Computer Science & Information Technology
S.No | Volume | Issue | Paper Title | Authors |
---|
International Journal of Computer Science & Information Technology (IJCSIT)
1 | 13 | 1 | Application of a Multilevel Technology Acceptance Management Model for Effective Technology Deployment | Gilbert Busolo, Lawrence Nderu and Kennedy Ogada, Jomo Kenyatta University of Agriculture and Technology, Kenya | Full Text |
2 | 13 | 1 | Real Time Vigilance Detection using Frontal EEG | Siddarth Ganesh1 and Ram Gurumoorthy2, 1Amrita Vishwa Vidyapeetham, India, 2StimScience Inc., USA | Full Text |
3 | 13 | 1 | Applying Genetic Algorithm to Solve Partitioning and Mapping Problem for Mesh Network-on-Chip Systems | Walid Mokthar Salh and Azeddien M. Sllame, University of Tripoli Tripoli, Libya | Full Text |
4 | 13 | 1 | Highly Constrained University Class Scheduling using Ant Colony Optimization | Al-Mahmud, KUET, Bangladesh | Full Text |
5 | 13 | 1 | Efficient Field of Vision Algorithms for Large 2D Grids | Evan R.M. Debenham and Roberto Solis-Oba, The University of Western Ontario, Canada | Full Text |
6 | 13 | 2 | Newly Proposed Technique for Autism Spectrum Disorder based Machine Learning | Sherif Kamel1,2 and Rehab Al-harbi2,1 October University for Modern Sciences and Arts, Egypt, 2 Arab East Colleges for Graduate Studies, KSA | Full Text |
7 | 13 | 2 | Big Data Analytics in Health Care: A Review Paper | Maria Mohammad Yousef, Al-albayt University, Jordan | Full Text |
8 | 13 | 2 | Monitoring of the Last US Presidential Elections | Christoph Glauser1, Jacques Savoy2 and Loris Schmid1,2, 1IFAAR Institute, Switzerland, 2University of Neuchatel, Switzerland | Full Text |
9 | 13 | 2 | Emerging Applications on Smart Phones: The Role of Privacy Concerns and its Antecedents on Smart Phones Usage | Waleed Al-Ghaith, Shaqra University, (Imam Muhammad Ibn Saud Islamic University), Saudi Arabia | Full Text |
10 | 13 | 2 | Comparison Analysis of Facebook’s Prophet, Amazon’s DeepAR+ and CNN-QR Algorithms for Successful Real-World Sales Forecasting | Emir Žunić1,2, Kemal Korjenić1, Sead Delalić1,2 and Zlatko Šubara1, 1Info Studio d.o.o. Sarajevo, Bosnia and Herzegovina, 2University of Sarajevo, Bosnia and Herzegovina | Full Text |
11 | 13 | 3 | Fabric Defect Detection based on Improved Object as Point | Yuan He, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore | Full Text |
12 | 13 | 3 | Product Sentiment Analysis for Amazon Reviews | Arwa S. M. AlQahtani, Princess Nourah bint Abdulrahman University, Saudi Arabia | Full Text |
13 | 13 | 4 | Online Learning During Covid-19 Pandemic, and Possibility of Adopting Computer-Based Test | Rabea Emdas1 and Ahmed Alruwaili2, 1Swinburne University of Technology, Australia, 2La Trobe University, Australia | Full Text |
14 | 13 | 4 | Web Scraper Utilizes Google Street View Images to Power a University Tour | Peiyuan Sun1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA | Full Text |
15 | 13 | 4 | Cloak-Reduce Load Balancing Strategy for Mapreduce | Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso | Full Text |
16 | 13 | 5 | Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles | Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA | Full Text |
17 | 13 | 5 | Information Retrieval based on Cluster Analysis Approach | Orabe Almanaseer, The University of Jordan, Jordan | Full Text |
18 | 13 | 5 | Blockchain Technology in Agriculture: A Case Study of Blockchain Start-Up Companies | Chandra Sekhar Bhusal, Information Technology and Physical Sciences Federation University, Australia | Full Text |
19 | 13 | 5 | Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks | Ali M. Allam, Helwan University, Egypt | Full Text |
20 | 13 | 5 | Circuit Break Connect Monitoring to 5G Mobile Application | Ton Tsang and Cheung Yip Kan, Hong Kong College of Technology, Hong Kong | Full Text |
21 | 13 | 5 | The BitcoinHeist: Classifications of Ransomware Crime Families | Micheline Al Harrack, Marymount University, USA | Full Text |
22 | 13 | 6 | Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches | Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3, 1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France | Full Text |
23 | 13 | 6 | Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks | Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran | Full Text |
24 | 13 | 6 | Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models | Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia | Full Text |
25 | 13 | 6 | SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines) | Amelie Anne Gutierrez, Holy Angel University, Philippines | Full Text |
26 | 13 | 6 | Creating 3D Models with 3D Printing Process | Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia | Full Text |
International Journal of Computer Science and Engineering Survey (IJCSES)
27 | 12 | 1 | Multilayer Backpropagation Neural Networks for Implementation of Logic Gates | Santosh Giri and Basanta Joshi, Tribhuvan University, Nepal | Full Text |
28 | 12 | 2 | Advance in Image and Audio Restoration and their Assessments: A Review | Omar H. Mohammed and Basil Sh. Mahmood, Mosul University, Iraq | Full Text |
Computer Science & Engineering: An International Journal (CSEIJ)
29 | 11 | 1 | Preventing Counterfeit Products using Cryptography, QR Code and Webservice | Cheman Shaik, VISH Consulting Services Inc, USA | Full Text |
30 | 11 | 2/3/4/5/6 | Aadhar Enabled Public Distribution System (AEPDS), Beneficiary Survey and Assessment Framework | Aakanksha Gupte and Dr. Gayatri Doctor, CEPT University, India | Full Text |
Advanced Computing: An International Journal (ACIJ)
31 | 12 | 1 | Detection of Forgery and Fabrication in Passports and Visas using Cryptography and QR Codes | Cheman Shaik, VISH Consulting Services Inc, USA | Full Text |
32 | 12 | 2/3/4/5 | E-Maintenance: Impact Over Industrial Processes, Its Dimensions & Principles | Yassine MOUMEN, Mariam BENHADOU and Abdellah HADDOUT, Hassan II University, Morocco | Full Text |
International Journal of Computer Science, Engineering and Applications (IJCSEA)
International Journal on Computational Science & Applications (IJCSA)
41 | 11 | 1/2/3/4 | An Artificial Intelligence URL Parser for Safer Web Browsing and Detection of Suspicious Links | James Jin1, Gayatri S2 and Yu Sun3, 1USA, 2University of California, USA, 3California State Polytechnic University, USA | Full Text |
42 | 11 | 1/2/3/4 | Procrash: A Solution To Procrastination by Limiting Online Distractions using Optical Character Recognition | Amanda Zhu1, Baoyu Yin2 and Yu Sun3, 1USA, 2Lehigh University, USA, 3California State Polytechnic University, USA | Full Text |
43 | 11 | 5/6 | Glioblastoma Synthesis and Segmentation with 3D Multi-Modal MRI: A Study using Generative Adversarial Networks | Edmond Wang, Westminster School, United Kingdom | Full Text |
International Journal on Information Theory (IJIT)
44 | 10 | 1/2/3 | The Effect of using Group Investigation Methods, Inquiry and Learning Style on Learning Outcomes | Achmad Noor Fatirul and Djoko Adi Walujo, PGRI Adi Buana University Surabaya, Indonesia | Full Text |
