of Technology, Kenya | Full Text |
69 | 13 | 5/6 | Orchestrating Multi-Agent Systems for Multi-Source Information Retrieval and Question Answering with Large Language Models | Antony Seabra 1,2, Claudio Cavalcante 1,2, Joao Nepomuceno 1, Lucas Lago 1, Nicolaas Ruberg 1, and Sergio Lifschitz 2 1 BNDES - Area de Tecnologia da Informacao, Brazil, 2 PUC-Rio - Departamento de Informatica, Brazil | Full Text |
70 | 13 | 5/6 | End-to-End Bangla AI for Solving Math Olympiad Problem Benchmark:Leveraging Large Language Model using Integrated Approach | H.M.Shadman Tabib and Jaber Ahmed Deedar, Bangladesh University of Engineering and Technology, Bangladesh | Full Text |
International Journal of Managing Information Technology (IJMIT)
71 | 16 | 1 | Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adversarial Model | Drici Mourad1 and Dr.Kazeem Oluwakemi Oseni2, 1University of Westminster, United Kingdom, 2University of Bedfordshire, United Kingdom | Full Text |
72 | 16 | 1 | Predictive Modelling of Air Quality Index (AQI) Across Diverse Cities and States of India using Machine Learning: Investigating the Influence of Punjab's Stubble Burning on AQI Variability | Kamaljeet Kaur Sidhu1, Habeeb Balogun1 and Dr.Kazeem Oluwakemi Oseni2, 1University of Westminster, United Kingdom, 2University of Bedfordshire, United Kingdom | Full Text |
73 | 16 | 3/4 | Adoption of Library Information Systems using the Technology Acceptance Model: a South African Study | Chiedza M Tevera1 and Ephias Ruhode2, 1Cape Peninsula University of Technology, South Africa, 2University of the West of Scotland, United Kingdom | Full Text |
74 | 16 | 2 | The Process and Fate of Hackathons Against Corruption in Brazil | Antonio Augusto Braighi, Federal University of Minas Gerais, Brasil | Full Text |
International Journal of Managing Value and Supply Chains (IJMVSC)
75 | 15 | 2 | Integrating Inventory Management and Distribution: A Holistic Supply Chain Strategy | Dilip Kumar Vaka, Deloitte consulting, US | Full Text |
76 | 15 | 1 | Safe and Inclusive School Bus Transportation System for Special Needs Children | Aditya Kumar Sharma 1 and Preeti Kumar Yadav 2, 1 Zum Services Inc., California, 2 Cama & Albless Hospital, India | Full Text | 77 | 15 | 1 | CMMS- Streamlining Maintenance management for Food and Beverage Industry to capture breakdowns | Animek Shaurya, USA | Full Text |
78 | 15 | 1 | Omni-Channel Distribution: A Transshipment Modeling Perspective | John M. Woosley, Robert F. Cope III, Rachelle F. Cope and David C. Wyld, Southeastern Louisiana University, USA | Full Text |
79 | 15 | 1 | Streamlining Roadside Inspection Reporting in Fleet Management Systems | Sahil Nyati, Maven Machines, USA | Full Text |
80 | 15 | 1 | Value and Supply Chains in International Trade. Puerto Rico Amidst Disasters, Captures and Leakages | Maribel Aponte-Garcia, University of Puerto Rico, Puerto Rico | Full Text |
81 | 15 | 2 | Contribution to Securing BYOD Systems in Financial Authorities and Public Administrations in Free Trade Zones | Patrick Aurélien AMPIRI KWA 1, Rostand Martialy Davy Loembe Souamy2,3, Aristide MANKITI FATI1,4 1 Marien NGOUABI University, Republic of the Congo, 2 Nanjing University, China, 3 Nanjing University of Post and Telecommunication, China, 4 Admitelecom Academy laboratory of Microwave, Ghana | Full Text |
82 | 15 | 3 | Do Tensions in the South China Sea Herald the Collapse of Global Supply Chains? | Gilles Paché, Aix-Marseille University, France | Full Text |
83 | 15 | 3 | Integrating Robotics for Enhanced Business Operations | Ravindra Kumar Patro, Zum Services Inc., USA | Full Text |
84 | 15 | 3 | Emerging Technologies for Precision Supply Chain Management | Ravindra Kumar Patro, Zum Services Inc., USA | Full Text |
85 | 15 | 3 | What is a State-of-the-Art Definition of Supply Chain Resilience in 2024 – With a Systematic Literature Review | Shixin Zou1 and Markus Witthaut2, 1TU Dortmund University, Germany, 2Fraunhofer Institute for Material Flow and Logistics IML, Germany | Full Text |
86 | 15 | 4 | The Impact of Coordination on Health Commodity Security in Sierra Leone | Michael Egharevba1,Moses N.P. Batema2, Jatu J. Abdulai 3, Brenda Olatunji Edith Stafford 4,Marie Ibranatu Kolipha-Kamara 5, Mohamed Bakarr Kanu5, 1 USA, 2 Directorate of Pharmaceutical Services, Ministry of Health, Sierra Leone, 3 National Medical Supplies Agency, Sierra Leone, 4 National Malaria Control Program, Ministry of Health, Sierra Leone, 5 Global Health Supply Chain-Procurement and Supply Management, Sierra Leone | Full Text |
International Journal of Managing Public Sector Information and Communication Technologies ( IJMPICT )
87 | 14 | 1/2/3 | Empirical Investigation into ICT Services Evaluation Within a Public Institution | Pappas Michael, Doxopoulou Kyriaki, Mavidis Aristotelis, Folinas Dimitris, International Hellenic University, Greece | Full Text |
88 | 14 | 4 | Evaluating Citizens' Perceptions and Attitudes Towards E-Voting in Local Governance: An Empirical Study | Eleni Michalopoulou1, Dimitris Folinas1, Dimitris Mylonas1, Zafeiro Fragkaki2, 1International Hellenic University, Greece, 2Aristotle University of Thessaloniki, Greece | Full Text |
Health Informatics: An International Journal (HIIJ)
89 | 13 | 1 | Integrating Machine Learning in Clinical Decision Support Systems | Tanay Subramanian, Brown University, USA | Full Text |
90 | 13 | 1 | Brief Commentary: Using a Logic Model to Integrate Public Health Informatics Into Refinements of Public Health Surveillance System | GV Fant, US Department of Veterans Affairs, USA | Full Text |
91 | 13 | 1 | Brief Commentary: Using a Logic Model to Integrate Public Health Informatics Into Refinements of Public Health Surveillance System | GV Fant, US Department of Veterans Affairs, USA | Full Text |
92 | 13 | 2 | A Practical Approach to Predicting Depression: Verbal and Non-Verbal Insights with Machine Learning | Sanskar Rahul Nanegaonkar and Kotaro Ando, I’m beside you Inc, Japan | Full Text |
