Computer Science & Information Technology

S.No Volume Issue Paper Title Authors

International Journal of Computer Science & Information Technology (IJCSIT)

1 13 1 Application of a Multilevel Technology Acceptance Management Model for Effective Technology Deployment Gilbert Busolo, Lawrence Nderu and Kennedy Ogada, Jomo Kenyatta University of Agriculture and Technology, Kenya Full Text
2 13 1 Real Time Vigilance Detection using Frontal EEG Siddarth Ganesh1 and Ram Gurumoorthy2, 1Amrita Vishwa Vidyapeetham, India, 2StimScience Inc., USA Full Text
3 13 1 Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh Network-on-Chip Systems Walid Mokthar Salh and Azeddien M. Sllame, University of Tripoli Tripoli, Libya Full Text
4 13 1 Highly Constrained University Class Scheduling using Ant Colony Optimization Al-Mahmud, KUET, Bangladesh Full Text
5 13 1 Efficient Field of Vision Algorithms for Large 2D Grids Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada Full Text
6 13 2 Newly Proposed Technique for Autism Spectrum Disorder based Machine Learning Sherif Kamel1,2 and Rehab Al-harbi2,1 October University for Modern Sciences and Arts, Egypt, 2 Arab East Colleges for Graduate Studies, KSA Full Text
7 13 2 Big Data Analytics in Health Care: A Review Paper Maria Mohammad Yousef, Al-albayt University, Jordan Full Text
8 13 2 Monitoring of the Last US Presidential Elections Christoph Glauser1, Jacques Savoy2 and Loris Schmid1,2, 1IFAAR Institute, Switzerland, 2University of Neuchatel, Switzerland Full Text
9 13 2 Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage Waleed Al-Ghaith, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Saudi Arabia Full Text
10 13 2 Comparison Analysis of Facebook’s Prophet, Amazon’s DeepAR+ and CNN-QR Algorithms for Successful Real-World Sales Forecasting Emir Žunić1,2, Kemal Korjenić1, Sead Delalić1,2 and Zlatko Šubara1, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina, 2University of Sarajevo, Bosnia and Herzegovina Full Text
11 13 3 Fabric Defect Detection based on Improved Object as Point Yuan He, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore Full Text
12 13 3 Product Sentiment Analysis for Amazon Reviews Arwa S. M. AlQahtani, Princess Nourah bint Abdulrahman University, Saudi Arabia Full Text
13 13 4 Online Learning During Covid-19 Pandemic, and Possibility of Adopting Computer-Based Test Rabea Emdas1 and Ahmed Alruwaili2, 1Swinburne University of Technology, Australia, 2La Trobe University, Australia Full Text
14 13 4 Web Scraper Utilizes Google Street View Images to Power a University Tour Peiyuan Sun1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA Full Text
15 13 4 Cloak-Reduce Load Balancing Strategy for Mapreduce Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso Full Text
16 13 5 Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA Full Text
17 13 5 Information Retrieval based on Cluster Analysis Approach Orabe Almanaseer, The University of Jordan, Jordan Full Text
18 13 5 Blockchain Technology in Agriculture: A Case Study of Blockchain Start-Up Companies Chandra Sekhar Bhusal, Information Technology and Physical Sciences Federation University, Australia Full Text
19 13 5 Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks Ali M. Allam, Helwan University, Egypt Full Text
20 13 5 Circuit Break Connect Monitoring to 5G Mobile Application Ton Tsang and Cheung Yip Kan, Hong Kong College of Technology, Hong Kong Full Text
21 13 5 The BitcoinHeist: Classifications of Ransomware Crime Families Micheline Al Harrack, Marymount University, USA Full Text
22 13 6 Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3, 1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France Full Text
23 13 6 Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran Full Text
24 13 6 Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia Full Text
25 13 6 SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines) Amelie Anne Gutierrez, Holy Angel University, Philippines Full Text
26 13 6 Creating 3D Models with 3D Printing Process Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia Full Text

International Journal of Computer Science and Engineering Survey (IJCSES)

27 12 1 Multilayer Backpropagation Neural Networks for Implementation of Logic Gates Santosh Giri and Basanta Joshi, Tribhuvan University, Nepal Full Text
28 12 2 Advance in Image and Audio Restoration and their Assessments: A Review Omar H. Mohammed and Basil Sh. Mahmood, Mosul University, Iraq Full Text

Computer Science & Engineering: An International Journal (CSEIJ)

29 11 1 Preventing Counterfeit Products using Cryptography, QR Code and Webservice Cheman Shaik, VISH Consulting Services Inc, USA Full Text
30 11 2/3/4/5/6 Aadhar Enabled Public Distribution System (AEPDS), Beneficiary Survey and Assessment Framework Aakanksha Gupte and Dr. Gayatri Doctor, CEPT University, India Full Text

Advanced Computing: An International Journal (ACIJ)

31 12 1 Detection of Forgery and Fabrication in Passports and Visas using Cryptography and QR Codes Cheman Shaik, VISH Consulting Services Inc, USA Full Text
32 12 2/3/4/5 E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles Yassine MOUMEN, Mariam BENHADOU and Abdellah HADDOUT, Hassan II University, Morocco Full Text

International Journal of Computer Science, Engineering and Applications (IJCSEA)

33 11 1 Unlimited Length Random Passwords for Exponentially Increased Security Cheman Shaik, VISH Consulting Services Inc, USA Full Text
34 11 1 Preventing Forged and Fabricated Academic Credentials using Cryptography and QR Codes Cheman Shaik, VISH Consulting Services Inc, USA Full Text
35 11 1 Using Image Processing Techniques to Increase Safety in Shooting Ranges Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey Full Text
36 11 2/3/4 Using Voice Recognition in E-Learning System to Reduce Educational Inequality During Covid-19 Vladimir Tregubov, Yuri Gagarin State Technical University of Saratov, Russia Full Text
37 11 2/3/4 Anomaly Detection in Arabic Texts using Ngrams and Self Organizing Maps Abdulwahed Almarimi and Asmaa Salem, Bani Waleed University, Libya Full Text
38 11 5 IoT based Smart Irrigation System by Exploiting Distributed Sensorial Network Md. Omar Faruk and Tarun Debnath, Pabna University of Science and Technology, Bangladesh Full Text
39 11 5 Dealing Crisis Management using AI Yew Kee Wong, HuangHuai University, China Full Text
40 11 6 Analysis of Topic Modeling with Unpooled and Pooled Tweets and Exploration of Trends during Covid Jaishree Ranganathan and Tsega Tsahai, Middle Tennessee State University, USA Full Text

International Journal on Computational Science & Applications (IJCSA)

41 11 1/2/3/4 An Artificial Intelligence URL Parser for Safer Web Browsing and Detection of Suspicious Links James Jin1, Gayatri S2 and Yu Sun3, 1USA, 2University of California, USA, 3California State Polytechnic University, USA Full Text
42 11 1/2/3/4 Procrash: A Solution To Procrastination by Limiting Online Distractions using Optical Character Recognition Amanda Zhu1, Baoyu Yin2 and Yu Sun3, 1USA, 2Lehigh University, USA, 3California State Polytechnic University, USA Full Text
43 11 5/6 Glioblastoma Synthesis and Segmentation with 3D Multi-Modal MRI: A Study using Generative Adversarial Networks Edmond Wang, Westminster School, United Kingdom Full Text

International Journal on Information Theory (IJIT)

44 10 1/2/3 The Effect of using Group Investigation Methods, Inquiry and Learning Style on Learning Outcomes Achmad Noor Fatirul and Djoko Adi Walujo, PGRI Adi Buana University Surabaya, Indonesia Full Text

Advanced Computational Intelligence: An International Journal (ACII)

45 8 1/2/3 Accurate Numerical Method for Singular Initial-Value Problems Tesfaye Aga Bullo1, Gemechis File Duressa1 and Gashu Gadisa Kiltu2, 1Jimma University, Ethiopia, 2Madda Walabu University, Ethiopia Full Text

