×
keyboard_arrow_up

Computer Science & Information Technology

S.No Volume Issue Paper Title Authors

International Journal of Computer Science & Information Technology (IJCSIT)

1 16 1 Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile Application Infrastructure Security Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA Full Text
2 16 1 Image Segmentation and Classification using Neural Network Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh Full Text
3 16 1 From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA Full Text
4 16 1 A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA Full Text
5 16 1 Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using Machine Learning Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA Full Text
6 16 2 Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks Saurabh Mishra1, Rakesh Ranjan1, Sonika Singh2 and Gagan Singh2, 1Sushant University, Inida, 2DIT University, India Full Text
7 16 2 The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States Omolola F. Hassan1, Oluwadare O. Aderibigbe1, Oghenekome P. Efijemue1 and Tolulope D. Onasanya2, 1Austin Peay State University, USA, 2North Carolina Agricultural and Technical State University, USA Full Text
8 16 2 Big Data and Machine Learning in Defence Yijie Weng1 and Jianhao Wu2, 1University of Maryland, USA, 2Cornell University, USA Full Text
9 16 2 AI-Based Home Security System Syeda Lamima Farhat, Likhitha Tubati, Metrine Osiemo and Rushit Dave, Minnesota State University, USA Full Text
10 16 3 The Impact of Blockchain Technology on the Financial Services Industry Kinil Doshi, Citibank, USA Full Text
11 16 3 Streamlining Compliance and Risk Management with RegTech Solutions Chintamani Bagwe, Citibank, USA Full Text
12 16 3 A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis Al-Mahmud and Kazutaka Shimada, Kyushu Institute of Technology, Japan Full Text
13 16 3 The Energy Storage Operation Under Stochastic Renewable Generation Tony Tsang and Chung Kwok Leung, Hong Kong College of Technology, Hong Kong Full Text
14 16 3 Psychological and Graphic Aspects of Colors: Influence and Application in Product Design Filip Popovski1, Hristina Dimova Popovska1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1University St. Klement of Ohrid, Macedonia, 2Internacional Slavic University, Macedonia Full Text
15 16 3 Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights Sanjay Moolchandani, Citibank N.A., USA Full Text
16 16 3 Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans Rezaul Karim1,2, Md. Badiuzzaman Biplob1 and Mohammad Shamsul Arefin1, 1Chittagong University of Engineering and Technology, Bangladesh, 2University of Chittagong, Bangladesh Full Text
17 16 3 Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications Priyank Singh, Tanvi Hungund and Shobhit Kukreti, Rochester Institute of Technology, US Full Text
18 16 3 Player Strategy Modeling in Classic Roleplaying Game Battle Environments Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA Full Text
19 16 3 Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and Future Prospects Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Emmanuel Hinneha and Samuel Attakorah, Carolina University, USA Full Text
20 16 4 Non-Deterministic and Risk Based Security Services Srinivas Rao Doddi1 and Akshay Krishna Kotamraju2, 1University of Los Angeles, USA, 2Founder Non-profit, USA Full Text
21 16 4 Database Security Compliance with Anti-Money Laundering Status Opeyemi Ayanbanjo, New England College, Boston Full Text
22 16 4 AI Strategy Formulation Across Various Game Genres - A Literature Review Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA Full Text
23 16 4 Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems Rashid Alakbarov and Mammad Hashimov, Institute of Information Technology, Azerbaijan Full Text
24 16 4 Exploring White Fragility in Large Language Models Janga Bussaja, Independent Researcher, USA Full Text
25 16 4 A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods Han-Chen Huang, Chung Hua University, Taiwan Full Text
26 16 4 The Role of Cloud Providers in IoT Services Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University St. Klement of Ohrid, Macedonia Full Text
27 16 4 FIX Protocol: The Backbone of Financial Trading Swapnil Kognole, UBS, USA Full Text
28 16 4 Shadowed AHP for Multi-Criteria Supplier Selection Mohamed Abdel Hameed El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt Full Text
29 16 4 Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional Responses, and Satisfaction Han-Chen Huang, Chung Hua University, Taiwan Full Text
30 16 5 Baoulé Related Parallel Corpora for Machine Translation Tasks: Mtbci-1.0 Kouassi Konan Jean-Claude, Bircham International University, Spain Full Text
31 16 5 A Neural Network Approach to Understanding Employee Retention Dynamics: Insights from Feature Importance Analysis Han-Chen Huang, Chung Hua University, Taiwan Full Text
32 16 5 Enhancing Organizational Efficiency of the Lantern Festival in Penghu, Taiwan Through Information Technology: Key Factors Analysis Shih-Ping Chang and Han-Chen Huang, Chung Hua University, Taiwan Full Text
33 16 5 Evaluating the Effect of Human Activity on Air Quality using Bayesian Networks and IDW Interpolation Hema Durairaj1 and L Priya Dharshini2, 1Publicis Sapient Pvt. Ltd., India, 2Lady Doak College, India Full Text
34 16 5 Resources Price Adjustment in Cloud Computing for Load Balancing and Fairness Between Users and Suppliers Lilia Chourou Gherir1, Ahmed Elleuch2 and Mohamed Jemni1, 1University of Tunis, Tunisia, 2University of Manouba, Tunisia Full Text
35 16 5 Exploring the Selection and Training of Tour Leaders: An Evaluation Model Based on the Analytic Hierarchy Process Yuang-Liang Sun and Han-Chen Huang, Chung Hua University, Taiwan Full Text
36 16 5 Analysis of Key Factors Influencing Penghu Tourism Development using the Delphi Method and AHP Pao-TsaiKuo and Han-Chen Huang, Chung Hua University, Taiwan Full Text
37 16 5 Malware Detection and Classification using Generative Adversarial Network Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh, Shri Prakash Dwivedi and Paras, G. B. Pant University of Agriculture and Technology, India Full Text
38 16 5 Utilizing Analytic Network Process for Evaluating Event Management Companies: A Case Study in Celebration Activities Han-Chen Huang, Chung Hua University, Taiwan Full Text
39 16 5 AI-Driven Threat Intelligence: Transforming Cybersecurity for Proactive Risk Management in Critical Sectors SA Mohaiminul Islam1, MD Shadikul Bari1, Ankur Sarkar1, A J M Obaidur Rahman Khan2 and Rakesh Paul1, 1Washington University Of Science & Technology (WUST), USA, 2Independent University (WUST), Bangladesh Full Text
40 16 6 Attention Mechanism for Attacks and Intrusion Detection Angham Alsuhaimi and Jehan janbi, Taif University, Kingdom of Saudi Arabia Full Text
41 16 6 Digital Interventions for Anxiety Management using AI-Driven Mobile Applications Mohammed Majid Bakhsh 1, Abu Saleh Muhammad Saimon 1 and A J M Obaidur Rahman Khan 2, 1 Washington University of Science & technology, USA, 2 Independent University Bangladesh, Bangladesh Full Text
42 16 6 Exploring Fault Tolerance Strategies in Big Data Infrastructures and Their Impact on Processing Efficiency Akaash Vishal Hazarika 1 and Mahak Shah 2, 1 North Carolina State University, USA, 2 Columbia University, USA Full Text
43 16 6 Analysis of Random Distortions in the Elements of the Basic Cell for an Analog-Digital Pipelined Converter Ricardo Francisco Martinez Gonzalez, Tecnologico Nacional de Mexico / IT Veracruz, Mexico Full Text
44 16 6 The Installation Design of Solar Panels for Village Houses HK with Optimization-based Efficiency for Sustainable Environmental Tony Tsang 1, Fong Lun Chuen 1, Gary Mok 2, Steven Poon 2 and Samuel Lip 2, 1 Hong Kong College of Technology, China, 2 Lordray Engineering Company Limited, Hong Kong Full Text
45 16 6 AI-Driven Test Case Optimization: Enhancing Efficiency in Software Testing Life Cycle K M Yaqub Ali and Sumi Akter, Washington University Of Science & Technology (WUST), USA Full Text
46 16 6 Unveiling Patterns: Advanced Data Mining Techniques for Accurate Predictive Analytics Sumi Akter and K M Yaqub Ali, Washington University of Science & Technology (WUST), USA Full Text

International Journal of Computer Science and Engineering Survey (IJCSES)

47 15 1 Integration of Latex Formula in Computer-Based Test Application for Academic Purposes Ikechukwu E. Onyenwe, Ebele Onyedinma, Onyedika O. IkechukwuOnyenwe, Obinna Agbata , and Faustinah N. Tubo, Nnamdi Azikiwe University, Nigeria Full Text
48 15 2/3/4 Cite_Stema SA Atendansiya: Modernizing Cite Students Attendance System with RFID Technology Rezzie R. Cadungog, Ryan L. Nambong, Nero L. Hontiveros, Mark Bryan C. Tenebroso, Michaelangelo R. Serrano, Notre Dame of Midsayap College, Philippines Full Text
49 15 5 A Survey on Machine Learning Applications in VLSI CAD K Shekar and Sandhya Rachamalla, Osmania University, India Full Text
50 15 6 Anemia Detection from Eyes, Palm and Fingernails with Machine Learning Models A.S.Nousir, Aya.M.Attia, M. Salama, A. Mostafa, M. Osama, H. A. Khalil, B. Mohamed and Dina Darwish Ahram Canadian University, Egypt Full Text

