Computer Science & Information Technology
S.No | Volume | Issue | Paper Title | Authors |
---|
International Journal of Computer Science & Information Technology (IJCSIT)
1 | 15 | 1 | Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry | Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA | Full Text |
2 | 15 | 1 | Prediction of Anemia using Machine Learning Algorithms | Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal | Full Text |
3 | 15 | 1 | Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms | Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA | Full Text |
4 | 15 | 1 | Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines | Kouassi Konan Jean-Claude, Bircham International University, Spain | Full Text |
5 | 15 | 1 | Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality | Thongchai Jeeradist, Kasem Bundit University, Thailand | Full Text |
6 | 15 | 1 | Behavioural Analytics in Cyber Security for Digital Forensics Application | Martin Luther Bwangah, Kabarak University, Kenya | Full Text |
7 | 15 | 2 | Application Security Self-Efficacy of Software Developers: A Correlational Study | Wisdom Umeugo, Independent Researcher, Canada | Full Text |
8 | 15 | 2 | Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition | Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey | Full Text |
9 | 15 | 2 | Linear Feedback Shift Register Genetically Adjusted for Sequence Copying | Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico | Full Text |
10 | 15 | 2 | The Development of Climate Agrometeorological Application for Farmers in Namibia | Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia | Full Text |
11 | 15 | 3 | A Novel Exploit Traffic Traceback Method Based on Session Relationship | Yajing Liu, Ruijie Cai, Xiaokang Yin and Shengli Liu, State Key Laboratory of Mathematical Engineering and Advanced Computing, China | Full Text |
12 | 15 | 3 | Confidential Computing in Edge- Cloud Hierarchy | Yeghisabet Alaverdyan1,2, Suren Poghosyan2 and Vahagn Poghosyans2,3, 1EKENG CJSC, Armenia, 2Institute for Informatics and Automation Problems of NAS RA, Armenia, 3Synopsys, Armenia | Full Text |
13 | 15 | 3 | The Design of a Lighting System for Hong Kong International Airport APM Tunnel for Energy Saving with Artificial Intelligence (AI) Lighting Defect Detection System | Tony Tsang and Chan Shui Hin, Hong Kong College of Technology, Hong Kong | Full Text |
14 | 15 | 3 | Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges | Delali Kwasi Dake, University of Education, Ghana | Full Text |
15 | 15 | 3 | A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate Modeling | Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao, Sun Yat-Sen University, China | Full Text |
16 | 15 | 3 | Development of a Prototype for Census and Enumeration: A Case Study of Namibia | Theodora Mukaya, Johanna Nelulu, V Hashiyana and Chris M, Mazila, University of Namibia, Namibia | Full Text |
17 | 15 | 4 | Recent Advancements in the Field of Deepfake Detection | Natalie Krueger1, Mounika Vanamala1 and Rushit Dave2, 1University of Wisconsin-Eau Claire, USA, 2Minnesota State University, USA | Full Text |
18 | 15 | 4 | Detection of Structured Query Language Injection Attacks Using Machine Learning Techniques | Taapopi John Angula and Valerianus Hashiyana, University of Namibia, Namibia | Full Text |
19 | 15 | 4 | Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning Approach | Md. Tofael Ahmed1,2, Nahida Akter1, Maqsudur Rahman1, Abu Zafor Muhammad Touhidul Islam2, Dipankar Das2 and Md. Golam Rashed2, 1Comilla University, Bangladesh, 2University of Rajshahi, Bangladesh | Full Text |
20 | 15 | 4 | Wi-Fi Data Analysis based on Machine Learning | Nanumura Gedara Umal Anuraga Nanumura, University of South Wales, United Kingdom | Full Text |
21 | 15 | 4 | Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers | Alexander Veach and Munther Abualkibash, Eastern Michigan University, USA | Full Text |
22 | 15 | 4 | Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust, Peer Influences, Perceived Usefulness and Ease of Use | Waleed Al-Ghaith, Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia | Full Text |
23 | 15 | 4 | Understanding the Role of Customer Trust in E-Commerce | Istiak Khan and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia | Full Text |
24 | 15 | 4 | Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary Indicator in Municipalities of North Cotabato,Philippines | Michaelangelo R. Serrano, Nero L. Hontiveros, EJ Ryle C. Mosquera, Aura Mae M. Celestino, John Louie D. Vilar, Junuel S. Baroy and Mitziel C. Gelbolingo, Notre Dame of Midsayap College, Philippines | Full Text |
25 | 15 | 4 | A Systematic Review on the Effectiveness of Using User-Generated Content in E-Commerce Marketing | Jubaer Akhter and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia | Full Text |
26 | 15 | 5 | Secure Arcade: A Gamified Defense Against Cyber Attacks | Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber and Mounika Vanamala, University of Wisconsin-Eau Claire, USA | Full Text |
27 | 15 | 5 | Analysis of the Relationship between Self-Esteem and Depression | Rosalba Cuapa C., Adair Ponce, Meliza Contreras, Mireya Tovar and Fernando Zacarias F., Universidad Autónoma de Puebla, México | Full Text |
28 | 15 | 6 | An Adaptive Network-Based Approach for Advanced Forecasting of Cryptocurrency Values | Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA | Full Text |
29 | 15 | 6 | Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-Based Techniques | Omar Shatnawi, Al al-Bayt University, Jordan | Full Text |
