Computer Science & Information Technology
| S.No | Volume | Issue | Paper Title | Authors |
|---|
International Journal of Computer Science & Information Technology (IJCSIT)
| 1 | 17 | 1 | Artificial Intelligence and Machine Learning Algorithms Are Used to Detect and Prevent Cyber Threats as Well as Their Potential Impact on the Future of Cybersecurity Practices | Md Al Amin, St. Francis College, United States | Full Text |
| 2 | 17 | 1 | Enhancing Public Reputation Systems: Trust Scaling to Mitigate Voter Subjectivity | Manh Hung Nguyen, Posts and Telecommunications Institute of Technologies (PTIT), Vietnam | Full Text |
| 3 | 17 | 2 | The Study of Artificial Intelligent Building Automation Control System in Hong Kong Commercial Building | Tony Tsang, Chang Kam Fai, Hong Kong College of Technology, China | Full Text |
| 4 | 17 | 3 | Hybrid Transformer-Based Classification for Web-Based Injection Attack Detection: A Novel Roberta-XLNet Approach | Ranuja Seethawaka, Chathurya Nambuwasam, D.K.W.G.G.T. Chandrasiri, K.A.S. Kavithma, Harinda Fernando and Ayesha Wijesooriya, Sri Lanka Institute of Information Technology, Sri Lanka | Full Text |
| 5 | 17 | 3 | Applying Cfahp to Explore the Key Models of Semiconductor Pre-Sales | Fei-Hon Kao, Chia-Hsiang Hsieh and Wen Pei, Chung Hua University, Taiwan | Full Text |
| 6 | 17 | 4 | Hard-Soft Data Fusion with ChatGPT: Toward Structured Representations and Automated Reasoning | Nicholas Gahman and Vinayak Elangovan, Penn State University Abington, USA | Full Text |
| 7 | 17 | 4 | Developing an Intelligent System based on Machine Learning Technology for Electronic Waste Management in the Field of Education | Amany Fathy Mohamed Ibrahim Metwaley 1, Elsaeed Elsaeed Mohamed Abd-ElRazik 2 and Rasha Kandil Mohamed Kandil Arafa 2, 1 Egypt, 2 Damietta University, Egypt | Full Text |
| 8 | 17 | 4 | Analysis of Evaluation Indicators for the Friendliness of Sports Venues to Individuals with Lower Limb Disabilities | Han-Chen Huang, Chung Hua University, Taiwan | Full Text |
| 9 | 17 | 4 | AI-Driven Strategies of Mitigating Cybersecurity Threats in U.S. Small and Medium Enterprises (SMEs) | Kemisola Kasali 1, Precious Orekha 2, Oluwaseun John Bamigboye 3, Afolabi Sabur Ajao 4, Peter O. Alawiye 5, Adeola Noheemot Raji 6, 1 University of Arkansas at Little Rock, USA, 2 Drexel University, USA, 3 California Miramar University, USA, 4 Northwestern University, USA, 5 New Mexico Highlands University, USA, 6 University of New Haven, USA | Full Text |
| 10 | 17 | 5 | Optimizing Global Finance: SAP S/4HANA Central Payments & Reconciliation with Cloud Analytics | Surendra Annanki, Numeric Technologies Inc., USA | Full Text |
| 11 | 17 | 5 | AI-Native Wireless Networks: Transforming Connectivity, Efficiency, and Autonomy for 5G/6G and Beyond | Akheel Mohammed 1, Zubair Ahmed Mohammed 2, Naveed Uddin Mohammed 2, Shravan Kumar Gunda 3, Mohammed Azmath Ansari 4 and Mohd Abdul Raheem 5, 1University of the Cumberlands, USA, 2Lindsey Wilson College, USA, 3Northwestern Polytechnic University, USA, 4Concordia University, USA, 5State University of New York Institute of Technology, USA | Full Text |
| 12 | 17 | 5 | Architectural Effectuation of Convolutional Homeomorphic Error-Correcting Codes using Nano Controlled-Selectors and Lattice Networks | Anas N. Al-Rabadi, The University of Jordan, Jordan | Full Text |