93 | 13 | 2 | Health Disparities: Differences in Veteran and Non-Veteran Populations using Generative AI | GV Fant, US Department of Veterans Affairs, USA | Full Text |
International Journal on Cybernetics & Informatics ( IJCI)
94 | 13 | 1 | Learning Analytics Dashboards for Advisors - A Systematic Literature Review | Suchith Reddy Vemula and Marcia Moraes, Colorado State University, USA | Full Text |
95 | 13 | 1 | Language Oriented Approach of Teaching Programming Skills | Bauming Wood, Neijiang Normal University, China | Full Text |
96 | 13 | 1 | Bridging the GAP: Selenium and RPA for Unparalleled Automation | Rohit Khankhoje, Independent Researcher, USA | Full Text |
97 | 13 | 1 | Scalable Action Mining Hybrid Method for Enhanced User Emotions in Education and Business Domain | Sanchari Chatterjee1, Angelina A. Tzacheva2 and Zbigniew Ras2, 1University of North Carolina, USA, 2West Cliff University Irvine, USA | Full Text |
98 | 13 | 1 | Leveraging Machine Learning Algorithm to Enable Access to Credit for Small Businesses in the United States of America | Toyyibat T. Yussuph, American Express, USA | Full Text |
99 | 13 | 1 | An Ethical Study of Generative AI from the Actor-Network Theory Perspective | Yuying li And Jinchi zhu, Communication University of Zhejiang, China | Full Text |
100 | 13 | 2 | Direct Punjabi to English Speech Translation using Discrete Units | Prabhjot Kaur1, L. Andrew M. Bush2 and Weisong Shi3, 1Wayne State University, USA, 2Utah State University, USA, 3University of Delaware, USA | Full Text |
101 | 13 | 2 | Improving the Capabilities of Large Language Model based Marketing Analytics Copilots with Semantic Search and Fine-Tuning | Yilin Gao1, Sai Kumar Arava2, Yancheng Li2 and James W Snyder Jr2, 1University of Southern California, USA, 2Adobe Inc., USA | Full Text |
102 | 13 | 2 | The Evaluation of a Code-Switched Sepedi-English Automatic Speech Recognition System | Amanda Phaladi and Thipe Modipa, University of Limpopo, South Africa | Full Text |
103 | 13 | 2 | Ara--CANINE: Character-Based Pre-Trained Language Model for Arabic Language Understanding | Abdulelah Alkesaiberi1, Ali Alkhathlan1 and Ahmed Abdelali2, 1King Abdulaziz University, Saudi Arabia, 2National Center for AI, Saudi Arabia | Full Text |
104 | 13 | 2 | Exploring Semantic Question Generation Methodology and a Case Study for Algorithmic Question Pool | Sumayyah Alamoudi and Amany Alnahdi, King Abdulaziz University, KSA | Full Text |
105 | 13 | 2 | On the Construction of Perfect Keyword Secure PEKS Scheme | Indranil Ghosh Ray, Queen's University Belfast, UK | Full Text |
106 | 13 | 2 | On the Construction of Perfect Keyword Secure PEKS Scheme | Indranil Ghosh Ray, Queen's University Belfast, UK | Full Text |
107 | 13 | 2 | The Mathematics behind Cryptocurrencies "A Statistical Analysis of Cryptocurrencies" | Masoud Eshaghinasrabadi, California State University, USA | Full Text |
108 | 13 | 2 | The Covid Shock, The Rise of Defi, and Bitcoin's Increasing Market Risk | Bruce D. McNevin1 and Joan Nix2, 1Chief Data Scientist, USA, 2Queens College (CUNY), USA | Full Text |
109 | 13 | 2 | Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing Method in Metric Space | K. Khettabi, B. Farou, Z. Kouahla, and H. Seridi, STIC Laboratory, Algeria | Full Text |
110 | 13 | 2 | Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach | Paul Addai1, Pedro Pinto2, and Tauheed Khan Mohd3, 1Augustana College, USA, 2Instituto Politecnico de Viana do Castelo (IPVC), Portugal, 3Eastern Michigan University, USA | Full Text |
111 | 13 | 2 | Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: A Technical Exploration | Nuha Sabek, Joseph Loftus, Kati Sneath, Spencer Ames, and Tauheed Khan Mohd, Eastern Michigan University, USA | Full Text |
112 | 13 | 2 | Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in Healthcare | Brad Chardenet, Jaycen Jamssens, Richard Cummins, and Tauheed Khan Mohd,Eastern Michigan University, USA | Full Text |
113 | 13 | 3 | Steps and Challenges in Analyzing Real Sensor Data from a Productive Press Shop and its Value for Predictive Maintenance Application | Safa Evirgen1 and Maylin Wartenberg2, 1Volkswagen AG, Germany, 2Hochschule Hannover, Germany | Full Text |
114 | 13 | 3 | A Creativity Monitoring Device (CMD) for New Insight into the Brain Mechanisms of Artistic, Scientific and Engineering Creative Acts | Nandor Ludvig, Translational Neuroscience Consultation, USA | Full Text |
115 | 13 | 3 | Connectivity-Based Clustering for Mixed Discrete and Continuous Data | Mahfuza Khatun1 and Sikandar Siddiqui2, 1Jahangirnagar University, Bangladesh , 2Deloitte Audit Analytics GmbH, Germany | Full Text |
116 | 13 | 3 | Advanced AI Solutions for Securities Trading: Building Scalable and Optimized Systems for Global Financial Markets | Akinde Abdullah, Hassan Omolola, Samuel Olatunde and Oluwadare Aderibigbe, Austin Peay State University, USA | Full Text |
117 | 13 | 4 | Challenges with Securing Digital Identity | Nikhil Ghadge, Okta.Inc, USA | Full Text |
118 | 13 | 4 | Forecasting Network Capacity for Global Enterprise Backbone Networks using Machine Learning Techniques | Kapil Patil1 and Bhavin Desai2, 1Principal Technical Program Manager, USA, 2Product Manager, USA | Full Text |
119 | 13 | 4 | Internet of Things: Domesticated Toolsets for Solving Major Challenges Faced by Individuals with Health Problems | Tunbosun Oyewale Oladoyinbo1 and Isiaka Akinkunmi Adeyemo2, 1University of Maryland Global Campus, USA 2Ladoke Akintola University of Technology, Nigeria | Full Text |
120 | 13 | 4 | The TOE Theory and Cloud Computing: Exploring Factors Affecting the Adoption Of Cloud Computing | Tunbosun Oyewale Oladoyinbo1, Isiaka Akinkunmi Adeyemo2 and Oluseun Babatunde Oladoyinbo3, 1University of Maryland Global Campus, USA, 2Ladoke Akintola University of Technology, Nigeria, 3Oyo state College of Agriculture, Nigeria | Full Text |
121 | 13 | 4 | Empowering Healthcare: A Blockchain-Based Secure and Decentralized Data Sharing Scheme with Searchable Encryption | Seyedmohammad Nouraniboosjin1, Melika Yousefi2, Sadaf Meisami3, MelinaYousefi4 and Sajad Meisami2 1Worcester Polytechnic Institute, USA, 2Illinois Institute of Technology, USA, 3Kharazmi University, Iran 4Isfahan University of Technology, Iran | Full Text |