30 | 15 | 6 | The Alignment between International and National Academic Accreditations - An Application in Information Systems Bachelor Program at Kingdom of Saudi Arabia | Rania A. Aboalela, King Abdulaziz University, Saudi Arabia | Full Text |
31 | 15 | 6 | Revealing the Foundations: The Strategic Influence of Test Design in Automation | Rohit Khankhoje, Independent Reseacher, USA | Full Text |
International Journal of Computer Science and Engineering Survey (IJCSES)
32 | 14 | 1/2/3/4 | Barriers for Females to Pursue Stem Careers and Studies at Higher Education Institutions (HEI). A Closer Look at Academic Literature | Elizaveta Tereshchenko1, Ari Happonen1 and Victoria Hasheela-Mufeti2, 1LUT University, Finland, 2University of Namibia, Namibia | Full Text |
33 | 14 | 1/2/3/4 | 5G Vs Wi-Fi Indoor Positioning: A Comparative Study | Even Becker and Hans D. Schotten, RPTU Kaiserslautern-Landau, Germany | Full Text |
34 | 14 | 5/6 | Navigating the Integration of 360 Mixed Reality in Cloud Computing | Koffka Khan, The University of the West Indies, Trinidad and Tobago | Full Text |
Computer Science & Engineering: An International Journal (CSEIJ)
35 | 13 | 1 | Agent-based Simulation for University Students Admission: Medical Colleges in Jordan Universities | Suha Khalil Assayed, Piyush Maheshwari, British University in Dubai, UAE | Full Text |
36 | 13 | 2 | Fuzzy Assessment of the “5 E’s” Instructional Treatment for Teaching Mathematics to Engineering Students | Michael Gr. Voskoglou, University of Peloponnese, Greece | Full Text |
37 | 13 | 2 | A Review of Agent-Based Simulation for University Students Admission | Suha Khalil Assayed and Piyush Maheshwari, British University, UAE | Full Text |
38 | 13 | 2 | A Wireless Device to Modular Robotized Instrument for Health Information | Veronika Ivanova1, Ani Boneva2, Stoyan Ivanov2 and Plamen Vasilev3, 1Institute of Robotics, Bulgaria, 2Institute of Information and Communication Technologies, Bulgaria, 3Industrial Automation University of Chemical Technologies and Metallurgy, Bulgaria | Full Text |
39 | 13 | 2 | A Cybersecurity and Digital Risk Assessment: A Family Case Study | Suha Khalil Assayed, British University, UAE | Full Text |
40 | 13 | 3 | Soft Computing: Contents, Techniques and Application | Michael Gr. Voskoglou, University of Peloponnese, Greece | Full Text |
41 | 13 | 4 | Exploratory Data Analysis and Feature Selection for Social Media Hackers Prediction Problem | Emmanuel Etuh1, Francis S. Bakpo1, George E. Okereke1 and David Omagu2, 1University of Nigeria, Nigeria, 2Kwararafa University, Nigeria |
Full Text |
42 | 13 | 5/6 | Comparative Analysis of Verbal Languages for Computing to Determine Which Language Possesses the Highest Efficacy and Computational Logic for Compiler Optimization | Bodle, W. L., McKenney, M., Segura, D., & Trafton, C., California Baptist University, USA | Full Text |
43 | 13 | 5/6 | Lightweight Certificateless Authenticated Key Agreement Protocol | Mwitende Gervais, Pivot Access Ltd, Rwanda | Full Text |
International Journal of Computer Science, Engineering and Applications (IJCSEA)
44 | 13 | 1 | Estimation of Persistence at a Community College: A Comparison of Alternative Machine Learning Models | Fermin Ornelas, Maricopa Community Colleges, USA | Full Text |
45 | 13 | 1 | Organ Donation Management System (Project: ODMS) | Abhay Yadav, Ariful Islam, Vasa Uday Kiran, Chitroju Naga Sai Jagadeesh, Gagandeep Singh, Lovely Professional University, India | Full Text |
46 | 13 | 2/3/4 | Embedded Systems and Software: Enabling Innovation in the Digital Age | Ali Shahdoust Moghadam, Nexide B.V., Netherlands | Full Text |
47 | 13 | 2/3/4 | Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ Performance in NS-2 | Ferdinand Alifo1, Mustapha Awinsongya yakubu2, Martin Doe3 and Michael Asante4, 1Local Gov’t Service, Ghana, 2University of Cincinnati Ohio, USA, 3University of Business and Integrated Development Studies, Ghana, 4Kwame Nkrumah University of Science and Technology, Ghana | Full Text |
International Journal on Information Theory (IJIT)
48 | 12 | 1/2/3 | On Run-Length-Constrained Binary Sequences | Zaharias M. Psillakis, University of Patras, Greece | Full Text |
International Journal on Natural Language Computing (IJNLC)
49 | 12 | 1 | Location-based Sentiment Analysis of 2019 Nigeria Presidential Election using a Voting Ensemble Approach | Ikechukwu Onyenwe1, Samuel N.C. Nwagbo1, Ebele Onyedinmav1, Onyedika Ikechukwu-Onyenwe1, Chidinma A. Nwafor2 and Obinna Agbata1, 1Nnamdi Azikiwe University, Nigeria, 2Nigerian Army College of Environmental Science and Technology, Nigeria | Full Text |
50 | 12 | 2 | Understanding Chinese Moral Stories with Further Pre-Training | Jing Qian1, Yong Yue1, Katie Atkinson2 and Gangmin Li3, 1Xi’an Jiaotong Liverpool University, China, 2University of Liverpool, UK, 13University of Bedfordshire, UK | Full Text |
51 | 12 | 2 | Evaluating BERT and ParsBERT for Analyzing Persian Advertisement Data | Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA | Full Text |
52 | 12 | 2 | Tuning Dari Speech Classification Employing Deep Neural Networks | Mursal Dawodi and Jawid Ahmad Baktash, Avignon University, France | Full Text |
53 | 12 | 2 | Lexis and Syntax of Medicine Product Warnings in the Philippines | Shielanie Soriano-Dacumos, University of Rizal System, Rizal Philippines | Full Text |