| 13 | 17 | 5 | Harnessing Artificial Intelligence for Public Health and Epidemiology: Opportunities, Barriers, and Pathways to Equitable Global Impact | Shanavaz Mohammed 1, Nasar Mohammed 2, Sruthi Balammagary 1, Sireesha Kolla 3, Srujan Kumar Ganta 4 and Shuaib Abdul Khader 5, 1University of the Cumberlands, USA, 2Valparaiso University, USA, 3National Institutes of Health, USA, 4JNTU, India, 5Concordia University, USA | Full Text |
| 14 | 17 | 5 | Responsible AI Analytics for Real-World Impact: Navigating Ethics, Privacy and Trust | Ghousia Sultana 1, Siraj Farheen Ansari 1, Mohammed Imran Ahmed 2, Abdul Faiyaz Shaik 1, Moin Uddin Khaja 3 and Bibhu Dash 4, 1Trine University, USA, 2Campbellsville University, USA, 3Lindsey Wilson College, USA, 4University of the Cumberlands, USA | Full Text |
| 15 | 17 | 5 | AI-Driven CTI for Business: Emerging Threats, Attack Strategies, and Defensive Measures | Mohammed Kashif 1, Mohammed Aasimuddin 2, Mubashir Ali Ahmed 3, Laxmi Bhavani Cheekatimalla 4, Eraj Farheen Ansari 5 and Ahwan Mishra 6, 1Jamia Millia Islamia University, India, 2Campbellsville University, USA, 3University of the People, USA, 4Kakatiya University, India, 5East-West University, USA, 6USA | Full Text |
| 16 | 17 | 5 | AI-Augmented Safety Management in Construction | Abdul Faisal Mohammed 1, Shahnawaz Mohammed 1, Abdul Raheman Mohammed 2 and Syed Abdullah Kamran 1, 1Trine University, USA, 2Lindsey Wilson College, USA | Full Text |
| 17 | 17 | 6 | IOT-Based Smart Building Monitoring and Control Strategies with Intelligence Deep Neural Networks | Tony Tsang and Yau Ka Hei, Hong Kong College of Technology, Hong Kong | Full Text |
| 18 | 17 | 6 | Mastering Penetration Testing: The Ethical Hacker’s Toolkit for Uncovering Vulnerabilities | Mohammad Abdus Salam and Amera Firdous, Chicago State University, USA | Full Text |
| 19 | 17 | 6 | A Data-Driven Predictive Framework for Inventory Optimization using Context-Augmented Machine Learning Models | Anees Fatima and Mohammad Abdus Salam, Chicago State University, USA | Full Text |
| 20 | 17 | 6 | A Decentralized Academic Certificate Issuance System using Smart Contracts on the Tron Network | Ana Julia Evangelista Andrade and Flavio Cezar Amate, Federal Institute of Education, Science and Technology of São Paulo (IFSP), Brazil | Full Text |
Computer Science & Engineering: An International Journal (CSEIJ)
| 1 | 15 | 1 | Exploring IoT and Machine Learning Integration for Soil Nutrients Monitoring and Crop Recommendation: A Survey | Vijaya R. Khemnar and Mininath R. Bendre, Pravara Rural Engineering College, India | Full Text |
| 2 | 15 | 1 | Machine Learning-based Classification of Indian Caste Certificates using GLCM Features | Subramani C, Suresh R and Muralidhara B L, Bangalore University, India | Full Text |
| 3 | 15 | 1 | Detection of Dyslexia and Dyscalculia in Children | Jawahar Jonathan, Bharathi K, Haripriya Khajuria, Lavanya J C, M Jyoshitha and Meghna Keshri, Acharya Institute of Technology, India | Full Text |
| 4 | 15 | 1 | A Survey on a Model for Pesticide Recommendation using Machine Learning | Vijaya lakshmi S Abbigeri and Geetha D Devanagavi, REVA University, India | Full Text |
| 5 | 15 | 1 | Comprehensive Privacy Preservation for Images and Videos using Machine Learning and Encryption | Abhishek Tanaji Halakate, Ayushma Shambhavi and Chhaya Suryabhan Dule, Acharya Institute of Technology, India | Full Text |
| 6 | 15 | 1 | Fire and Smoke Detection for Wildfire using YOLOV5 Algorithm | Bharathi K, Jawahar Jonathan K, Satyabhama, Shobharani C N, Sridevi and Bhagyashree K Itagi, Acharya Institute of Technology, India | Full Text |