Computer Science & Engineering: An International Journal (CSEIJ)

51 14 1 Data Mining for Students’ Employability Prediction S.M.M Malika, SLIATE, Sri Lanka Full Text
52 14 2 IoT Solutions for Smart Parking- Sigfox Technology Rachel John Robinson, IU University of Applied Sciences, Germany Full Text
53 14 3 Transforming Worlds: The Intersection of Translation Technology and Transformers in the Digital Age Zaki Muhammad Zayyanu, Usmanu Danfodiyo University, Nigeria Full Text
54 14 1 Revolutionising Translation Technology: A Comparative Study of Variant Transformer Models - BERT, GPT, and T5 Zaki Muhammad Zayyanu, Usmanu Danfodiyo University, Nigeria Full Text

International Journal of Computer Science, Engineering and Applications (IJCSEA)

55 14 1/2/3/4 Estimation Formula for Indirect Value Realization of Virtual Meetings Fatima A. Al Roomi and Hafed A. Al Ghamdi, Saudi Arabia Full Text

International Journal on Computational Science & Applications (IJCSA)

56 14 1/2/3/4/5/6 Machine Learning Classification using Motif Based Graph Databases Created from UWF-ZeekData22 Sikha S. Bagui, Dustin Mink, Subhash C. Bagui, Jadarius Hill, Farooq Mahmud and Michael Plain, University of West Florida, USA Full Text

International Journal on Natural Language Computing (IJNLC)

57 13 1 Evaluation of Medium-Sized Language Models in German and English Language Rene Peinl and Johannes Wirth, Hof University of Applied Sciences, Germany Full Text
58 13 1 Performance, Energy Consumption and Costs: A Comparative Analysis of Automatic Text Classification Approaches in the Legal Domain Leonardo Rigutini1, Achille Globo1, Marco Stefanelli2, Andrea Zugarini1, Sinan Gultekin1, Marco Ernandes1, 1expert.ai spa, Italy, 2University of Siena, Italy Full Text
59 13 1 Rag-Fusion: A New Take on Retrieval Augmented Generation Zackary Rackauckas, Infineon Technologies, California Full Text
60 13 1 Document Author Classification using Parsed Language Structure Todd K. Moon and Jacob H. Gunther, Utah State University, USA Full Text
61 13 1 Improving Dialogue Management Through Data Optimization Miguel Ángel Medina-Ramírez, Cayetano Guerra-Artal and Mario HernándezTejera, University of Las Palmas de Gran Canarias, Spain Full Text
62 13 2 Identifying Key Terms in Prompts for Relevance Evaluation with GPT Models Jaekeol Choi, Hankuk University of Foreign Studies, South Korea Full Text
63 13 3 Fine-Tuning of Small/Medium LLMs for Business QA on Structured Data Rasha Ragab and Abdulrahman Altahhan, University of Leeds, UK Full Text
64 13 3 Human Intention Space - Natural Language Phrase Driven Approach to Place Social Computing Interaction in a Designed Space Pronab Pal, KeyByte Systems, Australia Full Text
65 13 4 A Review of Prompt-Free Few-Shot Text Classification Methods Rim Messaoudi, Achraf Louiza and Francois Azelart, Akkodis Research, France Full Text
66 13 4 Interlingual Syntactic Parsing: An Optimized Head-Driven Parsing for English to Indian Language Machine Translation Pavan Kurariya, Prashant Chaudhary, Jahnavi Bodhankar, Lenali Singh and Ajai Kumar, Centre for Development of Advanced Computing, India Full Text
67 13 5/6 Neural and Statistical Machine Translation: Confronting the State of the Art Daniel Rojas Plata and Noe Alejandro Castro Sanchez, Cenidet/TecNM, Mexico Full Text
68 13 5/6 Data-Driven Part-of-Speech Tagging for the Gikuyu Language: Development, Challenges, and Prospects Gabriel Kamau, Dedan Kimathi University of Technology, Kenya Full Text
69 13 5/6 Orchestrating Multi-Agent Systems for Multi-Source Information Retrieval and Question Answering with Large Language Models Antony Seabra 1,2, Claudio Cavalcante 1,2, Joao Nepomuceno 1, Lucas Lago 1, Nicolaas Ruberg 1, and Sergio Lifschitz 2 1 BNDES - Area de Tecnologia da Informacao, Brazil, 2 PUC-Rio - Departamento de Informatica, Brazil Full Text
70 13 5/6 End-to-End Bangla AI for Solving Math Olympiad Problem Benchmark:Leveraging Large Language Model using Integrated Approach H.M.Shadman Tabib and Jaber Ahmed Deedar, Bangladesh University of Engineering and Technology, Bangladesh Full Text

International Journal of Managing Information Technology (IJMIT)

71 16 1 Synthetic Brain Images: Bridging the Gap in Brain Mapping With Generative Adversarial Model Drici Mourad1 and Dr.Kazeem Oluwakemi Oseni2, 1University of Westminster, United Kingdom, 2University of Bedfordshire, United Kingdom Full Text
72 16 1 Predictive Modelling of Air Quality Index (AQI) Across Diverse Cities and States of India using Machine Learning: Investigating the Influence of Punjab's Stubble Burning on AQI Variability Kamaljeet Kaur Sidhu1, Habeeb Balogun1 and Dr.Kazeem Oluwakemi Oseni2, 1University of Westminster, United Kingdom, 2University of Bedfordshire, United Kingdom Full Text
73 16 3/4 Adoption of Library Information Systems using the Technology Acceptance Model: a South African Study Chiedza M Tevera1 and Ephias Ruhode2, 1Cape Peninsula University of Technology, South Africa, 2University of the West of Scotland, United Kingdom Full Text
74 16 2 The Process and Fate of Hackathons Against Corruption in Brazil Antonio Augusto Braighi, Federal University of Minas Gerais, Brasil Full Text

International Journal of Managing Value and Supply Chains (IJMVSC)

75 15 2 Integrating Inventory Management and Distribution: A Holistic Supply Chain Strategy Dilip Kumar Vaka, Deloitte consulting, US Full Text
76 15 1 Safe and Inclusive School Bus Transportation System for Special Needs Children Aditya Kumar Sharma 1 and Preeti Kumar Yadav 2, 1 Zum Services Inc., California, 2 Cama & Albless Hospital, India Full Text
77 15 1 CMMS- Streamlining Maintenance management for Food and Beverage Industry to capture breakdowns Animek Shaurya, USA Full Text
78 15 1 Omni-Channel Distribution: A Transshipment Modeling Perspective John M. Woosley, Robert F. Cope III, Rachelle F. Cope and David C. Wyld, Southeastern Louisiana University, USA Full Text
79 15 1 Streamlining Roadside Inspection Reporting in Fleet Management Systems Sahil Nyati, Maven Machines, USA Full Text
80 15 1 Value and Supply Chains in International Trade. Puerto Rico Amidst Disasters, Captures and Leakages Maribel Aponte-Garcia, University of Puerto Rico, Puerto Rico Full Text
81 15 2 Contribution to Securing BYOD Systems in Financial Authorities and Public Administrations in Free Trade Zones Patrick Aurélien AMPIRI KWA 1, Rostand Martialy Davy Loembe Souamy2,3, Aristide MANKITI FATI1,4 1 Marien NGOUABI University, Republic of the Congo, 2 Nanjing University, China, 3 Nanjing University of Post and Telecommunication, China, 4 Admitelecom Academy laboratory of Microwave, Ghana Full Text
82 15 3 Do Tensions in the South China Sea Herald the Collapse of Global Supply Chains? Gilles Paché, Aix-Marseille University, France Full Text
83 15 3 Integrating Robotics for Enhanced Business Operations Ravindra Kumar Patro, Zum Services Inc., USA Full Text
84 15 3 Emerging Technologies for Precision Supply Chain Management Ravindra Kumar Patro, Zum Services Inc., USA Full Text
85 15 3 What is a State-of-the-Art Definition of Supply Chain Resilience in 2024 – With a Systematic Literature Review Shixin Zou1 and Markus Witthaut2, 1TU Dortmund University, Germany, 2Fraunhofer Institute for Material Flow and Logistics IML, Germany Full Text
86 15 4 The Impact of Coordination on Health Commodity Security in Sierra Leone Michael Egharevba1,Moses N.P. Batema2, Jatu J. Abdulai 3, Brenda Olatunji Edith Stafford 4,Marie Ibranatu Kolipha-Kamara 5, Mohamed Bakarr Kanu5, 1 USA, 2 Directorate of Pharmaceutical Services, Ministry of Health, Sierra Leone, 3 National Medical Supplies Agency, Sierra Leone, 4 National Malaria Control Program, Ministry of Health, Sierra Leone, 5 Global Health Supply Chain-Procurement and Supply Management, Sierra Leone Full Text