54 | 12 | 2 | Tuning Traditional Language Processing Approaches for Pashto Text Classification | Jawid Ahmad Baktash, Mursal Dawodi, Mohammad Zarif Joya, Nematullah Hassanzada, Avignon University, France | Full Text |
55 | 12 | 2 | Text Summarization in Mongolian Language | Chuluundorj Begz, University of the Humanities, Mongolia | Full Text |
56 | 12 | 2 | New Trends in Less-Resourced Language Processing: Case of Amazigh Language | Fadoua Ataa Allah and Siham Boulaknadel, Royal Institute of Amazigh Culture/Center of computer sciences studies, Morocco | Full Text |
57 | 12 | 2 | Simple Sentence in a·we | Amanda Aski Macdonald Momin, NEHU, India | Full Text |
58 | 12 | 2 | A Robust Joint-Training Graph Neural Networks Model for Event Detection with Symmetry and Asymmetry Noisy Labels | Mingxiang Li1, Huange Xing1, Tengyun Wang2, Jiaxuan Dai1, and Kaiming Xiao2, 1Naval University of Engineering, China, 2National University of Defense Technology, China | Full Text |
59 | 12 | 3 | Testing Different Log Bases for Vector Model Weighting Technique | Kamel Assaf, Programmer, Canada | Full Text |
60 | 12 | 3 | A Study on the Appropriate Size of the Mongolian General Corpus | Choi Sun Soo1 and Ganbat Tsend2, 1University of the Humanities, Mongolia, 2Otgontenger University, Mongolia | Full Text |
61 | 12 | 3 | RBIPA: An Algorithm for Iterative Stemming of Tamil Language Texts | V. Indumathi, S. SanthanaMegala, Rathnavel Subramaniam College of Arts and Science, India | Full Text |
62 | 12 | 4 | High Accuracy Location Information Extraction From Social Network Texts Using Natural Language Processing | Lossan Bonde1 and Severin Dembele2, 1Adventist University of Africa, Kenya, 2Universite Nazi Boni, Burkina Faso | Full Text |
63 | 12 | 4 | Language Distance and L3 Japanese Acquisition in Morphosyntactic Module | Wenchao Li, Zhejiang University, China | Full Text |
64 | 12 | 5 | Design and Development of Morphological Analyzer for Tigrigna Verbs using Hybrid Approach | Hagos Gebremedhin Gebremeskel1,2, Feng Chong1,* and Huang Heyan1, 1Beijing Institute of Technology, China, 2Mekelle University, Ethiopia | Full Text |
65 | 12 | 5 | Evaluation of Chatbot Technology: The Case of Greece | Theodoros Papadopoulos1, Zoi Lachana1, Thanos Anagnou1, Charalampos Alexopoulos1, Yannis Charalabidis1, Christos Bouras2, Nikos Karacapilidis2, Vasileios Kokkinos2, and Apostolos Gkamas2, 1University of the Aegean, Greece, 2University of Patras, Greece | Full Text |
66 | 12 | 6 | Chunker Based Sentiment Analysis and Tense Classification for Nepali Text | Archit Yajni and Sabu Lama Tamang, Sikkim Manipal Institute of Technology, Sikkim | Full Text |
International Journal of Managing Information Technology (IJMIT)
67 | 15 | 1/2 | Designing a Framework for Enhancing the Online Knowledge-Sharing Behavior of Academic Staff | Gebremedhin Gebreyohans1, David T. Croasdell2 and Million Meshesha1, 1Addis Ababa University, Ethiopia, 2University of Nevada, Reno | Full Text |
68 | 15 | 1/2 | Transforming Service Operations with AI: A Case for Business Value | Harsha Vijayakumar, S.P. Jain School of Global Management, United States | Full Text |
69 | 15 | 1/2 | Effectively Connect Acquired Technology to Innovation Over a Long Period | Akira Nagamatsu1, Yuji Tou2 and Chihiro Watanabe3, 1Tohoku University, Japan, 2Tohoku Gakuin University, Japan, 3Tokyo Institute of Technology, Japan | Full Text |
70 | 15 | 3 | Intrusion Detection System Using Customized Rules for Snort | Manju1, Shanmugasundaram Hariharan2, M. Mahasree1, Andraju Bhanu Prasad2 and H.Venkateswara Reddy2, 1SRM Institute of Science and Technology, India, 2Vardhaman College of Engineering Hyderabad, India | Full Text |
71 | 15 | 4 | Novel R&D Capabilities as a Response to ESG Risks-Lessons From Amazon’s Fusion of Diverse Knowledge | Yuji Tou1,2 and Chihiro Watanabe2,3, 1Tohoku Gakuin University, Japan, 2Tokyo Institute of technology, Japan, 3International Institute for Applied Systems Analysis (IIASA), Austria | Full Text |
International Journal of Managing Value and Supply Chains (IJMVSC)
72 | 14 | 1 | Value Chain Analysis of Tomato: A Case Study in Anis District - Dhamar Governorate, Yemen | Amira Qassem, Sana’a University, Republic of Yemen | Full Text |
73 | 14 | 1 | Blockchain Technology Adoption Effect Onknowledge Management State of the Art Survey | Alshawy Rawan1 and Alrwais Omer2, 1Prince Sultan University, Saudi Arabia, 2King Saud University, Saudi Arabia | Full Text |
74 | 14 | 2 | Overview of Smart Logistics and Blockchain Technologies | AbdulrahmanAlseqyani1, Abdullah Almutairi1 and Mohammed Albogami2, 1Zulfi Technical College, Saudi Arabia, 2Turbah Technical College, Saudi Arabia | Full Text |
75 | 14 | 2 | Tribal Entrepreneurship, in Forested Hinterland of Jharkhand. A Solution for Lwe Region | H.S Gupta, Institute Of Forest Productivity, India | Full Text |
76 | 14 | 3 | The Future of Dining Out: The Implications of Food Service Employment Trends on the Restaurant Industry | David C. Wyld and Juliana White, Southeastern Louisiana University, USA | Full Text |
International Journal of Managing Public Sector Information and Communication Technologies (IJMPICT)
77 | 14 | 1/2/3 | Empirical Investigation into ICT Services Evaluation Within a Public Institution | Pappas Michael, Doxopoulou Kyriaki, Mavidis Aristotelis, Folinas Dimitris, International Hellenic University, Greece | Full Text |
78 | 14 | 4 | Evaluating Citizens' Perceptions and Attitudes Towards E-Voting in Local Governance: An Empirical Study | Eleni Michalopoulou1, Dimitris Folinas1, Dimitris Mylonas1, Zafeiro Fragkaki2, 1International Hellenic University, Greece, 2Aristotle University of Thessaloniki, Greece | Full Text |