Advanced Computational Intelligence: An International Journal (ACII)
45 | 8 | 1/2/3 | Accurate Numerical Method for Singular Initial-Value Problems | Tesfaye Aga Bullo1, Gemechis File Duressa1 and Gashu Gadisa Kiltu2, 1Jimma University, Ethiopia, 2Madda Walabu University, Ethiopia | Full Text |
International Journal on Natural Language Computing (IJNLC)
International Journal of Managing Information Technology (IJMIT)
International Journal of Managing Value and Supply Chains (IJMVSC)
70 | 12 | 1 | A Thematic Literature Review on Business Process Management | C.R.Oruthotaarachchi and W M J I Wijayanayake, University of Kelaniya, Sri Lanka | Full Text |
71 | 12 | 2 | E-Supplier Management Practices on Supply Chain Performance of Sugar Processing Firms in Kenya | Evans Biraori Oteki, Murang’a University of Technology, Kenya | Full Text |
72 | 12 | 3 | The Agonies of Covid 19 on Vegetable Farmers Along the White Volta River Basin in the Upper East Region of Ghana | Benjamin Bilalam Jabik, University of Energy and Natural Resources, Ghana | Full Text |
73 | 12 | 3 | Corporate Environmental Sustainability – A Key Figure-Based Approach | Sabrina Stern1, Sven Steck2 and Stefan Waitzinger3, 1Hochschule für Technik, Wirtschaft und Gestaltung, Germany and Management Consultant at P3 automotive GmbH, Germany, 2Managing Partner at P3 automotive GmbH, Germany, 3Professor at Department Economie, Hochschule für Technik, Germany | Full Text |
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
Health Informatics - An International Journal (HIIJ)
82 | 10 | 1 | Detecting Fatigue in the Workplace | Tyler D. Asher and Ian Mc Andrew, Capitol Technology University, USA | Full Text |
83 | 10 | 1 | Language Characteristics Supporting Early Alzheimer's Diagnosis through Machine Learning - A Literature Review | Fabian Thaler and Heiko Gewald, Hochschule Neu-Ulm University of Applied Sciences, Germany | Full Text |
84 | 10 | 2 | Heat Illness Prevention in the Outdoor Workplace | Tyler D. Asher M.S and Ian McAndrew, Capitol Technology University, USA | Full Text |
85 | 10 | 2 | Clinical and Social Determinants to Improve Dod/Veteran Well Being: The Service Member Veteran Risk Profile | Richard T. Hartman1 and Mark E. Oxley2, 1Department of Veterans Affairs, USA, 2Air Force Institute of Technology, USA | Full Text |
86 | 10 | 3 | An EHealth Adoption Framework for Developing Countries: A Systematic Review | Agnes Rwashana Semwanga, Hasifah Kasujja Namatovu , Swaib Kyanda Kaawaase and Mark Abraham Magumba, Makerere University, Uganda | Full Text |
87 | 10 | 4 | Towards a Standard of Modelling Annotations in the E-Health Domain | Zayneb Mannai1, Anis Kalboussi2 and Ahmed Hadj Kacem1, 1Universityof Sfax, Tunisia, 2University of Kairouan, Tunisia | Full Text |
International Journal on Cybernetics & Informatics (IJCI)
88 | 10 | 1/2 | 1st International Conference on Innovative Computational Intelligence(ICICI 21) | May 07, 2021, Francis Xavier Engineering College, India, Volume Editors : D. Angeline Ranjithamani, A. Arul Amalraj (Eds) | Full Text |
89 | 10 | 3 | ICARTEC-2021 | June, 2021, Meenakshi Sundar Rajan Engineering College, Chennai, India, Volume Editors : Siji Raaja (Eds) | Full Text |
International Journal on Integrating Technology in Education (IJITE)
90 | 10 | 1 | A Study of Facts and Generating Factors of “Dislike for Exercise” and “Dislike for Physical Education” | B.Chuluun-Erdene and D.Azjargal, Mongolian National University of Education, Mongolia | Full Text |
91 | 10 | 2 | Comparing Virtual Learning Techniques Upon Technology Acceptance and Student Engagement in Differing Classroom Environment | Evans Girard1, Rita Yusri1, Adel Abusitta2 and Esma Aïmeur1, 1University of Montreal, Canada, 2McGill University, Canada | Full Text |
92 | 10 | 2 | An Automated Stable Personalised Partner Selection for Collaborative Privacy Education | Godfred Yaw Koi-Akrofi, Emmanuel Owusu-Oware and Hannah Tanye, University of Professional Studies, Ghana | Full Text |
93 | 10 | 2 | An Investigation into the Effectiveness of the Curriculum and Assessment Policy Statement (CAPS) in South African Schools | Tinuade Adekunbi Ojo1 and Refentse Mathabathe2, 1University of Johannesburg, South Africa, 2Ahube Valley Ext, South Africa | Full Text |
94 | 10 | 2 | A “Bird’s Eye View” on Communication Acts in a Classroom of Low Literacy Adults | Carlos Luís1,2, Helena Afonso3 and Maria José Marcelino1, 1CISUC and FCTUC Universidade de Coimbra, Portugal, 2IEFP-Centro de Formação Profissional de Coimbra, Portugal, 3IEFP-Delegação Regional do Centro IEFP Coimbra, Portugal | Full Text |
95 | 10 | 2 | Comparison of E-learning and Classroom Training for Bachelor Students of Traditional Medicine | SBazarragchaa Sodnom1, Uranchimeg Tudevdagva2,3, Tserendulam Luvsandorj1, Selenge Erdenechimeg1, 1Mongolian University of Pharmaceutical Sciences, Mongolia, 2Technical University of Chemnitz, Germany, 3Mongolian University of Science and Technology, Mongolia | Full Text |
96 | 10 | 2 | Connecting O*Net® Database to Cybersecurity Workforce Professional Certifications | Micheline Al Harrack, Marymount University, USA | Full Text |
97 | 10 | 3 | Perceptions of Online Teaching and Learning During the Covid-19 Pandemic in Barbadian Primary and Secondary Schools | Kristina Stuart1, Dwayne Devonish2, Unri Babb3, Kenroy Burke4 and Lisa McClean-Trotman5, 1Research Consultant, Nvivo Qualitative Expert, 2University of the West Indies, Cave Hill Barbados, 3Research Consultant, 4Research Consultant, 5UNICEF (Eastern Caribbean) Communication for Development Specialist, UNICEF, Research Supervisor | Full Text |
98 | 10 | 3 | Preparing Student Teachers to Teach with Technology: Case Studies in Finland and Israel | Olzan Goldstein1 and Eero Ropo2, 1Kaye Academic College of Education, Israel, 2Tampere University, Finland | Full Text |
99 | 10 | 4 | The Teachers Experience of Practice-based Education in Hybrid Delivery Mode | Felicity Molloy, Independent Academic, New Zealand | Full Text |
100 | 10 | 4 | Use of Socrative as a Teaching Tool in Anatomy during the Covid-19 Pandemic | Lennox Francis, University of the West Indies, Jamaica | Full Text |
101 | 10 | 4 | Acceptability of K12 Senior High School Students Academic Performance Monitoring System for Private Institutions with Decision Support System | Winston G. Domingo, Erwin N. Lardizabal and Sheena Marie V. Toledo, Cagayan Valley Computer and Information Technology College, Philippines | Full Text |
102 | 10 | 4 | The Application of Art in the Enhancement of Speaking Skills in Greek State Primary School Students of Pre-A1 Level | Eirini Kikioni1 and Makrina-Nina Zafiri2, 1Ministry of Education and Religious Affairs, Greece, 2Aristotle University of Thessaloniki, Greece | Full Text |
103 | 10 | 4 | Promoting Teachers’ Skills of Instructional Materials Improvisation through Workshops and Exhibitions in Calabar Metropolis, Nigeria | Ekpo O. Ekpo-Eloma and Abigail Aniefiok Effiong, University of Calabar, Nigeria | Full Text |
