×
keyboard_arrow_up

Computer Science & Information Technology

S.No Volume Issue Paper Title Authors

International Journal of Computer Science & Information Technology (IJCSIT)

1 15 1 Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA Full Text
2 15 1 Prediction of Anemia using Machine Learning Algorithms Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal Full Text
3 15 1 Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA Full Text
4 15 1 Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines Kouassi Konan Jean-Claude, Bircham International University, Spain Full Text
5 15 1 Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality Thongchai Jeeradist, Kasem Bundit University, Thailand Full Text
6 15 1 Behavioural Analytics in Cyber Security for Digital Forensics Application Martin Luther Bwangah, Kabarak University, Kenya Full Text
7 15 2 Application Security Self-Efficacy of Software Developers: A Correlational Study Wisdom Umeugo, Independent Researcher, Canada Full Text
8 15 2 Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey Full Text
9 15 2 Linear Feedback Shift Register Genetically Adjusted for Sequence Copying Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico Full Text
10 15 2 The Development of Climate Agrometeorological Application for Farmers in Namibia Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia Full Text
11 15 3 A Novel Exploit Traffic Traceback Method Based on Session Relationship Yajing Liu, Ruijie Cai, Xiaokang Yin and Shengli Liu, State Key Laboratory of Mathematical Engineering and Advanced Computing, China Full Text
12 15 3 Confidential Computing in Edge- Cloud Hierarchy Yeghisabet Alaverdyan1,2, Suren Poghosyan2 and Vahagn Poghosyans2,3, 1EKENG CJSC, Armenia, 2Institute for Informatics and Automation Problems of NAS RA, Armenia, 3Synopsys, Armenia Full Text
13 15 3 The Design of a Lighting System for Hong Kong International Airport APM Tunnel for Energy Saving with Artificial Intelligence (AI) Lighting Defect Detection System Tony Tsang and Chan Shui Hin, Hong Kong College of Technology, Hong Kong Full Text
14 15 3 Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges Delali Kwasi Dake, University of Education, Ghana Full Text
15 15 3 A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate Modeling Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao, Sun Yat-Sen University, China Full Text
16 15 3 Development of a Prototype for Census and Enumeration: A Case Study of Namibia Theodora Mukaya, Johanna Nelulu, V Hashiyana and Chris M, Mazila, University of Namibia, Namibia Full Text
17 15 4 Recent Advancements in the Field of Deepfake Detection Natalie Krueger1, Mounika Vanamala1 and Rushit Dave2, 1University of Wisconsin-Eau Claire, USA, 2Minnesota State University, USA Full Text
18 15 4 Detection of Structured Query Language Injection Attacks Using Machine Learning Techniques Taapopi John Angula and Valerianus Hashiyana, University of Namibia, Namibia Full Text
19 15 4 Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning Approach Md. Tofael Ahmed1,2, Nahida Akter1, Maqsudur Rahman1, Abu Zafor Muhammad Touhidul Islam2, Dipankar Das2 and Md. Golam Rashed2, 1Comilla University, Bangladesh, 2University of Rajshahi, Bangladesh Full Text
20 15 4 Wi-Fi Data Analysis based on Machine Learning Nanumura Gedara Umal Anuraga Nanumura, University of South Wales, United Kingdom Full Text
21 15 4 Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers Alexander Veach and Munther Abualkibash, Eastern Michigan University, USA Full Text
22 15 4 Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust, Peer Influences, Perceived Usefulness and Ease of Use Waleed Al-Ghaith, Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia Full Text
23 15 4 Understanding the Role of Customer Trust in E-Commerce Istiak Khan and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia Full Text
24 15 4 Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary Indicator in Municipalities of North Cotabato,Philippines Michaelangelo R. Serrano, Nero L. Hontiveros, EJ Ryle C. Mosquera, Aura Mae M. Celestino, John Louie D. Vilar, Junuel S. Baroy and Mitziel C. Gelbolingo, Notre Dame of Midsayap College, Philippines Full Text
25 15 4 A Systematic Review on the Effectiveness of Using User-Generated Content in E-Commerce Marketing Jubaer Akhter and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia Full Text
26 15 5 Secure Arcade: A Gamified Defense Against Cyber Attacks Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber and Mounika Vanamala, University of Wisconsin-Eau Claire, USA Full Text
27 15 5 Analysis of the Relationship between Self-Esteem and Depression Rosalba Cuapa C., Adair Ponce, Meliza Contreras, Mireya Tovar and Fernando Zacarias F., Universidad Autónoma de Puebla, México Full Text
28 15 6 An Adaptive Network-Based Approach for Advanced Forecasting of Cryptocurrency Values Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA Full Text
29 15 6 Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-Based Techniques Omar Shatnawi, Al al-Bayt University, Jordan Full Text
30 15 6 The Alignment between International and National Academic Accreditations - An Application in Information Systems Bachelor Program at Kingdom of Saudi Arabia Rania A. Aboalela, King Abdulaziz University, Saudi Arabia Full Text
31 15 6 Revealing the Foundations: The Strategic Influence of Test Design in Automation Rohit Khankhoje, Independent Reseacher, USA Full Text

International Journal of Computer Science and Engineering Survey (IJCSES)

32 14 1/2/3/4 Barriers for Females to Pursue Stem Careers and Studies at Higher Education Institutions (HEI). A Closer Look at Academic Literature Elizaveta Tereshchenko1, Ari Happonen1 and Victoria Hasheela-Mufeti2, 1LUT University, Finland, 2University of Namibia, Namibia Full Text
33 14 1/2/3/4 5G Vs Wi-Fi Indoor Positioning: A Comparative Study Even Becker and Hans D. Schotten, RPTU Kaiserslautern-Landau, Germany Full Text
34 14 5/6 Navigating the Integration of 360 Mixed Reality in Cloud Computing Koffka Khan, The University of the West Indies, Trinidad and Tobago Full Text

Computer Science & Engineering: An International Journal (CSEIJ)

35 13 1 Agent-based Simulation for University Students Admission: Medical Colleges in Jordan Universities Suha Khalil Assayed, Piyush Maheshwari, British University in Dubai, UAE Full Text
36 13 2 Fuzzy Assessment of the “5 E’s” Instructional Treatment for Teaching Mathematics to Engineering Students Michael Gr. Voskoglou, University of Peloponnese, Greece Full Text
37 13 2 A Review of Agent-Based Simulation for University Students Admission Suha Khalil Assayed and Piyush Maheshwari, British University, UAE Full Text
38 13 2 A Wireless Device to Modular Robotized Instrument for Health Information Veronika Ivanova1, Ani Boneva2, Stoyan Ivanov2 and Plamen Vasilev3, 1Institute of Robotics, Bulgaria, 2Institute of Information and Communication Technologies, Bulgaria, 3Industrial Automation University of Chemical Technologies and Metallurgy, Bulgaria Full Text
39 13 2 A Cybersecurity and Digital Risk Assessment: A Family Case Study Suha Khalil Assayed, British University, UAE Full Text
40 13 3 Soft Computing: Contents, Techniques and Application Michael Gr. Voskoglou, University of Peloponnese, Greece Full Text
41 13 4 Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem Emmanuel Etuh1, Francis S. Bakpo1, George E. Okereke1 and David Omagu2, 1University of Nigeria, Nigeria,
2Kwararafa University, Nigeria
Full Text
42 13 5/6 Comparative Analysis of Verbal Languages for Computing to Determine Which Language Possesses the Highest Efficacy and Computational Logic for Compiler Optimization Bodle, W. L., McKenney, M., Segura, D., & Trafton, C., California Baptist University, USA Full Text
43 13 5/6 Lightweight Certificateless Authenticated Key Agreement Protocol Mwitende Gervais, Pivot Access Ltd, Rwanda Full Text

International Journal of Computer Science, Engineering and Applications (IJCSEA)

44 13 1 Estimation of Persistence at a Community College: A Comparison of Alternative Machine Learning Models Fermin Ornelas, Maricopa Community Colleges, USA Full Text
45 13 1 Organ Donation Management System (Project: ODMS) Abhay Yadav, Ariful Islam, Vasa Uday Kiran, Chitroju Naga Sai Jagadeesh, Gagandeep Singh, Lovely Professional University, India Full Text
46 13 2/3/4 Embedded Systems and Software: Enabling Innovation in the Digital Age Ali Shahdoust Moghadam, Nexide B.V., Netherlands Full Text
47 13 2/3/4 Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ Performance in NS-2 Ferdinand Alifo1, Mustapha Awinsongya yakubu2, Martin Doe3 and Michael Asante4, 1Local Gov’t Service, Ghana, 2University of Cincinnati Ohio, USA, 3University of Business and Integrated Development Studies, Ghana, 4Kwame Nkrumah University of Science and Technology, Ghana Full Text

International Journal on Information Theory (IJIT)

48 12 1/2/3 On Run-Length-Constrained Binary Sequences Zaharias M. Psillakis, University of Patras, Greece Full Text

International Journal on Natural Language Computing (IJNLC)