Health Informatics - An International Journal (HIIJ)
79 | 12 | 1 | Identification of Socioeconomic Variables Responsible for Hypertensive Kidney Disease among Bangladeshi Adults | K.C.Bhuyan, Jahangirnagar University, Bangladesh | Full Text |
80 | 12 | 2 | Detection of Crackles and Wheezes in Lung Sound using Transfer Learning | Hafsa Gulzar1, Jiyun Li1, Arslan Manzoor2, Sadaf Rehmat3, Usman Amjad4 and Hadiqa Jalil Khan4, 1Donghua University, China, 2University of Catania, Italy, 4PIEAS, Pakistan, 4Islamia University of Bahawalpur, Pakistan | Full Text |
81 | 12 | 3 | Brief Communications Data Hygiene: Important Step in Decision Making with Implications for Health IT Professionals | GV Fant, US Department of Veterans Affairs, USA | Full Text |
82 | 12 | 3 | Gender Disparity of Tuberculosis Burden in Low-and Middle-Income Countries: A Systematic Review | Nilar Phyoe1, Thein Hlaing2 and Win Pa Sandar3, 1University of Bedfordshire, Luton, UK, 2District Public Health Department (Ministry of Health), Myanmar, 3STI Myanmar University, Myanmar | Full Text |
83 | 12 | 3 | The Proposed Guidelines for Cloud Computing Migration for South African Rural Hospitals | Mathabatha Johannes Mmako and Alfred Thaga Kgopa, Tshwane University of Technology, South Africa | Full Text |
84 | 12 | 4 | Automatic and Non-Invasive Continuous Glucose Monitoring in Paediatric Patients | Roberto Franchini, National Research Council, Italy | Full Text |
International Journal on Cybernetics & Informatics (IJCI)
85 | 12 | 1 | Stock Market Prediction using Reinforcement Learning with Sentiment Analysis | Xuemei Li and Hua Ming, Oakland University, USA | Full Text |
86 | 12 | 1 | Size and Fit Recommendations for Cold Start Customers in Fashion E-Commerce | Jaidam Ram Tej, Jyotirmoy Banerjee and Narendra Varma Dasararaju, Flipkart Internet Private Limited, India | Full Text |
87 | 12 | 1 | Using Artificial Intelligence to Filter out Barking, Typing, and other Noise from Video Calls in Microsoft Teams | Pawankumar Sharma, Bibhu Dash, University of the Cumberlands, USA | Full Text |
88 | 12 | 1 | Automated Identification of Disaster News for Crisis Management using Machine Learning | Lord Christian Carl H. Regacho, Ai Matsushita Angie M. Ceniza-Canillo, University of San Carlos, Philippines | Full Text |
89 | 12 | 1 | A Review of the Intersection Techniques on Humint and Osint | Alcides Macedo, Laerte Peotta and Flavio Gomes, University of Brasilia, Brasilia | Full Text |
90 | 12 | 1 | Bullying Tweets Detection using CNN- Attention | Alghafiqe Alhloul and Abu Alam, Gloucestershire University, UK | Full Text |
91 | 12 | 1 | Modeling and Design of Longitudinal and Lateral Control System with a Feedforward Controller for A 4 Wheeled Robot | Younes El koudia, Jarou Tarik, Abdouni Jawad, Sofia El Idrissi and Elmahdi Nasri, National School of Applied Sciences, Morocco | Full Text |
92 | 12 | 1 | The Turing Deception | David Noever and Matt Ciolino, PeopleTec, Inc., USA | Full Text |
93 | 12 | 1 | Machine Learning Applications in Malware Classification: A Meta-Analysis Literature Review | Tjada Nelson, Austin O'Brien and Cherie Noteboom, Dakota State University, South Dakota | Full Text |
94 | 12 | 1 | Concept of Delivery System in the Smart City Environment | Zuzana Spitalova, Oliver Leontiev and Patrik Harmanos, Slovak University of Technology, Slovakia | Full Text |
95 | 12 | 1 | Computer Vision For a Camel-Vehicle Collision Mitigation System | Khalid AlNujaidi and Ghadah AlHabib, Prince Mohammad Bin Fahd University, Saudi Arabia | Full Text |
96 | 12 | 1 | Motion and Memory in VR: The Influence of VR Control Method on Memorization of Foreign Language Orthography | Sanchari Chatterjee 1, Angelina A. Tzacheva 2 and Zbigniew Ras 2, 1University of North Carolina, USA, 2West Cliff University Irvine, USA | Full Text |
97 | 12 | 1 | Challenges of Integrating Virtual Learning Practice in Zimbabwe Secondary Schools during Covid-19 | Dudziro Nhengu, Africa University, Zimbabwe | Full Text |
98 | 12 | 1 | The Perceptions of Teachers on Communication with Students in a Remote Setting | Wally T. Luckeydoo, Independent Researcher, Tennessee | Full Text |
99 | 12 | 1 | Online Education in the Perception of Hungarian Students - Results of Online Focus Groups | Nagy, Adam 1, Fekete, Mariann 2, Szabo, Andrea 3, Bocskei, Balazs 4, 1Obuda University, 2SZTE University, 3Institute of Political Sciences, 4Milton Friedman University, Hungary | Full Text |
100 | 12 | 1 | A Cyber-Physical Methodology to Automate Robotized Finishing Processes | Angel Dacal-Nieto 1, Ruben Paz-Cibeira 1, Carmen Fernandez-Gonzalez 1, Juan Jose Areal 2, Pablo Lopez-Beiras 2 and Victor Alonso-Ramos 2, 1CTAG, Spain, 2 PCAE, Spain | Full Text |
101 | 12 | 2 | Improving CNN-Based Stock Trading by Considering Data Heterogeneity and Burst | Keer Yang 1, Guanqun Zhang 2, Chuan Bi 3, Qiang Guan 4, Hailu Xu 5, Shuai Xu 1, 1Case Western Reserve University, USA, 2Nankai University, USA, 3National Institute of Health, USA, 4Kent State University, USA, 5California State University Long Beach, USA | Full Text |
102 | 12 | 2 | The Stock Market Volatility Research between China and ASEAN based on Complex Networks/a> | Wangke Yu 1, Shuhua Liu 2, Ruoqi Pan 1, Ke Huang 1, Linyun Deng 1, 1Nanning University, China, 2Guangxi Academy of Social Sciences, China | Full Text |