122 | 13 | 4 | Fuzzy Cognitive Maps as a Bridge between Symbolic and Sub-Symbolic Artificial Intelligence | Maikel Leon, University of Miami, USA | Full Text |
123 | 13 | 4 | An Approach to Demonstrate That a Cognitive System Does Not Have Subjective Consciousness | Manuel Boissenin, France | Full Text |
124 | 13 | 4 | Decoding AI and Human Authorship: Nuances Revealed through NLP and Statistical Analysis | Mayowa Akinwande1, Oluwaseyi Adeliyi2 and Toyyibat Yussuph3, 1Austin Peay State University, USA 2University of Arkansas at Little Rock, USA, 3American Express Company, USA | Full Text |
125 | 13 | 4 | Transforming Everyday Environments: The Power of Ambient Intelligence | Partha Sarathi Samal, USA | Full Text |
126 | 13 | 4 | Peace Education in Africa: The Role of Games, Visual Arts and Crafts | Dudziro Nhengu, Midlands State University, Zimbabwe | Full Text |
127 | 13 | 4 | Reforming Biological/Biomedical Science Teaching and Education: A Reflection on Well-Developed Practices and Approaches in Large Class | Ahmed HK El-Hashash, Texas A & M University, USA | Full Text |
128 | 13 | 4 | AI-Powered Solutions for Missing Data in Pipeline Risk Assessments | Syed Jehanzeb Adeel Haider, Enbridge Energy Inc., USA | Full Text |
128 | 13 | 4 | Web-Based Automation Testing and Tools Leveraging AI and ML | Narendar Kumar Ale and Rekha sivakolundhu, University Of Cumberlands, USA | Full Text |
130 | 13 | 4 | A 63.74 DBΩ Gain 60.84 GHz Bandwidth Power-Efficient Transimpedance Amplifier in 130 Nm SiGe BiCMOS Technologys | Lavakumar Navilipuri and Andy Heinig, Fraunhofer Institute for Integrated Circuits IIS/EAS, Germany | Full Text |
131 | 13 | 4 | Exploring Transimpedance Amplifier Topologies: Design Considerations and Trade-Offs | Lavakumar Navilipuri and Andy Heinig, Fraunhofer Institute for Integrated Circuits IIS/EAS, Germany | Full Text |
132 | 13 | 4 | QUIDEST: Real-Time Monocular Depth Map to Audio Signal Conversion Algorithm | L. Tenze and E. Canessa, The Abdus Salam International Centre for Theoretical Physics (ICTP), Italy | Full Text |
133 | 13 | 4 | AI Teachers Using a VR/MR Environment for Greater Student Interaction and Immersion | L.M. Escobedo F, InterNaciones University, Guatemala | Full Text |
134 | 13 | 5 | Transformation of Printed Teaching Materials into Digital Form | Natalia Hrkotacova and Adriana Kickova, Constantine the Philosopher University, Slovakia | Full Text |
135 | 13 | 5 | Leveraging Generative AI for On-Demand Tutoring as a New Paradigm in Education | Maikel Leon, University of Miami, USA | Full Text |
136 | 13 | 5 | Multi-classification of Cad Entities: Leveraging the Entity-as-Node Approach with Graph Neural Networks | Sheela Raju Kurupathi1, Park Dongryul1, Sebastian Bosse1 and Peter Eisert1,2, 1Fraunhofer Heinrich Hertz Institute (HHI), Germany, 2Humboldt University of Berlin, Germany | Full Text |
137 | 13 | 5 | Block Medcare: Advancing Healthcare Through Blockchain Integration | Oliver Simonoski and Dijana Capeska Bogatinoska, University of Information Science and Technology, Macedonia | Full Text |
138 | 13 | 5 | WTCL-Dehaze: Rethinking Real-World Image Dehazing via Wavelet Transform and Contrastive Learning | Divine Joseph Appiah, Donghai Guan, Abdul Nasser Kasule and Mingqiang Wei, Nanjing University of Aeronautics and Astronautics, China | Full Text |
139 | 13 | 5 | DAPLSR: Data Augmentation Partial Least Squares Regression Model via Manifold Optimization | Haoran Chen, Jiapeng Liu, Jiafan Wang and Wenjun Shi, Zhengzhou University of Light Industry, China | Full Text |
140 | 13 | 5 | Blockchain Applications in Cyber Liability Insurance | Shreyas Kumar, Luis Loo and Leah Kocian, Texas A&M University, United States of America | Full Text |
141 | 13 | 5 | A New Mathetic (The Science of Learning) and Didactic (The Science of Teaching) Concept | Henk Roelofs1 and Willem Schreuder2, 1LE-Network, The Netherlands, 2Functionality, The Netherlands | Full Text |
142 | 13 | 5 | Haste Makes Waste: A Moderated Mediation Model of the Mechanisms Linking Artificial Intelligence Advancement to Film Firm Performance | Zexia Wang and Wucheng Han, University of Electronic Science and Technology of China, China | Full Text |
143 | 13 | 5 | Similar Data Points Identification with LLM: A Human-in-the-Loop Strategy Using Summarization and Hidden State Insights | Xianlong Zeng1, Yijing Gao2, Ang Liu3 and Fanghao Song1, 1Ohio University, USA, 2Brown University, USA 3Rutgers University, USA | Full Text |
144 | 13 | 5 | Predictive Analytics for Pilot Training in Southern Africa | Sibusiso Mzulwini and Tendani Lavhengwa, Tshwane University of Technology, RSA | Full Text |
145 | 13 | 5 | Uncertainty-Aware Seismic Signal Discrimination using Bayesian Convolutional Neural Networks | Soma Datta Reddy and Sunitha Palissery, Earthquake Engineering Research Centre, , India | Full Text |
146 | 13 | 6 | Leveraging Large Language Models For Optimized Item Categorization using UNSPSC Taxonomy | Anmolika Singh and Yuhang Diao, Data Scientist, USA | Full Text |
147 | 13 | 6 | Dynamic Multi-Agent Orchestration and Retrieval for Multi-Source Question-Answer Systems using Large Language Models | Antony Seabra 1,2, Claudio Cavalcante 1,2, Joao Nepomuceno1, Lucas Lago1, Nicolaas Ruberg 1 and Sergio Lifschitz 22BNDES, Brazil, 2 PUC-Rio, Brazil | Full Text |
148 | 13 | 6 | Integrating Event-Based Neuromorphic Processing and Hyperdimensional Computing with Tropical Algebra for Cognitive Ontology Networks | Robert McMenemy, Independent Researcher, United Kingdom | Full Text |
149 | 13 | 6 | AdversLLM: A Practical Guide To Governance, Maturity and Risk Assessment For LLM-Based Applications | Othmane Belmoukadam, Jiri De Jonghe, Sofyan Ajridi, Amir Krifa, Joelle Van Damme, Maher Mkadem and Patrice Latinne, AI LAB, Belgium | Full Text |
150 | 13 | 6 | Divergent Ensemble Networks: Enhancing Uncertainty Estimation with Shared Representations and Independent Branching | A. Chandorkar and A. Kharbanda, Indian Institute of Technology, India | Full Text |