49 12 1 Location-based Sentiment Analysis of 2019 Nigeria Presidential Election using a Voting Ensemble Approach Ikechukwu Onyenwe1, Samuel N.C. Nwagbo1, Ebele Onyedinmav1, Onyedika Ikechukwu-Onyenwe1, Chidinma A. Nwafor2 and Obinna Agbata1, 1Nnamdi Azikiwe University, Nigeria, 2Nigerian Army College of Environmental Science and Technology, Nigeria Full Text
50 12 2 Understanding Chinese Moral Stories with Further Pre-Training Jing Qian1, Yong Yue1, Katie Atkinson2 and Gangmin Li3, 1Xi’an Jiaotong Liverpool University, China, 2University of Liverpool, UK, 13University of Bedfordshire, UK Full Text
51 12 2 Evaluating BERT and ParsBERT for Analyzing Persian Advertisement Data Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA Full Text
52 12 2 Tuning Dari Speech Classification Employing Deep Neural Networks Mursal Dawodi and Jawid Ahmad Baktash, Avignon University, France Full Text
53 12 2 Lexis and Syntax of Medicine Product Warnings in the Philippines Shielanie Soriano-Dacumos, University of Rizal System, Rizal Philippines Full Text
54 12 2 Tuning Traditional Language Processing Approaches for Pashto Text Classification Jawid Ahmad Baktash, Mursal Dawodi, Mohammad Zarif Joya, Nematullah Hassanzada, Avignon University, France Full Text
55 12 2 Text Summarization in Mongolian Language Chuluundorj Begz, University of the Humanities, Mongolia Full Text
56 12 2 New Trends in Less-Resourced Language Processing: Case of Amazigh Language Fadoua Ataa Allah and Siham Boulaknadel, Royal Institute of Amazigh Culture/Center of computer sciences studies, Morocco Full Text
57 12 2 Simple Sentence in a·we Amanda Aski Macdonald Momin, NEHU, India Full Text
58 12 2 A Robust Joint-Training Graph Neural Networks Model for Event Detection with Symmetry and Asymmetry Noisy Labels Mingxiang Li1, Huange Xing1, Tengyun Wang2, Jiaxuan Dai1, and Kaiming Xiao2, 1Naval University of Engineering, China, 2National University of Defense Technology, China Full Text
59 12 3 Testing Different Log Bases for Vector Model Weighting Technique Kamel Assaf, Programmer, Canada Full Text
60 12 3 A Study on the Appropriate Size of the Mongolian General Corpus Choi Sun Soo1 and Ganbat Tsend2, 1University of the Humanities, Mongolia, 2Otgontenger University, Mongolia Full Text
61 12 3 RBIPA: An Algorithm for Iterative Stemming of Tamil Language Texts V. Indumathi, S. SanthanaMegala, Rathnavel Subramaniam College of Arts and Science, India Full Text
62 12 4 High Accuracy Location Information Extraction From Social Network Texts Using Natural Language Processing Lossan Bonde1 and Severin Dembele2, 1Adventist University of Africa, Kenya, 2Universite Nazi Boni, Burkina Faso Full Text
63 12 4 Language Distance and L3 Japanese Acquisition in Morphosyntactic Module Wenchao Li, Zhejiang University, China Full Text
64 12 5 Design and Development of Morphological Analyzer for Tigrigna Verbs using Hybrid Approach Hagos Gebremedhin Gebremeskel1,2, Feng Chong1,* and Huang Heyan1, 1Beijing Institute of Technology, China, 2Mekelle University, Ethiopia Full Text
65 12 5 Evaluation of Chatbot Technology: The Case of Greece Theodoros Papadopoulos1, Zoi Lachana1, Thanos Anagnou1, Charalampos Alexopoulos1, Yannis Charalabidis1, Christos Bouras2, Nikos Karacapilidis2, Vasileios Kokkinos2, and Apostolos Gkamas2, 1University of the Aegean, Greece, 2University of Patras, Greece Full Text
66 12 6 Chunker Based Sentiment Analysis and Tense Classification for Nepali Text Archit Yajni and Sabu Lama Tamang, Sikkim Manipal Institute of Technology, Sikkim Full Text

International Journal of Managing Information Technology (IJMIT)

67 15 1/2 Designing a Framework for Enhancing the Online Knowledge-Sharing Behavior of Academic Staff Gebremedhin Gebreyohans1, David T. Croasdell2 and Million Meshesha1, 1Addis Ababa University, Ethiopia, 2University of Nevada, Reno Full Text
68 15 1/2 Transforming Service Operations with AI: A Case for Business Value Harsha Vijayakumar, S.P. Jain School of Global Management, United States Full Text
69 15 1/2 Effectively Connect Acquired Technology to Innovation Over a Long Period Akira Nagamatsu1, Yuji Tou2 and Chihiro Watanabe3, 1Tohoku University, Japan, 2Tohoku Gakuin University, Japan, 3Tokyo Institute of Technology, Japan Full Text
70 15 3 Intrusion Detection System Using Customized Rules for Snort Manju1, Shanmugasundaram Hariharan2, M. Mahasree1, Andraju Bhanu Prasad2 and H.Venkateswara Reddy2, 1SRM Institute of Science and Technology, India, 2Vardhaman College of Engineering Hyderabad, India Full Text
71 15 4 Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusion of Diverse Knowledge Yuji Tou1,2 and Chihiro Watanabe2,3, 1Tohoku Gakuin University, Japan, 2Tokyo Institute of technology, Japan, 3International Institute for Applied Systems Analysis (IIASA), Austria Full Text

International Journal of Managing Value and Supply Chains (IJMVSC)

72 14 1 Value Chain Analysis of Tomato: A Case Study in Anis District - Dhamar Governorate, Yemen Amira Qassem, Sana’a University, Republic of Yemen Full Text
73 14 1 Blockchain Technology Adoption Effect Onknowledge Management State of the Art Survey Alshawy Rawan1 and Alrwais Omer2, 1Prince Sultan University, Saudi Arabia, 2King Saud University, Saudi Arabia Full Text
74 14 2 Overview of Smart Logistics and Blockchain Technologies AbdulrahmanAlseqyani1, Abdullah Almutairi1 and Mohammed Albogami2, 1Zulfi Technical College, Saudi Arabia, 2Turbah Technical College, Saudi Arabia Full Text
75 14 2 Tribal Entrepreneurship, in Forested Hinterland of Jharkhand. A Solution for Lwe Region H.S Gupta, Institute Of Forest Productivity, India Full Text
76 14 3 The Future of Dining Out: The Implications of Food Service Employment Trends on the Restaurant Industry David C. Wyld and Juliana White, Southeastern Louisiana University, USA Full Text

International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)

77 14 1/2/3 Empirical Investigation into ICT Services Evaluation Within a Public Institution Pappas Michael, Doxopoulou Kyriaki, Mavidis Aristotelis, Folinas Dimitris, International Hellenic University, Greece Full Text
78 14 4 Evaluating Citizens' Perceptions and Attitudes Towards E-Voting in Local Governance: An Empirical Study Eleni Michalopoulou1, Dimitris Folinas1, Dimitris Mylonas1, Zafeiro Fragkaki2, 1International Hellenic University, Greece, 2Aristotle University of Thessaloniki, Greece Full Text

Health Informatics - An International Journal (HIIJ)

79 12 1 Identification of Socioeconomic Variables Responsible for Hypertensive Kidney Disease among Bangladeshi Adults K.C.Bhuyan, Jahangirnagar University, Bangladesh Full Text
80 12 2 Detection of Crackles and Wheezes in Lung Sound using Transfer Learning Hafsa Gulzar1, Jiyun Li1, Arslan Manzoor2, Sadaf Rehmat3, Usman Amjad4 and Hadiqa Jalil Khan4, 1Donghua University, China, 2University of Catania, Italy, 4PIEAS, Pakistan, 4Islamia University of Bahawalpur, Pakistan Full Text
81 12 3 Brief Communications Data Hygiene: Important Step in Decision Making with Implications for Health IT Professionals GV Fant, US Department of Veterans Affairs, USA Full Text
82 12 3 Gender Disparity of Tuberculosis Burden in Low-and Middle-Income Countries: A Systematic Review Nilar Phyoe1, Thein Hlaing2 and Win Pa Sandar3, 1University of Bedfordshire, Luton, UK, 2District Public Health Department (Ministry of Health), Myanmar, 3STI Myanmar University, Myanmar Full Text
83 12 3 The Proposed Guidelines for Cloud Computing Migration for South African Rural Hospitals Mathabatha Johannes Mmako and Alfred Thaga Kgopa, Tshwane University of Technology, South Africa Full Text
84 12 4 Automatic and Non-Invasive Continuous Glucose Monitoring in Paediatric Patients Roberto Franchini, National Research Council, Italy Full Text

International Journal on Cybernetics & Informatics (IJCI)