103 | 12 | 2 | Review of Class Imbalance Dataset Handling Techniques for Depression Prediction and Detection | Simisani Ndaba, University of Botswana, Botswana | Full Text |
104 | 12 | 2 | Math Function Recognition with Fine-Tuning Pre-Trained Models | Fatimah Alshamari 1, 2and Abdou Youssef 1, 1The George Washington University, USA, 2Taibah University, KSA | Full Text |
105 | 12 | 2 | Natural Language Processing | Arvind Chandrasekaran, Colorado Technical University, USA | Full Text |
106 | 12 | 2 | Barracuda, an Open Source Framework for Parallelizing Divide and Conquer Algorithm | Abdourahmane Senghor, Cheikh Anta Diop University, Senegal | Full Text |
107 | 12 | 2 | Chatbots in a Botnet World | Forrest McKee and David Noever, PeopleTec, USA | Full Text |
108 | 12 | 2 | Using Blockchain to Achieve Decentralized Privacy in IoT Healthcare | Sajad Meisami 1, Mohammad Beheshti-Atashgah 2 and Mohammad Reza Aref 2, 1Illinois Institute of Technology, USA, 2Sharif University of Technology, Iran | Full Text |
109 | 12 | 2 | Security Attacks and Countermeasures in Smart Homes | Hasibul Alam and Emmett Tomai, The University of Texas Rio Grande Valley, USA | Full Text |
110 | 12 | 2 | A Blockchain-Based Consensus Slicing Mechanism for Distributed SDN Control Plane | Shanqing Jiang 1, 2 Lin Yang 2, 1Southeast University, Nanjing, China, 2Institude of System Engineering AMS PLA, China | Full Text |
111 | 12 | 2 | No Child is Left Behind? --Left-Behind Children and Drop-Out Rates in China | Yaoyu Zhang, Xiamen University, China | Full Text |
112 | 12 | 2 | How Online Learning, during Covid-19, has Affected Compassion in Teaching and Subsequently Impacted Student Satisfaction | Lucy Mackintosh, University of Hertfordshire, UK | Full Text |
113 | 12 | 2 | Exploring the Impact ofAI-powered Collaborative and Interactive NLP Apps on EFL Teaching in the Post-COVID-19 Era | Coffi Martinien ZOUNHIN TOBOULA, University of Abomey Calavi (UAC), Benin | Full Text |
114 | 12 | 2 | Use of Barnes-Hut Algorithm to Attack COVID-19 Virus | Radhouane Boughammoura, University of Monastir, Tunisia | Full Text |
115 | 12 | 2 | Exploring the Influence of Classroom Interaction on Academic Communication Skills in Secondary Schools: A Case | Study of Selected Senior High Schools in the Tahoua Region Dekande Sylvestre Tchangnonhou 1, Coffi Martinien Zounhin Toboula 2 and Claude Hounyetin 2, 1Djibo Hamani University of Tahoua, Niger, 2University of Abomey-Calavi (UAC), Benin | Full Text |
116 | 12 | 2 | The Role of English in Sino-Thai Cooperation: A Case Study of the People-to-People Exchange Jingshi Project at a University in Thailand | Shasha Luo and Tawatchai Chaisiri, Rajamangala University of Technology Thanyaburi, Thailand | Full Text |
117 | 12 | 2 | X-RECOSA: Multi-Scale Context Aggregation for Multi-Turn Dialogue Generation | Danqin Wu, Beijing University of Posts & Telecommunications, China | Full Text |
118 | 12 | 2 | Features Matching using Natural Language Processing | Muhammad Danial Khilji, Department of Data Science, choreograph, United Kingdom | Full Text |
119 | 12 | 2 | Abbreviation Dictionary for Twitter Hate Speech | Zainab Mansur 1, Nazlia Omar 2 and Sabrina Tiun 2, 1Omar Al-Mukhtar University, Libya, 2Universiti Kebangsaan Malaysia, Malaysia | Full Text |
120 | 12 | 2 | Tuning Dari Speech Classification Employing Deep Neural Networks | Mursal Dawodi, Jawid Ahmad Baktash, University Avignon, France | Full Text |
121 | 12 | 2 | Explaining the Performance of Collaborative Filtering Methods with Optimal Data Characteristics | Samin Poudel and Marwan Bikdash, North Carolina A & T University, USA | Full Text |
122 | 12 | 2 | Tuning Language Processing Approaches for Pashto Texts Classification | Jawid Ahmad Baktash, Mursal Dawodi, University Avignon, France | Full Text |
123 | 12 | 2 | Sentiment Analysis Classification for Text in Social Media: Application to Tunisian Dialect | Asma BelHadj Braiek, Zouhour Neji Ben Salem, Carthage University, Tunisia | Full Text |
124 | 12 | 2 | The Relativity of Energy and the Reversal of Time is a Shift in Perspective | Vinyasi, Independent Research at Home - Southern, California, USA | Full Text |
125 | 12 | 3 | Text Generation with GAN Networks using Feedback Score | Dmitrii Kuznetsov, South China University of Technology, China | Full Text |
126 | 12 | 3 | Teaching and Learning with ICT Tools: Issues and Challenges | Kamaljit Kaur, Khalsa College, India | Full Text |
127 | 12 | 3 | A Model-Based Approach Machine Learning to Scalable Portfolio Selection | Ana Paula S. Gularte 1, 2and Vitor V. Curtis1 2, 1Aeronautics Institute of Technology(ITA), Brazil, 2Federal University of Sao Paulo (UNIFESP), Brazil | Full Text |
128 | 12 | 3 | ALICE - Applying BERT to Italian Emails | Pasquale Restaino and Liliana Saracino, Sogei S.p.A., Italy | Full Text |
129 | 12 | 3 | Clustering an African Hairstyle Dataset Using PCA and K-Means | Teffo Phomolo Nicrocia, Owolawi Pius Adewale, Pholo Moanda Diana, Tshwane University of Technology, Pretoria (Soshanguve) | Full Text |
130 | 12 | 3 | Is There a Trojan! : Literature Survey and Critical Evaluation of the Latest ML Based Modern Intrusion Detection Systems in IoT Environments | Vishal Karanam, University of Southern California, USA | Full Text |
131 | 12 | 3 | Nuance: Near Ultrasound Attack on Networked Communication Environments | Forrest McKee and David Noever, PeopleTec, USA | Full Text |
132 | 12 | 3 | Research and Practice of a Blended Teaching Mode based on Small Private Online Courses Under an Informatization Background | Yan Li, Zhuoqun Lu and Heyun Liu, Hunan University of Humanities, China | Full Text |