151 | 13 | 6 | Proposal of a Data Model for a Dynamic Adaptation of Resources in IOTs (ADR-IOT) | KANGA Koffi 1, KAMAGATE Beman Hamidja1, BROU Aguie Pacome Bertrand 1 and OUMTANAGA Souleymane2 1 LASTIC-ESATIC, Cote d'Ivoire, 2 The Houphouet Boigny National Polytechnic Institute, Cote d'Ivoire | Full Text |
152 | 13 | 6 | Actionable Pattern Discovery for Emotion Detection in Big Data in Education and Business | Angelina Tzacheva 1 and Sanchari Chatterjee 2, 1West Cliff University, USA , 2University of North Carolina at Charlotte, USA | Full Text |
International Journal on Integrating Technology in Education (IJITE)
International Journal on Integrating Technology in Education (IJITE)
International Journal of Computer Networks & Communications (IJCNC)
162 | 16 | 1 | Secure Supervised Learning-Based Smart Home Authentication Framework | K. Swapna Sudha1, N. Jeyanthi1, and Celestine Iwendi2, 1Vellore Institute of Technology, India 2University of Bolton, UK | Full Text |
163 | 16 | 1 | Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion Detection | Trong Thua Huynh, Hoang Thanh Nguyen, Posts and Telecommunications Institute of Technology, Vietnam | Full Text |
164 | 16 | 1 | Q-Learning Model for Blockchain Security in Internet of Medical Things Networks | Kanneboina Ashok and Gopikrishnan S, VIT-AP University, India | Full Text |
165 | 16 | 1 | Feature Selection using the Concept of Peafowl Mating in IDS | Partha Ghosh, Joy Sharma and Nilesh Pandey, Netaji Subhash Engineering College, India | Full Text |
166 | 16 | 1 | Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System | Mohamed Khalaf1, Ahmed Fawzi1 and Ahmed Yahya2, 1Modern Academy for Engineering and Technology, Maadi, Egypt, 2Al-Azhar University, Cairo, Egypt | Full Text |
167 | 16 | 1 | Comparative Study of Orchestration using gRPC API and REST API in Server Creation Time: An Openstack Case | Hari Krishna S M and Rinki Sharma, M. S. Ramaiah University of Applied Sciences, India | Full Text |
168 | 16 | 1 | Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocation in Fog-Cloud Environments | Ahmed A. A. Gad-Elrab1,2, Almohammady S. Alsharkawy1, Mahmoud E. Embabi1, Ahmed Sobhi1,3, Farouk A. Emara1, 1Al-Azhar University, Cairo, Egypt, 2King Abdulaziz University, Jeddah, Saudi Arabia, 3AlRyada University for Science and Technology (RST), Egypt | Full Text |
169 | 16 | 1 | Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimized Link State Routing-Based for VANET | Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia | Full Text |
170 | 16 | 2 | Enhancing Traffic Routing Inside a Network through IoT Technology & Network Clustering by Selecting Smart Leader Nodes | Radwan S.Abujassar, Arab Open University Kuwait, Kuwait | Full Text |
171 | 16 | 2 | IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered Feature Selection with ML Model for IoT Threats & Attack Detection | J. I. Christy Eunaicy1, C. Jayapratha2 and H.Salome Hemachitra3, 1Thiagarajar College, India, 2Karpaga Vinayaga College of Engineering and Technology, India, 3Sri Meenakshi Government College of Arts for Women, India | Full Text |
172 | 16 | 2 | High Performance NMF based Intrusion Detection System for Big Data IoT Traffic | Abderezak Touzene, Ahmed Al Farsi and Nasser Al Zeidi, Sultan Qaboos University, Oman | Full Text |
173 | 16 | 2 | DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection | P Sumalatha and G.S. Mahalakshmi, Anna University, India | Full Text |
174 | 16 | 2 | Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems | Ali Muayed Fadhil1,2, Norashidah Md Din1, Norazizah Binti Mohd Aripin1 and Ali Ahmed Abed2, 1University Tenaga Nasional, Malaysia, 2University of Basrah, Iraq | Full Text |
175 | 16 | 2 | Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment | Stanley Mlato1,Yesaya Gabriel1, Prince Chirwa1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea | Full Text |
176 | 16 | 2 | A Topology Control Algorithm Taking into Account Energy and Quality of Transmission for Software-Defined Wireless Sensor Network | Hong Thi Chu Hai1, Le Huu Binh2 and Le Duc Huy3, 1Banking Academy of Vietnam, Vietnam, 2Hue University, Vietnam, 3Ha Noi University of Business and Technology, Vietnam | Full Text |
177 | 16 | 2 | A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks | Nabila Azdad and Mohamed Elboukhari, Mohammed First University, Morocco | Full Text |
178 | 16 | 3 | Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol | Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia | Full Text |
179 | 16 | 3 | Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post-Disaster Scenario | Junhyung Kim, Yeungnam University College, Korea | Full Text |
180 | 16 | 3 | Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Based Investigation using IFOG-Simulator | Alzahraa Elsayed, Khalil Mohamed and Hany Harb, Al Azhar University, Egypt | Full Text |
181 | 16 | 3 | An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation | Amina Darghouthi1, Abdelhakim Khlifi2, Hmaied Shaiek3, Fatma Ben Salah1 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2Sup’COM, University of Carthage, Tunisia, 3CEDRIC/LAETITIA Laboratory, France | Full Text |
182 | 16 | 3 | Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis | Asmaa BENCHAMA and Khalid ZEBBARA, Ibn zohr University, Morocco | Full Text |
183 | 16 | 3 | Analysis and Evolution of SHA-1 Algorithm - Analytical Technique | Malek M. Al-Nawashi, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein and Monther H. Al-Bsool Al-Balqa Applied University, Jordan | Full Text |
184 | 16 | 3 | EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection for WSN-Assisted IoT | Darshan B D and Prashanth C R, S J B Institute of Technology, India | Full Text |
185 | 16 | 3 | Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Service | Dongju Lee1 and Hyunsung Kim1,2, 1Kyungil University, Korea, 2University of Malawi, Malawi | Full Text |