85 12 1 Stock Market Prediction using Reinforcement Learning with Sentiment Analysis Xuemei Li and Hua Ming, Oakland University, USA Full Text
86 12 1 Size and Fit Recommendations for Cold Start Customers in Fashion E-Commerce Jaidam Ram Tej, Jyotirmoy Banerjee and Narendra Varma Dasararaju, Flipkart Internet Private Limited, India Full Text
87 12 1 Using Artificial Intelligence to Filter out Barking, Typing, and other Noise from Video Calls in Microsoft Teams Pawankumar Sharma, Bibhu Dash, University of the Cumberlands, USA Full Text
88 12 1 Automated Identification of Disaster News for Crisis Management using Machine Learning Lord Christian Carl H. Regacho, Ai Matsushita Angie M. Ceniza-Canillo, University of San Carlos, Philippines Full Text
89 12 1 A Review of the Intersection Techniques on Humint and Osint Alcides Macedo, Laerte Peotta and Flavio Gomes, University of Brasilia, Brasilia Full Text
90 12 1 Bullying Tweets Detection using CNN- Attention Alghafiqe Alhloul and Abu Alam, Gloucestershire University, UK Full Text
91 12 1 Modeling and Design of Longitudinal and Lateral Control System with a Feedforward Controller for A 4 Wheeled Robot Younes El koudia, Jarou Tarik, Abdouni Jawad, Sofia El Idrissi and Elmahdi Nasri, National School of Applied Sciences, Morocco Full Text
92 12 1 The Turing Deception David Noever and Matt Ciolino, PeopleTec, Inc., USA Full Text
93 12 1 Machine Learning Applications in Malware Classification: A Meta-Analysis Literature Review Tjada Nelson, Austin O'Brien and Cherie Noteboom, Dakota State University, South Dakota Full Text
94 12 1 Concept of Delivery System in the Smart City Environment Zuzana Spitalova, Oliver Leontiev and Patrik Harmanos, Slovak University of Technology, Slovakia Full Text
95 12 1 Computer Vision For a Camel-Vehicle Collision Mitigation System Khalid AlNujaidi and Ghadah AlHabib, Prince Mohammad Bin Fahd University, Saudi Arabia Full Text
96 12 1 Motion and Memory in VR: The Influence of VR Control Method on Memorization of Foreign Language Orthography Sanchari Chatterjee 1, Angelina A. Tzacheva 2 and Zbigniew Ras 2, 1University of North Carolina, USA, 2West Cliff University Irvine, USA Full Text
97 12 1 Challenges of Integrating Virtual Learning Practice in Zimbabwe Secondary Schools during Covid-19 Dudziro Nhengu, Africa University, Zimbabwe Full Text
98 12 1 The Perceptions of Teachers on Communication with Students in a Remote Setting Wally T. Luckeydoo, Independent Researcher, Tennessee Full Text
99 12 1 Online Education in the Perception of Hungarian Students - Results of Online Focus Groups Nagy, Adam 1, Fekete, Mariann 2, Szabo, Andrea 3, Bocskei, Balazs 4, 1Obuda University, 2SZTE University, 3Institute of Political Sciences, 4Milton Friedman University, Hungary Full Text
100 12 1 A Cyber-Physical Methodology to Automate Robotized Finishing Processes Angel Dacal-Nieto 1, Ruben Paz-Cibeira 1, Carmen Fernandez-Gonzalez 1, Juan Jose Areal 2, Pablo Lopez-Beiras 2 and Victor Alonso-Ramos 2, 1CTAG, Spain, 2 PCAE, Spain Full Text
101 12 2 Improving CNN-Based Stock Trading by Considering Data Heterogeneity and Burst Keer Yang 1, Guanqun Zhang 2, Chuan Bi 3, Qiang Guan 4, Hailu Xu 5, Shuai Xu 1, 1Case Western Reserve University, USA, 2Nankai University, USA, 3National Institute of Health, USA, 4Kent State University, USA, 5California State University Long Beach, USA Full Text
102 12 2 The Stock Market Volatility Research between China and ASEAN based on Complex Networks/a> Wangke Yu 1, Shuhua Liu 2, Ruoqi Pan 1, Ke Huang 1, Linyun Deng 1, 1Nanning University, China, 2Guangxi Academy of Social Sciences, China Full Text
103 12 2 Review of Class Imbalance Dataset Handling Techniques for Depression Prediction and Detection Simisani Ndaba, University of Botswana, Botswana Full Text
104 12 2 Math Function Recognition with Fine-Tuning Pre-Trained Models Fatimah Alshamari 1, 2and Abdou Youssef 1, 1The George Washington University, USA, 2Taibah University, KSA Full Text
105 12 2 Natural Language Processing Arvind Chandrasekaran, Colorado Technical University, USA Full Text
106 12 2 Barracuda, an Open Source Framework for Parallelizing Divide and Conquer Algorithm Abdourahmane Senghor, Cheikh Anta Diop University, Senegal Full Text
107 12 2 Chatbots in a Botnet World Forrest McKee and David Noever, PeopleTec, USA Full Text
108 12 2 Using Blockchain to Achieve Decentralized Privacy in IoT Healthcare Sajad Meisami 1, Mohammad Beheshti-Atashgah 2 and Mohammad Reza Aref 2, 1Illinois Institute of Technology, USA, 2Sharif University of Technology, Iran Full Text
109 12 2 Security Attacks and Countermeasures in Smart Homes Hasibul Alam and Emmett Tomai, The University of Texas Rio Grande Valley, USA Full Text
110 12 2 A Blockchain-Based Consensus Slicing Mechanism for Distributed SDN Control Plane Shanqing Jiang 1, 2 Lin Yang 2, 1Southeast University, Nanjing, China, 2Institude of System Engineering AMS PLA, China Full Text
111 12 2 No Child is Left Behind? --Left-Behind Children and Drop-Out Rates in China Yaoyu Zhang, Xiamen University, China Full Text
112 12 2 How Online Learning, during Covid-19, has Affected Compassion in Teaching and Subsequently Impacted Student Satisfaction Lucy Mackintosh, University of Hertfordshire, UK Full Text
113 12 2 Exploring the Impact ofAI-powered Collaborative and Interactive NLP Apps on EFL Teaching in the Post-COVID-19 Era Coffi Martinien ZOUNHIN TOBOULA, University of Abomey Calavi (UAC), Benin Full Text
114 12 2 Use of Barnes-Hut Algorithm to Attack COVID-19 Virus Radhouane Boughammoura, University of Monastir, Tunisia Full Text
115 12 2 Exploring the Influence of Classroom Interaction on Academic Communication Skills in Secondary Schools: A Case Study of Selected Senior High Schools in the Tahoua Region Dekande Sylvestre Tchangnonhou 1, Coffi Martinien Zounhin Toboula 2 and Claude Hounyetin 2, 1Djibo Hamani University of Tahoua, Niger, 2University of Abomey-Calavi (UAC), Benin Full Text
116 12 2 The Role of English in Sino-Thai Cooperation: A Case Study of the People-to-People Exchange Jingshi Project at a University in Thailand Shasha Luo and Tawatchai Chaisiri, Rajamangala University of Technology Thanyaburi, Thailand Full Text
117 12 2 X-RECOSA: Multi-Scale Context Aggregation for Multi-Turn Dialogue Generation Danqin Wu, Beijing University of Posts & Telecommunications, China Full Text
118 12 2 Features Matching using Natural Language Processing Muhammad Danial Khilji, Department of Data Science, choreograph, United Kingdom Full Text
119 12 2 Abbreviation Dictionary for Twitter Hate Speech Zainab Mansur 1, Nazlia Omar 2 and Sabrina Tiun 2, 1Omar Al-Mukhtar University, Libya, 2Universiti Kebangsaan Malaysia, Malaysia Full Text
120 12 2 Tuning Dari Speech Classification Employing Deep Neural Networks Mursal Dawodi, Jawid Ahmad Baktash, University Avignon, France Full Text
121 12 2 Explaining the Performance of Collaborative Filtering Methods with Optimal Data Characteristics Samin Poudel and Marwan Bikdash, North Carolina A & T University, USA Full Text
122 12 2 Tuning Language Processing Approaches for Pashto Texts Classification Jawid Ahmad Baktash, Mursal Dawodi, University Avignon, France Full Text
123 12 2 Sentiment Analysis Classification for Text in Social Media: Application to Tunisian Dialect Asma BelHadj Braiek, Zouhour Neji Ben Salem, Carthage University, Tunisia Full Text
124 12 2 The Relativity of Energy and the Reversal of Time is a Shift in Perspective Vinyasi, Independent Research at Home - Southern, California, USA Full Text
125 12 3 Text Generation with GAN Networks using Feedback Score Dmitrii Kuznetsov, South China University of Technology, China Full Text
126 12 3 Teaching and Learning with ICT Tools: Issues and Challenges Kamaljit Kaur, Khalsa College, India Full Text
127 12 3 A Model-Based Approach Machine Learning to Scalable Portfolio Selection Ana Paula S. Gularte 1, 2and Vitor V. Curtis1 2, 1Aeronautics Institute of Technology(ITA), Brazil, 2Federal University of Sao Paulo (UNIFESP), Brazil Full Text
128 12 3 ALICE - Applying BERT to Italian Emails Pasquale Restaino and Liliana Saracino, Sogei S.p.A., Italy Full Text
129 12 3 Clustering an African Hairstyle Dataset Using PCA and K-Means Teffo Phomolo Nicrocia, Owolawi Pius Adewale, Pholo Moanda Diana, Tshwane University of Technology, Pretoria (Soshanguve) Full Text
130 12 3 Is There a Trojan! : Literature Survey and Critical Evaluation of the Latest ML Based Modern Intrusion Detection Systems in IoT Environments Vishal Karanam, University of Southern California, USA Full Text
131 12 3 Nuance: Near Ultrasound Attack on Networked Communication Environments Forrest McKee and David Noever, PeopleTec, USA Full Text
132 12 3 Research and Practice of a Blended Teaching Mode based on Small Private Online Courses Under an Informatization Background Yan Li, Zhuoqun Lu and Heyun Liu, Hunan University of Humanities, China Full Text