International Journal on Natural Language Computing (IJNLC)

46 10 1 Applying the Affective Aware Pseudo Association Method to Enhance the Top-N Recommendations Distribution to Users in Group Emotion Recommender Systems John Kalung Leung, Igor Griva and William G. Kennedy, George Mason University, USA Full Text
47 10 2 An Automated Multiple-Choice Question Generation using Natural Language Processing Techniques Chidinma A. Nwafor and Ikechukwu E. Onyenwe, Nnamdi Azikiwe University Awka, Nigeria Full Text
48 10 2 Integrating Extracted Information from Bert and Multiple Embedding Methods with the Deep Neural Network for Humour Detection Rida Miraj and Masaki Aono, Toyohashi University of Technology, Japan Full Text
49 10 3 Automatic Extraction of Semantic Roles in Support Verb Constructions Ignazio Mauro Mirto, Università di Palermo, Italy Full Text
50 10 4 Domain based Chunking Nilamadhaba Mohapatra, Namrata Sarraf and Swapna sarit Sahu, Zeotap, India Full Text
51 10 4 Sentiment Analysis in Myanmar Language using Convolutional LSTM Neural Network Nwet Yin Tun Thein and Khin Mar Soe, University of Computer Studies, Myanmar Full Text
52 10 5 Developing Products Update-Alert System for E-Commerce Websites Users using Html Data and Web Scraping Technique Ikechukwu Onyenwe, Ebele Onyedinma, Chidinma Nwafor and Obinna Agbata, Nnamdi Azikiwe University, Nigeria Full Text
53 10 5 Analyzing Architectures for Neural Machine Translation using Low Computational Resources Aditya Mandke, Onkar Litake, and Dipali Kadam, SCTR’s Pune Institute of Computer Technology, India Full Text
54 10 5 Natural Language Processing through the Subtractive Mountain Clustering Algorithm - A Medication Intake Chatbot Paulo A. Salgado and T-P Azevedo Perdicoulis, Escola de Ciencias e Tecnologia Universidade de Tr´as-os-Montes e Alto Douro, Portugal Full Text
55 10 5 Built to Scale: A Corpus-Based Analysis of Adjective Scales in the Mcgill Pain Questionnaire Miriam Stern, Princeton University, USA Full Text
56 10 6 Question Answering Module Leveraging Heterogeneous Datasets Abinaya Govindan, Gyan Ranjan and Amit Verma, Neuron7.ai, USA Full Text
57 10 6 Warrants Generations using a Language Model and a Multi-Agent System Fatima Alkhawaldeh, Tommy Yuan and Dimitar Kazakov, University of York, UK Full Text

International Journal of Managing Information Technology (IJMIT)

58 13 1 A Novel Performance Measure for Machine Learning Classification Mingxing Gong, University of Delaware Newark, USA Full Text
59 13 1 A Management Approach of an E-Tutoring Program for High School Students Spyridon Doukakis, Ionian University, Greece Full Text
60 13 1 Assessing the Readiness for Cloud Computing in Higher Education Institutions in the Kingdom of Bahrain: Towards an Education Cloud Computing Strategy Jaflah Al-Ammary and Zakaria Saleh, University of Bahrain, Kingdom of Bahrain Full Text
61 13 1 The Impact of Information Technology on Business Transformation in the Operating TelecommunicationsCompanies in Jordan Abeer Sufian and Mohammed Otair, Amman Arb University, Jordan Full Text
62 13 2 Multi-Agent based Capital Market Management System: A Distributed Framework for Trading and Regulation Muhammed Kabir Ahmed1, Aliyuda Ali1, Ali Ahmad Aminu1 and Hassan Ibrahim2, 1Gombe State University, Nigeria, 2Gombe State Polytechnic, Nigeria Full Text
63 13 3 Challenges for Managing Complex Application Portfolios: A Case Study of South Australian Public Sector Agency Yaser Mirza, University of South Australia, Australia Full Text
64 13 3 A Review on Classification of Data Imbalance using BigData Ramasubramanian and Hariharan Shanmugasundaram, Shadan Women’s College of Engineering and Technology, India Full Text
65 13 3 Human Factors Considerations in Satellite Operations Human-Computer Interaction Technologies: A Review of Current Applications and Theory David G. I. Heinrich, Ian McAndrew and Jeremy Pretty, Capitol Technology University, USA Full Text
66 13 3 Implementation of Decision Support Personnel Recruitment System for Laguna State Polytechnic University-San Pablo City Campus Joanna A. Erlano-De Torres, Laguna State Polytechnic University-San Pablo City Campus, Philippines Full Text
67 13 4 Assessment on LSPU-SPCC Students’ Readiness towards M-learning Joanna A. Erlano-De Torres, Laguna State Polytechnic University-San Pablo City Campus, Philippines Full Text
68 13 4 The Impact of In-House Software Development Practices on System Usability in the Social Security Funds in Tanzania Hamis Fredrick Eliazer and Michael John Haule, Institute of Accountancy Arusha, Tanzania Full Text
69 13 4 Engineering Life Cycle Enables Penetration Testing and Cyber Operations Paul Cheney and Ian R. McAndrew, Capitol Technology University, USA Full Text

International Journal of Managing Value and Supply Chains (IJMVSC)

70 12 1 A Thematic Literature Review on Business Process Management C.R.Oruthotaarachchi and W M J I Wijayanayake, University of Kelaniya, Sri Lanka Full Text
71 12 2 E-Supplier Management Practices on Supply Chain Performance of Sugar Processing Firms in Kenya Evans Biraori Oteki, Murang’a University of Technology, Kenya Full Text
72 12 3 The Agonies of Covid 19 on Vegetable Farmers Along the White Volta River Basin in the Upper East Region of Ghana Benjamin Bilalam Jabik, University of Energy and Natural Resources, Ghana Full Text
73 12 3 Corporate Environmental Sustainability – A Key Figure-Based Approach Sabrina Stern1, Sven Steck2 and Stefan Waitzinger3, 1Hochschule für Technik, Wirtschaft und Gestaltung, Germany and Management Consultant at P3 automotive GmbH, Germany, 2Managing Partner at P3 automotive GmbH, Germany, 3Professor at Department Economie, Hochschule für Technik, Germany Full Text

International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)

74 12 1 Enablers and Inhibitors of E-tax System Use:The Perspective of Dual-Factor Concepts Md. Faridur Rahman1, Md. Shamim Talukder2 and Yang Lanrong1, 1Huazhong University of Science and Technology, China, 1North South University, Bangladesh Full Text
75 12 1 Public University Modes of Communications: A Study of Student Preferences Teri Root, David C. Wyld, Joseph Palmisano and Maya Weber, Southeastern Louisiana University, USA Full Text
76 12 2 The Effect of Internal Factors within the Government Entities on the Implementation of E-gov Projects by External IT Service Providers: An Empirical Study on GCC Area Saba Fakhry, SP Jain School of Global Management, UAE Full Text
77 12 2 A Data Governance Maturity Assessment: A Case Study of Saudi Arabia Hmood Al-Dossari and Aisha Ali Sumaili, King Saud University, Saudi Arabia Full Text
78 12 3 Challenges for Public Sector Organisations in Cloud Adoption: A Case Study of South Australian Public Sector Agency Yaser Mirza, University of South Australia, Australia Full Text
79 12 3 Image is Indeed Everything: An Analysis of How Americans View Leading Companies Today on the Seven Dimensions of Corporate Reputation David C. Wyld, Southeastern Louisiana University, USA Full Text
80 12 4 Cloud Computing in the Public Sector: Mapping the Knowledge Domain Mark Theby, Capitol Technology University, USA Full Text
81 12 4 Challenges in Significant Adoption of Active Queue Management in the Philippines’ Consumer Space Min Guk I. Chi, Bachelor of Business Administration, S P Jain School of Global Management, Australia Full Text