186 | 16 | 4 | Enhancing IoT Security: A Novel Approach with Federated Learning and Differential Privacy Integration | Aziz Ullah Karimy and P. Chandrasekhar Reddy, Jawaharlal Nehru Technological University, India | Full Text |
187 | 16 | 4 | Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to Mitre ATT&CK Mitigation Strategy | Ihab Mohamed, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt | Full Text |
188 | 16 | 4 | Enhancing IoT Routing Security and Efficiency: Towards AI-Enabled RPL Protocol | Abubakar Wakili and Sara Bakkali, Euromed University of Fez (UEMF), Morocco | Full Text |
199 | 16 | 4 | Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques | Surasit Songma, Watcharakorn Netharn and Siriluck Lorpunmanee, Suan Dusit University, Thailand | Full Text |
200 | 16 | 4 | An Anti-Jamming Technique by Jammer Localization for Multi-Channel Wireless Sensor Networks | Maoyejatun Hasana1 and Hossen Asiful Mustafa2, 1Asian University of Bangladesh, Bangladesh, 2Bangladesh University of Engineering and Technology (BUET), Bangladesh | Full Text |
201 | 16 | 4 | Real Time Parameter Estimation for Adaptive OFDM/OTFS Selection | Amina Darghouthi1, Abdelhakim Khlifi2 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2University of Carthage, Tunisia | Full Text |
202 | 16 | 4 | Modified Route Request Broadcasting for Improving Multipath Routing Scheme Performance in MANET | Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India | Full Text |
203 | 16 | 4 | IRLR: an Improved Reinforcement Learning-Based Routing Algorithm for Wireless Mesh Networks | Le Huu Binh1, Tu T. Vo1 and Le Duc Huy2, 1Hue University, Vietnam, 2Ha Noi University of Business and Technology, Vietnam | Full Text |
204 | 16 | 5 | Intelligent Efficient Routing and Localization in the Underwater Wireless Sensor Network to Improve Network Lifetime | Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India | Full Text |
205 | 16 | 5 | Radio Frequency Interference Detection and Automatic Modulation Recognition Based on Mask RCNN | Noureddine El-haryqy, Zhour Madini and Younes Zouine, IbnTofail University, Morocco | Full Text |
206 | 16 | 5 | Beacon-Based Uplink Transmission for LoRaWAN Direct to LEO Satellite Internet of Things | Mohammad Al mojamed, UMM Al-QURA University, Saudi Arabia | Full Text |
207 | 16 | 5 | Evaluating the Impact of Convolutional Neural Network Layer Depth on the Enhancement of Inertial Navigation System Solutions | Mohammed AFTATAH and Khalid ZEBBARA, Ibn Zohr University, Morocco | Full Text |
208 | 16 | 5 | Evaluating the Impact of Mid-Link Bandwidth Constraints on Video Streaming Performance Using NS2 | Zahraa Khazal Rashad, University of Valladolid, Spain | Full Text |
209 | 16 | 5 | ENIAO: Energy Aware Faulty Node Re-Placement Integrated With Duty Cycling and Improved Harmony Search Based Clustering through Adaptive Fish School Search Routing for WSN Optimization | RM.Alamelu1, J.Naveen Ananda Kumar2, C.Jayapratha3 and Govindaprabhu GB4, 1Sri sarada Niketan College for Women, India, 2Tekinvaderz LLC, USA, 3Karpaga Vinayaga College of Engineering & Technology, India, 4Madurai Kamaraj University (MKU), India | Full Text |
210 | 16 | 5 | Adaptive Hybrid Deep Learning Based Effective Channel Estimation in MIMO-Noma for Millimeter-Wave Systems with an Enhanced Optimization Algorithm | Belcy D Mathews and Tamilarasi Muthu, Puducherry Technological University, India | Full Text |
211 | 16 | 5 | A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection Algorithm in Mobile Ad Hoc etworks Algorithm | Ayoub Abdellaoui, Jamal Elmhamdi, Es-Sadek Mohamed Zeriab and Mohammed Bekkali, Mohammed V University, Morocco | Full Text |
212 | 16 | 6 | A Comparative Study of Cooperative and Non-Cooperative Wideband Spectrum Sensing in Cognitive Radio Networks for 5g Applications | Blessing C. Dike, Cajetan M. Akujuobi and Shumon Alam, A&M University Prairie, USA | Full Text |
213 | 16 | 6 | Outstanding Framework for Simulating and Generating Anchor Trajectory in Wireless Sensor Networks | Abdelhady Naguib1, 2, 1Jouf University, Saudi Arabia, 2Al-Azhar University, Egypt | Full Text |
214 | 16 | 6 | Prioritized Scheduling Routing Protocol for Minimizing Packet Drop in Wireless Body Area Network | Md. Taslim Arefin1, 2 and Md Abul Kalam Azad1, 1Jahangirnagar University, Bangladesh, 2Daffodil International University, Bangladesh | Full Text |
215 | 16 | 6 | Fuzzy-Based Clustering of Wireless Sensor Networks for Multiple Mobile Agent Itinerary Planning | Nidhi Kashyap1, Shuchita Upadhyaya1, Monika Poriye1 and Sachin Lalar2, 1Kurukshetra University, India, Gurugram University Gurugram, India | Full Text |
216 | 16 | 6 | Intrusion Detection Model using Machine Learning Algorithms on NSL-KDD Dataset | Reem Alshamy and Muhammet Ali Akcayol, Gazi University, Turkey | Full Text |
217 | 16 | 6 | Routing Performances in Wireless Sensor Networks: Determining Shortest Path Algorithms Effectiveness | Khine Thazin Min1 and N. Jeyanthi2, 1Myanmar Institute of Information Technology, Myanmar, 2Vellore Institute of Technology, India | Full Text |
218 | 16 | 6 | An Innovative Hybrid Model for Effective DDOS Attack Detection in Software Defined Networks | Quang Truong Can, Tien Dat Nguyen, Minh Bao Pham, Thanh Tung Nguyen, Thi Hanh AnTran and Thi Thai Mai Dinh, VNU University of Engineering and Technology, Viet Nam | Full Text |
219 | 16 | 6 | Modeling Low-Cost Inertial Navigation Systems and their Errors | Mohammed AFTATAH, Khalid ZEBBARA and Soufiane EL ASRI, Ibn Zohr University, Morocco | Full Text |
International Journal of Wireless & Mobile Networks (IJWMN)
220 | 16 | 1/2 | Implementing Machine Learning Algorithms for Predictive Network Maintenance in 5G and Beyond Networks | Yamini Kannan and Dharika Kapil, New York University, USA | Full Text |
221 | 16 | 1/2 | The Need of Trustworthy Announcements to Achieve Driving Comfort | TRezvi Shahariar1 and Chris Phillips2, 1University of Dhaka, Bangladesh, 2Queen Mary University of London, England | Full Text |