133 12 3 Subtypes of Developmental Dyslexia Julia Koifman, Israel Full Text
134 12 3 An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Performance Dana Alsagheer and Hadi Mansourifar, University of Houston, USA Full Text
135 12 4 Integrating AI and ML Education in Small Liberal Arts Institutions: Curriculum and Pedagogical Considerations Nathan Johnson and Sayani Sarkar, Bellarmine University, USA Full Text
136 12 4 Improving User Experience with Online Learning Using Analytical Comparasions between Instructors & Students of Qatar University Hamad Khamees R B Albuainain and Pilsung Choe, Qatar University College of Engineering, Qatar Full Text
137 12 4 Mirror, Mirror, in My Mind: An Ethological Approach to Shaping Student Behavior Kimberly K. Davis, LLC, Texas Full Text
138 12 4 Note Taking in VR: The Forearm Keyboard B. Davis, T. Hughes-Roberts, and C. Windmill, University of Derby, United Kingdom Full Text
139 12 4 Investigating the Future of ‘Engineer of 2020’ Attributes: Moving from Access to Engagement & Sense of Belonging Terrell L. Strayhorn, Virginia Union University, USA Full Text
140 12 4 A New Method to Explore the Integer Partition Problem Brayden Chen, Ridgewood, USA Full Text
141 12 4 A Framework for Smart Homes for Elderly People Using Labview® Ilapakurthy Sriram Vamsi, University of California Irvine, USA Full Text
142 12 4 DDoS Detection in Software-Defined Network (SDN) Using Machine Learning Haya Alubaidan, Reem Alzaher, Maryam AlQhatani, Rami Mohammed, Imam Abdulrahman Bin Faisal University, Saudi Arabia Full Text
143 12 5 Temperature Sensor with Buffer-Chain based Time-to-Digital Converter for Ultra-Low Voltage Operation Kaito NAGAI and Kimiyoshi USAMI, Shibaura Institute of Technology, Japan Full Text
144 12 5 Comparative Analysis of Simulation Techniques: Scan Compression and Internal Scan Parul Patel1, Arvind Rajawat1 and Pooja Jain2, 1Maulana Azad National Institute of Technology Bhopal, India, 2Automotive and Discrete group STMicroelectronics Private Limited Greater Noida, India Full Text
145 12 5 The Techniques in Enhancing Bandwidth Load Balancing QoS at Local Area Network: A Review Paper M.Al-Batahari, Azlinda Abdul Aziz and Nur Syufiza Ahmad Shukor, University Selangor, Malaysia Full Text
146 12 5 A Review of Cybersecurity as an Effective Tool for Fighting Identity Theft across United States Oloyede Adekunle1, Ajibade Idris1, Obunadike Callistus1, Phillips Adeniyi1, Shittu Olayemi1, Taiwo Esther1, Kizor-Akaraiwe Somto2, 1Austin Peay State University, USA, 2University of Washington, USA Full Text
147 12 5 Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update Michael Mundt1 and Harald Baier2, 1Esri Deutschland GmbH, Germany, 2Bundeswehr University, Germany Full Text
148 12 5 An Expert System as an Awareness Tool to Prevent Social Engineering Attacks in Public Organizations Waldson Rodrigues Cardoso, Joao Marco Silva and Admilson Ribamar Lima Ribeiro, Federal University of Sergipe, Brazil Full Text
149 12 5 Sliding Window Sum Algorithms for Deep Neural Networks Roman Snytsar, Microsoft, United States of America Full Text
150 12 5 Regulating Generative AI: A Pathway to Ethical and Responsible Implementation Jonathan Luckett, Marymount University, United States of America Full Text
151 12 5 Evaluating the Impact of Color Normalization on Kidney Image Segmentation Sai Javvadi, University of Louisville, Louisville Kentucky, USA Full Text
152 12 5 Applying User Experience and Usercentered Design Software Processes in Undergraduate Mobile Application Development Teaching Manuel Ignacio Castillo Lopez, Ana Libia Eslava Cervantes and Gustavo de la Cruz Martinez, Universidad Nacional Autonoma de Mexico, Mexico Full Text
153 12 5 Laboratory Access Implementing QR Code Authentication Using OTP Sghaier Chaabani, Abdulrahman Almuhaidib, Hussain Alsalem, Faisal Alotaibi, Mohsen Bamardouf, Ibrahim Abukhamseen, Hussain AlGallaf, Yosef Aljwaid, Abdulrahman Alharby, Hussain Alattas, Imam Abdulrahman Bin Faisal University, Kingdom of Saudi Arabia Full Text
154 12 5 Analyzing Political Sentiment of Indic Languages with Transformers Pranav Gunhal, Artificial Intelligence Coalition, USA Full Text
155 12 5 Business Process Modeled with BPMN and CTL Model Checking F. Ouazar, M.C. Boukala and M.Ioualalen, USTHB, Algeria Full Text
156 12 6 Underwater Detection of Ancient Pottery Sherds Using Deep Learning Konstantinos Paraskevas, Ioannis Mariolis, Georgios Giouvanis, GeorgiaPeleka, Georgios Zampokas and Dimitrios Tzovaras, Information Technologies Institute, Greece Full Text
157 12 6 Use of Hough Transform and Homography for the Creation of Image Corpora for Smart Agriculture Jose A. Brenes1, Javier Ferrandez-Pastor2, Jose M. Camara-Zapata3, and Gabriela Marin-Ravenos1, 1University of Costa Rica, Costa Rica, 2University of Alicante, Spain,3University Miguel Hernandez, Spain Full Text
158 12 6 Disk Failure Prediction based on Multi-layer Domain Adaptive Learning Guangfu Gao1, Peng Wu1 and Hussain Dawood2, 1University of Jinan, China, 2National Skills University, Islamabad Full Text
159 12 6 Potential Impact of Generative Artificial Intelligence(AI) on the Financial Industry Suman Kalia, Saint Peter's University, USA Full Text
160 12 6 Data-level Hybrid Strategy Selection for Disk Fault Prediction Model based on Multivariate Gan Shuangshuang Yuan, Peng Wu and Yuehui Chen, University of Jinan, China Full Text
161 12 6 An Improved CTGAN for Data Processing Method of Imbalanced Disk Failure Jingbo Jia1, Peng Wu1 and Hussain Dawood2, 1University of Jinan, China, 2National Skills University Islamabad, China Full Text
162 12 6 A Survey of Methods for Handling Disk Data Imbalance Shuangshuang Yuan1, Peng Wu1, Yuehui Chen1 and Qiang Li2, 1University of Jinan, China, 2State Key Laboratory of High-end Server & Storage Technolog, China Full Text
163 12 6 Estimating Cloud Computing Round-Trip Time (RTT) Using Fuzzy Logic for Inter-Region Distances Ihab Sekhi, Miskolc University, Hungary Full Text
164 12 6 Predicting Accident Severity: An Analysis of Factors Affecting Accident Severity Using Random Forest Model Adekunle Adefabi, Somtobe Olisah, Callistus Obunadike, Oluwatosin Oyetubo, Esther Taiwo and Edward Tella, Austin Peay State University, USA Full Text
165 12 6 A Review of the Ethics of Artificial Intelligence and Its Applications in the United States Taiwo Esther, Akinsola Ahmed, Tella Edward, Makinde Kolade and Akinwande Mayowa, Austin Peay State University, USA Full Text
166 12 6 Drones in Surveillance Missions: Case Study of the Gendarmerie Forces of the Iberian Countries Veronica Mendes Pinto1,2, Tiago Goncalves Silva1,2,3 and Jose Silvestre Silva1,3,4, 1Portuguese Military Academy, Portugal, 2Guarda Nacional Republicana (GNR), Portugal, 3Military Academy Research Center (CINAMIL), Portugal, 4Universidade de Coimbra, Portugal Full Text
167 12 6 The Integration of Artificial Intelligence Into Database Systems(AI-DB Integration Review) Unuriode O. Austine, Durojaiye M. Olalekan, Yusuf Y. Babatunde and Okunade O. Lateef, Austin Peay State University, USA Full Text
168 12 6 A Proposal for an Open-Source Bitcoin Forensics Tool Pedro Henrique Resende Ribeiro, Pedro Leale and Ivan da Silva Sendin, Federal University of Uberlandia, Brazil Full Text
169 12 7 Business Talk: Harnessing Generative AI with Data Analytics Maturity Simone Malacaria1, Michele Grimaldi2, Marco Greco2 and Andrea De Mauro1, 1University of "Tor Vergata", Italy, 2University of Cassino and Southern Lazio, Italy Full Text
170 12 7 AI-Empowered Learning Models in Economy 5.0: Fostering Meaning Creation Beyond Literacy Tabea Hirzel, Independent Researcher & Educator, Spain Full Text
171 12 7 Tomato Disease Fusion and Classification using Deep Learning Patrick Ansah1, Sumit Kumar Tetarave1, Ezhil Kalaimannan2 and Caroline John2, 1Kalinga Institute of Industrial Technology, India, 2University of West Florida, USA Full Text
172 12 7 Fast Automatized Parameter Adaption Process of CNC Milling Machines under use of Perception based Artificial Intelligence Sebastian Feldmann, Michael Schmiedt, Johann Jung, Julian Marc Schlosser, Tobias Stempfle, Christian Rathmann and Wolfgang Rimkus, Aalen University, Germany Full Text
173 12 7 User-Centric Privacy Control in Identity Management and Access Control within Cloud-Based Systems Kelvin Ovabor and Travis Atkison, University of Alabama, USA Full Text
174 12 7 Empowering Cyber Threat Intelligence with AI Raghad Ghawa, Jawaher Alamri, and Rawan Eid Alanazi, College of Computer and Information Sciences, Saudi Arabia Full Text
175 12 7 Application of Fuzzy Topsis for Prioritizing Barriers to Circular Economy Adoption in the Automotive Sector: A Study in an Emerging Country Tiago F. A. C. Sigahi, Federal University of Alfenas, Brazil Full Text