133 | 12 | 3 | Subtypes of Developmental Dyslexia | Julia Koifman, Israel | Full Text |
134 | 12 | 3 | An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Performance | Dana Alsagheer and Hadi Mansourifar, University of Houston, USA | Full Text |
135 | 12 | 4 | Integrating AI and ML Education in Small Liberal Arts Institutions: Curriculum and Pedagogical Considerations | Nathan Johnson and Sayani Sarkar, Bellarmine University, USA | Full Text |
136 | 12 | 4 | Improving User Experience with Online Learning Using Analytical Comparasions between Instructors & Students of Qatar University | Hamad Khamees R B Albuainain and Pilsung Choe, Qatar University College of Engineering, Qatar | Full Text |
137 | 12 | 4 | Mirror, Mirror, in My Mind: An Ethological Approach to Shaping Student Behavior | Kimberly K. Davis, LLC, Texas | Full Text |
138 | 12 | 4 | Note Taking in VR: The Forearm Keyboard | B. Davis, T. Hughes-Roberts, and C. Windmill, University of Derby, United Kingdom | Full Text |
139 | 12 | 4 | Investigating the Future of ‘Engineer of 2020’ Attributes: Moving from Access to Engagement & Sense of Belonging | Terrell L. Strayhorn, Virginia Union University, USA | Full Text |
140 | 12 | 4 | A New Method to Explore the Integer Partition Problem | Brayden Chen, Ridgewood, USA | Full Text |
141 | 12 | 4 | A Framework for Smart Homes for Elderly People Using Labview® | Ilapakurthy Sriram Vamsi, University of California Irvine, USA | Full Text |
142 | 12 | 4 | DDoS Detection in Software-Defined Network (SDN) Using Machine Learning | Haya Alubaidan, Reem Alzaher, Maryam AlQhatani, Rami Mohammed, Imam Abdulrahman Bin Faisal University, Saudi Arabia | Full Text |
143 | 12 | 5 | Temperature Sensor with Buffer-Chain based Time-to-Digital Converter for Ultra-Low Voltage Operation | Kaito NAGAI and Kimiyoshi USAMI, Shibaura Institute of Technology, Japan | Full Text |
144 | 12 | 5 | Comparative Analysis of Simulation Techniques: Scan Compression and Internal Scan | Parul Patel1, Arvind Rajawat1 and Pooja Jain2, 1Maulana Azad National Institute of Technology Bhopal, India, 2Automotive and Discrete group STMicroelectronics Private Limited Greater Noida, India | Full Text |
145 | 12 | 5 | The Techniques in Enhancing Bandwidth Load Balancing QoS at Local Area Network: A Review Paper | M.Al-Batahari, Azlinda Abdul Aziz and Nur Syufiza Ahmad Shukor, University Selangor, Malaysia | Full Text |
146 | 12 | 5 | A Review of Cybersecurity as an Effective Tool for Fighting Identity Theft across United States | Oloyede Adekunle1, Ajibade Idris1, Obunadike Callistus1, Phillips Adeniyi1, Shittu Olayemi1, Taiwo Esther1, Kizor-Akaraiwe Somto2, 1Austin Peay State University, USA, 2University of Washington, USA | Full Text |
147 | 12 | 5 | Enabling Protection Against Data Exfiltration by Implementing ISO 27001:2022 Update | Michael Mundt1 and Harald Baier2, 1Esri Deutschland GmbH, Germany, 2Bundeswehr University, Germany | Full Text |
148 | 12 | 5 | An Expert System as an Awareness Tool to Prevent Social Engineering Attacks in Public Organizations | Waldson Rodrigues Cardoso, Joao Marco Silva and Admilson Ribamar Lima Ribeiro, Federal University of Sergipe, Brazil | Full Text |
149 | 12 | 5 | Sliding Window Sum Algorithms for Deep Neural Networks | Roman Snytsar, Microsoft, United States of America | Full Text |
150 | 12 | 5 | Regulating Generative AI: A Pathway to Ethical and Responsible Implementation | Jonathan Luckett, Marymount University, United States of America | Full Text |
151 | 12 | 5 | Evaluating the Impact of Color Normalization on Kidney Image Segmentation | Sai Javvadi, University of Louisville, Louisville Kentucky, USA | Full Text |
152 | 12 | 5 | Applying User Experience and Usercentered Design Software Processes in Undergraduate Mobile Application Development Teaching | Manuel Ignacio Castillo Lopez, Ana Libia Eslava Cervantes and Gustavo de la Cruz Martinez, Universidad Nacional Autonoma de Mexico, Mexico | Full Text |
153 | 12 | 5 | Laboratory Access Implementing QR Code Authentication Using OTP | Sghaier Chaabani, Abdulrahman Almuhaidib, Hussain Alsalem, Faisal Alotaibi, Mohsen Bamardouf, Ibrahim Abukhamseen, Hussain AlGallaf, Yosef Aljwaid, Abdulrahman Alharby, Hussain Alattas, Imam Abdulrahman Bin Faisal University, Kingdom of Saudi Arabia | Full Text |
154 | 12 | 5 | Analyzing Political Sentiment of Indic Languages with Transformers | Pranav Gunhal, Artificial Intelligence Coalition, USA | Full Text |
155 | 12 | 5 | Business Process Modeled with BPMN and CTL Model Checking | F. Ouazar, M.C. Boukala and M.Ioualalen, USTHB, Algeria | Full Text |
156 | 12 | 6 | Underwater Detection of Ancient Pottery Sherds Using Deep Learning | Konstantinos Paraskevas, Ioannis Mariolis, Georgios Giouvanis, GeorgiaPeleka, Georgios Zampokas and Dimitrios Tzovaras, Information Technologies Institute, Greece | Full Text |
157 | 12 | 6 | Use of Hough Transform and Homography for the Creation of Image Corpora for Smart Agriculture | Jose A. Brenes1, Javier Ferrandez-Pastor2, Jose M. Camara-Zapata3, and Gabriela Marin-Ravenos1, 1University of Costa Rica, Costa Rica, 2University of Alicante, Spain,3University Miguel Hernandez, Spain | Full Text |
158 | 12 | 6 | Disk Failure Prediction based on Multi-layer Domain Adaptive Learning | Guangfu Gao1, Peng Wu1 and Hussain Dawood2, 1University of Jinan, China, 2National Skills University, Islamabad | Full Text |