222 | 16 | 3 | Modified O-RAN 5G Edge Reference Architecture using RNN | M.V.S Phani Narasimham1 and Y.V.S Sai Pragathi2, 1Wipro Technologies, India, 2Stanley College of Engineering & Technology for Women (Autonomous), India | Full Text |
223 | 16 | 3 | Intelligent Cognitive Engine for 5G Network Quality of Service Management | Ifeanyi Stanly Nwokoro1, Muhammad Qaim Aliyu Sambo2, Ifeanyi Friday Eze3, Sanusi Yusuf Ahmed4, Timothy Ola Akinfenwa5, Zacciah Kwaku Adom-Oduro6, Osakpamwan George Oshodin7, Julius Tunji Okesola8, Nwatu Augustina Nebechi9, 1Rhema University, Nigeria, 2Five Stars ICT Ltd, Nigeria, 3First Bank, Nigeria, 4Bank of Industry, Nigeria, 5Osun State University, Nigeria, 6University of Professional Studies Accra, Ghana, 7Addbeams Nigeria Ltd, Nigeria, 8First Tech University, Nigeria, 9Alex Ekwueme Federal University Ndufu-Alike Ebonyi State, Nigeria | Full Text |
224 | 16 | 4/5 | Potential use of IoT Distance Measurement Tool in Boule Sports | Wahidah Md Shah1, M Azim. Adnan1, Aslinda Hassan1, Norharyati Harum1 and Isredza Rahmi A. Hamid2, 1Universiti Teknikal Malaysia Melaka (UTeM), Malaysia, 2Universiti Tun Hussein Onn, Malaysia | Full Text |
225 | 16 | 4/5 | Comprehensive Performance Testing Analysis and Security Vulnerability Detection of a 5G Stand Alone Network using a Firecell Testbed | Ndidi Anyakora, Cajetan M. Akujuobi, and Mohamed F. Chouikka, Prairie View A &M University, USA | Full Text |
226 | 16 | 4/5 | Machine Learning for Early Detection of Rare Genetic Disorders using Multi-Omics Data | Nishant Gadde, Avaneesh Mohapatra, Rishi Kanaparti, Siddhardh Manukonda, Jashan Chahal and Jeffrey Au, USA | Full Text |
227 | 16 | 6 | Two-factor Authentication Smart Entryway using Modified LBPH Algorithm | Zakiah Ayop 1, Wan Mohamad Hariz Bin Wan Mohamad Rosdi 2, Looi Wei Hua 3, Syarulnaziah Anawar 1 Nur Fadzilah Othman 1, 1 Universiti Teknikal Malaysia Melaka, Malaysia, 2 ASK Pentest Sdn. Bhd., Malaysia, 3 V6 Technology Sdn Bhd, Malaysia | Full Text |
228 | 16 | 6 | Clustering based on Hybridization of Genetic Algorithm and Improved K-Means (GA-IKM) in an IoT Network | Moez Elarfaoui and Nadia Ben Azzouna, University of Tunis, Tunisia | Full Text |
229 | 16 | 6 | The Mediating Effect of Behavioral Intention in the Relationship between Social Influence and Wireless Technology Usage | Kyambadde Abdunool, Mwase Ali, Ssebanenya Muhammad and Saunders Warda, Makerere University Business School, Uganda | Full Text |
230 | 16 | 6 | A Monte-Carlo Analysis between a Microscopic Model and a Mesoscopic Model for Vehicular Ad-Hoc Networks | Aslinda Hassan 1, Wahidah Md. Shah 1 and Mohammed Saad Talib 2, 1 Universiti Teknikal Malaysia Melaka, Malaysia 2 University of Babylon, Iraq | Full Text |
231 | 16 | 6 | Network-centric Optimal Hybrid Sensing Hole Recovery and Self- Healing in IPV6 WSNs | Kwadwo Asante 1, Yaw Marfo Missah 2, Frimpong Twum 2 and Michael Asante 2, 1 AA-MUSTED, Ghana, 2 KNUST, Ghana | Full Text |
International Journal of Distributed and Parallel systems (IJDPS)
232 | 15 | 1 | A Scalable Monitoring System for Software Defined Networks | Mahmoud Eissa, Ahmed Yahya and Usama Gad, Al-Azhar University, Egypt | Full Text |
233 | 15 | 2/3/4/5/6 | Wireless Communication Security and It’s Protection Methods | Nikitha Merilena Jonnada, University of the Cumberlands, USA | Full Text |
International Journal on AdHoc Networking Systems (IJANS)
234 | 14 | 1 | Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A Comprehensive Review | Md Khaledur Rahman, Faysal Amin Tanvir, Md Saiful Islam, Md Shameem Ahsan and Manam Ahmed, Lamar University, USA | Full Text |
235 | 14 | 1 | Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison | Mutia Afroze Alin and Md. Delowar Hossain, Begum Rokeya University, Bangladesh | Full Text |
236 | 14 | 2/3 | Sowing the Seeds of Precision: Innovations in Wireless Sensor Networks for Agricultural Environmental Monitoring | Sreedeep Dey and Sreejita Das, Vijaygarh Jyotish Ray College, India | Full Text |
International Journal of Data Mining & Knowledge Management Process ( IJDKP )
237 | 14 | 1/2 | Proactive Wildfire Detection and Management using AI, ML, and 5G Technology in the United States | Okoro C. Stanley, Lopez Alexander and Unuriode O. Austine, Austin Peay State University, USA | Full Text |
238 | 14 | 1/2 | Discovery of Actionable Patterns Through Scalable Vertical Data Split Method with Meta Actions and Information Granules | Angelina A. Tzacheva1, Sanchari Chatterjee2 and Zbigniew W. Ras2, 1West Cliff University, USA, 2University of North Carolina at Charlotte, USA | Full Text |
239 | 14 | 3/4/5/6 | The Role of Machine Learning in Enhancing Personalized Online Learning Experiences | Anilkumar Jangili1 and Sivakumar Ramakrishnan2, 1Statistical Programming and Research & Development, USA 2Statistical Programming, Innovation & AI, USA | Full Text |
International Journal of Multimedia & Its Applications (IJMA)
240 | 16 | 1 | The Effect of Campus News Video Library on Secondary Vocational School Students’ Sense of Responsibility and Self-Awareness Ability | BaiQiao Zhu1 and Kien Tsong Chau2, 1China, 2Universiti Sains Malaysia, Malaysia | Full Text |
241 | 16 | 2 | Metaloguing: The New Paradigms of Storytelling in the Age of Digital Media | Yesol Seo, Hankuk University of Foreign Studies, Korea | Full Text |
242 | 16 | 3 | Impact of an Enhanced Adaptive Microlearning System on Learning Achievement and Adaptability in On-the-Job Adults | Bo Zhu, Kien Tsong Chau, and Nur Azlina Mohamed Mokmin, Universiti Sains Malaysia, Malaysia | Full Text |
243 | 16 | 3 | Utilizing Hedonic-Motivation System Acceptance Model (HMASM) in Developing a Keris Virtual Reality Game | Muhammad Waiz Hasyimi Muhammad Hidzer and Maizatul Hayati Mohamad Yatim, Sultan Idris Education University, Malaysia | Full Text |
244 | 16 | 4 | Empowering Collaborative Learning: Innovative Integration of Real-Time Communication Into Hololens-Based Learning System | Jiajia Guo, Kien Tsong Chau and Siti Nazleen Abdul Rabu, Universiti Sains Malaysia, Malaysia | Full Text |