104 | 10 | 4 | An Assessment of ICT Support for Students Living with Disabilities at the University of Namibia | Mathew Haitota1, Chirimbana Moses2 and Haimbangu Malakia3, 1Mathew Haitota Students Support Services University of Namibia (Main Campus), 2University of Namibia (Oshakati Campus), 3Ministry of Education, Arts and Culture (Omusati Directorate of Education) | Full Text |
International Journal of Computer Networks & Communications (IJCNC)
105 | 13 | 1 | WiFi Transmit Power and its Effect on Co-Channel Interference | Zyanya Cordova, Riddhi Rana, Giovanna Rendon, Justin Thunell and Abdelrahman Elleithy, William Paterson University, USA | Full Text |
106 | 13 | 1 | An Optimal Route Discovery using Biogeography based Optimization for Vehicular Ad Hoc Networks | Shaeista Begum1, Nagaraj B. Patil2 and Vishwanath P3, 1Government Engineering College, Raichur, India, 2Government Engineering College, Gangavathi, India, 3H.K.E.S’s S.L.N. College Of Engineering, India | Full Text |
107 | 13 | 1 | IPTV Improvement Approach over LTE-WLAN Heterogeneous Networks | Mohamed Matoui, Noureddine Moumkine and Abdellah Adib, Faculty of Science and Technology Mohammedia, Morocco | Full Text |
108 | 13 | 1 | Enhanced Particle Swarm Optimization for Effective Relay Nodes Deployment in Wireless Sensor Networks | Bader Alshaqqawi1, Sardar Anisul Haque2, Mohammed Alreshoodi1 and Ibrahim Alsukayti1, 1Qassim University, Saudi Arabia, 2Alcorn State University, USA | Full Text |
109 | 13 | 1 | Designing an Energy Efficient Clustering in Heterogeneous Wireless Sensor Network | Lakshmi M and Prashanth C R, Dr. Ambedkar Institute of Technology, India | Full Text |
110 | 13 | 1 | An Exact Analytical Model for an IoT Network with MMPP Arrivals | Osama Salameh, Arab American University, Palestine | Full Text |
111 | 13 | 1 | Context Information Aggregation Mechanism Based on Bloom Filters (CIA-BF) for High Performance Monitoring Applications of Internet of Things | Fawaz Alassery and Maha M. Althobaiti, Taif University, Saudi Arabia | Full Text |
112 | 13 | 2 | Dynamic Shaping Method using SDN And NFV Paradigms | Shin-ichi Kuribayashi, Seikei University, Japan | Full Text |
113 | 13 | 2 | Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for Performance Improvement in MANET | Gyanendra Kumar Pallai1, Meenakshi Sankaran2 and Amiya Kumar Rath3, 1SOA University, India, 2VIT Bhopal University, India, 3Veer Surendra Sai University of Technology, India | Full Text |
114 | 13 | 2 | Developing an Adaptive Channel Modelling using a Genetic Algorithm Technique to Enhance Aerial Vehicle-to-Everything Wireless Communications | Faris. A. Almalki, Taif University, Kingdom of Saudi Arabia | Full Text |
115 | 13 | 2 | Q-Learning based Routing Protocol to Enhance Network Lifetime in WSNs | Arunita Kundaliya and D.K. Lobiyal, Jawaharlal Nehru University, India | Full Text |
116 | 13 | 2 | Quantile Regressive Fish Swarm Optimized Deep Convolutional Neural Learning for Reliable Data Transmission in IoV | S. Suguna Devi and A. Bhuvaneswari, Cauvery College For Women, India | Full Text |
117 | 13 | 2 | Privacy-Preserving Machine Authenticated Key Agreement for Internet of Things | Beaton Kapito1,3, Mwawi Nyirenda1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea, 3Malawi Adventist University, Malawi | Full Text |
118 | 13 | 2 | Does Digital Native Status Impact End-User Antivirus Usage? | Gerrianne Roberts1 and Shawon Rahman2, 1Valencia College, USA, 2University of Hawaii-Hilo, USA | Full Text |
119 | 13 | 3 | About Digital Communication Methods for Visible Light Communication | Wataru Uemura, Yasuhiro Fukumori and Takato Hayama, Ryukoku University, Japan | Full Text |
120 | 13 | 3 | Evolutionary Computing based Neuron-Computational Model for Microstrip Patch Antenna Design Optimization | Rohini Saxena, Mukesh Kumar and Shadman Aslam, University of Allahabad, India | Full Text |
121 | 13 | 3 | Multilayer Representation and Multiscale Analysis on Data Networks | Luz Angela Aristizábal Q and Nicolás Toro G, Universidad Nacional de Colombia, Colombia | Full Text |
122 | 13 | 3 | Clock Synchronization using Truncated Mean and Whale Optimization for Clustered Sensor Networks | Karthik Soundarapandian1 and Ashok Kumar Ambrose2, 1Bharathiar University, India, 2Alagappa Govt. Arts College, India | Full Text |
123 | 13 | 3 | A Controllable RSU and Vampire Moth to Support the Cluster Stability in VANET | Ronald Adrian, Selo Sulistyo, I Wayan Mustika and Sahirul Alam, Universitas Gadjah Mada, Indonesia | Full Text |
124 | 13 | 3 | A Method of Improving Energy Efficiency Through Geofencing and False Data Blocking In Context-Aware Architecture for Probabilistic Voting-Based Filtering Scheme of WSNs | Su Man Nam1 and Youn Kyoung Seo2, 1DUDU Information Technologies, Republic of Korea, 2Incheon Jae Neung University, Republic of Korea | Full Text |
125 | 13 | 3 | Trust Level Evaluation based Asymmetric Cryptography Protocol for Flexible Access Control in Fog Computing | C. Nagarani1 and R. Kousalya2, 1PSG College of Arts and Science, India, 2Dr. N.G.P Arts and Science College, India | Full Text |
126 | 13 | 4 | Traffic Congestion Prediction using Deep Reinforcement Learning in Vehicular Ad-Hoc Networks (VANETS) | Chantakarn Pholpol and Teerapat Sanguankotchakorn, Asian Institute of Technology, Thailand | Full Text |
127 | 13 | 4 | An Efficient and Stable Routing Algorithm in Mobile Ad Hoc Network | Priyanka Pandey and Raghuraj Singh, Harcourt Butler Technical University, India | Full Text |
128 | 13 | 4 | Novel Position Estimation using Differential Timing Information for Asynchronous LTE/NR Networks | Muhammad Abugabal, Yasmine Fahmy and Hazim Tawfik, Cairo University, Egypt | Full Text |
129 | 13 | 4 | Optimized Cluster Establishment and Cluster-Head Selection Approach in WSN | Shivshanker. P. Biradar1 and T. S. Vishwanath2, 1LAEC, India, 2BKIT, India | Full Text |
130 | 13 | 4 | A Cluster-Based Routing Protocol and Fault Detection for Wireless Sensor Network | Slaheddine Chelbi1 and Riadh Moussi2,3, 1Qassim University, Kingdom of Saudi Arabia, 2Taibah University, Kingdom of Saudi Arabia, 3University of Kairouan, Tunisia | Full Text |
131 | 13 | 4 | Performance Analysis in Cellular Networks Considering the QoS by Retrial Queueing Model with the Fractional Guard Channels Policies | Dang ThanhChuong, Hoa Ly Cuong, Pham Trung Duc and Duong Duc Hung, Hue University, VietNam | Full Text |
132 | 13 | 4 | MAR Security: Improved Security Mechanism for Emergency Messages of VANET using Group Key Management & Cryptography Schemes (GKMC) | Mahabaleshwar Kabbur, Anand R and Arul Kumar V, REVA University, India | Full Text |
133 | 13 | 5 | Threshold based VM Placement Technique for Load Balanced Resource Provisioning using Priority Scheme in Cloud Computing | Mayank Sohani and S. C. Jain, Rajasthan Technical University, India | Full Text |
134 | 13 | 5 | A New Efficient Cache Replacement Strategy for Named Data Networking | Saad Al-Ahmadi, King Saud University, Saudi Arabia | Full Text |
135 | 13 | 5 | An Effective Control of Hello Process for Routing Protocol in MANETs | Dhirendra Kumar Sharma and Nitika Goenka, University of Petroleum and Energy Studies, India | Full Text |