| 7 | 15 | 1 | Plant Leaf Diseases Detection using Deep Learning and Novel CNN | Vidya Bhushan and Reshma, Acharya Institutes of Technology, India | Full Text |
| 8 | 15 | 1 | Contrastive Learning in Image Style Transfer: A Thorough Examination using CAST and UCAST Frameworks | Raju Soniya and G Babu, Acharya Institute of Technology, India | Full Text |
| 9 | 15 | 1 | Smart Agriculture Irrigation System using IoT | Shiwali Yadav, Pawan Kumar, Aman Kumar Mishra, Monika Tiwari, Utkarsh Kumar and Gursahib Singh, Chandigarh University, India | Full Text |
| 10 | 15 | 1 | Hybrid Attention Mechanisms in 3D CNN for Noise-Resilient Lip Reading in Complex Environments | Prabhuraj Metipatil and Pranav SK, REVA University, India | Full Text |
| 11 | 15 | 1 | Screening Brain Tumors from MRI Images with Deep Learning Approaches | Savitha Shetty1, Saritha Shetty1, Sowmya M R2, Priya Kamath B3 and Sowmya M R4, 1NMAMIT (Nitte Deemed to be University), India, 2NMIT Bangalore, India, 3Manipal Institute of Technology, India, 4National Institute of Technology Karnataka, India | Full Text |
| 12 | 15 | 1 | Smart Hydroponics: Solar Powered Hydroponics System using Dual Axis Solar Tracker | Savitha Shetty1, Saritha Shetty1, Joshva Rodrigues1, Priya Kamath B2 and Sowmya M R3, 1NMAMIT (Nitte Deemed to be University), India, 2Manipal Institute of Technology, India, 3NMIT, India | Full Text |
| 13 | 15 | 1 | Enhancing Student Engagement and Personalized Learning through AI Tools: A Comprehensive Review | Boya Durga Bhavani, Rajeshwari Shetty and Mahesh D M, Acharya Institute of Graduate Studies, India | Full Text |
| 14 | 15 | 1 | RNN-GAN Integration for Enhanced Voice-Based Email Accessibility: A Comparative Study for Visually Impaired Users | A R Deepti1, Vivek K1, Farzeen Basit1 and B Manimekala2, 1Acharya Institute of Graduate Studies, India, 2Christ University, India | Full Text |
| 15 | 15 | 1 | Artificial Intelligence and Machine Learning Based Plant Monitoring | Shrutika C Rampure, Bhavyashree S P and Rakshitha B T, Acharya Institute of Technology, India | Full Text |
| 16 | 15 | 1 | Enhancing Surveillance System through Edge Computing: A Framework For Real-Time Human Detection | Ranjan G, S Akshatha, Sandeep N and Vasanth A, Acharya Institute of Technology, India | Full Text |
| 17 | 15 | 1 | Mind-Balance: AI-Powered Mental Health Assistant | Hussana Johar R B, Yashaswini M, Yasin Malik, Yogashree B S and Vinay V, ATMECE, India | Full Text |
| 18 | 15 | 1 | AI-Enabled Fruit Decay Detection | Varalakshmi B D, Vijayalakshmi S A, M Kavya Sree, Ayushi Raj, Deepika Divya and Anubhav Tekriwal, Acharya Institute of Technology, India | Full Text |
| 19 | 15 | 1 | Sentiment Patterns in YouTube Comments: A Comprehensive Analysis | Savitha Shetty1, Saritha Shetty1, Priya Kamath B2 and Deepthi Shetty3, 1NMAMIT (Nitte Deemed to be University), India, 2Manipal Institute of Technology, India, 3NMIT, India | Full Text |
| 20 | 15 | 1 | Soil Analysis, Disease Detection and Pesticide Recommendation for Farmers using AI and ML | Vijayalakshmi S A, Varalakshmi B D, Rohith R, Sanjay L Y, Shashiraj Shetty and Prasad M J, Acharya Institute of Technology, India | Full Text |
| 21 | 15 | 1 | AI Powered Crop Recommendation and Yield Prediction System | Akash S, Harshitha B R, Nandini R and Kavya S, Acharya Institute of Technology, India | Full Text |