245 | 16 | 4 | A Preliminary Concept on Cybersecurity Skill Training Framework for a Capture-the-Flag Game using 5-Step Gamification Approach | Khoo Li Jing1,2, Maizatu1 Hayati Mohamad Yatim2 and Wong Yoke Seng2, 1University of Wollongong Malaysia, Malaysia, 2Sultan Idris Education University, Malaysia | Full Text |
246 | 16 | 5 | Incorporating Cross-Cultural Design into the User Interface | Bahareh Nejati1, Ravi Teja Manchi2 and Damian Schofield3, 1Virginia Polytechnic Institute and State University, USA 2Motorola Solutions, USA, 3State University of New York, USA | Full Text |
247 | 16 | 5 | Enhancing Engagement in Learning Management Systems using Gamification Framework | Maizan Mat Amin, Syadiah Nor Wan Shamsuddin and Wan Mohd Amir Fazamin Wan Hamzah, Universiti Sultan Zainal Abidin, Malaysia | Full Text |
248 | 16 | 6 | Analyzing Performance Patterns and User Experience in Online Cybersecurity Challenges: Insights from SKRCTF | Khoo Li Jing 1,2, Maizatul Hayati Mohamad Yatim 1, and Wong Yoke Seng 1, 1 Sultan Idris Education University, Malaysia 2 University of Wollongong Malaysia, Malaysia | Full Text |
International Journal of Computer Graphics & Animation (IJCGA)
249 | 14 | 1/2/3/4 | The Evolution of Volumetric Video: A Survey of Smart Transcoding and Compression Approaches | Preetish Kakkar1 and Hariharan Ragothaman2, 1Adobe, USA, 2Athena Health, USA | Full Text |
International Journal of Artificial Intelligence & Applications (IJAIA)
251 | 15 | 1 | A Comprehensive Systematic Review for Cardiovascular Disease using Machine Learning Techniques | Islam D. S. Aabdalla and D.Vasumathi, JNTUH University, India | Full Text |
252 | 15 | 1 | Imbalanced Dataset Effect on CNN-Based Classifier Performance for Face Recognition | Miftah Asharaf Najeeb and Alhaam Alariyibi, University of Benghazi, Libya | Full Text |
253 | 15 | 1 | Ensemble Learning Approach for Digital Communication Modulation’s Classification | Yahya Benremdane, Said Jamal, Oumaima Taheri, Jawad Lakziz and Said Ouaskit, University Hassan II, Morocco | Full Text |
254 | 15 | 1 | Review of AI Maturity Models in Automotive SME Manufacturing | Dharmender Salian, University of the Cumberlands, USA | Full Text |
255 | 15 | 1 | Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture | Shahriyar Guliyev, Nakhchivan State University, Azerbaijan | Full Text |
256 | 15 | 1 | Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and Neural Network Algorithms | Said Jamal, Jawad Lakziz, Yahya Benremdane and Said Ouaskit, University Hassan II, Morocco | Full Text |
257 | 15 | 1 | Wavelet Scattering Transform for ECG Cardiovascular Disease Classification | Islam D.S. Aabdalla and D.Vasumathi, JNTUH University, India | Full Text |
258 | 15 | 1 | A Machine Learning Ensemble Model for the Detection of Cyberbullying | Abulkarim Faraj Alqahtanil,2 and Mohammad Ilyas1, lFlorida Atlantic University, USA, 2King Khalid Military Academy, Saudi Arabia | Full Text |
259 | 15 | 1 | An Improved mT5 Model for Chinese Text Summary Generation | Fuping Ren2, Jian Chenl, and Defu Zhangl, lXiamen University, China, 2Shenzhen Comtech Technology Co. Ltd, China | Full Text |
260 | 15 | 2 | The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing Risks and Benefits Through Practical Solutions and Use Cases | Richard Fultonl, Diane Fulton2, Nate Hayes3 and Susan Kaplan3, lTroy University, USA, 2Clayton State University USA, 3Modal Technology, USA | Full Text |
261 | 15 | 2 | Employee Attrition Prediction using Machine Learning Models: A Review Paper | Haya Alqahtani, Hana Almagrabi and Amal Alharbi, King Abdulaziz University, Kingdom of Saudi Arabia | Full Text |
262 | 15 | 2 | Research on Fuzzy C- Clustering Recursive Genetic Algorithm based on Cloud Computing Bayes Function | Wang Xu1 and Huang Wei Qiang2, 1Neusoft Institute, China, 2South China Normal University, China | Full Text |
263 | 15 | 2 | Information Extraction from Product Labels: A Machine Vision Approach | Hansi Seitaj and Vinayak Elangovan, Pennsylvania State University, USA | Full Text |
264 | 15 | 2 | Immunizing Image Classifiers Against Localized Adversary Attacks | Henok Ghebrechristos and Gita Alaghband, University of Colorado-Denver, Colorado | Full Text |
265 | 15 | 3 | Deep Learning for Smart Grid Intrusion Detection: A Hybrid CNN-LSTM-Based Model | Abdulhakim Alsaiari and Mohammad Ilyas, Florida Atlantic University, USA | Full Text |
266 | 15 | 3 | PhotoQR: A Novel ID Card with an Encoded View | Livio Tenze and Enrique Canessa, The Abdus Salam International Center for Theoretical Physics, Italy | Full Text |
267 | 15 | 3 | Is Prompt Engineering a Profession? | Zişan Cihangir IŞIN1, Hilal FIDAN1, Beyşan Tarık IŞIN2, Erşan IŞIN3, and Tamer IŞIN4, 1ZEB Innovation, Turkey 2IMED Surgical Teknoloji, Turkey, 3IŞIN Yazılım ve Teknoloji, Turkey, 4IMED Surgical LLC, USA | Full Text |
268 | 15 | 3 | Systematic Review of Models Usedto Handle Class Imbalance in Anomaly Detection for Energy Consumption | David Kaimenyi Marangu, Stephen ThiiruNjenga and Rachael Njeri Ndung’u, Murang’a University of Technology, Kenya | Full Text |
269 | 15 | 3 | Classifying Emergency Patients into Fast-Track and Complex Cases using Machine Learning | Ala’ Karajeh and Rasit Eskicioglu, University of Manitoba, Canada | Full Text |
270 | 15 | 4 | Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment Through Feature Engineering and Employing an Ensemble Technique | Abdulelah Al Hanif and Mohammad Ilyas, Florida Atlantic University, USA | Full Text |
271 | 15 | 4 | Exploring AI Applications for Addressing Alternative Conceptions in Teaching Physics: Focus on Electrical Circuits at the Secondary Level | Gabriel Dias De Carvalho Junior1 and Ivan Targino Ponciano Filho2, 1University of Namur & Catholic University of Louvain, Belgium, 2University Vale do Sapucaí, Brazil | Full Text |
272 | 15 | 4 | Comparing LLMs using a Unified Performance Ranking System | Maikel Leon, University of Miami, USA | Full Text |
273 | 15 | 4 | Leveraging Naive Bayes for Enhanced Survival Analysis in Breast Cancer | Muhammad Garba, Muhammad Abdurrahman Usman and Anas Muhammad Gulumbe, Kebbi State University of Science & Technology, Nigeria | Full Text |