136 | 13 | 5 | Sector Tree-Based Clustering for Energy Efficient Routing Protocol in Heterogeneous Wireless Sensor Network | Nguyen Duy Tan, Vu Khanh Quy, Pham Ngoc Hung and Le Van Vinh, Hung Yen University of Technology and Education, Vietnam | Full Text |
137 | 13 | 5 | Dynamic Task Scheduling based on Burst Time Requirement for Cloud Environment | Linz Tom1 and Bindu V.R.2, 1Assumption College, India, 2Mahatma Gandhi University, India | Full Text |
138 | 13 | 5 | Investigating Multilayer Omega-Type Networks Operating with the Cut-Through Technique under Uniform or Hotspot Traffic Conditions | Eleftherios Stergiou1, John Garofalakis2, Dimitrios Liarokapis1 and Spiridoula Margariti1, 1University of Ioannina, Greece, 2University of Patras and Computer Technology Institute and Press- “DIOPHANTUS” (CTI) Patras, Greece | Full Text |
139 | 13 | 5 | Privacy-Preserving Authentication Scheme for Roaming Service in Global Mobility Networks | Sung Woon Lee1 and Hyunsung Kim2,3, 1Tongmyong University, Korea, 2University of Malawi, Malawi, 3Kyungil University, Korea | Full Text |
140 | 13 | 6 | Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Encryption | FUJITA Satoshi, Hiroshima University, Japan | Full Text |
141 | 13 | 6 | MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet of Things | Padmashree M G, Mallikarjun J P, Arunalatha J S and Venugopal K R, University Visvesvaraya College of Engineering, Bangalore University, India | Full Text |
142 | 13 | 6 | Securing BGP by Handling Dynamic Network Behavior and Unbalanced Datasets | Rahul Deo Verma, Shefalika Ghosh Samaddar and A. B. Samaddar, National Institute of Technology Sikkim, India | Full Text |
143 | 13 | 6 | A Cooperative Localization Method based on V2I Communication and Distance Information in Vehicular Networks | Walaa Afifi, Hesham A. Hefny and Nagy R. Darwish, Cairo University, Egypt | Full Text |
144 | 13 | 6 | Fuzzy Logic-based Efficient Message Route Selection Method to Prolong the Network Lifetime in WSNs | Jungsub Ahn1, Sanghyeok Lim2 and Taeho Cho1*, 1Sungkyunkwan University, Republic of Korea, 2Amorepacific Republic of Korea | Full Text |
145 | 13 | 6 | BER Analysis for Downlink MIMO-NOMA Systems over Rayleigh Fading Channels | Vu Tran Hoang Son1, 2 and Dang Le Khoa1, 2*, 1VNUHCM - University of Science, Vietnam, 2Vietnam National University, Vietnam | Full Text |
International Journal of Wireless & Mobile Networks (IJWMN)
International Journal of Distributed and Parallel systems (IJDPS)
155 | 12 | 1/2 | Task-Decomposition based Anomaly Detection of Massive And High-Volatility Session Data on Academic Backbone Network | Ruo Ando1, Youki Kadobayashi2 and Hiroki Takakura1, 1National Institute of Informatics, 2-1-2Hitotsubashi, Japan, 2Nara Institute of Science and Technology, Japan | Full Text |
156 | 12 | 3/4/5 | Study of Task Scheduling Strategy based on Trustworthiness | Jun QIN1, 2, Yanyan SONG1 and Ping ZONG2, 3, 1Communication University of China, China, 2Nanjing University of Posts and Telecommunications, China, 3Nanjing University of Science and Technology Zijin College, China | Full Text |
157 | 12 | 3/4/5 | Trust in the Adoption of Internet of Things for Smart Agriculture in Developing Countries | Tsitsi Zengeya, Paul Sambo and Nyasha Mabika, Great Zimbabwe University, Zimbabwe | Full Text |
International Journal of Grid Computing & Applications (IJGCA)
158 | 12 | 1/2/3 | An Intelligent System for the Enhancement of Visually Impaired Navigation and Disaster Assistance using Geo-Based Positioning and Machine Learning | Wenhua Liang1, Ishmael Rico2 and Yu Sun3, 1USA, 2University of California, USA, 3California State Polytechnic University, USA | Full Text |
International Journal on AdHoc Networking Systems (IJANS)
159 | 11 | 1 | Investigation and Evaluation of IEEE 802.11n WLANs Link Features Performance Under Single Host and Concurrent Communication | Sumon Kumar Debnath1 Prodip Kumar Sarker1, Md. Manowarul Islam2 and Ileas Pramanik1, 1Begum Rokeya University, Bangladesh, 2Jagannath University, Bangladesh | Full Text |
160 | 11 | 2 | Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wireless System | Md. Firoz Ahmed, Md. Sofiqul Islam and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
161 | 11 | 3 | Design of a Compact Circular Microstrip Patch Antenna for WLAN Applications | Chaitali Mukta, Mahfujur Rahman and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
162 | 11 | 3 | A Trust-Based Predictive Model for Mobile Ad Hoc Networks | K.Divya and B.Srinivasan, Gobi Arts & Science College, India | Full Text |
The International Journal of Ambient Systems and Applications (IJASA)
163 | 9 | 1/2 | Performance of Convolution and CRC Channel Encoded V-Blast 4x4 MIMO MC-CDMA Wireless Communication System | Md. Firoz Ahmed, Md. Tahidul Islam and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
164 | 9 | 1/2 | Comparison of Bit Error Rate Performance of Various Digital Modulation Schemes over AWGN and Rayleigh Fading Channels using Simulink | Md. Firoz Ahmed, Md. Faysal Ahmed and Abu Zafor Md. Touhidul Islam, Rajshahi University, Bangladesh | Full Text |
165 | 9 | 1/2 | Sensor based Smart Irrigation System with Monitoring and Controlling using Internet of Things | Nazmul Hassan, Sheikh Hasib Cheragee, Sakil Ahammed and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
166 | 9 | 1/2 | A Study of IoT based Real-Time Solar Power Remote Monitoring System | Sheikh Hasib Cheragee, Nazmul Hassan, Sakil Ahammed and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
167 | 9 | 3/4 | An Intelligent and Data-driven Mobile Volunteer Event Management Platform using Machine Learning and Data Analytics | Serena Wen1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA | Full Text |
International Journal of Software Engineering & Applications (IJSEA)
168 | 12 | 1 | Generating Software Product Line Model by Resolving Code Smells in the Products’ Source Code | Sami Ouali, University of Technology and Applied Sciences, Oman | Full Text |
169 | 12 | 1 | E-Loox, A Hybrid Learning Management System | Bilal Gonen and Badri Jimale, University of Cincinnati, USA | Full Text |
170 | 12 | 2/3 | A Holistic Self-Adaptive Software Model | Shatha Alfar and Said Ghoul, Research Laboratory on Bio-inspired Software Engineering Philadelphia University, Jordan | Full Text |
171 | 12 | 2/3 | Embedding Quality into Software Product Line Variability Artifacts | Mworia Daniel, Nderu Lawrence and Kimwele Michael, Jommo Kenyatta University of Agriculture and Technology, Kenya | Full Text |
172 | 12 | 2/3 | Modeling and Verification of ERP Functional Requirements based on Colored Petri Net | Nafisa Osman and Abd-Elkader Sahraoui, Sudan University of science and technology, Sudan & LAAS-CNRS, France, Université de Toulouse, France | Full Text |
173 | 12 | 2/3 | Predefined Project Scope Changes and its Causes for Project Success | Theyab Althiyabi and Rizwan Qureshi, King Abdul-Aziz University, Saudi Arabia | Full Text |
174 | 12 | 4 | Enhancing Delphi Method with Algorithmic Estimates for Software Effort Estimation: An Experimental Study | Tharwon Arnuphaptrairong, Chulalongkorn University, Thailand | Full Text |