International Journal of Managing Public Sector Information and Communication Technologies ( IJMPICT )

87 14 1/2/3 Empirical Investigation into ICT Services Evaluation Within a Public Institution Pappas Michael, Doxopoulou Kyriaki, Mavidis Aristotelis, Folinas Dimitris, International Hellenic University, Greece Full Text
88 14 4 Evaluating Citizens' Perceptions and Attitudes Towards E-Voting in Local Governance: An Empirical Study Eleni Michalopoulou1, Dimitris Folinas1, Dimitris Mylonas1, Zafeiro Fragkaki2, 1International Hellenic University, Greece, 2Aristotle University of Thessaloniki, Greece Full Text

Health Informatics: An International Journal (HIIJ)

89 13 1 Integrating Machine Learning in Clinical Decision Support Systems Tanay Subramanian, Brown University, USA Full Text
90 13 1 Brief Commentary: Using a Logic Model to Integrate Public Health Informatics Into Refinements of Public Health Surveillance System GV Fant, US Department of Veterans Affairs, USA Full Text
91 13 1 Brief Commentary: Using a Logic Model to Integrate Public Health Informatics Into Refinements of Public Health Surveillance System GV Fant, US Department of Veterans Affairs, USA Full Text
92 13 2 A Practical Approach to Predicting Depression: Verbal and Non-Verbal Insights with Machine Learning Sanskar Rahul Nanegaonkar and Kotaro Ando, I’m beside you Inc, Japan Full Text
93 13 2 Health Disparities: Differences in Veteran and Non-Veteran Populations using Generative AI GV Fant, US Department of Veterans Affairs, USA Full Text

International Journal on Cybernetics & Informatics ( IJCI)

<
94 13 1 Learning Analytics Dashboards for Advisors - A Systematic Literature Review Suchith Reddy Vemula and Marcia Moraes, Colorado State University, USA Full Text
95 13 1 Language Oriented Approach of Teaching Programming Skills Bauming Wood, Neijiang Normal University, China Full Text
96 13 1 Bridging the GAP: Selenium and RPA for Unparalleled Automation Rohit Khankhoje, Independent Researcher, USA Full Text
97 13 1 Scalable Action Mining Hybrid Method for Enhanced User Emotions in Education and Business Domain Sanchari Chatterjee1, Angelina A. Tzacheva2 and Zbigniew Ras2, 1University of North Carolina, USA, 2West Cliff University Irvine, USA Full Text
98 13 1 Leveraging Machine Learning Algorithm to Enable Access to Credit for Small Businesses in the United States of America Toyyibat T. Yussuph, American Express, USA Full Text
99 13 1 An Ethical Study of Generative AI from the Actor-Network Theory Perspective Yuying li And Jinchi zhu, Communication University of Zhejiang, China Full Text
100 13 2 Direct Punjabi to English Speech Translation using Discrete Units Prabhjot Kaur1, L. Andrew M. Bush2 and Weisong Shi3, 1Wayne State University, USA, 2Utah State University, USA, 3University of Delaware, USA Full Text
101 13 2 Improving the Capabilities of Large Language Model based Marketing Analytics Copilots with Semantic Search and Fine-Tuning Yilin Gao1, Sai Kumar Arava2, Yancheng Li2 and James W Snyder Jr2, 1University of Southern California, USA, 2Adobe Inc., USA Full Text
102 13 2 The Evaluation of a Code-Switched Sepedi-English Automatic Speech Recognition System Amanda Phaladi and Thipe Modipa, University of Limpopo, South Africa Full Text
103 13 2 Ara--CANINE: Character-Based Pre-Trained Language Model for Arabic Language Understanding Abdulelah Alkesaiberi1, Ali Alkhathlan1 and Ahmed Abdelali2, 1King Abdulaziz University, Saudi Arabia, 2National Center for AI, Saudi Arabia Full Text
104 13 2 Exploring Semantic Question Generation Methodology and a Case Study for Algorithmic Question Pool Sumayyah Alamoudi and Amany Alnahdi, King Abdulaziz University, KSA Full Text
105 13 2 On the Construction of Perfect Keyword Secure PEKS Scheme Indranil Ghosh Ray, Queen's University Belfast, UK Full Text
106 13 2 On the Construction of Perfect Keyword Secure PEKS Scheme Indranil Ghosh Ray, Queen's University Belfast, UK Full Text
107 13 2 The Mathematics behind Cryptocurrencies "A Statistical Analysis of Cryptocurrencies" Masoud Eshaghinasrabadi, California State University, USA Full Text
108 13 2 The Covid Shock, The Rise of Defi, and Bitcoin's Increasing Market Risk Bruce D. McNevin1 and Joan Nix2, 1Chief Data Scientist, USA, 2Queens College (CUNY), USA Full Text
109 13 2 Efficient Storage of Heterogeneous IoT data in a Blockchain using an Indexing Method in Metric Space K. Khettabi, B. Farou, Z. Kouahla, and H. Seridi, STIC Laboratory, Algeria Full Text
110 13 2 Enhancing Time Series Anomaly Detection: A Hybrid Model Fusion Approach Paul Addai1, Pedro Pinto2, and Tauheed Khan Mohd3, 1Augustana College, USA, 2Instituto Politecnico de Viana do Castelo (IPVC), Portugal, 3Eastern Michigan University, USA Full Text
111 13 2 Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: A Technical Exploration Nuha Sabek, Joseph Loftus, Kati Sneath, Spencer Ames, and Tauheed Khan Mohd, Eastern Michigan University, USA Full Text
112 13 2 Exploring Vulnerabilities and Attack Vectors Targeting Pacemaker Devices in Healthcare Brad Chardenet, Jaycen Jamssens, Richard Cummins, and Tauheed Khan Mohd,Eastern Michigan University, USA Full Text
113 13 3 Steps and Challenges in Analyzing Real Sensor Data from a Productive Press Shop and its Value for Predictive Maintenance Application Safa Evirgen1 and Maylin Wartenberg2, 1Volkswagen AG, Germany, 2Hochschule Hannover, Germany Full Text
114 13 3 A Creativity Monitoring Device (CMD) for New Insight into the Brain Mechanisms of Artistic, Scientific and Engineering Creative Acts Nandor Ludvig, Translational Neuroscience Consultation, USA Full Text
115 13 3 Connectivity-Based Clustering for Mixed Discrete and Continuous Data Mahfuza Khatun1 and Sikandar Siddiqui2, 1Jahangirnagar University, Bangladesh , 2Deloitte Audit Analytics GmbH, Germany Full Text
116 13 3 Advanced AI Solutions for Securities Trading: Building Scalable and Optimized Systems for Global Financial Markets Akinde Abdullah, Hassan Omolola, Samuel Olatunde and Oluwadare Aderibigbe, Austin Peay State University, USA Full Text
117 13 4 Challenges with Securing Digital Identity Nikhil Ghadge, Okta.Inc, USA Full Text
118 13 4 Forecasting Network Capacity for Global Enterprise Backbone Networks using Machine Learning Techniques Kapil Patil1 and Bhavin Desai2, 1Principal Technical Program Manager, USA, 2Product Manager, USA Full Text
119 13 4 Internet of Things: Domesticated Toolsets for Solving Major Challenges Faced by Individuals with Health Problems Tunbosun Oyewale Oladoyinbo1 and Isiaka Akinkunmi Adeyemo2, 1University of Maryland Global Campus, USA 2Ladoke Akintola University of Technology, Nigeria Full Text
120 13 4 The TOE Theory and Cloud Computing: Exploring Factors Affecting the Adoption Of Cloud Computing Tunbosun Oyewale Oladoyinbo1, Isiaka Akinkunmi Adeyemo2 and Oluseun Babatunde Oladoyinbo3, 1University of Maryland Global Campus, USA, 2Ladoke Akintola University of Technology, Nigeria, 3Oyo state College of Agriculture, Nigeria Full Text
121 13 4 Empowering Healthcare: A Blockchain-Based Secure and Decentralized Data Sharing Scheme with Searchable Encryption Seyedmohammad Nouraniboosjin1, Melika Yousefi2, Sadaf Meisami3, MelinaYousefi4 and Sajad Meisami2 1Worcester Polytechnic Institute, USA, 2Illinois Institute of Technology, USA, 3Kharazmi University, Iran 4Isfahan University of Technology, Iran Full Text
122 13 4 Fuzzy Cognitive Maps as a Bridge between Symbolic and Sub-Symbolic Artificial Intelligence Maikel Leon, University of Miami, USA Full Text
123 13 4 An Approach to Demonstrate That a Cognitive System Does Not Have Subjective Consciousness Manuel Boissenin, France Full Text
124 13 4 Decoding AI and Human Authorship: Nuances Revealed through NLP and Statistical Analysis Mayowa Akinwande1, Oluwaseyi Adeliyi2 and Toyyibat Yussuph3, 1Austin Peay State University, USA 2University of Arkansas at Little Rock, USA, 3American Express Company, USA Full Text
125 13 4 Transforming Everyday Environments: The Power of Ambient Intelligence Partha Sarathi Samal, USA Full Text
126 13 4 Peace Education in Africa: The Role of Games, Visual Arts and Crafts Dudziro Nhengu, Midlands State University, Zimbabwe Full Text
127 13 4 Reforming Biological/Biomedical Science Teaching and Education: A Reflection on Well-Developed Practices and Approaches in Large Class Ahmed HK El-Hashash, Texas A & M University, USA Full Text
128 13 4 AI-Powered Solutions for Missing Data in Pipeline Risk Assessments Syed Jehanzeb Adeel Haider, Enbridge Energy Inc., USA Full Text
128 13 4 Web-Based Automation Testing and Tools Leveraging AI and ML Narendar Kumar Ale and Rekha sivakolundhu, University Of Cumberlands, USA Full Text
130 13 4 A 63.74 DBΩ Gain 60.84 GHz Bandwidth Power-Efficient Transimpedance Amplifier in 130 Nm SiGe BiCMOS Technologys Lavakumar Navilipuri and Andy Heinig, Fraunhofer Institute for Integrated Circuits IIS/EAS, Germany Full Text
131 13 4 Exploring Transimpedance Amplifier Topologies: Design Considerations and Trade-Offs Lavakumar Navilipuri and Andy Heinig, Fraunhofer Institute for Integrated Circuits IIS/EAS, Germany Full Text
132 13 4 QUIDEST: Real-Time Monocular Depth Map to Audio Signal Conversion Algorithm L. Tenze and E. Canessa, The Abdus Salam International Centre for Theoretical Physics (ICTP), Italy Full Text
133 13 4 AI Teachers Using a VR/MR Environment for Greater Student Interaction and Immersion L.M. Escobedo F, InterNaciones University, Guatemala Full Text
134 13 5 Transformation of Printed Teaching Materials into Digital Form Natalia Hrkotacova and Adriana Kickova, Constantine the Philosopher University, Slovakia Full Text
135 13 5 Leveraging Generative AI for On-Demand Tutoring as a New Paradigm in Education Maikel Leon, University of Miami, USA Full Text
136 13 5 Multi-classification of Cad Entities: Leveraging the Entity-as-Node Approach with Graph Neural Networks Sheela Raju Kurupathi1, Park Dongryul1, Sebastian Bosse1 and Peter Eisert1,2, 1Fraunhofer Heinrich Hertz Institute (HHI), Germany, 2Humboldt University of Berlin, Germany Full Text
137 13 5 Block Medcare: Advancing Healthcare Through Blockchain Integration Oliver Simonoski and Dijana Capeska Bogatinoska, University of Information Science and Technology, Macedonia Full Text
138 13 5 WTCL-Dehaze: Rethinking Real-World Image Dehazing via Wavelet Transform and Contrastive Learning Divine Joseph Appiah, Donghai Guan, Abdul Nasser Kasule and Mingqiang Wei, Nanjing University of Aeronautics and Astronautics, China Full Text
139 13 5 DAPLSR: Data Augmentation Partial Least Squares Regression Model via Manifold Optimization Haoran Chen, Jiapeng Liu, Jiafan Wang and Wenjun Shi, Zhengzhou University of Light Industry, China Full Text
140 13 5 Blockchain Applications in Cyber Liability Insurance Shreyas Kumar, Luis Loo and Leah Kocian, Texas A&M University, United States of America Full Text
141 13 5 A New Mathetic (The Science of Learning) and Didactic (The Science of Teaching) Concept Henk Roelofs1 and Willem Schreuder2, 1LE-Network, The Netherlands, 2Functionality, The Netherlands Full Text
142 13 5 Haste Makes Waste: A Moderated Mediation Model of the Mechanisms Linking Artificial Intelligence Advancement to Film Firm Performance Zexia Wang and Wucheng Han, University of Electronic Science and Technology of China, China Full Text
143 13 5 Similar Data Points Identification with LLM: A Human-in-the-Loop Strategy Using Summarization and Hidden State Insights Xianlong Zeng1, Yijing Gao2, Ang Liu3 and Fanghao Song1, 1Ohio University, USA, 2Brown University, USA 3Rutgers University, USA Full Text
144 13 5 Predictive Analytics for Pilot Training in Southern Africa Sibusiso Mzulwini and Tendani Lavhengwa, Tshwane University of Technology, RSA Full Text
145 13 5 Uncertainty-Aware Seismic Signal Discrimination using Bayesian Convolutional Neural Networks Soma Datta Reddy and Sunitha Palissery, Earthquake Engineering Research Centre, , India Full Text
146 13 6 Leveraging Large Language Models For Optimized Item Categorization using UNSPSC Taxonomy Anmolika Singh and Yuhang Diao, Data Scientist, USA Full Text
147 13 6 Dynamic Multi-Agent Orchestration and Retrieval for Multi-Source Question-Answer Systems using Large Language Models Antony Seabra 1,2, Claudio Cavalcante 1,2, Joao Nepomuceno1, Lucas Lago1, Nicolaas Ruberg 1 and Sergio Lifschitz 22BNDES, Brazil, 2 PUC-Rio, Brazil Full Text
148 13 6 Integrating Event-Based Neuromorphic Processing and Hyperdimensional Computing with Tropical Algebra for Cognitive Ontology Networks Robert McMenemy, Independent Researcher, United Kingdom Full Text
149 13 6 AdversLLM: A Practical Guide To Governance, Maturity and Risk Assessment For LLM-Based Applications Othmane Belmoukadam, Jiri De Jonghe, Sofyan Ajridi, Amir Krifa, Joelle Van Damme, Maher Mkadem and Patrice Latinne, AI LAB, Belgium Full Text
150 13 6 Divergent Ensemble Networks: Enhancing Uncertainty Estimation with Shared Representations and Independent Branching A. Chandorkar and A. Kharbanda, Indian Institute of Technology, India Full Text
151 13 6 Proposal of a Data Model for a Dynamic Adaptation of Resources in IOTs (ADR-IOT) KANGA Koffi 1, KAMAGATE Beman Hamidja1, BROU Aguie Pacome Bertrand 1 and OUMTANAGA Souleymane2 1 LASTIC-ESATIC, Cote d'Ivoire, 2 The Houphouet Boigny National Polytechnic Institute, Cote d'Ivoire Full Text
152 13 6 Actionable Pattern Discovery for Emotion Detection in Big Data in Education and Business Angelina Tzacheva 1 and Sanchari Chatterjee 2, 1West Cliff University, USA , 2University of North Carolina at Charlotte, USA Full Text