Health Informatics - An International Journal (HIIJ)

82 10 1 Detecting Fatigue in the Workplace Tyler D. Asher and Ian Mc Andrew, Capitol Technology University, USA Full Text
83 10 1 Language Characteristics Supporting Early Alzheimer's Diagnosis through Machine Learning - A Literature Review Fabian Thaler and Heiko Gewald, Hochschule Neu-Ulm University of Applied Sciences, Germany Full Text
84 10 2 Heat Illness Prevention in the Outdoor Workplace Tyler D. Asher M.S and Ian McAndrew, Capitol Technology University, USA Full Text
85 10 2 Clinical and Social Determinants to Improve Dod/Veteran Well Being: The Service Member Veteran Risk Profile Richard T. Hartman1 and Mark E. Oxley2, 1Department of Veterans Affairs, USA, 2Air Force Institute of Technology, USA Full Text
86 10 3 An EHealth Adoption Framework for Developing Countries: A Systematic Review Agnes Rwashana Semwanga, Hasifah Kasujja Namatovu , Swaib Kyanda Kaawaase and Mark Abraham Magumba, Makerere University, Uganda Full Text
87 10 4 Towards a Standard of Modelling Annotations in the E-Health Domain Zayneb Mannai1, Anis Kalboussi2 and Ahmed Hadj Kacem1, 1Universityof Sfax, Tunisia, 2University of Kairouan, Tunisia Full Text

International Journal on Cybernetics & Informatics (IJCI)

88 10 1/2 1st International Conference on Innovative Computational Intelligence(ICICI 21)   May 07, 2021, Francis Xavier Engineering College, India, Volume Editors : D. Angeline Ranjithamani, A. Arul Amalraj (Eds) Full Text
89 10 3 ICARTEC-2021 June, 2021, Meenakshi Sundar Rajan Engineering College, Chennai, India, Volume Editors : Siji Raaja (Eds) Full Text

International Journal on Integrating Technology in Education (IJITE)

90 10 1 A Study of Facts and Generating Factors of “Dislike for Exercise” and “Dislike for Physical Education” B.Chuluun-Erdene and D.Azjargal, Mongolian National University of Education, Mongolia Full Text
91 10 2 Comparing Virtual Learning Techniques Upon Technology Acceptance and Student Engagement in Differing Classroom Environment Evans Girard1, Rita Yusri1, Adel Abusitta2 and Esma Aïmeur1, 1University of Montreal, Canada, 2McGill University, Canada Full Text
92 10 2 An Automated Stable Personalised Partner Selection for Collaborative Privacy Education Godfred Yaw Koi-Akrofi, Emmanuel Owusu-Oware and Hannah Tanye, University of Professional Studies, Ghana Full Text
93 10 2 An Investigation into the Effectiveness of the Curriculum and Assessment Policy Statement (CAPS) in South African Schools Tinuade Adekunbi Ojo1 and Refentse Mathabathe2, 1University of Johannesburg, South Africa, 2Ahube Valley Ext, South Africa Full Text
94 10 2 A “Bird’s Eye View” on Communication Acts in a Classroom of Low Literacy Adults Carlos Luís1,2, Helena Afonso3 and Maria José Marcelino1, 1CISUC and FCTUC Universidade de Coimbra, Portugal, 2IEFP-Centro de Formação Profissional de Coimbra, Portugal, 3IEFP-Delegação Regional do Centro IEFP Coimbra, Portugal Full Text
95 10 2 Comparison of E-learning and Classroom Training for Bachelor Students of Traditional Medicine SBazarragchaa Sodnom1, Uranchimeg Tudevdagva2,3, Tserendulam Luvsandorj1, Selenge Erdenechimeg1, 1Mongolian University of Pharmaceutical Sciences, Mongolia, 2Technical University of Chemnitz, Germany, 3Mongolian University of Science and Technology, Mongolia Full Text
96 10 2 Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications Micheline Al Harrack, Marymount University, USA Full Text
97 10 3 Perceptions of Online Teaching and Learning During the Covid-19 Pandemic in Barbadian Primary and Secondary Schools Kristina Stuart1, Dwayne Devonish2, Unri Babb3, Kenroy Burke4 and Lisa McClean-Trotman5, 1Research Consultant, Nvivo Qualitative Expert, 2University of the West Indies, Cave Hill Barbados, 3Research Consultant, 4Research Consultant, 5UNICEF (Eastern Caribbean) Communication for Development Specialist, UNICEF, Research Supervisor Full Text
98 10 3 Preparing Student Teachers to Teach with Technology: Case Studies in Finland and Israel Olzan Goldstein1 and Eero Ropo2, 1Kaye Academic College of Education, Israel, 2Tampere University, Finland Full Text
99 10 4 The Teachers Experience of Practice-based Education in Hybrid Delivery Mode Felicity Molloy, Independent Academic, New Zealand Full Text
100 10 4 Use of Socrative as a Teaching Tool in Anatomy during the Covid-19 Pandemic Lennox Francis, University of the West Indies, Jamaica Full Text
101 10 4 Acceptability of K12 Senior High School Students Academic Performance Monitoring System for Private Institutions with Decision Support System Winston G. Domingo, Erwin N. Lardizabal and Sheena Marie V. Toledo, Cagayan Valley Computer and Information Technology College, Philippines Full Text
102 10 4 The Application of Art in the Enhancement of Speaking Skills in Greek State Primary School Students of Pre-A1 Level Eirini Kikioni1 and Makrina-Nina Zafiri2, 1Ministry of Education and Religious Affairs, Greece, 2Aristotle University of Thessaloniki, Greece Full Text
103 10 4 Promoting Teachers’ Skills of Instructional Materials Improvisation through Workshops and Exhibitions in Calabar Metropolis, Nigeria Ekpo O. Ekpo-Eloma and Abigail Aniefiok Effiong, University of Calabar, Nigeria Full Text
104 10 4 An Assessment of ICT Support for Students Living with Disabilities at the University of Namibia Mathew Haitota1, Chirimbana Moses2 and Haimbangu Malakia3, 1Mathew Haitota Students Support Services University of Namibia (Main Campus), 2University of Namibia (Oshakati Campus), 3Ministry of Education, Arts and Culture (Omusati Directorate of Education) Full Text

International Journal of Computer Networks & Communications (IJCNC)