175 | 12 | 5 | Product Quality Evaluation Method (PQEM): To Understand the Evolution of Quality Through the Iterations of a Software Product | Mariana Falco and Gabriela Robiolo, Universidad Austral, Argentina | Full Text |
176 | 12 | 5 | A Framework for Aspectual Requirements Validation: an Experimental Study | Abdelsalam M. Maatuk1, Sohil F. Alshareef1 and Tawfig M. Abdelaziz2, 1University of Benghazi, Libya, 2Libyan International Medial University, Libya | Full Text |
177 | 12 | 5 | Properties of a Feature in Code-Assets: An Exploratory Study | Armaya’u Zango Umar1 and Jaejoon Lee2, 1Al-Qalam University Katsina, Nigeria, 2University of East Anglia, UK | Full Text |
178 | 12 | 6 | Embedding Performance Testing in Agile Software Model | Suresh Kannan Duraisamy, Bryce Bass and Sai Mukkavilli, Georgia Southwestern State University, USA | Full Text |
International Journal of Network Security & Its Applications (IJNSA)
179 | 13 | 1 | Resolving Network Defense Conflicts with Zero Trust Architectures and Other End-to-End Paradigms | William R. Simpson and Kevin E. Foltz, The Institute for Defense Analyses (IDA), USA | Full Text |
180 | 13 | 1 | Analysis of Machine Learning Algorithms with Feature Selection for Intrusion Detection using UNSW-NB15 Dataset | Geeta Kocher1 and Gulshan Kumar2, 1MRSPTU, India, 2SBSSTC, India | Full Text |
181 | 13 | 1 | Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis | Anna Georgiadou, Spiros Mouzakitis and Dimitris Askounis, National Technical University of Athens, Greece | Full Text |
182 | 13 | 1 | Defeating MITM Attacks on Cryptocurrency Exchange Accounts with Individual User Keys | Cheman Shaik, VISH Consulting Services Inc, USA | Full Text |
183 | 13 | 1 | Game Theory Application Resources Management and Distribution in Blockchain Network | Cong Hung Tran1, Dien Tam Le1, 2, Thanh Hieu Huynh3, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Thu Duc Technology College, Vietnam, 3Saigon University, Vietnam | Full Text |
184 | 13 | 2 | Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream | Matthew Schofield, Gulsum Alicioglu, Bo Sun, Russell Binaco, Paul Turner, Cameron Thatcher, Alex Lam and Anthony Breitzman, Rowan University, USA | Full Text |
185 | 13 | 2 | Performance Evaluation of Machine Learning Techniques for DOS Detection in Wireless Sensor Network | Lama Alsulaiman and Saad Al-Ahmadi, King Saud University, Saudi Arabia | Full Text |
186 | 13 | 2 | Applying the Health Belief Model to Cardiac Implanted Medical Device Patients | George W. Jackson1 and Shawon Rahman2, 1Capella University, USA, 2University of HawaiiHilo, USA | Full Text |
187 | 13 | 2 | A Literature Survey and Analysis on Social Engineering Defense Mechanisms and Infosec Policies | Dalal Alharthi and Amelia Regan, University of California Irvine, USA | Full Text |
188 | 13 | 2 | Phishing Mitigation Techniques: A Literature Survey | Wosah Peace Nmachi and Thomas Win, School of Computing & Engineering University of Gloucestershire, United Kingdom | Full Text |
189 | 13 | 3 | Deep Learning Classification Methods Applied to Tabular Cybersecurity Benchmarks | David A. Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA | Full Text |
190 | 13 | 3 | Effect Man-In the Middle on the Network Performance in Various Attack Strategies | Iyas Alodat, Jerash University, Jordan | Full Text |
191 | 13 | 3 | Information-Centric Blockchain Technology for the Smart Grid | Lanqin Sang and Henry Hexmoor, Southern Illinois University, USA | Full Text |
192 | 13 | 3 | A Survey on Federated Identity Management Systems Limitation and Solutions | Maha Aldosary and Norah Alqahtani, Imam Mohammad Ibn Saud Islamic University, KSA | Full Text |
193 | 13 | 4 | Use of MARKOV Chain for Early Detecting DDoS Attacks | Chin-Ling Chen1 and Jian-Ming Chen2, 1National Pingtung University, Taiwan, 2Genesis Technology, Inc., Taiwan | Full Text |
194 | 13 | 4 | Constructing the 2-Element AGDS Protocol based on the Discrete Logarithm Problem | Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia | Full Text |
195 | 13 | 4 | Proof-of-Reputation: An Alternative Consensus Mechanism for Blockchain Systems | Oladotun Aluko1 and Anton Kolonin2, 1Novosibirsk State University, Russia, 2Aigents Group, Russia | Full Text |
196 | 13 | 4 | Critical Infrastructure Cybersecurity Challenges: IoT in Perspective | Akwetey Henry Matey1, Paul Danquah2, Godfred Yaw Koi-Akrofi1 and Isaac Asampana1, 1University of Professional Studies Accra, 2Heritage Christian University | Full Text |
197 | 13 | 4 | Collective Signature Protocols for Signing Groups based on Problem of Finding Roots Modulo Large Prime Number | Tuan Nguyen Kim1, Duy Ho Ngoc2 and Nikolay A. Moldovyan3, 1Duy Tan University, Vietnam, 2Ha Noi, Vietnam, 3St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Russia | Full Text |
198 | 13 | 5 | Evaluation of a Blockchain-Enabled Resource Management Mechanism for NGNs | Michael Xevgenis, Dimitrios G. Kogias, Ioannis Christidis, Charalampos Patrikakis and Helen C. Leligou, University of West Attica, Greece | Full Text |
199 | 13 | 5 | Secure Blockchain Decentralized Voting for Verified Users | Piotr Pospiech, Aleksander Marianski and Michal Kedziora, Wroclaw University of Science and Technology, Poland | Full Text |
200 | 13 | 6 | Detection Method for Classifying Malicious Firmware | David Noever and Samantha E. Miller Noever, PeopleTec, Inc., USA | Full Text |
201 | 13 | 6 | Malicious Javascript Detection based on Clustering Techniques | Nguyen Hong Son1 and Ha Thanh Dung2, 1Faculty of Information Technology Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam | Full Text |
202 | 13 | 6 | Understanding Traffic Patterns of Covid-19 IoC in Huge Academic Backbone Network SINET | Ruo Ando1, Youki Kadobayashi2, Hiroki Takakura1 and Hiroshi Itoh3, 1National Institute of Informatics, Japan, 2Nara Institute of Science and Technology, Japan, 3National Institute of Information and Communications Technology, Japan | Full Text |
203 | 13 | 6 | Improving Security and Fairness in Federated Learning Systems | Andrew R. Short1, Τheofanis G. Orfanoudakis2 and Helen C. Leligou1, 1University of West Attica, Greece, 2Hellenic Open University, Greece | Full Text |
204 | 13 | 6 | Improve Security in Smart Cities Based on IoT, Solve Cyber Electronic Attacks with Technology by using Packet Tracer | Raed Al-hamarneh, University of Almaarefa, Kingdom of Saudi Arabia | Full Text |
205 | 13 | 6 | System End-User Actions as a Threat to Information System Security | Paulus Kautwima, Titus Haiduwa, Kundai Sai, Valerianus Hashiyana and Nalina Suresh, University of Namibia, Namibia | Full Text |
206 | 13 | 6 | Information and Communication Security Mechanisms For Microservices-based Systems | Lenin Leines-Vite, Juan Carlos Pérez-Arriaga and Xavier Limón, Universidad Veracruzana, Mexico | Full Text |
207 | 13 | 6 | Comparative Review of Malware Analysis Methodologies | Ioannis G. Kiachidis and Dimitrios A. Baltatzis, International Hellenic University, Greece | Full Text |