International Journal on Integrating Technology in Education (IJITE)

153 13 1 Summary of the Impact of a Non-Fiction, Low Budget, Digital Social Media Project Paula Latham, Independent Researcher, UK Full Text
154 13 2 Pioneering Online Assessment Solutions: Empirical Experiences from Educational Practitioners Joel Yawe Masagazi1, Patrick Lugemwa2 and Eva Mirembe2, 1Uganda Christian University, Uganda 2Institute of Open Distance and e-Learning (IODeL), Uganda Full Text
155 13 3 A Framework for Deploying IPV6 at Higher Education Institutions Shubair A. Abdullah, Sultan Qaboos University, Sultanate of Oman Full Text
156 13 3 Implementation of Computational Tools in the Teaching-learning Process of Materials Strength Martínez Christian, Oñate Fernanda, Iza Johanna, Ramírez Ana and Pinto César, Instituto Superior Tecnológico Pelileo, Ecuador Full Text
157 13 3 Discovering Joan Miró Through Artificial Intelligence: an Educational Scenario for Preschool Education Asimina Katsouda, Hellenic Open University, Greece Full Text
158 13 3 The Internet of Peace: Unpacking the Gender-IoT-peacebuilding Nexus in Sudan and Colombia Dudziro Nhengu, Midlands State University, Zimbabwe Full Text
159 13 3 Generative AI as a New Paradigm for Personalized Tutoring in Modern Education Maikel Leon, University of Miami, USA Full Text
160 13 3 Designing and Applying Educational Scenarios using Synth4kids Musical Educational Software in Preschool Education Christina Charalambidou1 and Yannis Mygdanis2, 1European University Cyprus, Cyprus, 2The American College, Greece Full Text
161 13 4 Assessment of Postgraduate Programs for International Students in Selected Australian Universities: Input for Policy Making for International Postgraduate Students Jhon Jhon Alanzalon, Adamson University, Philippines Full Text

International Journal on Integrating Technology in Education (IJITE)