105 13 1 WiFi Transmit Power and its Effect on Co-Channel Interference Zyanya Cordova, Riddhi Rana, Giovanna Rendon, Justin Thunell and Abdelrahman Elleithy, William Paterson University, USA Full Text
106 13 1 An Optimal Route Discovery using Biogeography based Optimization for Vehicular Ad Hoc Networks Shaeista Begum1, Nagaraj B. Patil2 and Vishwanath P3, 1Government Engineering College, Raichur, India, 2Government Engineering College, Gangavathi, India, 3H.K.E.S’s S.L.N. College Of Engineering, India Full Text
107 13 1 IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks Mohamed Matoui, Noureddine Moumkine and Abdellah Adib, Faculty of Science and Technology Mohammedia, Morocco Full Text
108 13 1 Enhanced Particle Swarm Optimization for Effective Relay Nodes Deployment in Wireless Sensor Networks Bader Alshaqqawi1, Sardar Anisul Haque2, Mohammed Alreshoodi1 and Ibrahim Alsukayti1, 1Qassim University, Saudi Arabia, 2Alcorn State University, USA Full Text
109 13 1 Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Network Lakshmi M and Prashanth C R, Dr. Ambedkar Institute of Technology, India Full Text
110 13 1 An Exact Analytical Model for an IoT Network with MMPP Arrivals Osama Salameh, Arab American University, Palestine Full Text
111 13 1 Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things Fawaz Alassery and Maha M. Althobaiti, Taif University, Saudi Arabia Full Text
112 13 2 Dynamic Shaping Method using SDN And NFV Paradigms Shin-ichi Kuribayashi, Seikei University, Japan Full Text
113 13 2 Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET Gyanendra Kumar Pallai1, Meenakshi Sankaran2 and Amiya Kumar Rath3, 1SOA University, India, 2VIT Bhopal University, India, 3Veer Surendra Sai University of Technology, India Full Text
114 13 2 Developing an Adaptive Channel Modelling using a Genetic Algorithm Technique to Enhance Aerial Vehicle-to-Everything Wireless Communications Faris. A. Almalki, Taif University, Kingdom of Saudi Arabia Full Text
115 13 2 Q-Learning based Routing Protocol to Enhance Network Lifetime in WSNs Arunita Kundaliya and D.K. Lobiyal, Jawaharlal Nehru University, India Full Text
116 13 2 Quantile Regressive Fish Swarm Optimized Deep Convolutional Neural Learning for Reliable Data Transmission in IoV S. Suguna Devi and A. Bhuvaneswari, Cauvery College For Women, India Full Text
117 13 2 Privacy-Preserving Machine Authenticated Key Agreement for Internet of Things Beaton Kapito1,3, Mwawi Nyirenda1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea, 3Malawi Adventist University, Malawi Full Text
118 13 2 Does Digital Native Status Impact End-User Antivirus Usage? Gerrianne Roberts1 and Shawon Rahman2, 1Valencia College, USA, 2University of Hawaii-Hilo, USA Full Text
119 13 3 About Digital Communication Methods for Visible Light Communication Wataru Uemura, Yasuhiro Fukumori and Takato Hayama, Ryukoku University, Japan Full Text
120 13 3 Evolutionary Computing based Neuron-Computational Model for Microstrip Patch Antenna Design Optimization Rohini Saxena, Mukesh Kumar and Shadman Aslam, University of Allahabad, India Full Text
121 13 3 Multilayer Representation and Multiscale Analysis on Data Networks Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia Full Text
122 13 3 Clock Synchronization using Truncated Mean and Whale Optimization for Clustered Sensor Networks Karthik Soundarapandian1 and Ashok Kumar Ambrose2, 1Bharathiar University, India, 2Alagappa Govt. Arts College, India Full Text
123 13 3 A Controllable RSU and Vampire Moth to Support the Cluster Stability in VANET Ronald Adrian, Selo Sulistyo, I Wayan Mustika and Sahirul Alam, Universitas Gadjah Mada, Indonesia Full Text
124 13 3 A Method of Improving Energy Efficiency Through Geofencing and False Data Blocking In Context-Aware Architecture for Probabilistic Voting-Based Filtering Scheme of WSNs Su Man Nam1 and Youn Kyoung Seo2, 1DUDU Information Technologies, Republic of Korea, 2Incheon Jae Neung University, Republic of Korea Full Text
125 13 3 Trust Level Evaluation based Asymmetric Cryptography Protocol for Flexible Access Control in Fog Computing C. Nagarani1 and R. Kousalya2, 1PSG College of Arts and Science, India, 2Dr. N.G.P Arts and Science College, India Full Text
126 13 4 Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular Ad-Hoc Networks (VANETS) Chantakarn Pholpol and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand Full Text
127 13 4 An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India Full Text
128 13 4 Novel Position Estimation using Differential Timing Information for Asynchronous LTE/NR Networks Muhammad Abugabal, Yasmine Fahmy and Hazim Tawfik, Cairo University, Egypt Full Text
129 13 4 Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN Shivshanker. P. Biradar1 and T. S. Vishwanath2, 1LAEC, India, 2BKIT, India Full Text
130 13 4 A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network Slaheddine Chelbi1 and Riadh Moussi2,3, 1Qassim University, Kingdom of Saudi Arabia, 2Taibah University, Kingdom of Saudi Arabia, 3University of Kairouan, Tunisia Full Text
131 13 4 Performance Analysis in Cellular Networks Considering the QoS by Retrial Queueing Model with the Fractional Guard Channels Policies Dang ThanhChuong, Hoa Ly Cuong, Pham Trung Duc and Duong Duc Hung, Hue University, VietNam Full Text
132 13 4 MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC) Mahabaleshwar Kabbur, Anand R and Arul Kumar V, REVA University, India Full Text
133 13 5 Threshold based VM Placement Technique for Load Balanced Resource Provisioning using Priority Scheme in Cloud Computing Mayank Sohani and S. C. Jain, Rajasthan Technical University, India Full Text
134 13 5 A New Efficient Cache Replacement Strategy for Named Data Networking Saad Al-Ahmadi, King Saud University, Saudi Arabia Full Text
135 13 5 An Effective Control of Hello Process for Routing Protocol in MANETs Dhirendra Kumar Sharma and Nitika Goenka, University of Petroleum and Energy Studies, India Full Text
136 13 5 Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterogeneous Wireless Sensor Network Nguyen Duy Tan, Vu Khanh Quy, Pham Ngoc Hung and Le Van Vinh, Hung Yen University of Technology and Education, Vietnam Full Text
137 13 5 Dynamic Task Scheduling based on Burst Time Requirement for Cloud Environment Linz Tom1 and Bindu V.R.2, 1Assumption College, India, 2Mahatma Gandhi University, India Full Text
138 13 5 Investigating Multilayer Omega-Type Networks Operating with the Cut-Through Technique under Uniform or Hotspot Traffic Conditions Eleftherios Stergiou1, John Garofalakis2, Dimitrios Liarokapis1 and Spiridoula Margariti1, 1University of Ioannina, Greece, 2University of Patras and Computer Technology Institute and Press- “DIOPHANTUS” (CTI) Patras, Greece Full Text
139 13 5 Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks Sung Woon Lee1 and Hyunsung Kim2,3, 1Tongmyong University, Korea, 2University of Malawi, Malawi, 3Kyungil University, Korea Full Text
140 13 6 Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Encryption FUJITA Satoshi, Hiroshima University, Japan Full Text
141 13 6 MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things Padmashree M G, Mallikarjun J P, Arunalatha J S and Venugopal K R, University Visvesvaraya College of Engineering, Bangalore University, India Full Text
142 13 6 Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets Rahul Deo Verma, Shefalika Ghosh Samaddar and A. B. Samaddar, National Institute of Technology Sikkim, India Full Text
143 13 6 A Cooperative Localization Method based on V2I Communication and Distance Information in Vehicular Networks Walaa Afifi, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt Full Text
144 13 6 Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Network Lifetime in WSNs Jungsub Ahn1, Sanghyeok Lim2 and Taeho Cho1*, 1Sungkyunkwan University, Republic of Korea, 2Amorepacific Republic of Korea Full Text
145 13 6 BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels Vu Tran Hoang Son1, 2 and Dang Le Khoa1, 2*, 1VNUHCM - University of Science, Vietnam, 2Vietnam National University, Vietnam Full Text

International Journal of Wireless & Mobile Networks (IJWMN)