208 | 13 | 6 | Can Blockchain be a Solution to IoT Technical and Security Issues | Adanma Cecilia Eberendu1, Titus Ifeanyi Chinebu2, 1Madonna University, Nigeria, 2Federal College of Dental Technology and Therapy, Nigeria | Full Text |
International Journal of Security, Privacy and Trust Management (IJSPTM)
209 | 10 | 1 | GasMASk Annotation-based Code Generator as an Embedded Domain-Specific Language in Collaborative Multi-Agent Systems | Orcun Oruc and Uwe Aßmann, TU Dresden, Germany | Full Text |
210 | 10 | 2 | Security and Privacy Perceptions among Female Online Social Media Users: A Case Study of Bangladesh | Farida Chowdhury, Sadia Sultana and Mahruba Sharmin Chowdhury, Shahjalal University of Science and Technology, Bangladesh | Full Text |
International Journal of Database Management Systems (IJDMS)
211 | 13 | 1 | Mapping Common Errors in Entity Relationship Diagram Design of Novice Designers | Rami Rashkovits1 and Ilana Lavy2, 1Peres Academic Center, Israel, 2Yezreel Valley College, Israel | Full Text |
212 | 13 | 1 | Re-optimization for Multi-objective Cloud Database Query Processing using Machine Learning | Chenxiao Wang, Zach Arani, Le Gruenwald, Laurent d'Orazio and Eleazar Leal, University of Oklahoma, USA | Full Text |
213 | 13 | 2 | Healthbot for Polycystic Ovarian Syndrome | Jeyshree Krishnaswamy Sundararajan, Yanyan Li, and Ahmad Hadaegh, California State University-San Marcos, USA | Full Text |
214 | 13 | 3 | Database Private Security Jurisprudence: A Case Study using Oracle | Madhuri N. Gedam and B. B. Meshram, Mumbai University, India | Full Text |
215 | 13 | 4 | Text Advertisements Analysis using Convolutional Neural Networks | Abdulwahed Almarimi and Asmaa Salem, Bani Waleed University, Libya | Full Text |
216 | 13 | 4 | Map Reduce based on Cloak DHT Data Replication Evaluation | Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso | Full Text |
217 | 13 | 5/6 | Considering Structural and Vocabulary Heterogeneity in XML Query: FPTPQ and Holistic Evaluation | Brice Nguefack1, Maurice Tchoupé Tchendji1 and Thomas Djotio Ndie2, 1University of Dschang, Cameroon, 2University of Yaoundé I, Cameroun | Full Text |
International Journal of Data Mining & Knowledge Management Process (IJDKP)
218 | 11 | 1 | Apply Machine Learning Methods to Predict Failure of Glaucoma Drainage | Jiali Tang, Jack Wang and Ahmad Reza Hadaegh, California State University San Marcos, USA | Full Text |
219 | 11 | 1 | Partitioning Wide Area Graphs Using a Space Filling Curve | Cyprien Gottstein1, Philippe Raipin Parvedy1, Michel Hurfin2, Thomas Hassan1 and Thierry Coupaye1, 1TGI-OLS-DIESE-LCP-DDSD, Orange Labs, France, 2Univ Rennes, INRIA, France | Full Text |
220 | 11 | 1 | A Comprehensive Analysis of Quantum Clustering : Finding All the Potential Minima | Aude Maignan1 and Tony Scott2, 1Univ. Grenoble Alpes, CNRS, France, 2RWTH-Aachen University, Germany | Full Text |
221 | 11 | 2/3/4 | Semantics Graph Mining for Topic Discovery and Word Associations | Alex Romanova, Melenar, LLC, McLean, VA, USA | Full Text |
222 | 11 | 2/3/4 | Petrochemical Production Big Data and its Four Typical Application Paradigms | Hu Shaolin, Zhang Qinghua, Su Naiquan and Li Xiwu, Guangdong University of Petrochemical Technology, China | Full Text |
223 | 11 | 5 | An Experimental Evaluation of Similarity-Based and Embedding-Based Link Prediction Methods on Graphs | Md Kamrul Islam, Sabeur Aridhi and Malika Smail-Tabbone, Universite de Lorraine, France | Full Text |
224 | 11 | 5 | The 5 Dimensions of Problem Solving using Dinna: Case Study in the Electronics Industry | Mohammed Hamoumi, Abdellah Haddout and Mariam Benhadou, Hassan II University, Morocco | Full Text |
225 | 11 | 6 | Review of Machine Learning Applications and Datasets in Classification of Acute Leukemia | Jaishree Ranganathan, Middle Tennessee State University, USA | Full Text |
The International Journal of Multimedia & Its Applications (IJMA)
226 | 13 | 1/2 | LACLOD: Learning Analytics for Children’s Logic Development | Suzani Mohamad Samuri1,2, Dorroity Anak Emang1, Rahmadi Agus3, Bahbibi Rahmatullah1,2, Nurul Salini Mohamed Salleh1 and Mazlina Che Mustafa4, 1Computing and Creative Industry, Idris Education University, Malaysia, 2Data Intelligent and Knowledge Management (DILIGENT) Special Interest Group, Sultan Idris Education University, Perak, Malaysia, 3Islamic University of Muhammad Arsyad Al Banjari Kalimantan, Indonesia, 4National Child Development Research Centre, Sultan Idris Education University, Malaysia | Full Text |
227 | 13 | 1/2 | Blind Extraction of Digital Watermarking Algorithm for Color Images | Xuecheng Gong, Wanggen Li and Wang Jing, Anhui Normal University, China | Full Text |
228 | 13 | 1/2 | Development of Rubric to Measure Children’s Creativity in Game Design | Laili Farhana Md Ibharim1, Maizatul Hayati Mohamad Yatim1, Nor Zuhaidah Mohamed Zain1, Ummu Husna Azizan1 and Norasikin Fabil2, 1Universiti Pendidikan Sultan Idris, Malaysia, 2Universiti Sains Islam Malaysia, Malaysia | Full Text |
229 | 13 | 3 | Need Analysis: Portable Web Server Development Kits for Teaching and Learning | Nor Masharah Husain, Nadia Akma Ahmad Zaki, Rasyidi Johan, and Noor Anida Zaria Mohd Noor, Universiti Pendidikan Sultan Idris, Malaysia | Full Text |
230 | 13 | 4 | Developing an Interactive Storybook Application ‘Jack and the Dirty Smelly Beast’ for English Language Proficiency among Children | Indah Fakhrani Arpin and Maizatul Hayati Mohamad Yatim, Sultan Idris Education University, Malaysia | Full Text |
231 | 13 | 4 | Marie: Validation of the Artificial Intelligence Model for Covid-19 Detection | Valdirene Bento1, Bruno Frederico Salaroli2 and Paula Santos3, 1Radiologist responsible at UBS, Brazil, 2General practitioner in Itapeva, Brazil, 3University of São Paulo, Brazil | Full Text |
232 | 13 | 4 | Audio Cryptography via Enhanced Genetic Algorithm | Salamudeen Alhassan1, Gabriel Kofi Armah1 and Issah Zabsonre Alhassan2, 1C. K. Tedam University of Technology and Applied Sciences, Ghana, 2Kwame Nkrumah University of Science and Technology, Ghana | Full Text |
233 | 13 | 5 | Development of Web Application for Packaging Design | Rawiphon Charunphankasem, Rajamangala University of Technology Phra Nakhon, Thailand | Full Text |
234 | 13 | 6 | Mobile Augmented Reality Application for Primary School Education | Normala Rahim, Wan Rizhan, Maizan Mat Amin, Wan Malini Wan Isa, Ismahafezi Ismail, Nur SaadahMohd Shapri, Rafhanah Ramlan, Universiti Sultan Zainal Abidin, Malaysia | Full Text |
235 | 13 | 6 | Exploring Virtual Reality Application in Tourism: VR Bukit Puteri | Maizan Mat Amin, Wan Mohd Rizhan Wan Idris, Normala Rahim, Nur Saadah Mohd Sapri, Ismahafezi Ismail, Wan Malini Wan Isa and Muhammad Hazwan Mohamad, Universiti Sultan Zainal Abidin, Malaysia | Full Text |
236 | 13 | 6 | The Impact of VR Graphical User Interface on Oculus Touch Controller and Oculus Rift | Natchaphak Meeusah and Bennapa Pattanapipat, Rajamangala University of Technology Thanyaburi, Thailand | Full Text |
International Journal of Computer Graphics & Animation (IJCGA)
237 | 11 | 1/2/3/4 | Fast Fluid Thermodynamics Simulation by Solving Heat Diffusion Equation | Wanwan Li, George Mason University, USA | Full Text |