153 13 1 Summary of the Impact of a Non-Fiction, Low Budget, Digital Social Media Project Paula Latham, Independent Researcher, UK Full Text
154 13 2 Pioneering Online Assessment Solutions: Empirical Experiences from Educational Practitioners Joel Yawe Masagazi1, Patrick Lugemwa2 and Eva Mirembe2, 1Uganda Christian University, Uganda 2Institute of Open Distance and e-Learning (IODeL), Uganda Full Text
155 13 3 A Framework for Deploying IPV6 at Higher Education Institutions Shubair A. Abdullah, Sultan Qaboos University, Sultanate of Oman Full Text
156 13 3 Implementation of Computational Tools in the Teaching-learning Process of Materials Strength Martínez Christian, Oñate Fernanda, Iza Johanna, Ramírez Ana and Pinto César, Instituto Superior Tecnológico Pelileo, Ecuador Full Text
157 13 3 Discovering Joan Miró Through Artificial Intelligence: an Educational Scenario for Preschool Education Asimina Katsouda, Hellenic Open University, Greece Full Text
158 13 3 The Internet of Peace: Unpacking the Gender-IoT-peacebuilding Nexus in Sudan and Colombia Dudziro Nhengu, Midlands State University, Zimbabwe Full Text
159 13 3 Generative AI as a New Paradigm for Personalized Tutoring in Modern Education Maikel Leon, University of Miami, USA Full Text
160 13 3 Designing and Applying Educational Scenarios using Synth4kids Musical Educational Software in Preschool Education Christina Charalambidou1 and Yannis Mygdanis2, 1European University Cyprus, Cyprus, 2The American College, Greece Full Text
161 13 4 Assessment of Postgraduate Programs for International Students in Selected Australian Universities: Input for Policy Making for International Postgraduate Students Jhon Jhon Alanzalon, Adamson University, Philippines Full Text

International Journal of Computer Networks & Communications (IJCNC)

162 16 1 Secure Supervised Learning-Based Smart Home Authentication Framework K. Swapna Sudha1, N. Jeyanthi1, and Celestine Iwendi2, 1Vellore Institute of Technology, India 2University of Bolton, UK Full Text
163 16 1 Effective Multi-Stage Training Model for Edge Computing Devices in Intrusion Detection Trong Thua Huynh, Hoang Thanh Nguyen, Posts and Telecommunications Institute of Technology, Vietnam Full Text
164 16 1 Q-Learning Model for Blockchain Security in Internet of Medical Things Networks Kanneboina Ashok and Gopikrishnan S, VIT-AP University, India Full Text
165 16 1 Feature Selection using the Concept of Peafowl Mating in IDS Partha Ghosh, Joy Sharma and Nilesh Pandey, Netaji Subhash Engineering College, India Full Text
166 16 1 Sensing Time Improvement using Two Stage Detectors for Cognitive Radio System Mohamed Khalaf1, Ahmed Fawzi1 and Ahmed Yahya2, 1Modern Academy for Engineering and Technology, Maadi, Egypt, 2Al-Azhar University, Cairo, Egypt Full Text
167 16 1 Comparative Study of Orchestration using gRPC API and REST API in Server Creation Time: An Openstack Case Hari Krishna S M and Rinki Sharma, M. S. Ramaiah University of Applied Sciences, India Full Text
168 16 1 Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocation in Fog-Cloud Environments Ahmed A. A. Gad-Elrab1,2, Almohammady S. Alsharkawy1, Mahmoud E. Embabi1, Ahmed Sobhi1,3, Farouk A. Emara1, 1Al-Azhar University, Cairo, Egypt, 2King Abdulaziz University, Jeddah, Saudi Arabia, 3AlRyada University for Science and Technology (RST), Egypt Full Text
169 16 1 Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimized Link State Routing-Based for VANET Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia Full Text
170 16 2 Enhancing Traffic Routing Inside a Network through IoT Technology & Network Clustering by Selecting Smart Leader Nodes Radwan S.Abujassar, Arab Open University Kuwait, Kuwait Full Text
171 16 2 IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered Feature Selection with ML Model for IoT Threats & Attack Detection J. I. Christy Eunaicy1, C. Jayapratha2 and H.Salome Hemachitra3, 1Thiagarajar College, India, 2Karpaga Vinayaga College of Engineering and Technology, India, 3Sri Meenakshi Government College of Arts for Women, India Full Text
172 16 2 High Performance NMF based Intrusion Detection System for Big Data IoT Traffic Abderezak Touzene, Ahmed Al Farsi and Nasser Al Zeidi, Sultan Qaboos University, Oman Full Text
173 16 2 DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection P Sumalatha and G.S. Mahalakshmi, Anna University, India Full Text
174 16 2 Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems Ali Muayed Fadhil1,2, Norashidah Md Din1, Norazizah Binti Mohd Aripin1 and Ali Ahmed Abed2, 1University Tenaga Nasional, Malaysia, 2University of Basrah, Iraq Full Text
175 16 2 Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy Commitment Stanley Mlato1,Yesaya Gabriel1, Prince Chirwa1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea Full Text
176 16 2 A Topology Control Algorithm Taking into Account Energy and Quality of Transmission for Software-Defined Wireless Sensor Network Hong Thi Chu Hai1, Le Huu Binh2 and Le Duc Huy3, 1Banking Academy of Vietnam, Vietnam, 2Hue University, Vietnam, 3Ha Noi University of Business and Technology, Vietnam Full Text
177 16 2 A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless Body Area Networks Nabila Azdad and Mohamed Elboukhari, Mohammed First University, Morocco Full Text
178 16 3 Improved MPR Selection Algorithm-Based WS-OLSR Routing Protocol Waleed Khalid Ahmed, Mohd Nazri bin Mohd Warip, Mohamed Elshaikh Elobaid Said Ahmed and Phaklen Ehkan, Universiti Malaysia Perlis, Malaysia Full Text
179 16 3 Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post-Disaster Scenario Junhyung Kim, Yeungnam University College, Korea Full Text
180 16 3 Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Based Investigation using IFOG-Simulator Alzahraa Elsayed, Khalil Mohamed and Hany Harb, Al Azhar University, Egypt Full Text
181 16 3 An Hybrid Framework OTFS-OFDM Based on Mobile Speed Estimation Amina Darghouthi1, Abdelhakim Khlifi2, Hmaied Shaiek3, Fatma Ben Salah1 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2Sup’COM, University of Carthage, Tunisia, 3CEDRIC/LAETITIA Laboratory, France Full Text
182 16 3 Optimizing CNN-BiGRU Performance: Mish Activation and Comparative Analysis Asmaa BENCHAMA and Khalid ZEBBARA, Ibn zohr University, Morocco Full Text
183 16 3 Analysis and Evolution of SHA-1 Algorithm - Analytical Technique Malek M. Al-Nawashi, Obaida M. Al-hazaimeh, Isra S. Al-Qasrawi, Ashraf A. Abu-Ein and Monther H. Al-Bsool Al-Balqa Applied University, Jordan Full Text
184 16 3 EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection for WSN-Assisted IoT Darshan B D and Prashanth C R, S J B Institute of Technology, India Full Text
185 16 3 Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Service Dongju Lee1 and Hyunsung Kim1,2, 1Kyungil University, Korea, 2University of Malawi, Malawi Full Text
186 16 4 Enhancing IoT Security: A Novel Approach with Federated Learning and Differential Privacy Integration Aziz Ullah Karimy and P. Chandrasekhar Reddy, Jawaharlal Nehru Technological University, India Full Text
187 16 4 Enhancing Cybersecurity Defenses: A Multicriteria Decision-Making Approach to Mitre ATT&CK Mitigation Strategy Ihab Mohamed, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt Full Text
188 16 4 Enhancing IoT Routing Security and Efficiency: Towards AI-Enabled RPL Protocol Abubakar Wakili and Sara Bakkali, Euromed University of Fez (UEMF), Morocco Full Text
199 16 4 Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Surasit Songma, Watcharakorn Netharn and Siriluck Lorpunmanee, Suan Dusit University, Thailand Full Text
200 16 4 An Anti-Jamming Technique by Jammer Localization for Multi-Channel Wireless Sensor Networks Maoyejatun Hasana1 and Hossen Asiful Mustafa2, 1Asian University of Bangladesh, Bangladesh, 2Bangladesh University of Engineering and Technology (BUET), Bangladesh Full Text
201 16 4 Real Time Parameter Estimation for Adaptive OFDM/OTFS Selection Amina Darghouthi1, Abdelhakim Khlifi2 and Belgacem Chibani1, 1University of Gabes, Tunisia, 2University of Carthage, Tunisia Full Text
202 16 4 Modified Route Request Broadcasting for Improving Multipath Routing Scheme Performance in MANET Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India Full Text
203 16 4 IRLR: an Improved Reinforcement Learning-Based Routing Algorithm for Wireless Mesh Networks Le Huu Binh1, Tu T. Vo1 and Le Duc Huy2, 1Hue University, Vietnam, 2Ha Noi University of Business and Technology, Vietnam Full Text
204 16 5 Intelligent Efficient Routing and Localization in the Underwater Wireless Sensor Network to Improve Network Lifetime Vinayprasad M S and Jayaram M N, JSS Science and Technology University, India Full Text
205 16 5 Radio Frequency Interference Detection and Automatic Modulation Recognition Based on Mask RCNN Noureddine El-haryqy, Zhour Madini and Younes Zouine, IbnTofail University, Morocco Full Text
206 16 5 Beacon-Based Uplink Transmission for LoRaWAN Direct to LEO Satellite Internet of Things Mohammad Al mojamed, UMM Al-QURA University, Saudi Arabia Full Text
207 16 5 Evaluating the Impact of Convolutional Neural Network Layer Depth on the Enhancement of Inertial Navigation System Solutions Mohammed AFTATAH and Khalid ZEBBARA, Ibn Zohr University, Morocco Full Text
208 16 5 Evaluating the Impact of Mid-Link Bandwidth Constraints on Video Streaming Performance Using NS2 Zahraa Khazal Rashad, University of Valladolid, Spain Full Text
209 16 5 ENIAO: Energy Aware Faulty Node Re-Placement Integrated With Duty Cycling and Improved Harmony Search Based Clustering through Adaptive Fish School Search Routing for WSN Optimization RM.Alamelu1, J.Naveen Ananda Kumar2, C.Jayapratha3 and Govindaprabhu GB4, 1Sri sarada Niketan College for Women, India, 2Tekinvaderz LLC, USA, 3Karpaga Vinayaga College of Engineering & Technology, India, 4Madurai Kamaraj University (MKU), India Full Text
210 16 5 Adaptive Hybrid Deep Learning Based Effective Channel Estimation in MIMO-Noma for Millimeter-Wave Systems with an Enhanced Optimization Algorithm Belcy D Mathews and Tamilarasi Muthu, Puducherry Technological University, India Full Text
211 16 5 A Link’s Fineness Based on Spatial Relation for Multipoint Relays Selection Algorithm in Mobile Ad Hoc etworks Algorithm Ayoub Abdellaoui, Jamal Elmhamdi, Es-Sadek Mohamed Zeriab and Mohammed Bekkali, Mohammed V University, Morocco Full Text
212 16 6 A Comparative Study of Cooperative and Non-Cooperative Wideband Spectrum Sensing in Cognitive Radio Networks for 5g Applications Blessing C. Dike, Cajetan M. Akujuobi and Shumon Alam, A&M University Prairie, USA Full Text
213 16 6 Outstanding Framework for Simulating and Generating Anchor Trajectory in Wireless Sensor Networks Abdelhady Naguib1, 2, 1Jouf University, Saudi Arabia, 2Al-Azhar University, Egypt Full Text
214 16 6 Prioritized Scheduling Routing Protocol for Minimizing Packet Drop in Wireless Body Area Network Md. Taslim Arefin1, 2 and Md Abul Kalam Azad1, 1Jahangirnagar University, Bangladesh, 2Daffodil International University, Bangladesh Full Text
215 16 6 Fuzzy-Based Clustering of Wireless Sensor Networks for Multiple Mobile Agent Itinerary Planning Nidhi Kashyap1, Shuchita Upadhyaya1, Monika Poriye1 and Sachin Lalar2, 1Kurukshetra University, India, Gurugram University Gurugram, India Full Text
216 16 6 Intrusion Detection Model using Machine Learning Algorithms on NSL-KDD Dataset Reem Alshamy and Muhammet Ali Akcayol, Gazi University, Turkey Full Text
217 16 6 Routing Performances in Wireless Sensor Networks: Determining Shortest Path Algorithms Effectiveness Khine Thazin Min1 and N. Jeyanthi2, 1Myanmar Institute of Information Technology, Myanmar, 2Vellore Institute of Technology, India Full Text
218 16 6 An Innovative Hybrid Model for Effective DDOS Attack Detection in Software Defined Networks Quang Truong Can, Tien Dat Nguyen, Minh Bao Pham, Thanh Tung Nguyen, Thi Hanh AnTran and Thi Thai Mai Dinh, VNU University of Engineering and Technology, Viet Nam Full Text
219 16 6 Modeling Low-Cost Inertial Navigation Systems and their Errors Mohammed AFTATAH, Khalid ZEBBARA and Soufiane EL ASRI, Ibn Zohr University, Morocco Full Text