146 13 1 3D Metallic Plate Lens Antenna based Beamspace Channel Estimation Technique for 5G Mmwave Massive MIMO Systems Prosenjit Paul and Md Munjure Mowla, Rajshahi University of Engineering & Technology, Bangladesh Full Text
147 13 2 Call Admission Control Algorithm with Efficient Handoff for Both 4G and 5G Networks Maharazu Mamman1 and Zurina Mohd Hanapi2, 1Federal College of Education Katsina, Nigeria, 2Universiti Putra Malaysia, Malaysia Full Text
148 13 2 Applicability of Overlay Non-Delay Tolerant Position-Based Protocols in Highways and Urban Environments for VANET Mahmoud Ali Al Shugran, Jerash University, Jordan Full Text
149 13 3/4 A Comprehensive Secure Protocol for All D2D Scenarios Hoda Nematy, Malek-Ashtar University of Technology, Iran Full Text
150 13 5 Functional and Harmonious Selforganization of Large Intellectual Agent Ensembles with Smart Hybrid Competencies via Wireless and Mobile Networks Evgeny Bryndin, Research Center NATURAL INFORMATICS, Russia Full Text
151 13 5 Dual-carrier Modulation of COFDM with Labeling Diversity to Reduce PAPR Allen Le Roy Limberg Full Text
152 13 5 Investigation of Radio Frequency Licensed Spectrum Utilization in Nigeria: A Study of Rumuokwuta, Port Harcourt, Nigeria Nkwachukwu Chukwuchekwa, Enwume Joshua U, Longinus S. Ezema and Cosmas K Agubor, Federal University of Technology, Nigeria Full Text
153 13 6 Effects of MAC Parameters on the Performance of IEEE 802.11 DCF in NS-3 Abubakar Siddik, Jakia Akter Nitu, Natasha Islam, Anju Ara Hasi, Jannatun Ferdous, Mizanur Rahman and Nahid Sultan, Hajee Mohammad Danesh Science and Technology University, Bangladesh Full Text
154 13 6 Performance Analysis of OLSR Protocol in Manet Considering Different Mobility Speed and Network Density Koay Yong Cett, Nor Aida Mahiddin*, Fatin Fazain Mohd Affandi, Raja Hasyifah Raja Bongsu, Aznida Hayati, Universiti Sultan Zainal Abidin (UniSZA), Malaysia Full Text

International Journal of Distributed and Parallel systems (IJDPS)

155 12 1/2 Task-Decomposition based Anomaly Detection of Massive And High-Volatility Session Data on Academic Backbone Network Ruo Ando1, Youki Kadobayashi2 and Hiroki Takakura1, 1National Institute of Informatics, 2-1-2Hitotsubashi, Japan, 2Nara Institute of Science and Technology, Japan Full Text
156 12 3/4/5 Study of Task Scheduling Strategy based on Trustworthiness Jun QIN1, 2, Yanyan SONG1 and Ping ZONG2, 3, 1Communication University of China, China, 2Nanjing University of Posts and Telecommunications, China, 3Nanjing University of Science and Technology Zijin College, China Full Text
157 12 3/4/5 Trust in the Adoption of Internet of Things for Smart Agriculture in Developing Countries Tsitsi Zengeya, Paul Sambo and Nyasha Mabika, Great Zimbabwe University, Zimbabwe Full Text

International Journal of Grid Computing & Applications (IJGCA)

158 12 1/2/3 An Intelligent System for the Enhancement of Visually Impaired Navigation and Disaster Assistance using Geo-Based Positioning and Machine Learning Wenhua Liang1, Ishmael Rico2 and Yu Sun3, 1USA, 2University of California, USA, 3California State Polytechnic University, USA Full Text

International Journal on AdHoc Networking Systems (IJANS)

159 11 1 Investigation and Evaluation of IEEE 802.11n WLANs Link Features Performance Under Single Host and Concurrent Communication Sumon Kumar Debnath1 Prodip Kumar Sarker1, Md. Manowarul Islam2 and Ileas Pramanik1, 1Begum Rokeya University, Bangladesh, 2Jagannath University, Bangladesh Full Text
160 11 2 Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wireless System Md. Firoz Ahmed, Md. Sofiqul Islam and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh Full Text
161 11 3 Design of a Compact Circular Microstrip Patch Antenna for WLAN Applications Chaitali Mukta, Mahfujur Rahman and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh Full Text
162 11 3 A Trust-Based Predictive Model for Mobile Ad Hoc Networks K.Divya and B.Srinivasan, Gobi Arts & Science College, India Full Text

The International Journal of Ambient Systems and Applications (IJASA)

163 9 1/2 Performance of Convolution and CRC Channel Encoded V-Blast 4x4 MIMO MC-CDMA Wireless Communication System Md. Firoz Ahmed, Md. Tahidul Islam and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh Full Text
164 9 1/2 Comparison of Bit Error Rate Performance of Various Digital Modulation Schemes over AWGN and Rayleigh Fading Channels using Simulink Md. Firoz Ahmed, Md. Faysal Ahmed and Abu Zafor Md. Touhidul Islam, Rajshahi University, Bangladesh Full Text
165 9 1/2 Sensor based Smart Irrigation System with Monitoring and Controlling using Internet of Things Nazmul Hassan, Sheikh Hasib Cheragee, Sakil Ahammed and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh Full Text
166 9 1/2 A Study of IoT based Real-Time Solar Power Remote Monitoring System Sheikh Hasib Cheragee, Nazmul Hassan, Sakil Ahammed and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh Full Text
167 9 3/4 An Intelligent and Data-driven Mobile Volunteer Event Management Platform using Machine Learning and Data Analytics Serena Wen1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA Full Text

International Journal of Software Engineering & Applications (IJSEA)

168 12 1 Generating Software Product Line Model by Resolving Code Smells in the Products’ Source Code Sami Ouali, University of Technology and Applied Sciences, Oman Full Text
169 12 1 E-Loox, A Hybrid Learning Management System Bilal Gonen and Badri Jimale, University of Cincinnati, USA Full Text
170 12 2/3 A Holistic Self-Adaptive Software Model Shatha Alfar and Said Ghoul, Research Laboratory on Bio-inspired Software Engineering Philadelphia University, Jordan Full Text
171 12 2/3 Embedding Quality into Software Product Line Variability Artifacts Mworia Daniel, Nderu Lawrence and Kimwele Michael, Jommo Kenyatta University of Agriculture and Technology, Kenya Full Text
172 12 2/3 Modeling and Verification of ERP Functional Requirements based on Colored Petri Net Nafisa Osman and Abd-Elkader Sahraoui, Sudan University of science and technology, Sudan & LAAS-CNRS, France, Université de Toulouse, France Full Text
173 12 2/3 Predefined Project Scope Changes and its Causes for Project Success Theyab Althiyabi and Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia Full Text
174 12 4 Enhancing Delphi Method with Algorithmic Estimates for Software Effort Estimation: An Experimental Study Tharwon Arnuphaptrairong, Chulalongkorn University, Thailand Full Text
175 12 5 Product Quality Evaluation Method (PQEM): To Understand the Evolution of Quality Through the Iterations of a Software Product Mariana Falco and Gabriela Robiolo, Universidad Austral, Argentina Full Text
176 12 5 A Framework for Aspectual Requirements Validation: an Experimental Study Abdelsalam M. Maatuk1, Sohil F. Alshareef1 and Tawfig M. Abdelaziz2, 1University of Benghazi, Libya, 2Libyan International Medial University, Libya Full Text
177 12 5 Properties of a Feature in Code-Assets: An Exploratory Study Armaya’u Zango Umar1 and Jaejoon Lee2, 1Al-Qalam University Katsina, Nigeria, 2University of East Anglia, UK Full Text
178 12 6 Embedding Performance Testing in Agile Software Model Suresh Kannan Duraisamy, Bryce Bass and Sai Mukkavilli, Georgia Southwestern State University, USA Full Text

International Journal of Network Security & Its Applications (IJNSA)