159 | 12 | 6 | Potential Impact of Generative Artificial Intelligence(AI) on the Financial Industry | Suman Kalia, Saint Peter's University, USA | Full Text |
160 | 12 | 6 | Data-level Hybrid Strategy Selection for Disk Fault Prediction Model based on Multivariate Gan | Shuangshuang Yuan, Peng Wu and Yuehui Chen, University of Jinan, China | Full Text |
161 | 12 | 6 | An Improved CTGAN for Data Processing Method of Imbalanced Disk Failure | Jingbo Jia1, Peng Wu1 and Hussain Dawood2, 1University of Jinan, China, 2National Skills University Islamabad, China | Full Text |
162 | 12 | 6 | A Survey of Methods for Handling Disk Data Imbalance | Shuangshuang Yuan1, Peng Wu1, Yuehui Chen1 and Qiang Li2, 1University of Jinan, China, 2State Key Laboratory of High-end Server & Storage Technolog, China | Full Text |
163 | 12 | 6 | Estimating Cloud Computing Round-Trip Time (RTT) Using Fuzzy Logic for Inter-Region Distances | Ihab Sekhi, Miskolc University, Hungary | Full Text |
164 | 12 | 6 | Predicting Accident Severity: An Analysis of Factors Affecting Accident Severity Using Random Forest Model | Adekunle Adefabi, Somtobe Olisah, Callistus Obunadike, Oluwatosin Oyetubo, Esther Taiwo and Edward Tella, Austin Peay State University, USA | Full Text |
165 | 12 | 6 | A Review of the Ethics of Artificial Intelligence and Its Applications in the United States | Taiwo Esther, Akinsola Ahmed, Tella Edward, Makinde Kolade and Akinwande Mayowa, Austin Peay State University, USA | Full Text |
166 | 12 | 6 | Drones in Surveillance Missions: Case Study of the Gendarmerie Forces of the Iberian Countries | Veronica Mendes Pinto1,2, Tiago Goncalves Silva1,2,3 and Jose Silvestre Silva1,3,4, 1Portuguese Military Academy, Portugal, 2Guarda Nacional Republicana (GNR), Portugal, 3Military Academy Research Center (CINAMIL), Portugal, 4Universidade de Coimbra, Portugal | Full Text |
167 | 12 | 6 | The Integration of Artificial Intelligence Into Database Systems(AI-DB Integration Review) | Unuriode O. Austine, Durojaiye M. Olalekan, Yusuf Y. Babatunde and Okunade O. Lateef, Austin Peay State University, USA | Full Text |
168 | 12 | 6 | A Proposal for an Open-Source Bitcoin Forensics Tool | Pedro Henrique Resende Ribeiro, Pedro Leale and Ivan da Silva Sendin, Federal University of Uberlandia, Brazil | Full Text |
169 | 12 | 7 | Business Talk: Harnessing Generative AI with Data Analytics Maturity | Simone Malacaria1, Michele Grimaldi2, Marco Greco2 and Andrea De Mauro1, 1University of "Tor Vergata", Italy, 2University of Cassino and Southern Lazio, Italy | Full Text |
170 | 12 | 7 | AI-Empowered Learning Models in Economy 5.0: Fostering Meaning Creation Beyond Literacy | Tabea Hirzel, Independent Researcher & Educator, Spain | Full Text |
171 | 12 | 7 | Tomato Disease Fusion and Classification using Deep Learning | Patrick Ansah1, Sumit Kumar Tetarave1, Ezhil Kalaimannan2 and Caroline John2, 1Kalinga Institute of Industrial Technology, India, 2University of West Florida, USA | Full Text |
172 | 12 | 7 | Fast Automatized Parameter Adaption Process of CNC Milling Machines under use of Perception based Artificial Intelligence | Sebastian Feldmann, Michael Schmiedt, Johann Jung, Julian Marc Schlosser, Tobias Stempfle, Christian Rathmann and Wolfgang Rimkus, Aalen University, Germany | Full Text |
173 | 12 | 7 | User-Centric Privacy Control in Identity Management and Access Control within Cloud-Based Systems | Kelvin Ovabor and Travis Atkison, University of Alabama, USA | Full Text |
174 | 12 | 7 | Empowering Cyber Threat Intelligence with AI | Raghad Ghawa, Jawaher Alamri, and Rawan Eid Alanazi, College of Computer and Information Sciences, Saudi Arabia | Full Text |
175 | 12 | 7 | Application of Fuzzy Topsis for Prioritizing Barriers to Circular Economy Adoption in the Automotive Sector: A Study in an Emerging Country | Tiago F. A. C. Sigahi, Federal University of Alfenas, Brazil | Full Text |
International Journal on Integrating Technology in Education (IJITE)
International Journal of Computer Networks & Communications (IJCNC)
189 | 15 | 1 | An Intrusion Detection Mechanism for MANETS based on Deep Learning Artificial Neural Networks (ANNS) | Mohamad T Sultan1,2, Hesham El Sayed1,2 and Manzoor Ahmed Khan3, 1,3College of Information Technology United Arab Emirates University, UAE, 2United Arab Emirates University, United Arab Emirates | Full Text |
190 | 15 | 1 | Phishing URL Detection using LSTM Based Ensemble Learning Approaches | Bireswar Banik and Abhijit Sarma, Gauhati University, India | Full Text |
191 | 15 | 1 | A Lightweight Method for Detecting Cyber Attacks in High-traffic Large Networks based on Clustering Techniques | Nguyen Hong Son1 and Ha Thanh Dung2, 1Posts and Telecommunications Institute of Technology, Vietnam, 2Saigon University, Vietnam |
Full Text |
192 | 15 | 1 | Actor Critic Approach based Anomaly Detection for Edge Computing Environments | Shruthi N1 and Siddesh G K2, 1BNMIT, India, 2New Horizon College of Engineering, India | Full Text |
193 | 15 | 1 | An Efficient Method to Compute the Rate Matrix for Multi-Server Retrial Queues with Cloud Computing Systems | Dang Thanh Chuong, Hoa Ly Cuong, Hoang Dinh Long and Duong Duc Hung, Hue University, Vietnam | Full Text |
194 | 15 | 1 | Adaptive Bandwidth Management Model for Wireless Mobile Ad-hoc Network | Nibedita Jagadev1, Binod Kumar Pattanayak1, Ahmadkhader habboush2, Bassam Mohammad Elzaghmouri2, Mahmoud Ali Al Shugran2, 1Siksha’O’ Anusandhan Deemed to be University, India, 2Jerash University, Jordan |
Full Text |