International Journal of Wireless & Mobile Networks (IJWMN)

220 16 1/2 Implementing Machine Learning Algorithms for Predictive Network Maintenance in 5G and Beyond Networks Yamini Kannan and Dharika Kapil, New York University, USA Full Text
221 16 1/2 The Need of Trustworthy Announcements to Achieve Driving Comfort TRezvi Shahariar1 and Chris Phillips2, 1University of Dhaka, Bangladesh, 2Queen Mary University of London, England Full Text
222 16 3 Modified O-RAN 5G Edge Reference Architecture using RNN M.V.S Phani Narasimham1 and Y.V.S Sai Pragathi2, 1Wipro Technologies, India, 2Stanley College of Engineering & Technology for Women (Autonomous), India Full Text
223 16 3 Intelligent Cognitive Engine for 5G Network Quality of Service Management Ifeanyi Stanly Nwokoro1, Muhammad Qaim Aliyu Sambo2, Ifeanyi Friday Eze3, Sanusi Yusuf Ahmed4, Timothy Ola Akinfenwa5, Zacciah Kwaku Adom-Oduro6, Osakpamwan George Oshodin7, Julius Tunji Okesola8, Nwatu Augustina Nebechi9, 1Rhema University, Nigeria, 2Five Stars ICT Ltd, Nigeria, 3First Bank, Nigeria, 4Bank of Industry, Nigeria, 5Osun State University, Nigeria, 6University of Professional Studies Accra, Ghana, 7Addbeams Nigeria Ltd, Nigeria, 8First Tech University, Nigeria, 9Alex Ekwueme Federal University Ndufu-Alike Ebonyi State, Nigeria Full Text
224 16 4/5 Potential use of IoT Distance Measurement Tool in Boule Sports Wahidah Md Shah1, M Azim. Adnan1, Aslinda Hassan1, Norharyati Harum1 and Isredza Rahmi A. Hamid2, 1Universiti Teknikal Malaysia Melaka (UTeM), Malaysia, 2Universiti Tun Hussein Onn, Malaysia Full Text
225 16 4/5 Comprehensive Performance Testing Analysis and Security Vulnerability Detection of a 5G Stand Alone Network using a Firecell Testbed Ndidi Anyakora, Cajetan M. Akujuobi, and Mohamed F. Chouikka, Prairie View A &M University, USA Full Text
226 16 4/5 Machine Learning for Early Detection of Rare Genetic Disorders using Multi-Omics Data Nishant Gadde, Avaneesh Mohapatra, Rishi Kanaparti, Siddhardh Manukonda, Jashan Chahal and Jeffrey Au, USA Full Text
227 16 6 Two-factor Authentication Smart Entryway using Modified LBPH Algorithm Zakiah Ayop 1, Wan Mohamad Hariz Bin Wan Mohamad Rosdi 2, Looi Wei Hua 3, Syarulnaziah Anawar 1 Nur Fadzilah Othman 1, 1 Universiti Teknikal Malaysia Melaka, Malaysia, 2 ASK Pentest Sdn. Bhd., Malaysia, 3 V6 Technology Sdn Bhd, Malaysia Full Text
228 16 6 Clustering based on Hybridization of Genetic Algorithm and Improved K-Means (GA-IKM) in an IoT Network Moez Elarfaoui and Nadia Ben Azzouna, University of Tunis, Tunisia Full Text
229 16 6 The Mediating Effect of Behavioral Intention in the Relationship between Social Influence and Wireless Technology Usage Kyambadde Abdunool, Mwase Ali, Ssebanenya Muhammad and Saunders Warda, Makerere University Business School, Uganda Full Text
230 16 6 A Monte-Carlo Analysis between a Microscopic Model and a Mesoscopic Model for Vehicular Ad-Hoc Networks Aslinda Hassan 1, Wahidah Md. Shah 1 and Mohammed Saad Talib 2, 1 Universiti Teknikal Malaysia Melaka, Malaysia 2 University of Babylon, Iraq Full Text
231 16 6 Network-centric Optimal Hybrid Sensing Hole Recovery and Self- Healing in IPV6 WSNs Kwadwo Asante 1, Yaw Marfo Missah 2, Frimpong Twum 2 and Michael Asante 2, 1 AA-MUSTED, Ghana, 2 KNUST, Ghana Full Text

International Journal of Distributed and Parallel systems (IJDPS)

232 15 1 A Scalable Monitoring System for Software Defined Networks Mahmoud Eissa, Ahmed Yahya and Usama Gad, Al-Azhar University, Egypt Full Text
233 15 2/3/4/5/6 Wireless Communication Security and It’s Protection Methods Nikitha Merilena Jonnada, University of the Cumberlands, USA Full Text

International Journal on AdHoc Networking Systems (IJANS)