274 | 15 | 5 | Artificial Intelligence Approaches for Predicting Diabetes in Egypt | Ayah H. Elsheikh1, Hossam A. Ghazi2 and Nancy Awadallah Awad3, 1Sadat academy for Management Sciences, Egypt 2Mansoura University, Egypt, 3Sadat Academy for Management Sciences, Egypt | Full Text |
275 | 15 | 5 | AutoEncoder Convolutional Neural Network for Pneumonia Detection | Michael Nosa-Omoruyi and Linda U. Oghenekaro, University of Port Harcourt, Nigeria | Full Text |
276 | 15 | 5 | Revolutionizing Land Cover Analysis: A Systematic Review of Geospatial Intelligence with Classification and Segmentation | Vinothkumar Kolluru1, Sudeep Mungara2, Advaitha Naidu Chintakunta3, Lokesh Kolluru4, Charan Sundar Telaganeni5, 1Senior Data Scientist, USA, 2Data Scientist, USA, 3Software Development Engineer, USA 4Transportation Engineer, USA, 5Python Developer, USA | Full Text |
277 | 15 | 5 | Transformer-Based Regression Models for Assessing Reading Passage Complexity: A Deep Learning Approach in Natural Language Processing | Harmanpreet Sidhu and Amr Abdel-Dayem, Laurentian University, Canada | Full Text |
278 | 15 | 5 | A Multifaceted AI-Driven Radio Network | George Sturm, Radio Logos, Albania | Full Text |
279 | 15 | 5 | Quantum Computing and the Implications on Online Security | Nishant Gadde1, Avaneesh Mohapatra2, Navnit Vijay3, Siddhardh Manukonda1, Daiwik Shashikanth4 1Jordan High School, USA, 2West Forsyth High School, USA, 3Acellus Private Academy, USA, 4South Forsyth High School, USA | Full Text |
280 | 15 | 5 | Neuro-Adaptive AI for Dynamic Distraction Mitigation in Autonomous Vehicle Environments | Vivek Ghulaxe, Publix Technology, USA | Full Text |
281 | 15 | 6 | Empowering Cloud-native Security: the Transformative Role of Artificial Intelligence | Bhanu Prakash Manjappasetty Masagali1 and Mandar Nayak2 1Leading Long Term Care Insurance Provider in USA, 2Leading Healthcare Insurance Provider in USA | Full Text |
282 | 15 | 6 | A Comparative Analysis of Class Imbalance Handling Techniques for Deep Models in the Detection of Anomalies in Energy Consumption | David Kaimenyi Marangu, Stephen Thiiru Njenga and Rachael Njeri Ndung’u Murang’a University of Technology, Kenya | Full Text |
283 | 15 | 6 | The Role of Internet of Things and Fog Computing in Smart Cities | Houda ERREGUI1, Achraf EL AOUAQI2, Hicham ABERBACH2 and Abdelouahed SABRI2 1University of Education Sciences, Morocco, 2University of Sidi Mohamed Ben Abdellah, Morocco | Full Text |
284 | 15 | 6 | AI for IOMT Security: a Survey of Intrusion Detection Systems, Architectures, Attacks and Challenges | Ghaida Balhareth, Mohammad Ilyas , and Basmh Alkanjar, Florida Atlantic University, USA | Full Text |
International Journal of Fuzzy Logic Systems (IJFLS)
285 | 14 | 1 | Enhancing Everyday Interactions: The Future of Ambient Intelligence | Partha Sarathi Samal, USA | Full Text |
International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)
286 | 13 | 1 | AI in Test Automation: Overcoming Challenges, Embracing Imperatives | Rohit Khankhoje, Independent Researcher, USA | Full Text |
287 | 13 | 1 | Early Detection of Parkinson Disease through Biomedical Speech and Voice Analysis |
Pawan Kumar Badhan1, 2 and Manjeet Kaur1, 1Pyramid College of Business And Technology, India, 2Australian Computer Society, Australia |
Full Text |
288 | 13 | 2 | A Comprehensive Guide to Testing AI Application Metrics | Chintamani Bagwe and Kinil Doshi, Citibank, USA | Full Text |
289 | 13 | 2 | Optimisation of Logistic Operations using AI | Semen Levin, Tomsk State University of Control Systems and Radio Electronics, Russia |
Full Text |
290 | 13 | 2 | Elements of Legislation for Artificial Intelligence Systems | Anna Romanova, Moscow Institute of Physics and Technology (National Research University), Russia | Full Text |
291 | 13 | 2 | Harnessing Artificial Intelligence and Blockchain Technology to Enhance Team Productivity | Shrikarnag Bangalore Prahallada, Ranjitha Sridhar Rao, Lohith Dayananda Ram, Shrivatsa Bangalore Prahallada and Deepashree Abhaya, Tymeline Inc, USA | Full Text |
292 | 13 | 3/4 | Fuzzy Logic-Driven Natural Language Processing in Pharma Supply Chain Analytics | Abhik Choudhury, IBM Corporation, USA | Full Text |
Machine Learning and Applications: An International Journal (MLAIJ)
Signal & Image Processing: An International Journal (SIPIJ)
301 | 15 | 1/2 | PSO-HRVSO: Segmentation of Retinal Vessels Through Homomorphic Filtering Enhanced by PSO Optimization | Niladri Halder1, Dibyendu Roy2, Partha Pratim Sarkar2, Sankar Narayan Patra1, Subhankar Bandyopadhyay1, 1Jadavpur University, India, 2Burdwan University, India | Full Text |
302 | 15 | 3 | PExploring Deep Learning Models for Image Recognition: A Comparative Review | Siddhartha Nuthakki1, Sai Kalyana pranitha buddiga2 and Sonika Koganti3, 1First Object Inc, USA 2Independent Researcher, USA, 3Software Engineer, USA | Full Text |
303 | 15 | 4 | A Prony Method Variant which Surpasses the Adaptive LMS Filter in the Precision of the Output Signal’s Representation of the Input | Parthasarathy Srinivasan, Bee Hive Software Solutions, USA | Full Text |
304 | 15 | 5/6 | The X-ray Euclidean Synthetic Image | Halah Ahmad AbdAlmeneem, Jazan University, Saudi Arabia | Full Text |
International Journal on Soft Computing (IJSC)
305 | 15 | 1/2 | Enhancing Software Supply Chain Resilience: Strategy for Mitigating Software Supply Chain Security Risks and Ensuring Security Continuity in Development Lifecycle | Akinsola Ahmed and Akinde Abdullah, Austin Peay State University, USA | Full Text |
306 | 15 | 3 | Evaluating Racial Bias in Large Language Models: The Necessity for “SMOKY” | Janga Bussaja, Independent Researcher, USA | Full Text |
307 | 15 | 3 | Fuzzy Cognitive Maps Bridging Transparency and Performance in Hybrid AI Systems | Maikel Leon, University of Miami, USA | Full Text |
308 | 15 | 3 | The Optimization of Weight Functions of R3,1 Space Time by the Echo State Network | Sadataka Furui1 and Serge Dos Santos2, 1Teikyo University, Japan, 2Universite de Tours, France | Full Text |