International Journal of Web & Semantic Technology (IJWesT)
238 | 12 | 1 | U-mentalism Patent: The Beginning of Cinematic Supercomputation | Luís Homem, Centro de Filosofia das Ciências da Universidade de Lisboa, Portugal | Full Text |
239 | 12 | 1 | Evaluation of Single-Span Models on Extractive Multi-Span Question-Answering | Marie-Anne Xu1 and Rahul Khanna2, 1Crystal Springs Uplands School, USA, 2University of Southern California, USA | Full Text |
240 | 12 | 2/3 | Ontology Service Center: A Datahub for Ontology Application | CHEN Tao1, SU Rina1, ZHANG Yongjuan2, YIN Xin3 and ZHU Rui4, 1Sun Yat-sen University, China, 2Chinese Academy of Sciences, China, 3Remin University of China, China, 4Shanghai University, China | Full Text |
241 | 12 | 2/3 | A Framework for Building a Multilingual Industrial Ontology: Methodology and a Case Study for Building Smartphone English-Arabic Ontology | Amany K. Alnahdi, King Abdulaziz University, Saudi Arabia | Full Text |
242 | 12 | 4 | Political Opinion Analysis in Social Networks: Case of Twitter and Facebook | Telesphore TIENDREBEOGO and Yassia ZAGRE, University of Nazi Boni, Burkina Faso | Full Text |
243 | 12 | 4 | A Self-Supervised Tibetan-Chinese Vocabulary Alignment Method | Enshuai Hou, Jie zhu, Liangcheng Yin and Ma Ni, Tibet University, China | Full Text |
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
244 | 11 | 1/2/3/4/5/6 | Blockchain based Data Security as a Service in Cloud Platform Security | Magesh Kasthuri, Wipro Limited, Bengaluru, India | Full Text |
245 | 11 | 1/2/3/4/5/6 | Digital Banking - Architecture Strategies using Cloud Computing | Prudhvi Parne, Bank of Hope, USA | Full Text |
246 | 11 | 1/2/3/4/5/6 | A Novel Optimization of Cloud Instances with Inventory Theory Applied on Real Time IoT Data of Stochastic Nature | Sayan Guha, Cognizant Technology Solutions, India | Full Text |
International Journal of Artificial Intelligence & Applications (IJAIA)
247 | 12 | 1 | Graph Algorithm to Find Core Periphery Structures using Mutual K-nearest Neighbors | Divya Sardana1 and Raj Bhatnagar2, 1Teradata Corp., USA, 2University of Cincinnati, USA | Full Text |
248 | 12 | 1 | CAn Explanation Framework for Interpretable Credit Scoring | Lara Marie Demajo, Vince Vella and Alexiei Dingli, University of Malta, Malta | Full Text |
249 | 12 | 1 | Towards Predicting Software Defects with Clustering Techniques | Waheeda Almayyan, Computer Information Department, Collage of Business Studies, PAAET, Kuwait | Full Text |
250 | 12 | 1 | Analysis of Enterprise Shared Resource Invocation Scheme based on Hadoop and R | Hong Xiong, University of California, USA | Full Text |
251 | 12 | 1 | Understanding Negative Sampling in Knowledge Graph Embedding | Jing Qian1, 2, Gangmin Li1, Katie Atkinson2 and Yong Yue1, 1Xi’an Jiaotong-Liverpool University, China, 2University of Liverpool, United Kingdom | Full Text |
252 | 12 | 1 | Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern Analysis | Divya Sardana1, Shruti Marwaha2 and Raj Bhatnagar3, 1Teradata Corp., USA, 2Stanford University, USA, 3University of Cincinnati, USA | Full Text |
253 | 12 | 1 | Software Testing: Issues and Challenges of Artificial Intelligence & Machine Learning | Kishore Sugali, Chris Sprunger and Venkata N Inukollu, Purdue University, USA | Full Text |
254 | 12 | 2 | A Modified CNN-Based Face Recognition System | Jayanthi Raghavan and Majid Ahmadi, University of Windsor, Canada | Full Text |
255 | 12 | 3 | Implementation of a Decision Support System and Business Intelligence Algorithms for the Automated Management of Insurance Agents Activities | Alessandro Massaro, Antonio Panarese, Michele Gargaro, Costantino Vitale and Angelo Maurizio Galiano, Dyrecta Lab, IT Research Laboratory, Italy | Full Text |
256 | 12 | 3 | Twitter based Sentiment Analysis of Impact of Covid-19 on Education Globaly | Swetha Sree Cheeti, Yanyan Li and Ahmad Hadaegh, California State University-San Marcos, USA | Full Text |
257 | 12 | 3 | A STDP Rule that Favours Chaotic Spiking over Regular Spiking of Neurons | Mario Antoine Aoun, Montreal, Quebec, Canada | Full Text |
258 | 12 | 4 | Nature: A Tool Resulting from the Union of Artificial Intelligence and Natural Language Processing for Searching Research Projects in Colombia | Felipe Cujar-Rosero, David Santiago Pinchao Ortiz, Silvio Ricardo Timarán Pereira and Jimmy Mateo Guerrero Restrepo, University of Nariño, Colombia | Full Text |
259 | 12 | 4 | Fabric Defect Detection based on Improved Faster RCNN | Yuan He, Han-Dong Zhang, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore | Full Text |
260 | 12 | 4 | Predictive Model for Maize Stem Borers’ Classification in Precision Farming | Ezeofor Chukwunazo1, Akpado Kenneth2 and Ulasi Afamefuna3, 1University of Port Harcourt, Nigeria, 2NnamdiAzikiwe University, Nigeria, 3Federal University of Technology, Nigeria | Full Text |
261 | 12 | 4 | Human-System Interface with Explanation of Actions for Autonomous Anti-UAV Systems | John Kontos, National and Kapodistrian University of Athens, Greece | Full Text |
262 | 12 | 5 | A Brief Survey of Question Answering Systems | Michael Caballero, University of California, USA | Full Text |
263 | 12 | 5 | An Acceleration Method based on Deep Learning and Multilinear Feature Space | Michel Andre L .Vinagreiro1, Edson C. Kitani2, Armando Antonio M. Lagana1 and Leopoldo R. Yoshioka1, 1Escola Politecnica da Universidade de Sao Paulo, Brasil, 2Fatec Santo Andre, Brasil | Full Text |
264 | 12 | 5 | Finding Facial Expression Patterns on Videos based on Smile and Eyes-Open Confidence Values | Setiawan Hadi, Asep K Supriatna, Faishal Wahiduddin, Wilis Srisayekti, Achmad Djunaidi, Efi Fitriana, Aceng Abdullah and Dian Ekawati, Universitas Padjadjaran, Indonesia | Full Text |
265 | 12 | 6 | A Knowledge based Automatic Radiation Treatment Plan Alert System | Erwei Bai1 and Junyi Xia2, 1University of Iowa, USA, 2Mount Sinai Hospital, USA | Full Text |
266 | 12 | 6 | Automation of Best-Fit Model Selection using a Bag of Machine Learning Libraries for Sales Forecasting | Pauline Sherly Jeba P1, Manju Kiran1, Amit Kumar Sharma1, Divakar Venkatesh2, 1RBEI, Robert Bosch GmbH, India, 2Enterprise Solutions-SAP, Robert Bosch GmbH, Germany | Full Text |
267 | 12 | 6 | Digital Transformation of Financial Services using Artificial Intelligence, Machine Learning, and Cloud Computing | Prudhvi Parne, Bank of Hope, USA | Full Text |
268 | 12 | 6 | A New Perspective of Paramodulation Complexity by Solving 100 Sliding Block Puzzles | Ruo Ando1 and Yoshiyasu Takefuji2, 1National Institute of Informatics, Japan, 2Musashino University Faculty of Data Science, Japan | Full Text |
269 | 12 | 6 | Automatic Home-based Screening of Obstructive Sleep Apnea using Single Channel Electrocardiogram and SPO2 Signals | Hosna Ghandeharioun, Khorasan Institute of Higher Education, Iran | Full Text |
270 | 12 | 6 | Category Trees - Classifiers that Branch on Category | Kieran Greer, Distributed Computing Systems, Belfast, UK | Full Text |
International Journal of Fuzzy Logic Systems (IJFLS)