International Journal on Integrating Technology in Education (IJITE)

176 12 1 Teachers' Perceptions of Communication Influencing the Teacher-Student Relationship in an Online Environment Wally T. Luckeydoo, Independent Researcher, Tennessee Full Text
177 12 1 Externalities in Education, Scientific Knowledge and Scientific Research Meilin Lyu, Ioannis Batas, Dafni Faka, Dimitris Galanis, Antonis Koukouladakis and Anthanasia Tsigouni, National University of Athens, Greece Full Text
178 12 1 The Effect of Emotional Awareness Exercises on Adaptiveness in Coping and Empathy with Pre-Service Teachers in Mixed Reality Simulations Ashley Brooksbank1, Jody S. Piro1, Carrie Straub2, and Erik Gundel1, 1Western Connecticut State University, United States, 2Mursion Full Text
179 12 1 From Physical to Virtual Learning During COVID-19: Challenges, Opportunities and Lessons Learnt Dudziro Nhengu, Africa University, Zimbabwe Full Text
180 12 1 A Model for Usability Evaluation of Learning Management Systems Sarah I Alkoblan and Mohammad Abdullah-Al-Wadud, King Saud University, Saudi Arabia Full Text
181 12 2 From Logo Programming to Fab Labs: The Legacy of Constructionist Learning in K−12 Education Technology Melvin LaPrade and Sherry Lassiter, Fab Foundation, USA Full Text
182 12 2 Using ChatGPT to Generate Computer Science Problem Sets Tyler Flaagan, Dakota State University, USA Full Text
183 12 2 Archetype or Stereotype: The Femme Fatale in Online Education Xiaohan Feng and Makoto Murakami, Toyo University, Japann Full Text
184 12 3 Empowering Small Liberal Arts Institutions: Designing an In-Depth Curriculum for Integrating AI and ML Education With Pedagogical Considerations Sayani Sarkar and Nathan Johnson, Bellarmine University, USA Full Text
185 12 3 Virtual Collaboration in the Context of Teaching and Learning With Interdisciplinary Perspective Jiangfan Feng, Yanjie Gong, and Mao Tian, Chongqing University of Posts and Telecommunications, China Full Text
186 12 3 Adopting Virtual Reality for Education: Exploring Teachers’ Perspectives on Readiness, Opportunities, and Challenges Rob E. Carpenter1, Rochell R. McWhorter1, Katherine Stone2 and Leanne Coyne3, 1University of Texas at Tyler, USA, 2University of Texas at Tyler School of Medicine, USA, 3West Coast University School of Pharmacy, USA Full Text
187 12 4 Reforming Education for Sustainability: The Contribution of Serious Games to Address Risk Communication for Resilience. An Illustrative Example Focused on Tsunami Events Steven Hawthorn1, Rui Jesus2 and Mariana Baptista3, 1Univer, NOVA de Lisboa, Portugal, 2Instituto Politécnico de Lisboa, Portugal, 3Universidade de Lisboa, Portugal Full Text
188 12 4 Online Versus Face-to-Face Learning: Students’ Preferences During Crisis Times Ayelet Ayalon and Noa Aharony, Bar-Ilan University, Israel Full Text

International Journal of Computer Networks & Communications (IJCNC)

189 15 1 An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS) Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates Full Text
190 15 1 Phishing URL Detection using LSTM Based Ensemble Learning Approaches Bireswar Banik and Abhijit Sarma, Gauhati University, India Full Text
191 15 1 A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam,
2Saigon University, Vietnam
Full Text
192 15 1 Actor Critic Approach based Anomaly Detection for Edge Computing Environments Shruthi N1 and Siddesh G K2, 1BNMIT, India, 2New Horizon College of Engineering, India Full Text
193 15 1 An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam Full Text
194 15 1 Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network Nibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2,
Mahmoud Ali Al Shugran2, 1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan
Full Text
195 15 1 Dynamic Interference Suppression for TV White Space: the Case of Thailand Prathana Thaopanya1 and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand,
2Asian Institute of Technology, Thailand
Full Text
196 15 1 Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan Full Text
197 15 2 Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs Faiza Al-Salti1, N. Alzeidi2, Khaled Day2, Abderezak Touzene2, 1Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2Sultan Qaboos University, Oman Full Text
198 15 2 Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks Chandra Kanta Samal, Delhi University, India Full Text
199 15 2 VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network Savita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India Full Text
200 15 2 An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET Driss Abada1, Rachid Adrdor2, Omar Boutkhoum3, and Adil Bouhouch4, 1,3Chouaïb Doukkali University, Morocco,
2Ibn Zohr University, Morocco, 4Mohamed V University, Morocco
Full Text
201 15 2 Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP Joshua Porche1 and Shawon Rahman2, 1Information Security System Engineer, USA, 2University of Hawaii-Hilo
Hilo, USA
Full Text
202 15 2 Detection of Peer-to-Peer Botnets using Graph Mining Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India Full Text
203 15 2 Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET Nitesh Ghodichor1, Raj Thaneeghavl. V1, Dinesh Sahu1, Gautam Borkar2, Ankush Sawarkar3, 1SRK University, India,
2DY Patil University, India, 3VNIT, India
Full Text
204 15 2 Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA Full Text
205 15 3 Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitive Radio Network Sopan Talekar1, Satish Banait2 and Mithun Patil3, 1MVPS’s KBT College of Engineering, India, 2K.K. Wagh Institute of Engineering Education & Research, India, 3N.K. Orchid College of Engineering & Technology, India Full Text
206 15 3 Evaluating Latency in Fifth-Generation Vehicle-to-Everything Communications using Adaptive Neuro-Fuzzy Inference
System Model
Sopan Talekar1, Satish Banait2 and Mithun Patil3, 1Hamdy A.M. Sayedahmed1,3, Emadeldin M. Elgamal1,2, Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA, 3Central Metallurgical Research and Development Institute, Egypt Full Text
207 15 3 IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India Full Text
208 15 3 IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India Full Text
209 15 3 Enabling Ray Tracing for 5G Vladislav Ryzhov, Moscow Institute of Physics and Technology, Russia Full Text
210 15 3 Congestion and Energy Aware Multipath Load Balancing Routing for LLNs Kala Venugopal and T G Basavaraju, Government Engineering College, India Full Text
211 15 3 PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features S. Chanti, T. Chithralekha, and K. S. Kuppusamy, Pondicherry University, India Full Text
212 15 3 DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Practical Environment Dinh Thi Thai Mai, Nguyen Tien Dat, Pham Minh Bao, Can Quang Truong, Nguyen Thanh Tung, VNU University
of Engineering and Technology, Hanoi, Vietnam
Full Text
213 15 3 Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications Hariharasudhan V and P.Vetrivelan, VIT, India Full Text
214 15 4 Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques Ziaul Hossain1 and Gorry Fairhurst2, 1University of Fraser Valley, Canada, 2University of Aberdeen, UK Full Text
215 15 4 Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks Varun P. Sarvade1 and Shrirang Ambaji Kulkarni2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute
of Engineering, India
Full Text
216 15 4 IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm Prabhakar Narasappa Kota1, Pravin Balaso Chopade1, Bhagvat D. Jadhav2, Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3, 1MES’s College of Engineering, India, 2JSPM's Rajarshi Shahu College of Engineering, India, 3Dr. D. Y. Patil Institute
of Technology, India
Full Text
217 15 4 Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment Mohamed Ali Shaaban1, Almohammady S. Alsharkawy2, Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2,
1Sinai University, Egypt, 2Al-Azhar University, Egypt
Full Text
218 15 4 Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network Shanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India Full Text
219 15 4 Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms Witcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand Full Text
220 15 4 Machine Learning Based Ensemble Classifier for Android Malware Detection P Sumalatha1 and G.S. Mahalakshmi2, 1Bhoj Reddy Engineering College for Women, India, 2Anna University, India Full Text
221 15 4 Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques Ahmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria Full Text
222 15 5 BLE Beacon with Data Accumulation Functionality KOBAYASHI Kakeru and FUJITA Satoshi, Hiroshima University, Japan Full Text
223 15 5 Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network Mohammadjavad Abbasi, A. S. Abdullah and N. Fisal, Universiti Teknologi Malaysia (UTM), Malaysia Full Text
224 15 5 Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT Awatef Chniguir and Zouhair Ben Jemaa, University of Tunis El Manar, Tunisia Full Text
225 15 5 Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System Saureng Kumar and S C Sharma, IIT Roorkee, India Full Text
226 15 5 Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks Salima Nebti1 and Mohammed Redjimi2, 1Emir Abdelkader University, Algeria, 220 Août 1955 University, Algeria Full Text
227 15 5 Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network Adarsha M1, S. Malathi1 and Santosh Kumar2, 1M. S. Ramaiah University of Applied Sciences, India, 2Liaocheng University, China Full Text
228 15 5 A Privacy-Aware Tracking and Tracing System Ali M. Allam, Helwan University, Egypt Full Text
229 15 5 A Survey on CDN Vulnerability to DoS Attacks Maurizio D’Arienzo and Serena Gracco, Universit`a della Campania ”L.Vanvitelli”, Italy Full Text
230 15 6 Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient Reinforcement Learning Framework Shruthi N1 and Siddesh G K2, 1Visvesvaraya Technological University, India, 2ALVA’s Institute of Engineering & Technology, India Full Text
231 15 6 Machine to Machine Authenticated Key Agreement with Forward Secrecy for Internet of Things Batamu Anderson Chiphiko1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea Full Text
232 15 6 Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities in Prominent Blockchains Oualid Zaazaa and Hanan El Bakkali, Mohammed V University in Rabat, Morocco Full Text
233 15 6 Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures Akashdeep Bhardwaj1, Naresh Kumar2 and Shawon S. M. Rahman3, 1University of Petroleum and Energy Studies, India, 2University of Nizwa, Oman, 3University of Hawai‘i at Hilo, USA Full Text
234 15 6 Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model Ravi Hosamani and Yerriswamy T, K.L.E . Institute of Technology, India Full Text
235 15 6 Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network Hassen A. Mogaibel and Majed Hashim, Al-Ahgaff University, Yemen Full Text
236 15 6 Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicular Named Data Networks Nithin Rao R and Rinki Sharma, Ramaiah University of Applied Sciences, India Full Text
237 15 6 Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation in the Cognitive Radio Network Aravindkumaran.S and Dr.Saraswady.D, Puducherry Technological University, India Full Text