179 13 1 Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA Full Text
180 13 1 Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India Full Text
181 13 1 Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece Full Text
182 13 1 Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys Cheman Shaik, VISH Consulting Services Inc, USA Full Text
183 13 1 Game Theory Application Resources Management and Distribution in Blockchain Network Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam Full Text
184 13 2 Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA Full Text
185 13 2 Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia Full Text
186 13 2 Applying the Health Belief Model to Cardiac Implanted Medical Device Patients George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA Full Text
187 13 2 A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies Dalal Alharthi and Amelia Regan, University of California Irvine, USA Full Text
188 13 2 Phishing Mitigation Techniques: A Literature Survey Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom Full Text
189 13 3 Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA Full Text
190 13 3 Effect Man-In the Middle on the Network Performance in Various Attack Strategies Iyas Alodat, Jerash University, Jordan Full Text
191 13 3 Information-Centric Blockchain Technology for the Smart Grid Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA Full Text
192 13 3 A Survey on Federated Identity Management Systems Limitation and Solutions Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA Full Text
193 13 4 Use of MARKOV Chain for Early Detecting DDoS Attacks Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan Full Text
194 13 4 Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia Full Text
195 13 4 Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia Full Text
196 13 4 Critical Infrastructure Cybersecurity Challenges: IoT in Perspective Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of Professional Studies Accra, 2Heritage Christian University Full Text
197 13 4 Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia Full Text
198 13 5 Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece Full Text
199 13 5 Secure Blockchain Decentralized Voting for Verified Users Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland Full Text
200 13 6 Detection Method for Classifying Malicious Firmware David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA Full Text
201 13 6 Malicious Javascript Detection based on Clustering Techniques Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam Full Text
202 13 6 Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan, 2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan Full Text
203 13 6 Improving Security and Fairness in Federated Learning Systems Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece, 2Hellenic Open University, Greece Full Text
204 13 6 Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia Full Text
205 13 6 System End-User Actions as a Threat to Information System Security Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia Full Text
206 13 6 Information and Communication Security Mechanisms For Microservices-based Systems Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico Full Text
207 13 6 Comparative Review of Malware Analysis Methodologies Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece Full Text
208 13 6 Can Blockchain be a Solution to IoT Technical and Security Issues Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental Technology and Therapy, Nigeria Full Text

International Journal of Security, Privacy and Trust Management (IJSPTM)

209 10 1 GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems Orcun Oruc and Uwe Aßmann, TU Dresden, Germany Full Text
210 10 2 Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh Farida Chowdhury, Sadia Sultana and Mahruba Sharmin Chowdhury, Shahjalal University of Science and Technology, Bangladesh Full Text

International Journal of Database Management Systems (IJDMS)

211 13 1 Mapping Common Errors in Entity Relationship Diagram Design of Novice Designers Rami Rashkovits1 and Ilana Lavy2, 1Peres Academic Center, Israel, 2Yezreel Valley College, Israel Full Text
212 13 1 Re-optimization for Multi-objective Cloud Database Query Processing using Machine Learning Chenxiao Wang, Zach Arani, Le Gruenwald, Laurent d'Orazio and Eleazar Leal, University of Oklahoma, USA Full Text
213 13 2 Healthbot for Polycystic Ovarian Syndrome Jeyshree Krishnaswamy Sundararajan, Yanyan Li, and Ahmad Hadaegh, California State University-San Marcos, USA Full Text
214 13 3 Database Private Security Jurisprudence: A Case Study using Oracle Madhuri N. Gedam and B. B. Meshram, Mumbai University, India Full Text
215 13 4 Text Advertisements Analysis using Convolutional Neural Networks Abdulwahed Almarimi and Asmaa Salem, Bani Waleed University, Libya Full Text
216 13 4 Map Reduce based on Cloak DHT Data Replication Evaluation Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso Full Text
217 13 5/6 Considering Structural and Vocabulary Heterogeneity in XML Query: FPTPQ and Holistic Evaluation Brice Nguefack1, Maurice Tchoupé Tchendji1 and Thomas Djotio Ndie2, 1University of Dschang, Cameroon, 2University of Yaoundé I, Cameroun Full Text

International Journal of Data Mining & Knowledge Management Process (IJDKP)

218 11 1 Apply Machine Learning Methods to Predict Failure of Glaucoma Drainage Jiali Tang, Jack Wang and Ahmad Reza Hadaegh, California State University San Marcos, USA Full Text
219 11 1 Partitioning Wide Area Graphs Using a Space Filling Curve Cyprien Gottstein1, Philippe Raipin Parvedy1, Michel Hurfin2, Thomas Hassan1 and Thierry Coupaye1, 1TGI-OLS-DIESE-LCP-DDSD, Orange Labs, France, 2Univ Rennes, INRIA, France Full Text
220 11 1 A Comprehensive Analysis of Quantum Clustering : Finding All the Potential Minima Aude Maignan1 and Tony Scott2, 1Univ. Grenoble Alpes, CNRS, France, 2RWTH-Aachen University, Germany Full Text
221 11 2/3/4 Semantics Graph Mining for Topic Discovery and Word Associations Alex Romanova, Melenar, LLC, McLean, VA, USA Full Text
222 11 2/3/4 Petrochemical Production Big Data and its Four Typical Application Paradigms Hu Shaolin, Zhang Qinghua, Su Naiquan and Li Xiwu, Guangdong University of Petrochemical Technology, China Full Text
223 11 5 An Experimental Evaluation of Similarity-Based and Embedding-Based Link Prediction Methods on Graphs Md Kamrul Islam, Sabeur Aridhi and Malika Smail-Tabbone, Universite de Lorraine, France Full Text
224 11 5 The 5 Dimensions of Problem Solving using Dinna: Case Study in the Electronics Industry Mohammed Hamoumi, Abdellah Haddout and Mariam Benhadou, Hassan II University, Morocco Full Text
225 11 6 Review of Machine Learning Applications and Datasets in Classification of Acute Leukemia Jaishree Ranganathan, Middle Tennessee State University, USA Full Text

The International Journal of Multimedia & Its Applications (IJMA)

226 13 1/2 LACLOD: Learning Analytics for Children’s Logic Development Suzani Mohamad Samuri1,2, Dorroity Anak Emang1, Rahmadi Agus3, Bahbibi Rahmatullah1,2, Nurul Salini Mohamed Salleh1 and Mazlina Che Mustafa4, 1Computing and Creative Industry, Idris Education University, Malaysia, 2Data Intelligent and Knowledge Management (DILIGENT) Special Interest Group, Sultan Idris Education University, Perak, Malaysia, 3Islamic University of Muhammad Arsyad Al Banjari Kalimantan, Indonesia, 4National Child Development Research Centre, Sultan Idris Education University, Malaysia Full Text
227 13 1/2 Blind Extraction of Digital Watermarking Algorithm for Color Images Xuecheng Gong, Wanggen Li and Wang Jing, Anhui Normal University, China Full Text
228 13 1/2 Development of Rubric to Measure Children’s Creativity in Game Design Laili Farhana Md Ibharim1, Maizatul Hayati Mohamad Yatim1, Nor Zuhaidah Mohamed Zain1, Ummu Husna Azizan1 and Norasikin Fabil2, 1Universiti Pendidikan Sultan Idris, Malaysia, 2Universiti Sains Islam Malaysia, Malaysia Full Text
229 13 3 Need Analysis: Portable Web Server Development Kits for Teaching and Learning Nor Masharah Husain, Nadia Akma Ahmad Zaki, Rasyidi Johan, and Noor Anida Zaria Mohd Noor, Universiti Pendidikan Sultan Idris, Malaysia Full Text
230 13 4 Developing an Interactive Storybook Application ‘Jack and the Dirty Smelly Beast’ for English Language Proficiency among Children Indah Fakhrani Arpin and Maizatul Hayati Mohamad Yatim, Sultan Idris Education University, Malaysia Full Text
231 13 4 Marie: Validation of the Artificial Intelligence Model for Covid-19 Detection Valdirene Bento1, Bruno Frederico Salaroli2 and Paula Santos3, 1Radiologist responsible at UBS, Brazil, 2General practitioner in Itapeva, Brazil, 3University of São Paulo, Brazil Full Text
232 13 4 Audio Cryptography via Enhanced Genetic Algorithm Salamudeen Alhassan1, Gabriel Kofi Armah1 and Issah Zabsonre Alhassan2, 1C. K. Tedam University of Technology and Applied Sciences, Ghana, 2Kwame Nkrumah University of Science and Technology, Ghana Full Text
233 13 5 Development of Web Application for Packaging Design Rawiphon Charunphankasem, Rajamangala University of Technology Phra Nakhon, Thailand Full Text
234 13 6 Mobile Augmented Reality Application for Primary School Education Normala Rahim, Wan Rizhan, Maizan Mat Amin, Wan Malini Wan Isa, Ismahafezi Ismail, Nur SaadahMohd Shapri, Rafhanah Ramlan, Universiti Sultan Zainal Abidin, Malaysia Full Text
235 13 6 Exploring Virtual Reality Application in Tourism: VR Bukit Puteri Maizan Mat Amin, Wan Mohd Rizhan Wan Idris, Normala Rahim, Nur Saadah Mohd Sapri, Ismahafezi Ismail, Wan Malini Wan Isa and Muhammad Hazwan Mohamad, Universiti Sultan Zainal Abidin, Malaysia Full Text
236 13 6 The Impact of VR Graphical User Interface on Oculus Touch Controller and Oculus Rift Natchaphak Meeusah and Bennapa Pattanapipat, Rajamangala University of Technology Thanyaburi, Thailand Full Text