| 22 | 15 | 1 | Fake News Detection using Machine Learning Techniques | Sushmitha R, Rakshitha B T and Shrutika C Rampure, Acharya Institute of Technology, India | Full Text |
| 23 | 15 | 1 | AI Based Road Accident Detection and Alert System | Rahul Kumar, Karthik S and Manjunath B, REVA University, India | Full Text |
| 24 | 15 | 1 | A Smart Healthcare Monitoring System using IoT and Machine Learning | Priyanka S, Varsha K and Raghavendra B, Acharya Institute of Technology, India | Full Text |
| 25 | 15 | 1 | Handwritten Digit Recognition using Deep Neural Networks | Sanjana R, Divya S and Megha N, Acharya Institute of Technology, India | Full Text |
| 26 | 15 | 1 | AI Driven Traffic Management System for Smart Cities | Kiran Kumar H, Sagar B and Harsha V, Bangalore University, India | Full Text |
| 27 | 15 | 1 | AI Based Chatbot for Student Assistance in Universities | Sneha M, Pooja S and Nikhil R, REVA University, India | Full Text |
| 28 | 15 | 1 | IoT Based Smart Waste Management System | Arjun P, Rakesh Kumar and Nithin S, Acharya Institute of Technology, India | Full Text |
| 29 | 15 | 1 | Blockchain Based Secure Voting System | Harish Kumar, Deepak R and Varun S, Bangalore Institute of Technology, India | Full Text |
| 30 | 15 | 1 | Deep Learning Approach for Skin Disease Classification | Ananya Sharma, Pooja Verma and Ritu Singh, Delhi Technological University, India | Full Text |
| 31 | 15 | 1 | Speech Emotion Recognition using Deep Learning | Praveen Kumar, Sneha Gupta and Aditi Mishra, VIT University, India | Full Text |
| 32 | 15 | 1 | AI Based Intrusion Detection System for Network Security | Rahul Sharma, Akash Verma and Nitin Gupta, Chandigarh University, India | Full Text |
| 33 | 15 | 1 | Automated Attendance System using Face Recognition | Rohit Singh, Aman Gupta and Shubham Jain, Lovely Professional University, India | Full Text |
| 34 | 15 | 1 | Cloud Based E-Learning Platform with AI Recommendation System | Pallavi Desai, Nikhil Patil and Sneha Kulkarni, Pune University, India | Full Text |
| 35 | 15 | 2 | Theoretical and Conceptual Fundamentals of System Computing – Quantum Oscillatory TQC/NMSI | Sergiu Vasili Lazarev, Researcher in Theoretical Physics and Cosmology, Romania | Full Text |
| 36 | 15 | 3 | Can We Trust Machines? A Critical Look at Some Machine Translation Evaluation Metrics | Muhammad Zayyanu Zaki and Nazir Ibrahim Abbas, Usmanu Danfodiyo University, Nigeria | Full Text |
| 37 | 15 | 4/5 | Secure Integration of LLMs with Production Databases through Context Based Data Anonymization | Hassane Tahir1 and Patrick Brezillon2, 1Université Paris Cité, France, 2LIP6 - Sorbonne Université, France | Full Text |
| 38 | 15 | 6 | Modeling and Simulation of Data Protection Systems for Business Continuity and Disaster Recovery | Sašo Nikolovski1 and Pece Mitrevski2, 1AUE-FON University, North Macedonia, 2University St. Kliment Ohridski, North Macedonia | Full Text |
International Journal of Computer Science and Engineering Survey (IJCSES)
| 1 | 16 | 1/2/3/4/5 | Steganography Research Landscape: A Brief Century-Long Bibliometric Study | Eltyeb Elsamani1 and Yousif Elsamani2, 1AL-Neelain University, Sudan, 2The University of Tokyo, Japan | Full Text |
International Journal of Computer Science, Engineering and Applications (IJCSEA)
| 55 | 14 | 1/2/3/4 | Estimation Formula for Indirect Value Realization of Virtual Meetings | Fatima A. Al Roomi and Hafed A. Al Ghamdi, Saudi Arabia | Full Text |