International Journal of Wireless & Mobile Networks (IJWMN)

238 15 1 CFMS: A Cluster-based Convergecast Framework for Dense Multi-Sink Wireless Sensor Networks Gokou Hervé Fabrice Diédié1, Koigny Fabrice Kouassi2 and Tchimou N’Takpé2, 1Université Peleforo Gon Coulibaly, Ivory Coast, 2Université Nangui Abrogoua, Ivory Coast Full Text
239 15 2/3 Dual Band F-Antenna for Europe and North America Prasad Samudrala, Justin Jose and Amit Kulkarni, Honeywell Building Technologies, India Full Text
240 15 2/3 Design of Fractal-Based Tri-Band Microstrip Bandpass Filter for ISM,WLAN and Wimax Applications Nagham Radhi and Mohammed Fadhil, University of Technology, Iraq Full Text
241 15 4 The Effect of Accepted Handoff Signal Quality on the Queued Combined Guard Channel and Mobile Assisted Handoff Call Admission in 5G Networks Nagla O. Mohamed, Yanbu Industrial College, KSA Full Text
242 15 5 New Structure of Channel Coding: Serial Concatenation of Polar Codes Mohammed Mensouri and Mustapha Eddahibi, Ibn Zohr University, Morocco Full Text
243 15 5 Wireless Networks using Visible Light Communication: A Review CorneliusA. D. Pahalson, Habila Nuhu and Biyas Alfred Zungkat, Plateau State Polytechnic Barkin Ladi, Nigeria Full Text
244 15 5 Toward a Generic Vehicular Cloud Network Architecture: A Case of Virtual Vehicle as a Service Fekri M. Abduljalil, University of Sana’a, Yemen Full Text
245 15 6 A Hybrid GAPSO Optimization Approach Lutfi Mohammed Omer Khanbary, Aden University, Yemen Full Text
246 15 6 Malware Detection in IoT Systems using Machine Learning Techniques Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA Full Text
247 15 6 Effects Investigation of MAC and PHY Layer Parameters on the Performance of IEEE 802.15.6 CSMA/CA Md. Abubakar Siddik, Most. Anju Ara Hasi, Md. Rajiul Islam and Jakia Akter Nitu, Hajee Mohammad Danesh Science and Technology University, Bangladesh Full Text

International Journal of Distributed and Parallel systems (IJDPS)

248 14 1/2/3/4/5/6 Load Balancing Large Data Sets in a Hadoop Cluster Andriavelonera Anselme A., Rivosoaniaina Alain N., Rakotomalala Francis, Mahatody Thomas and Manantsoa
Victor, University of Fianarantsoa, Madagascar
Full Text
249 14 1/2/3/4/5/6 Load Balancing in the Combined Technology of Li-fi and Wi-Fi based on Collaborative Game Payam Porkar Rezayie1, Hamid Shokrzadeh2, Mehdi Dehghan Takht Foladi3, Amirmasoud Rahmani4, Sepideh
Moosavi Nasab5, 1,4Islamic Azad University, Tehran, Iran, 2,5Pardis Branch, Islamic Azad University, Iran, 3Amirkabir
University of Technology, Iran
Full Text
249 14 1/2/3/4/5/6 Write Buffer Partitioning with Rename Register Capping in Multithreaded Cores Allan Diaz and Wei-Ming Lin, The University of Texas at San Antonio, USA Full Text

International Journal on AdHoc Networking Systems (IJANS)

250 13 1 A Patch Antenna design with Boosted Bandwidth for ISM band Applications Md. Shaharul Islam, Md. Firoz Ahmed, Md. Hasnat Kabir, Md. Ashraful Islam and Md. Matiqul Islam,
University of Rajshahi, Bangladesh
Full Text
251 13 2 Microcontroller based AVR Hazardous Gas Detection System using IoT Ram Prasad, VTU University, India Full Text
252 13 3 A Comparative Study for Block Chain Applications in the MANET Sangheethaa S, University of Fujairah, UAE Full Text
253 13 4 Comparative Performance Analysis of the IEEE802.11ax and 802.11ac MIMOLink for WLANs Md. Delowar Hossain, Sumon Kumar Debnath, Iffat Ara Badhan, Md. Monirul Islam, Ad. Ahsan Habib, Md. Sharif
Uddin, Md. Abul Munjer, Prodip Kumar Sarker, Ileas Pramanik, and Mutia Afroze Alin, Begum Rokeya University,
Bangladesh
Full Text
254 13 4 PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Transmit Sequence-Particle Swarm Karthik Kumar Vaigandla, Ranjith Kumar Siddoju, Madhu Kumar Vanteru, Malothu Devsingh, Dudimetla Prasad,
Balaji Institute of Technology & Science, India
Full Text

The International Journal of Ambient Systems and Applications (IJASA)

255 11 1/2/3/4 A 5GHz Flexible Compact Microstrip Patch Antenna for WBAN Applications: Design, Simulation and Performance Analysis Md. Samiul Islam, Md. Akramul Alim and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh Full Text

International Journal of Software Engineering & Applications (IJSEA)

256 14 1 Education, Migration and Sustainability-Human Socioeconomic Development and Changing Technological Trends Pawankumar Sharma, University of the Cumberlands, KY USA Full Text
257 14 1 A New Complexity Metric for UML Sequence Diagrams Nevy Kimani Maina, Geoffrey Muchiri Muketha and Geoffrey Mariga Wambugu, Murang'a University of Technology, Kenya Full Text
258 14 1 Adventure and Quiz Learning Game Based on a Virtual Tour of a Video Game Museum Mark Muhhin, Daniel Nael, Raimond-Hendrik Tunnel, Ulrich Norbisrath, University of Tartu, Tartu, Estonia Full Text
259 14 2 Digital Community Currency Usability From the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (MTCR.) Alago Sabina, Solomon Ogara, Michael Oloko and Richard Kiaka, Jaramogi Oginga Odinga University of Science and Technology, Kenya Full Text
260 14 3 Agile Software Architecture in Global Software Development Environment: Systematic Literature Mapping Thiago Gomes, and Marcelo Marinho, Federal Rural University of Pernambuco, Brazil Full Text
261 14 3 A Metrics-Based Model for Estimating the Maintenance Effort of Python Software Catherine Wambui Mukunga, John Gichuki Ndia and Geoffrey Mariga Wambugu, Murang’a University of Technology, Murang’a Kenya Full Text
262 14 3 The Effect of Time Pressure During COVID-19 on Software Quality Asmaa Hassan1,2 and Omer Alrwais1, 1King Saud University, Saudi Arabia, 2King Khalid University, Saudi Arabia Full Text
263 14 4 Transforming Software Requirements into Test Cases via Model Transformation Nader Kesserwan1, Jameela Al-Jaroodi1, Nader Mohamed2 and Imad Jawhar3, 1Robert Morris University, USA,2Pennsylvania Western University, USA, 3AlMaaref University, Lebanon Full Text
264 14 5 Agile, User-Centered Design and Quality in Software Processes for Mobile Application Development Teaching Manuel Ignacio Castillo López, Ana Libia Eslava Cervantes, Gustavo de la Cruz Martínez and Jorge Luis Ortega Arjona, Universidad Nacional Autónoma de México, Mexico Full Text
265 14 5 Analyzing Aircraft Landing Decision Making Through Fuzzy Logic Approach: A Comparative Study Sarah A. Ibrahim, Khirallah s. Elfarjani, Mrwan BenIdris, University of Benghazi, Libya Full Text
266 14 5 Redusharptor: A Tool to Simplify Developer-Written C# Unit Tests David Weber and Arpit Christi, Weber State University, USA Full Text
267 14 6 Code Swarm: A Code Generation Tool based on the Automatic Derivation of Transformation Rule Set Hina Mahmood1, Atif Aftab Jilani2 and Abdul Rauf3, 1McMaster University, Canada, 2FAST-National University of Computer and Emerging Sciences, Pakistan, 3Knightec AB, Sweden Full Text

International Journal of Network Security & Its Applications (IJNSA)