International Journal of Computer Graphics & Animation (IJCGA)

237 11 1/2/3/4 Fast Fluid Thermodynamics Simulation by Solving Heat Diffusion Equation Wanwan Li, George Mason University, USA Full Text

International Journal of Web & Semantic Technology (IJWesT)

238 12 1 U-mentalism Patent: The Beginning of Cinematic Supercomputation Luís Homem, Centro de Filosofia das Ciências da Universidade de Lisboa, Portugal Full Text
239 12 1 Evaluation of Single-Span Models on Extractive Multi-Span Question-Answering Marie-Anne Xu1 and Rahul Khanna2, 1Crystal Springs Uplands School, USA, 2University of Southern California, USA Full Text
240 12 2/3 Ontology Service Center: A Datahub for Ontology Application CHEN Tao1, SU Rina1, ZHANG Yongjuan2, YIN Xin3 and ZHU Rui4, 1Sun Yat-sen University, China, 2Chinese Academy of Sciences, China, 3Remin University of China, China, 4Shanghai University, China Full Text
241 12 2/3 A Framework for Building a Multilingual Industrial Ontology: Methodology and a Case Study for Building Smartphone English-Arabic Ontology Amany K. Alnahdi, King Abdulaziz University, Saudi Arabia Full Text
242 12 4 Political Opinion Analysis in Social Networks: Case of Twitter and Facebook Telesphore TIENDREBEOGO and Yassia ZAGRE, University of Nazi Boni, Burkina Faso Full Text
243 12 4 A Self-Supervised Tibetan-Chinese Vocabulary Alignment Method Enshuai Hou, Jie zhu, Liangcheng Yin and Ma Ni, Tibet University, China Full Text

International Journal on Cloud Computing: Services and Architecture (IJCCSA)

244 11 1/2/3/4/5/6 Blockchain based Data Security as a Service in Cloud Platform Security Magesh Kasthuri, Wipro Limited, Bengaluru, India Full Text
245 11 1/2/3/4/5/6 Digital Banking - Architecture Strategies using Cloud Computing Prudhvi Parne, Bank of Hope, USA Full Text
246 11 1/2/3/4/5/6 A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real Time IoT Data of Stochastic Nature Sayan Guha, Cognizant Technology Solutions, India Full Text

International Journal of Artificial Intelligence & Applications (IJAIA)

247 12 1 Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neighbors Divya Sardana1 and Raj Bhatnagar2, 1Teradata Corp., USA, 2University of Cincinnati, USA Full Text
248 12 1 CAn Explanation Framework for Interpretable Credit Scoring Lara Marie Demajo, Vince Vella and Alexiei Dingli, University of Malta, Malta Full Text
249 12 1 Towards Predicting Software Defects with Clustering Techniques Waheeda Almayyan, Computer Information Department, Collage of Business Studies, PAAET, Kuwait Full Text
250 12 1 Analysis of Enterprise Shared Resource Invocation Scheme based on Hadoop and R Hong Xiong, University of California, USA Full Text
251 12 1 Understanding Negative Sampling in Knowledge Graph Embedding Jing Qian1, 2, Gangmin Li1, Katie Atkinson2 and Yong Yue1, 1Xi’an Jiaotong-Liverpool University, China, 2University of Liverpool, United Kingdom Full Text
252 12 1 Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern Analysis Divya Sardana1, Shruti Marwaha2 and Raj Bhatnagar3, 1Teradata Corp., USA, 2Stanford University, USA, 3University of Cincinnati, USA Full Text
253 12 1 Software Testing: Issues and Challenges of Artificial Intelligence & Machine Learning Kishore Sugali, Chris Sprunger and Venkata N Inukollu, Purdue University, USA Full Text
254 12 2 A Modified CNN-Based Face Recognition System Jayanthi Raghavan and Majid Ahmadi, University of Windsor, Canada Full Text
255 12 3 Implementation of a Decision Support System and Business Intelligence Algorithms for the Automated Management of Insurance Agents Activities Alessandro Massaro, Antonio Panarese, Michele Gargaro, Costantino Vitale and Angelo Maurizio Galiano, Dyrecta Lab, IT Research Laboratory, Italy Full Text
256 12 3 Twitter based Sentiment Analysis of Impact of Covid-19 on Education Globaly Swetha Sree Cheeti, Yanyan Li and Ahmad Hadaegh, California State University-San Marcos, USA Full Text
257 12 3 A STDP Rule that Favours Chaotic Spiking over Regular Spiking of Neurons Mario Antoine Aoun, Montreal, Quebec, Canada Full Text
258 12 4 Nature: A Tool Resulting from the Union of Artificial Intelligence and Natural Language Processing for Searching Research Projects in Colombia Felipe Cujar-Rosero, David Santiago Pinchao Ortiz, Silvio Ricardo Timarán Pereira and Jimmy Mateo Guerrero Restrepo, University of Nariño, Colombia Full Text
259 12 4 Fabric Defect Detection based on Improved Faster RCNN Yuan He, Han-Dong Zhang, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore Full Text
260 12 4 Predictive Model for Maize Stem Borers’ Classification in Precision Farming Ezeofor Chukwunazo1, Akpado Kenneth2 and Ulasi Afamefuna3, 1University of Port Harcourt, Nigeria, 2NnamdiAzikiwe University, Nigeria, 3Federal University of Technology, Nigeria Full Text
261 12 4 Human-System Interface with Explanation of Actions for Autonomous Anti-UAV Systems John Kontos, National and Kapodistrian University of Athens, Greece Full Text
262 12 5 A Brief Survey of Question Answering Systems Michael Caballero, University of California, USA Full Text
263 12 5 An Acceleration Method based on Deep Learning and Multilinear Feature Space Michel Andre L .Vinagreiro1, Edson C. Kitani2, Armando Antonio M. Lagana1 and Leopoldo R. Yoshioka1, 1Escola Politecnica da Universidade de Sao Paulo, Brasil, 2Fatec Santo Andre, Brasil Full Text
264 12 5 Finding Facial Expression Patterns on Videos based on Smile and Eyes-Open Confidence Values Setiawan Hadi, Asep K Supriatna, Faishal Wahiduddin, Wilis Srisayekti, Achmad Djunaidi, Efi Fitriana, Aceng Abdullah and Dian Ekawati, Universitas Padjadjaran, Indonesia Full Text
265 12 6 A Knowledge based Automatic Radiation Treatment Plan Alert System Erwei Bai1 and Junyi Xia2, 1University of Iowa, USA, 2Mount Sinai Hospital, USA Full Text
266 12 6 Automation of Best-Fit Model Selection using a Bag of Machine Learning Libraries for Sales Forecasting Pauline Sherly Jeba P1, Manju Kiran1, Amit Kumar Sharma1, Divakar Venkatesh2, 1RBEI, Robert Bosch GmbH, India, 2Enterprise Solutions-SAP, Robert Bosch GmbH, Germany Full Text
267 12 6 Digital Transformation of Financial Services using Artificial Intelligence, Machine Learning, and Cloud Computing Prudhvi Parne, Bank of Hope, USA Full Text
268 12 6 A New Perspective of Paramodulation Complexity by Solving 100 Sliding Block Puzzles Ruo Ando1 and Yoshiyasu Takefuji2, 1National Institute of Informatics, Japan, 2Musashino University Faculty of Data Science, Japan Full Text
269 12 6 Automatic Home-based Screening of Obstructive Sleep Apnea using Single Channel Electrocardiogram and SPO2 Signals Hosna Ghandeharioun, Khorasan Institute of Higher Education, Iran Full Text
270 12 6 Category Trees - Classifiers that Branch on Category Kieran Greer, Distributed Computing Systems, Belfast, UK Full Text