234 14 1 Design and Implementation of Low-Cost Electric Vehicles (EVs) Supercharger: A Comprehensive Review Md Khaledur Rahman, Faysal Amin Tanvir, Md Saiful Islam, Md Shameem Ahsan and Manam Ahmed, Lamar University, USA Full Text
235 14 1 Wireless Evolution: IEEE 802.11N, 802.11AC, and 802.11AX Performance Comparison Mutia Afroze Alin and Md. Delowar Hossain, Begum Rokeya University, Bangladesh Full Text
236 14 2/3 Sowing the Seeds of Precision: Innovations in Wireless Sensor Networks for Agricultural Environmental Monitoring Sreedeep Dey and Sreejita Das, Vijaygarh Jyotish Ray College, India Full Text

International Journal of Data Mining & Knowledge Management Process ( IJDKP )

237 14 1/2 Proactive Wildfire Detection and Management using AI, ML, and 5G Technology in the United States Okoro C. Stanley, Lopez Alexander and Unuriode O. Austine, Austin Peay State University, USA Full Text
238 14 1/2 Discovery of Actionable Patterns Through Scalable Vertical Data Split Method with Meta Actions and Information Granules Angelina A. Tzacheva1, Sanchari Chatterjee2 and Zbigniew W. Ras2, 1West Cliff University, USA, 2University of North Carolina at Charlotte, USA Full Text
239 14 3/4/5/6 The Role of Machine Learning in Enhancing Personalized Online Learning Experiences Anilkumar Jangili1 and Sivakumar Ramakrishnan2, 1Statistical Programming and Research & Development, USA 2Statistical Programming, Innovation & AI, USA Full Text

International Journal of Multimedia & Its Applications (IJMA)

240 16 1 The Effect of Campus News Video Library on Secondary Vocational School Students’ Sense of Responsibility and Self-Awareness Ability BaiQiao Zhu1 and Kien Tsong Chau2, 1China, 2Universiti Sains Malaysia, Malaysia Full Text
241 16 2 Metaloguing: The New Paradigms of Storytelling in the Age of Digital Media Yesol Seo, Hankuk University of Foreign Studies, Korea Full Text
242 16 3 Impact of an Enhanced Adaptive Microlearning System on Learning Achievement and Adaptability in On-the-Job Adults Bo Zhu, Kien Tsong Chau, and Nur Azlina Mohamed Mokmin, Universiti Sains Malaysia, Malaysia Full Text
243 16 3 Utilizing Hedonic-Motivation System Acceptance Model (HMASM) in Developing a Keris Virtual Reality Game Muhammad Waiz Hasyimi Muhammad Hidzer and Maizatul Hayati Mohamad Yatim, Sultan Idris Education University, Malaysia Full Text
244 16 4 Empowering Collaborative Learning: Innovative Integration of Real-Time Communication Into Hololens-Based Learning System Jiajia Guo, Kien Tsong Chau and Siti Nazleen Abdul Rabu, Universiti Sains Malaysia, Malaysia Full Text
245 16 4 A Preliminary Concept on Cybersecurity Skill Training Framework for a Capture-the-Flag Game using 5-Step Gamification Approach Khoo Li Jing1,2, Maizatu1 Hayati Mohamad Yatim2 and Wong Yoke Seng2, 1University of Wollongong Malaysia, Malaysia, 2Sultan Idris Education University, Malaysia Full Text
246 16 5 Incorporating Cross-Cultural Design into the User Interface Bahareh Nejati1, Ravi Teja Manchi2 and Damian Schofield3, 1Virginia Polytechnic Institute and State University, USA 2Motorola Solutions, USA, 3State University of New York, USA Full Text
247 16 5 Enhancing Engagement in Learning Management Systems using Gamification Framework Maizan Mat Amin, Syadiah Nor Wan Shamsuddin and Wan Mohd Amir Fazamin Wan Hamzah, Universiti Sultan Zainal Abidin, Malaysia Full Text
248 16 6 Analyzing Performance Patterns and User Experience in Online Cybersecurity Challenges: Insights from SKRCTF Khoo Li Jing 1,2, Maizatul Hayati Mohamad Yatim 1, and Wong Yoke Seng 1, 1 Sultan Idris Education University, Malaysia 2 University of Wollongong Malaysia, Malaysia Full Text

International Journal of Computer Graphics & Animation (IJCGA)

249 14 1/2/3/4 The Evolution of Volumetric Video: A Survey of Smart Transcoding and Compression Approaches Preetish Kakkar1 and Hariharan Ragothaman2, 1Adobe, USA, 2Athena Health, USA Full Text

International Journal of Artificial Intelligence & Applications (IJAIA)

251 15 1 A Comprehensive Systematic Review for Cardiovascular Disease using Machine Learning Techniques Islam D. S. Aabdalla and D.Vasumathi, JNTUH University, India Full Text
252 15 1 Imbalanced Dataset Effect on CNN-Based Classifier Performance for Face Recognition Miftah Asharaf Najeeb and Alhaam Alariyibi, University of Benghazi, Libya Full Text
253 15 1 Ensemble Learning Approach for Digital Communication Modulation’s Classification Yahya Benremdane, Said Jamal, Oumaima Taheri, Jawad Lakziz and Said Ouaskit, University Hassan II, Morocco Full Text
254 15 1 Review of AI Maturity Models in Automotive SME Manufacturing Dharmender Salian, University of the Cumberlands, USA Full Text
255 15 1 Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture Shahriyar Guliyev, Nakhchivan State University, Azerbaijan Full Text
256 15 1 Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and Neural Network Algorithms Said Jamal, Jawad Lakziz, Yahya Benremdane and Said Ouaskit, University Hassan II, Morocco Full Text
257 15 1 Wavelet Scattering Transform for ECG Cardiovascular Disease Classification Islam D.S. Aabdalla and D.Vasumathi, JNTUH University, India Full Text
258 15 1 A Machine Learning Ensemble Model for the Detection of Cyberbullying Abulkarim Faraj Alqahtanil,2 and Mohammad Ilyas1, lFlorida Atlantic University, USA, 2King Khalid Military Academy, Saudi Arabia Full Text
259 15 1 An Improved mT5 Model for Chinese Text Summary Generation Fuping Ren2, Jian Chenl, and Defu Zhangl, lXiamen University, China, 2Shenzhen Comtech Technology Co. Ltd, China Full Text
260 15 2 The Transformation Risk-Benefit Model of Artificial Intelligence: Balancing Risks and Benefits Through Practical Solutions and Use Cases Richard Fultonl, Diane Fulton2, Nate Hayes3 and Susan Kaplan3, lTroy University, USA, 2Clayton State University USA, 3Modal Technology, USA Full Text
261 15 2 Employee Attrition Prediction using Machine Learning Models: A Review Paper Haya Alqahtani, Hana Almagrabi and Amal Alharbi, King Abdulaziz University, Kingdom of Saudi Arabia Full Text
262 15 2 Research on Fuzzy C- Clustering Recursive Genetic Algorithm based on Cloud Computing Bayes Function Wang Xu1 and Huang Wei Qiang2, 1Neusoft Institute, China, 2South China Normal University, China Full Text
263 15 2 Information Extraction from Product Labels: A Machine Vision Approach Hansi Seitaj and Vinayak Elangovan, Pennsylvania State University, USA Full Text
264 15 2 Immunizing Image Classifiers Against Localized Adversary Attacks Henok Ghebrechristos and Gita Alaghband, University of Colorado-Denver, Colorado Full Text
265 15 3 Deep Learning for Smart Grid Intrusion Detection: A Hybrid CNN-LSTM-Based Model Abdulhakim Alsaiari and Mohammad Ilyas, Florida Atlantic University, USA Full Text
266 15 3 PhotoQR: A Novel ID Card with an Encoded View Livio Tenze and Enrique Canessa, The Abdus Salam International Center for Theoretical Physics, Italy Full Text
267 15 3 Is Prompt Engineering a Profession? Zişan Cihangir IŞIN1, Hilal FIDAN1, Beyşan Tarık IŞIN2, Erşan IŞIN3, and Tamer IŞIN4, 1ZEB Innovation, Turkey 2IMED Surgical Teknoloji, Turkey, 3IŞIN Yazılım ve Teknoloji, Turkey, 4IMED Surgical LLC, USA Full Text
268 15 3 Systematic Review of Models Usedto Handle Class Imbalance in Anomaly Detection for Energy Consumption David Kaimenyi Marangu, Stephen ThiiruNjenga and Rachael Njeri Ndung’u, Murang’a University of Technology, Kenya Full Text
269 15 3 Classifying Emergency Patients into Fast-Track and Complex Cases using Machine Learning Ala’ Karajeh and Rasit Eskicioglu, University of Manitoba, Canada Full Text
270 15 4 Enhance the Detection of DoS and Brute Force Attacks within the MQTT Environment Through Feature Engineering and Employing an Ensemble Technique Abdulelah Al Hanif and Mohammad Ilyas, Florida Atlantic University, USA Full Text
271 15 4 Exploring AI Applications for Addressing Alternative Conceptions in Teaching Physics: Focus on Electrical Circuits at the Secondary Level Gabriel Dias De Carvalho Junior1 and Ivan Targino Ponciano Filho2, 1University of Namur & Catholic University of Louvain, Belgium, 2University Vale do Sapucaí, Brazil Full Text
272 15 4 Comparing LLMs using a Unified Performance Ranking System Maikel Leon, University of Miami, USA Full Text
273 15 4 Leveraging Naive Bayes for Enhanced Survival Analysis in Breast Cancer Muhammad Garba, Muhammad Abdurrahman Usman and Anas Muhammad Gulumbe, Kebbi State University of Science & Technology, Nigeria Full Text
274 15 5 Artificial Intelligence Approaches for Predicting Diabetes in Egypt Ayah H. Elsheikh1, Hossam A. Ghazi2 and Nancy Awadallah Awad3, 1Sadat academy for Management Sciences, Egypt 2Mansoura University, Egypt, 3Sadat Academy for Management Sciences, Egypt Full Text
275 15 5 AutoEncoder Convolutional Neural Network for Pneumonia Detection Michael Nosa-Omoruyi and Linda U. Oghenekaro, University of Port Harcourt, Nigeria Full Text
276 15 5 Revolutionizing Land Cover Analysis: A Systematic Review of Geospatial Intelligence with Classification and Segmentation Vinothkumar Kolluru1, Sudeep Mungara2, Advaitha Naidu Chintakunta3, Lokesh Kolluru4, Charan Sundar Telaganeni5, 1Senior Data Scientist, USA, 2Data Scientist, USA, 3Software Development Engineer, USA 4Transportation Engineer, USA, 5Python Developer, USA Full Text
277 15 5 Transformer-Based Regression Models for Assessing Reading Passage Complexity: A Deep Learning Approach in Natural Language Processing Harmanpreet Sidhu and Amr Abdel-Dayem, Laurentian University, Canada Full Text
278 15 5 A Multifaceted AI-Driven Radio Network George Sturm, Radio Logos, Albania Full Text
279 15 5 Quantum Computing and the Implications on Online Security Nishant Gadde1, Avaneesh Mohapatra2, Navnit Vijay3, Siddhardh Manukonda1, Daiwik Shashikanth4 1Jordan High School, USA, 2West Forsyth High School, USA, 3Acellus Private Academy, USA, 4South Forsyth High School, USA Full Text
280 15 5 Neuro-Adaptive AI for Dynamic Distraction Mitigation in Autonomous Vehicle Environments Vivek Ghulaxe, Publix Technology, USA Full Text
281 15 6 Empowering Cloud-native Security: the Transformative Role of Artificial Intelligence Bhanu Prakash Manjappasetty Masagali1 and Mandar Nayak2 1Leading Long Term Care Insurance Provider in USA, 2Leading Healthcare Insurance Provider in USA Full Text
282 15 6 A Comparative Analysis of Class Imbalance Handling Techniques for Deep Models in the Detection of Anomalies in Energy Consumption David Kaimenyi Marangu, Stephen Thiiru Njenga and Rachael Njeri Ndung’u Murang’a University of Technology, Kenya Full Text
283 15 6 The Role of Internet of Things and Fog Computing in Smart Cities Houda ERREGUI1, Achraf EL AOUAQI2, Hicham ABERBACH2 and Abdelouahed SABRI2 1University of Education Sciences, Morocco, 2University of Sidi Mohamed Ben Abdellah, Morocco Full Text
284 15 6 AI for IOMT Security: a Survey of Intrusion Detection Systems, Architectures, Attacks and Challenges Ghaida Balhareth, Mohammad Ilyas , and Basmh Alkanjar, Florida Atlantic University, USA Full Text