268 15 1 Analyzing Network Performance Parameters using Wireshark Ruchi Tuli, Jubail Industrial College, Kingdom of Saudi Arabia Full Text
269 15 1 Metrics for Evaluating Alerts in Intrusion Detection Systems Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya Full Text
270 15 1 Optimizing Congestion Control by using Devices Authentication in Software-Defined Networks Tamer Barakat, Hanan Eljawhri, Mohamed Merzban and Mahmoud Elbayoumi, Fayoum University, Egypt Full Text
271 15 2 Mechanisms for Digital Transformation in the Education and Healthcare Sectors Utilizing Decentralized Self-Sovereign Identity Gregory H. Jackson1 and Karaitiana Taiuru2, 1Adayge Inc., Utah, U.S.A, 2University of Auckland, New Zealand Full Text
272 15 2 Cybercrime Awareness on Social Media: A Comparison Study Wisdom Umeugo, Independent researcher, Canada Full Text
273 15 2 A Countermeasure for Double Spending Attacks on Blockchain Technology in Smart Grid Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA Full Text
274 15 3 Near Ultrasonic Attack and Defensive Countermeasures Forrest McKee and David Noever, PeopleTec, USA Full Text
275 15 3 Pseudo Random Key Generator using Fractal based Trellis Coded Genetic Algorithm for Image Encryption Anusha .T and Venkatesan R, PSG College of Technology, India Full Text
276 15 3 A Novel Alert Correlation Technique for Filtering Network Attacks Jane Kinanu Kiruki1,2, Geoffrey Muchiri Muketha1 and Gabriel Kamau1, 1Murang’a University of Technology, Kenya, 2Chuka University, Kenya Full Text
277 15 3 The Relationship Between the Characteristics of Software Developers and Security Behavior Intention Wisdom Umeugo, Independent Researcher, Canada Full Text
278 15 3 An Extended K-Means Cluster Head Selection Algorithm for Efficient Energy Consumption in Wireless Sensor Networks Peter Maina Mwangi, John Gichuki Ndia and Geoffrey Muchiri Muketha, Murang’a University of Technology, Kenya Full Text
279 15 3 The Evolving Threat Landscape: An Overview of Attacks and Response Strategies Against Cybercrime in Saudi Arabia Homam El-Taj, Dar Al-Hekma University, Kingdom of Saudi Arabia Full Text
280 15 3 Advancements in Crowd-Monitoring System: A Comprehensive Analysis of Systematic Approaches and Automation Algorithms: State-of-the-Art Mohammed Ameen and Richard Stone, Iowa State University, USA Full Text
281 15 4 Building a Continuously Integrating System with High Safety Tuan Nguyen Kim1, Ha Nguyen Hoang2 and Vy Huynh Trieu3, 1Duy Tan University, Viet Nam, 2Hue University, Vietnam, 3Phạm Van Dong University, Viet Nam Full Text
282 15 5 Invertible Neural Network for Inference Pipeline Anomaly Detection Malgorzata Schwab and Ashis Biswas, University of Colorado at Denver, USA Full Text
283 15 5 SPDZ-Based Optimistic Fair Multi-Party Computation Detection Chung-Li Wang, Alibaba Inc., USA Full Text
284 15 5 Exploring the Effectiveness of VPN Architecture in Enhancing Network Security for Mobile Networks: An Investigation Study Khawla Azwee1, Mokhtar Alkhattali1 and Mostafa Dow2, 1High Institute of Science and Technology, Libya, 2College of Science and Technology, Libya Full Text
285 15 6 Exploring Critical Vulnerabilities in SIEM Implementation and SOC Service Procurement: An In-Depth Analysis of High-Risk Scenarios Ertuğrul AKBAŞ, Istanbul Esenyurt University, Turkey Full Text
286 15 6 A Framework for Securing Email Entrances and Mitigating Phishing Impersonation Attacks Wosah Peace Nmachi, University of Gloucestershire, United Kingdom Full Text
287 15 6 A Systematic Review on Machine Learning Insider Threat Detection Models, Datasets and Evaluation Metrics Everleen Nekesa Wanyonyi1,2, Silvance Abeka2 and Newton Masinde2, 1Murang’a University of Technology, Kenya, 2Jaramogi Oginga Odinga University of Science and Technology, Kenya Full Text

International Journal of Security, Privacy and Trust Management (IJSPTM)

288 12 1 How Reversibility Differentiates Cyber from Kinetic Warfare: A Case Study in the Energy Sector Tom Johansmeyer, University of Kent, UK Full Text
289 12 1 A Trust Management Framework for Vehicular Ad Hoc Networks Rezvi Shahariar and Chris Phillips, University of London, UK Full Text
290 12 2 The Performance Comparison of a Brute-Force Password Cracking Algorithm using Regular Functions and Generator Functions in Python Berker Tasoluk1 and Zuhal Tanrikulu2, 1Istanbul University, Turkey, 2Bogazici University, Turkey Full Text
291 12 3/4 Deep Learning Meets Blockchain for Automated and Secure Access Control Asma Jodeiri Akbarfam1, Sina Barazandeh2, Deepti Gupta3, and Hoda Maleki1, 1Augusta University, Augusta, USA,2Bilkent University, Turkey, 3Texas A&M University Central Texas, USA Full Text
292 12 3/4 Object Capability Model for Tee: A Cheri Based Compartmentalization Approach Bala Subramanyan, Verifoxx Ltd, UK Full Text
293 12 3/4 Guideline for the Production of Digital Rights Management (DRM) Shannon Kathleen Coates and Hossein Abroshan, Anglia Ruskin University, UK Full Text

International Journal of Database Management Systems (IJDMS)

294 15 1 A Review of the Use of R Programming for data Science Research in Botswana Simisani Ndaba, University of Botswana, Botswana Full Text
295 15 1 Scaling Distributed Database Joins by Decoupling Computation and Communication Abhirup Chakraborty, ACM Member Full Text
296 15 2/3 A Comparative Analysis of Data Mining Methods and Hierarchical Linear Modeling Using PISA 2018 Data Wenting Weng1 and Wen Luo2, 1Johns Hopkins University, USA, 2Texas A&M University, USA Full Text
297 15 4/5 Gendarmerie Drones Used in National Security Missions Verónica Mendes Pinto1,2, 3, Tiago Gonçalves Silva1,2,3, José Silvestre Silva1,3,4, 1Portuguese Military Academy, Lisbon, Portugal, 2Guarda Nacional Republicana (GNR), Portugal, 3Military Academy Research Center (CINAMIL), Portugal, 4Universidade de Coimbra, Portugal Full Text
298 15 6 Data Anonymization Process Challenges and Context Missions Hassane Tahir and Patrick Brezillon, Sorbonne Université, France Full Text

International Journal of Data Mining & Knowledge Management Process (IJDKP)

299 13 1/2 The Stock Market Volatility Between China and Asean Countries Association Studies Based on Complex Networks Wangke Yu, Shuhua Liu, Ruoqi Pan, Ke Huang, Linyun Deng, Nanning University, China Full Text
300 13 1/2 Class Imbalance Handling Techniques used in Depression Prediction and Detection Simisani Ndaba, University of Botswana, Botswana Full Text
301 13 1/2 Demand Forecasting of a Perishable Dairy Drink: An ARIMA Approach T. Musora, Z. Chazuka, A. Jaison, J. Mapurisa, and J. Kamusha, Chinhoyi University of Technology, Zimbabwe Full Text
302 13 3 Heart Disease Prediction using Machine Learning and Deep Learning Dinesh Kalla and Arvind Chandrasekaran, Colorado Technical University, USA Full Text
303 13 4/5 When Should They Buy? Surviving Machine Learning Models for Purchase Timing Diego Vallarino, Independent Researcher, Spain Full Text

International Journal of Multimedia & Its Applications (IJMA)

304 15 1/2 A Comparative Study on Human Views in Mythologies and Webtoons Y.S. Seo, Hankuk University of Foreign Studies, Korea Full Text
305 15 3 Altruistic ASD (Autism Spectrum Disorder) Virtual Reality Game Taraf Alshalan, Ghala Alamri and Maali Alabullhafith, Princess Norah University, Saudi Arabia Full Text
306 15 3 Digital Malaysian Tradition Game: A Case Study of Baling Tin Nur Sufilea Izzati, Suzana Ahmad, Marina Ismail, Norizan Mat Diah, Norharziana Yahaya Rashdi, Sumarni Abu Bakar, Universiti Teknologi MARA, Malaysia Full Text
307 15 4 Exploring the Aspects of Educational Robotics: A Mini Systematic Literature Review Theinmoli Munusamy, Maizatul Hayati Mohamad Yatim and Suhazlan bin Suhaimi, Universiti Pendidikan Sultan Idris (UPSI), Malaysia Full Text
308 15 5 A Preliminary Study on Multidisciplinary Design Framework in a Virtual Reality Learning Environment Choong Wai Keng1, Maizatul Hayati Mohamad Yatim2 and Noorhayati Saad1, 1Taylor’s University, Malaysia, 2Sultan Idris Education University, Malaysia Full Text

International Journal of Computer Graphics & Animation (IJCGA)

309 13 1 Negative Attributes of the Metaverse Based on Thematic Analysis of Movie “belle” and “ready Player One” Y.S. Seo1 and Austin Kang2, 1Hankuk University of Foreign Studies Graduate School, Korea and 2Seoul National University, Korea Full Text
310 13 2 History and Future Trends of Multicore Computer Architecture Abdulrahman Alseqyani and Abdullah Almutairi, Zulfi College of Technology, Saudi Arabia Full Text

International Journal of Web & Semantic Technology (IJWesT)

311 15 1 Enhancing Web Accessibility - Navigating the Upgrade of Design Systems from WCAG 2.0 to WCAG 2.1 Hardik Shah, Rochester Institute of Technology, USA Full Text
312 15 1 Advancing Web Development - Enhancing Component-Based Software Engineering and Design Systems Through HTML5 Customized Built-in Elements Hardik Shah, Rochester Institute of Technology, USA Full Text

International Journal on Cloud Computing: Services and Architecture (IJCCSA)

313 13 1 Security and Privacy Aware Programming Model for IoT Applications in Cloud Environment Subba Reddy Borra, Smitha Khond and D. Srivalli, Malla Reddy Engineering College for Women (Autonomous), India Full Text
314 13 2 Users’ Perception Towards Cloud Computing: A Case of Department Statistic South Africa Mosima Naphtaline Phasha and Alfred Thaga Kgopa, Tshwane University of Technology, Pretoria, South Africa Full Text
315 13 2 Achieving Seamless Migration to Private-Cloud Infrastructure for Multi-Campus Universities Niki Kyriakou, Zoi Lachana, Dimitrios N. Skoutas, Charalampos Skianis and Yannis Charalabidis, University of the Aegean, Greece Full Text
316 13 3/4 Experimental Study to Maintain Stability in the Case of Industrial Cloudlets Network Amel Ben Lazreg, Sousse University, Tunisia Full Text

International Journal of Artificial Intelligence & Applications (IJAIA)