271 | 11 | 1 | A Combination of Palmer Algorithm and Gupta Algorithm for Scheduling Problem in Apparel Industry | Cecilia E. Nugraheni, Luciana Abednego and Maria Widyarini, Parahyangan Catholic University, Indonesia | Full Text |
272 | 11 | 1 | A Fuzzy Interactive BI-objective Model for SVM to Identify the Best Compromise Solution for Measuring the Degree of Infection With Corona Virus Disease (Covid-19) | Mohammed Zakaria Moustafa1, Hassan Mahmoud Elragal1, Mohammed Rizk Mohammed1, Hatem Awad Khater2 and Hager Ali Yahia1, 1ALEXANDRIA University, Egypt, 2Horus University, Egypt | Full Text |
273 | 11 | 1 | Forex Data Analysis using Weka | Luciana Abednego and Cecilia Esti Nugraheni, Parahyangan Catholic University, Indonesia | Full Text |
274 | 11 | 2/3/4 | DDoS Attack Detection on Internet o Things using Unsupervised AlgorithmsFull Text | Hailye Tekleselase, Addis Ababa University, Ethiopia | Full Text |
275 | 11 | 2/3/4 | Fuzzy Control of a Servomechanism: Practical Approach using Mamdani and Takagi- Sugeno Controllers | Renato Aguiar and Izabella Sirqueira, Centro Universitario FEI, Brazil | Full Text |
International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)
276 | 10 | 1 | Futuristic Technology in Architecture & Planning - Augmented and Virtual Reality: an Overview | Pearl Jishtu and Madhura A Yadav, Manipal University, India | Full Text |
Machine Learning and Applications: An International Journal (MLAIJ)
277 | 8 | 1 | Artificial Intelligence Models for Crime Prediction in Urban Spaces | Ana Laura Lira Cortes1 and Carlos Fuentes Silva2, 1Universidad Autónoma de Querétaro, México, 2Universidad Politécnica de Querétaro, México | Full Text |
278 | 8 | 1 | Analysis of Covid-19 in the United States using Machine Learning | James G. Koomson, Marymount University, USA | Full Text |
279 | 8 | 2/3 | A Development Framework for a Conversational Agent to Explore Machine Learning Concepts | Ayse Kok Arslan, Oxford Alumni of Northern California, USA | Full Text |
280 | 8 | 2/3 | An Enhancement for the Consistent Depth Estimation of Monocular Videos using Lightweight Network | JMohamed N. Sweilam1,2, and Nikolay Tolstokulakov2, 1Suez University, Egypt, 2Novosibirsk State University, Russia | Full Text |
281 | 8 | 2/3 | Catwalkgrader: A Catwalk Analysis and Correction System using Machine Learning and Computer Vision | Tianjiao Dong1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA | Full Text |
282 | 8 | 2/3 | Hybridization of DBN with SVM and its Impact on Performance in Multi-Document Summarization | Karari Kinyanjui, Malanga Ndenga and H.O Nyongesa, Dedan Kimathi University of Technology, Kenya | Full Text |
283 | 8 | 4 | A Comprehensive Study on Occlusion Invariant Face Recognition under Face Mask Occlusions | Susith Hemathilaka1 and Achala Aponso2, 1University of Westminster, United Kingdom, 2Informatics Institute of Technology, Sri Lanka | Full Text |
284 | 8 | 4 | A Survey of Neural Network Hardware Accelerators in Machine Learning | Fatimah Jasem and Manar AlSaraf, Kuwait University, Kuwait | Full Text |
Signal & Image Processing : An International Journal (SIPIJ)
285 | 12 | 1 | Application of Convolutional Neural Network In LAWN Measurement | J. Wilkins1, M. V. Nguyen1, B. Rahmani1, 2, 1Fontbonne University, USA, 2Maryville University, USA | Full Text |
286 | 12 | 1 | Research on Noise Reduction and Enhancement Algorithm of Girth Weld Image | Xiang-Song Zhang1, Wei-Xin Gao1 and Shi-Ling Zhu2, 1Xi'an Shiyou University, China, 2Xi’an University of Post and Telecommunications, China | Full Text |
287 | 12 | 1 | Target Detection and Classification Improvements using Contrast Enhanced 16-bit Infrared Videos | Chiman Kwan and David Gribben, Applied Research, LLC, USA | Full Text |
288 | 12 | 1 | Role of Hybrid Level Set in Fetal Contour Extraction | Rachana Jaiswal and Srikant Satarkar, Amravati University, India | Full Text |
289 | 12 | 2 | Classification and Comparison of License Plates Localization Algorithms | Mustapha Saidallah, Fatimazahra Taki, Abdelbaki El Belrhiti El Alaoui and Abdeslam El Fergougui, Moulay Ismail University, Morocco | Full Text |
290 | 12 | 2 | General Purpose Image Tampering Detection using Convolutional Neural Network and Local Optimal Oriented Pattern (LOOP) | Ali Ahmad Aminu1, 2 and Nwojo Nnanna Agwu1, 1Nile University of Nigeria, Nigeria, 2Gombe State University, Nigeria | Full Text |
291 | 12 | 2 | Target Detection and Classification Performance Enhancement using Super-Resolution Infrared Videos | Chiman Kwan, David Gribben and Bence Budavari, Applied Research, LLC, USA | Full Text |
292 | 12 | 3 | Practical Approaches to Target Detection in Long Range and Low Quality Infrared Videos | Chiman Kwan and David Gribben, Applied Research, LLC, Rockville, Maryland, USA | Full Text |
293 | 12 | 3 | Computer Aided Detection of Obstructive Sleep Apnea from EEG Signals | Saheed Ademola Bello and Umar Alqasemi, King AbdulAziz University, Saudi Arabia | Full Text |
294 | 12 | 3 | Using Distance Measure based Classification in Automatic Extraction of Lungs Cancer Nodules for Computer Aided Diagnosis | Maan Ammar1, Muhammad Shamdeen2, MazenKasedeh2, Kinan Mansour3 and Waad Ammar3, 1AL Andalus University for Medical Sciences, Syria, 2Damascus University, Syria, 3Al Andalus University Hospital, Syria | Full Text |
295 | 12 | 4 | Modelling, Conception and Simulation of a Digital Watermarking System based on Hyperbolic Geometry | Coulibaly Cheick Yacouba Rachid and Tiendrebeogo B. Telesphore, Nazi Boni University, Burkina Faso | Full Text |
296 | 12 | 5 | Combining of Narrative News and VR Games: Comparison of Various Forms of News Games | Xiaohan Feng, and Makoto Murakami, Toyo University, Japan | Full Text |
297 | 12 | 5 | Mixed Spectra for Stable Signals from Discrete Observations | Rachid Sabre, University of Burgundy, France | Full Text |
298 | 12 | 5 | Fractional Order Butterworth Filter for Fetal Electrocardiographic Signal Feature Extraction | Hadi Mohsen Alkanfery and Ibrahim Mustafa Mehedi, King Abdulaziz University, Saudi Arabia | Full Text |
299 | 12 | 6 | Sensing Method for Two-Target Detection in Time-Constrained Vector Poisson Channel | Muhammad Fahad and Daniel R. Fuhrmann, Michigan Technological University, USA | Full Text |
300 | 12 | 6 | Classification of OCT Images for Detecting Diabetic Retinopathy Disease using Machine Learning | Marwan Aldahami and Umar Alqasemi, King Abdulaziz University, Saudi Arabia | Full Text |
301 | 12 | 6 | A Comparative Study of Machine Learning Algorithms for EEG Signal Classification | Anam Hashmi, Bilal Alam Khan and Omar Farooq, Aligarh Muslim University, India | Full Text |
International Journal on Soft Computing (IJSC)
302 | 12 | 1 | AI Testing: Ensuring a Good Data Split Between Data Sets (Training and Test) using K-means Clustering and Decision Tree Analysis | Kishore Sugali, Chris Sprunger and Venkata N Inukollu, Purdue University, USA | Full Text |
303 | 12 | 2/3/4 | An approach to Fuzzy clustering of the iris petals by using Ac-means Analysis | Nicolás Enrique Salgado Guitiérrez, Sergio Andrés Valencia Ramírez and José Soriano Méndez, District University FJDC, Colombia | Full Text |