International Journal of Fuzzy Logic Systems (IJFLS)

285 14 1 Enhancing Everyday Interactions: The Future of Ambient Intelligence Partha Sarathi Samal, USA Full Text

International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

286 13 1 AI in Test Automation: Overcoming Challenges, Embracing Imperatives Rohit Khankhoje, Independent Researcher, USA Full Text
287 13 1 Early Detection of Parkinson Disease through
Biomedical Speech and Voice Analysis
Pawan Kumar Badhan1, 2 and Manjeet Kaur1,
1Pyramid College of Business And Technology, India, 2Australian Computer Society, Australia
Full Text
288 13 2 A Comprehensive Guide to Testing AI Application Metrics Chintamani Bagwe and Kinil Doshi, Citibank, USA Full Text
289 13 2 Optimisation of Logistic Operations using AI Semen Levin, Tomsk State University of Control
Systems and Radio Electronics, Russia
Full Text
290 13 2 Elements of Legislation for Artificial Intelligence Systems Anna Romanova, Moscow Institute of Physics and Technology (National Research University), Russia Full Text
291 13 2 Harnessing Artificial Intelligence and Blockchain Technology to Enhance Team Productivity Shrikarnag Bangalore Prahallada, Ranjitha Sridhar Rao, Lohith Dayananda Ram, Shrivatsa Bangalore Prahallada and Deepashree Abhaya, Tymeline Inc, USA Full Text
292 13 3/4 Fuzzy Logic-Driven Natural Language Processing in Pharma Supply Chain Analytics Abhik Choudhury, IBM Corporation, USA Full Text

Machine Learning and Applications: An International Journal (MLAIJ)

293 11 1 Thelxinoë: Recognizing Human Emotions Using Pupillometry and Machine Learning Darlene Barker1 and Haim Levkowitz2, 1Rivier University, USA, 2University of Massachusetts, USA Full Text
294 11 2 Text-Based Detection of On-Hold Scripts in Contact Center Calls Dmitrii Galimzianov and Viacheslav Vyshegorodtsev, DeepSound.AI, Kazakhstan Full Text
295 11 2 Developing an Android-based Adaptive Data Acquisition System Powered by Big Data Analysis Priyank Singh Tanvi Hungund and Shobhit Kukreti Full Text
296 11 2 Leveraging Machine Learning to Enhance Information Exploration Nikhil Ghadge, Software Architect, Workforce Identity Cloud, Okta.Inc Full Text
297 11 3 Sensitivity Analysis of Word Importance using GPT Model: A Ranking XAI Approach with Attention Weights and KL Divergence Arav Agarwal1 and Rhea Mahajan2, 1India, 2University of Jammu, India Full Text
298 11 3 Artificial Intelligence: An Experiential Learning Tool to Acquire Knowledge and Enhance Creativity Epilogue Jedishkem1 and Jesfaith Jedishkem2, 1Ngwane College, Eswatini, 2Freelance Artist Researcher, Eswatini Full Text
299 11 4 Empirical Analysis of the Bias-Variance Tradeoff Across Machine Learning Models Hardev Ranglani, EXL Service Inc, USA Full Text
300 11 4 Comparative Analysis of Clustering Algorithms on Synthetic Circular Patters Data Hardev Ranglani, EXL Service Inc, USA Full Text

Signal & Image Processing: An International Journal (SIPIJ)

301 15 1/2 PSO-HRVSO: Segmentation of Retinal Vessels Through Homomorphic Filtering Enhanced by PSO Optimization Niladri Halder1, Dibyendu Roy2, Partha Pratim Sarkar2, Sankar Narayan Patra1, Subhankar Bandyopadhyay1, 1Jadavpur University, India, 2Burdwan University, India Full Text
302 15 3 PExploring Deep Learning Models for Image Recognition: A Comparative Review Siddhartha Nuthakki1, Sai Kalyana pranitha buddiga2 and Sonika Koganti3, 1First Object Inc, USA 2Independent Researcher, USA, 3Software Engineer, USA Full Text
303 15 4 A Prony Method Variant which Surpasses the Adaptive LMS Filter in the Precision of the Output Signal’s Representation of the Input Parthasarathy Srinivasan, Bee Hive Software Solutions, USA Full Text
304 15 5/6 The X-ray Euclidean Synthetic Image Halah Ahmad AbdAlmeneem, Jazan University, Saudi Arabia Full Text

International Journal on Soft Computing (IJSC)

305 15 1/2 Enhancing Software Supply Chain Resilience: Strategy for Mitigating Software Supply Chain Security Risks and Ensuring Security Continuity in Development Lifecycle Akinsola Ahmed and Akinde Abdullah, Austin Peay State University, USA Full Text
306 15 3 Evaluating Racial Bias in Large Language Models: The Necessity for “SMOKY” Janga Bussaja, Independent Researcher, USA Full Text
307 15 3 Fuzzy Cognitive Maps Bridging Transparency and Performance in Hybrid AI Systems Maikel Leon, University of Miami, USA Full Text
308 15 3 The Optimization of Weight Functions of R3,1 Space Time by the Echo State Network Sadataka Furui1 and Serge Dos Santos2, 1Teikyo University, Japan, 2Universite de Tours, France Full Text





menu
Reach Us

emailsecretary@airccse.org


emailjsecretary@airccj.org

close