317 14 1 An Authorship Identification Empirical Evaluation of Writing Style Features in Cross-Topic and Cross-genre Documents Simisani Ndaba, Edwin Thuma, Gontlafetse Mosweunyane, University of Botswana, Gaborone, Botswana Full Text
318 14 1 Investigating the Effect of BD-CRAFT to Text Detection Algorithms Clarisa V. Albarillo1 and Proceso L. Fernandez, Jr.2, 1Don Mariano Marcos Memorial State University, Philippines, 2Ateneo de Manila University, Philippines Full Text
319 14 2 Spot-the-Camel: Computer Vision for Safer Roads Khalid AlNujaidi, Ghadah AlHabib, and Abdulaziz AlOdhieb, Prince Mohammad Bin Fahd University, Saudi Arabia Full Text
320 14 2 Stock Broad-Index Trend Patterns Learning via Domain Knowledge Informed Generative Network Jingyi Gu, Fadi P. Deek and Guiling Wang, New Jersey Institute of Technology, USA Full Text
321 14 2 Psychological Emotion Recognition of Students using Machine Learning based Chatbot Suha Khalil Assayed1, Khaled Shaalan1, Sana Alsayed2, Manar Alkhatib1,1The British University, UAE,2Philadelphia University, Jordan Full Text
322 14 2 A Comparison of Document Similarity Algorithms Nicholas Gahman and Vinayak Elangovan, Penn State University, USA Full Text
323 14 2 Design That Uses AI to Overturn Stereotypes: Make Witches Wicked Again Xiaohan Feng and Makoto Murakami, Toyo University, Japan Full Text
324 14 2 Development of an Intelligent Vital Sign Monitoring Robot System Yu-Ping Liao Wen-Hsiang Yeh, Hong-Xin Wu, and Yi-Lin Cheng, Chung Yuan Christian University, Taiwan Full Text
325 14 2 EDGE-Net: Efficient Deep-Learning Gradients Extraction Network Nasrin Akbari and Amirali Baniasadi, University of Victoria, Canada Full Text
326 14 3 Large Language Models for Ciphers David Noever, PeopleTec, USA Full Text
327 14 3 Procedural Generation in 2D Metroidvania Game with Answer Set Programming and Perlin Noise John Xu1 and John Morris2, 1USA, 2California State Polytechnic University, USA Full Text
328 14 4 Real Time Deep Learning Weapon Detection Techniques for Mitigating Lone Wolf Attacks Akhila Kambhatla and Ahmed R Khaled, Southern Illinois University, USA Full Text
329 14 4 Uncertainty Estimation in Neural Networks Through Multi-Task Learning Ashish James and Anusha James, Insitute for Infocomm Research (I2R), Singapore Full Text
330 14 4 Answer Set Programming (DLV – Clingo):Connect 4 Solver Rosalba Cuapa C, Fernando Zacarias F and Adair Ponce, Universidad Autónoma de Puebla, México Full Text
331 14 4 Segmentation of the Gastrointestinal Tract MRI Using Deep Learning J. Roy and A. Abdel-Dayem, Laurentian University, Canada Full Text
332 14 5 Performance Evaluation of Block-Sized Algorithms for Majority Vote in Facial Recognition Andrea Ruiz-Hernandez, Jennifer Lee, Nawal Rehman, Jayanthi Raghavan and Majid Ahmadi, University of Windsor, Canada Full Text
333 14 5 Subverting Characters Stereotypes: Exploring the Role of AI in Stereotype Subversion Xiaohan Feng and Makoto Murakami, Toyo University, Kawagoe, Japan Full Text
334 14 5 Characteristics of Networks Generated by Kernel Growing Neural Gas Kazuhisa Fujita, Komatsu University, Japan Full Text
335 14 5 Sentiment Analysis in Indian Elections: Unraveling Public Perception of the Karnataka Elections With Transformers Pranav Gunhal, Artificial Intelligence Coalition, USA Full Text
336 14 5 Identifying Text Classification Failures in Multilingual AI-Generated Content Raghav Subramaniam, Independent Researcher Full Text
337 14 6 Building Python Application for Webmail Interfaces Navigation using Voice Recognition Technology Mokhtar Alkhattali1, Mostafa Dow2, Khawla Azwee1 and Mohamed Sayah2, 1High Institute of Science and Technology, Libya, 2College of Science and Technology, Libya Full Text
338 14 6 English to Arabic Machine Translation of Mathematical Documents Mustapha Eddahibi and Mohammed Mensouri, Ibnou Zohr University, Morocco Full Text
339 14 5 Smart Crosswalk: Machine Learning and Image Processing based Pedestrian and Vehicle Monitoring System Hiruni J.M.D.K, Weerakoon L.M.R, Weerasinghe T.R, Jayasinghe S.J.A.S.M.S, Jenny Krishara, Sanjeevi Chandrasiri, Sri Lanka Institute of Information Technology, Sri Lanka Full Text
340 14 6 Learning Spline Models with the EM Algorithm for Shape Recognition Abdullah A. Al-Shaher, Yousef S. AlKhawari, Public Authority for Applied Education and Training, Kuwait Full Text

International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

341 12 1/2 A Hybrid Methods DSS for the Best Performing Lecturers Selection Teotino G. Soares1, Marcelo F. X. Cham2, Abdullah Z. Abidin3 and Tenia Wahyuningrum4, 1,2Dili Institute of Technology (DIT), Timor Leste, 3Professional IT Consultant Enterprise, Malaysia, 4Institut Teknologi Telkom Purwokerto, Indonesia Full Text

Machine Learning and Applications: An International Journal (MLAIJ)

342 10 1 A Machine Learning Method for Prediction of Yogurt Quality and Consumers Preferencesusing Sensory Attributes and Image Processing Techniques MahaHany1, Shaheera Rashwan1 and Neveen M. Abdelmotilib2, 1Informatics Research Institute, Egypt, 2Arid Lands Cultivation Research Institute, Egypt Full Text
343 10 2/3 Face Mask Detection Model Using Convolutional Neural Network Mamdouh M. Gomaa1, Alaa Elnashar1, Mahmoud M. Eelsherif2, and Alaa M. Zaki1, 1Minia University, Egypt, 2Sinai university, Egypt Full Text
344 10 2/3 Breast Tumor Detection Using Efficient Machine Learning and Deep Learning Techniques Ankita Patra1, Santi Kumari Behera2, Prabira Kumar Sethy1, Nalini Kanta Barpanda1, Ipsa Mahapatra2, 1Sambalpur University, India, 2VSSUT Burla, India Full Text
345 10 2/3 Sentiment-Driven Cryptocurrency Price Prediction: A Machine Learning Approach Utilizing Historical Data and Social Media Sentiment Analysis Saachin Bhatt, Mustansar Ghazanfar, and Mohammad Hossein Amirhosseini, University of East London, United Kingdom Full Text
346 10 4 Evaluating the Accuracy of Classification Algorithms for Detecting Heart Disease Risk Alhaam Alariyibi, Mohamed El-Jarai and Abdelsalam Maatuk, Benghazi University, Libya Full Text

Signal & Image Processing : An International Journal (SIPIJ)

347 14 1 Evaluating the Accuracy of a Linear Regression Model in Predicting the Dissolution of Tablets Based on Raman Maps Gábor Knyihár, Kristóf Csorba and Hassan Charaf, Budapest University of Technology and Economics Budapest, Hungary Full Text
348 14 1 Scaling Distributed Database Joins by Decoupling Computation and Communication Abhirup Chakraborty, ACM Member Full Text
349 14 2/3 A Comparative Analysis of Data Mining Methods and Hierarchical Linear Modeling Using PISA 2018 Data Wenting Weng1 and Wen Luo2, 1Johns Hopkins University, USA, 2Texas A&M University, USA Full Text
350 14 4/5 Gendarmerie Drones Used in National Security Missions Verónica Mendes Pinto1,2, 3, Tiago Gonçalves Silva1,2,3, José Silvestre Silva1,3,4, 1Portuguese Military Academy, Lisbon, Portugal, 2Guarda Nacional Republicana (GNR), Portugal, 3Military Academy Research Center (CINAMIL), Portugal, 4Universidade de Coimbra, Portugal Full Text
351 14 6 Data Anonymization Process Challenges and Context Missions Hassane Tahir and Patrick Brezillon, Sorbonne Université, France Full Text
352 14 6 Data Anonymization Process Challenges and Context Missions Hassane Tahir and Patrick Brezillon, Sorbonne Université, France Full Text

International Journal on Soft Computing ( IJSC )

353 14 1 Exploring Sentiment Analysis Research: A Social Media Data Perspective Zahra Dahish1,2 and Shah J Miah1, 1University of Newcastle, Australia, 2Jazan University, Saudi Arabia Full Text
354 14 2 Texts Classification with the usage of Neural Network based on the Word2vec’s Words Representation D. V. Iatsenko, Southern Federal University, Russia Full Text
355 14 3 Insider Threat Prevention in the US Banking System Oghenekome Efijemue1, Ifunanya Ejimofor1 and Omoshola Simon Owolabi2, 1Austin Peay State University, Clarksville USA, 2Carolina University, USA Full Text
356 14 3 Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Financial Fraud in the United States Financial Sectors Efijemue Oghenekome Paul1, Obunadike Callistus1, Olisah Somtobe1, Taiwo Esther1, Kizor-Akaraiwe Somto2, Odooh Clement1 and Ifunanya Ejimofor1, 1Austin Peay State University, Clarksville USA, 2University of Washington, Seattle USA Full Text
357 14 4 Analytic Approach in Accessing Trends and Impacts of Medicaid-Medicare Dual Enrollment in the United States Clement Odooh and Regina Robert, Austin Peay State University, USA Full Text
358 14 4 A Review of Data Intelligence Applications Within Healthcare Sector in the United States Clement Odooh, Regina Robert and Efijemue Oghenekome Paul, Austin Peay State University, USA Full Text





menu
Reach Us

emailsecretary@airccse.org


emailjsecretary@airccj.org

close