International Journal of Fuzzy Logic Systems (IJFLS)

271 11 1 A Combination of Palmer Algorithm and Gupta Algorithm for Scheduling Problem in Apparel Industry Cecilia E. Nugraheni, Luciana Abednego and Maria Widyarini, Parahyangan Catholic University, Indonesia Full Text
272 11 1 A Fuzzy Interactive BI-objective Model for SVM to Identify the Best Compromise Solution for Measuring the Degree of Infection With Corona Virus Disease (Covid-19) Mohammed Zakaria Moustafa1, Hassan Mahmoud Elragal1, Mohammed Rizk Mohammed1, Hatem Awad Khater2 and Hager Ali Yahia1, 1ALEXANDRIA University, Egypt, 2Horus University, Egypt Full Text
273 11 1 Forex Data Analysis using Weka Luciana Abednego and Cecilia Esti Nugraheni, Parahyangan Catholic University, Indonesia Full Text
274 11 2/3/4 DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsFull Text Hailye Tekleselase, Addis Ababa University, Ethiopia Full Text
275 11 2/3/4 Fuzzy Control of a Servomechanism: Practical Approach using Mamdani and Takagi- Sugeno Controllers Renato Aguiar and Izabella Sirqueira, Centro Universitario FEI, Brazil Full Text

International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

276 10 1 Futuristic Technology in Architecture & Planning - Augmented and Virtual Reality: an Overview Pearl Jishtu and Madhura A Yadav, Manipal University, India Full Text

Machine Learning and Applications: An International Journal (MLAIJ)

277 8 1 Artificial Intelligence Models for Crime Prediction in Urban Spaces Ana Laura Lira Cortes1 and Carlos Fuentes Silva2, 1Universidad Autónoma de Querétaro, México, 2Universidad Politécnica de Querétaro, México Full Text
278 8 1 Analysis of Covid-19 in the United States using Machine Learning James G. Koomson, Marymount University, USA Full Text
279 8 2/3 A Development Framework for a Conversational Agent to Explore Machine Learning Concepts Ayse Kok Arslan, Oxford Alumni of Northern California, USA Full Text
280 8 2/3 An Enhancement for the Consistent Depth Estimation of Monocular Videos using Lightweight Network JMohamed N. Sweilam1,2, and Nikolay Tolstokulakov2, 1Suez University, Egypt, 2Novosibirsk State University, Russia Full Text
281 8 2/3 Catwalkgrader: A Catwalk Analysis and Correction System using Machine Learning and Computer Vision Tianjiao Dong1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA Full Text
282 8 2/3 Hybridization of DBN with SVM and its Impact on Performance in Multi-Document Summarization Karari Kinyanjui, Malanga Ndenga and H.O Nyongesa, Dedan Kimathi University of Technology, Kenya Full Text
283 8 4 A Comprehensive Study on Occlusion Invariant Face Recognition under Face Mask Occlusions Susith Hemathilaka1 and Achala Aponso2, 1University of Westminster, United Kingdom, 2Informatics Institute of Technology, Sri Lanka Full Text
284 8 4 A Survey of Neural Network Hardware Accelerators in Machine Learning Fatimah Jasem and Manar AlSaraf, Kuwait University, Kuwait Full Text

Signal & Image Processing : An International Journal (SIPIJ)

285 12 1 Application of Convolutional Neural Network In LAWN Measurement J. Wilkins1, M. V. Nguyen1, B. Rahmani1, 2, 1Fontbonne University, USA, 2Maryville University, USA Full Text
286 12 1 Research on Noise Reduction and Enhancement Algorithm of Girth Weld Image Xiang-Song Zhang1, Wei-Xin Gao1 and Shi-Ling Zhu2, 1Xi'an Shiyou University, China, 2Xi’an University of Post and Telecommunications, China Full Text
287 12 1 Target Detection and Classification Improvements using Contrast Enhanced 16-bit Infrared Videos Chiman Kwan and David Gribben, Applied Research, LLC, USA Full Text
288 12 1 Role of Hybrid Level Set in Fetal Contour Extraction Rachana Jaiswal and Srikant Satarkar, Amravati University, India Full Text
289 12 2 Classification and Comparison of License Plates Localization Algorithms Mustapha Saidallah, Fatimazahra Taki, Abdelbaki El Belrhiti El Alaoui and Abdeslam El Fergougui, Moulay Ismail University, Morocco Full Text
290 12 2 General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP) Ali Ahmad Aminu1, 2 and Nwojo Nnanna Agwu1, 1Nile University of Nigeria, Nigeria, 2Gombe State University, Nigeria Full Text
291 12 2 Target Detection and Classification Performance Enhancement using Super-Resolution Infrared Videos Chiman Kwan, David Gribben and Bence Budavari, Applied Research, LLC, USA Full Text
292 12 3 Practical Approaches to Target Detection in Long Range and Low Quality Infrared Videos Chiman Kwan and David Gribben, Applied Research, LLC, Rockville, Maryland, USA Full Text
293 12 3 Computer Aided Detection of Obstructive Sleep Apnea from EEG Signals Saheed Ademola Bello and Umar Alqasemi, King AbdulAziz University, Saudi Arabia Full Text
294 12 3 Using Distance Measure based Classification in Automatic Extraction of Lungs Cancer Nodules for Computer Aided Diagnosis Maan Ammar1, Muhammad Shamdeen2, MazenKasedeh2, Kinan Mansour3 and Waad Ammar3, 1AL Andalus University for Medical Sciences, Syria, 2Damascus University, Syria, 3Al Andalus University Hospital, Syria Full Text
295 12 4 Modelling, Conception and Simulation of a Digital Watermarking System based on Hyperbolic Geometry Coulibaly Cheick Yacouba Rachid and Tiendrebeogo B. Telesphore, Nazi Boni University, Burkina Faso Full Text
296 12 5 Combining of Narrative News and VR Games: Comparison of Various Forms of News Games Xiaohan Feng, and Makoto Murakami, Toyo University, Japan Full Text
297 12 5 Mixed Spectra for Stable Signals from Discrete Observations Rachid Sabre, University of Burgundy, France Full Text
298 12 5 Fractional Order Butterworth Filter for Fetal Electrocardiographic Signal Feature Extraction Hadi Mohsen Alkanfery and Ibrahim Mustafa Mehedi, King Abdulaziz University, Saudi Arabia Full Text
299 12 6 Sensing Method for Two-Target Detection in Time-Constrained Vector Poisson Channel Muhammad Fahad and Daniel R. Fuhrmann, Michigan Technological University, USA Full Text
300 12 6 Classification of OCT Images for Detecting Diabetic Retinopathy Disease using Machine Learning Marwan Aldahami and Umar Alqasemi, King Abdulaziz University, Saudi Arabia Full Text
301 12 6 A Comparative Study of Machine Learning Algorithms for EEG Signal Classification Anam Hashmi, Bilal Alam Khan and Omar Farooq, Aligarh Muslim University, India Full Text

International Journal on Soft Computing (IJSC)

302 12 1 AI Testing: Ensuring a Good Data Split Between Data Sets (Training and Test) using K-means Clustering and Decision Tree Analysis Kishore Sugali, Chris Sprunger and Venkata N Inukollu, Purdue University, USA Full Text
303 12 2/3/4 An approach to Fuzzy clustering of the iris petals by using Ac-means Analysis Nicolás Enrique Salgado Guitiérrez, Sergio Andrés Valencia Ramírez and José Soriano Méndez, District University FJDC, Colombia Full Text

Reach Us