195 | 15 | 1 | Dynamic Interference Suppression for TV White Space: the Case of Thailand | Prathana Thaopanya1 and Teerapat Sanguankotchakorn2, 1Thai Public Broadcasting Service (ThaiPBS), Thailand, 2Asian Institute of Technology, Thailand |
Full Text |
196 | 15 | 1 | Spectrum Sharing between Cellular and Wi-Fi Networks based on Deep Reinforcement Learning | Bayarmaa Ragchaa and Kazuhiko Kinoshita, Tokushima University, Japan | Full Text |
197 | 15 | 2 | Performance Evaluation of ERGR-EMHC Routing Protocol using LSWTS and 3DUL Localization Schemes in UWSNs | Faiza Al-Salti1, N. Alzeidi2, Khaled Day2, Abderezak Touzene2, 1Sultan Qaboos Comprehensive Cancer Care and Research Centre, Oman, 2Sultan Qaboos University, Oman | Full Text |
198 | 15 | 2 | Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks | Chandra Kanta Samal, Delhi University, India | Full Text |
199 | 15 | 2 | VHFRP: Virtual Hexagonal Frame Routing Protocol for Wireless Sensor Network | Savita Jadhav1 and Sangeeta Jadhav2, 1Dr. D. Y. Patil Institute of Technology Pimpri, India,2Army Institute of Technology, Dhighi, India | Full Text |
200 | 15 | 2 | An Efficient Mobile Gateway Selection and Discovery Based-Routing Protocol in Heterogeneous LTE-VANET | Driss Abada1, Rachid Adrdor2, Omar Boutkhoum3, and Adil Bouhouch4, 1,3Chouaïb Doukkali University, Morocco, 2Ibn Zohr University, Morocco, 4Mohamed V University, Morocco |
Full Text |
201 | 15 | 2 | Security Culture, Top Management, and Training on Security Effectiveness: A Correlational Study Without CISSP | Joshua Porche1 and Shawon Rahman2, 1Information Security System Engineer, USA, 2University of Hawaii-Hilo Hilo, USA |
Full Text |
202 | 15 | 2 | Detection of Peer-to-Peer Botnets using Graph Mining | Dhruba Jyoti Borah and Abhijit Sarma, Gauhati University, India | Full Text |
203 | 15 | 2 | Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET | Nitesh Ghodichor1, Raj Thaneeghavl. V1, Dinesh Sahu1, Gautam Borkar2, Ankush Sawarkar3, 1SRK University, India, 2DY Patil University, India, 3VNIT, India |
Full Text |
204 | 15 | 2 | Performance Evaluation of the KVM Hypervisor Running on ARM-Based Single-Board Computers | Eric Gamess, Mausam Parajuli, and Syed Shah, Jacksonville State University, USA | Full Text |
205 | 15 | 3 | Improved Q-Reinforcement Learning based Optimal Channel Selection in Cognitive Radio Network | Sopan Talekar1, Satish Banait2 and Mithun Patil3, 1MVPS’s KBT College of Engineering, India, 2K.K. Wagh Institute of Engineering Education & Research, India, 3N.K. Orchid College of Engineering & Technology, India | Full Text |
206 | 15 | 3 | Evaluating Latency in Fifth-Generation Vehicle-to-Everything Communications using Adaptive Neuro-Fuzzy Inference System Model |
Sopan Talekar1, Satish Banait2 and Mithun Patil3, 1Hamdy A.M. Sayedahmed1,3, Emadeldin M. Elgamal1,2, Hesham A. Hefny1, 1Cairo University, Egypt, 2Tarleton State University, USA, 3Central Metallurgical Research and Development Institute, Egypt | Full Text |
207 | 15 | 3 | IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network | Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India | Full Text |
208 | 15 | 3 | IoT-Based Mobile Adaptive Routing Algorithm in a Ubiquitous Network | Prasanna Kumar G and Shankaraiah N, Jayachamarajendra College of Engineering, India | Full Text |
209 | 15 | 3 | Enabling Ray Tracing for 5G | Vladislav Ryzhov, Moscow Institute of Physics and Technology, Russia | Full Text |
210 | 15 | 3 | Congestion and Energy Aware Multipath Load Balancing Routing for LLNs | Kala Venugopal and T G Basavaraju, Government Engineering College, India | Full Text |
211 | 15 | 3 | PUMMP: Phishing URL Detection using Machine Learning with Monomorphic and Polymorphic Treatment of Features | S. Chanti, T. Chithralekha, and K. S. Kuppusamy, Pondicherry University, India | Full Text |
212 | 15 | 3 | DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Practical Environment | Dinh Thi Thai Mai, Nguyen Tien Dat, Pham Minh Bao, Can Quang Truong, Nguyen Thanh Tung, VNU University of Engineering and Technology, Hanoi, Vietnam |
Full Text |
213 | 15 | 3 | Blockchain-Based Secure and Scalable Routing Mechanisms for VANETs Applications | Hariharasudhan V and P.Vetrivelan, VIT, India | Full Text |
214 | 15 | 4 | Enhancing HTTP Web Protocol Performance with Updated Transport Layer Techniques | Ziaul Hossain1 and Gorry Fairhurst2, 1University of Fraser Valley, Canada, 2University of Aberdeen, UK | Full Text |
215 | 15 | 4 | Real-World Multimedia Streaming for Software Defined Vehicular Ad Hoc Networks | Varun P. Sarvade1 and Shrirang Ambaji Kulkarni2, 1B. G. M. Institute of Technology, Mudhol, India, 2The National Institute of Engineering, India |
Full Text |
216 | 15 | 4 | IoT Resource Allocation and Optimization Using Improved Reptile Search Algorithm | Prabhakar Narasappa Kota1, Pravin Balaso Chopade1, Bhagvat D. Jadhav2, Pravin Marotrao Ghate2 and Shankar Dattatray Chavan3, 1MES’s College of Engineering, India, 2JSPM's Rajarshi Shahu College of Engineering, India, 3Dr. D. Y. Patil Institute of Technology, India |
Full Text |
217 | 15 | 4 | Efficient ECC-Based Authentication Scheme for Fog-Based IoT Environment | Mohamed Ali Shaaban1, Almohammady S. Alsharkawy2, Mohammad T. Abou-Kreisha2 and Mohammed Abdel Razek2, 1Sinai University, Egypt, 2Al-Azhar University, Egypt |
Full Text |
218 | 15 | 4 | Investigation of Ant Colony Optimization Algorithm for Efficient Energy Utilization in Wireless Sensor Network | Shanmugavalli R and Subashini P, Avinashilingam Institute for Home Science and Higher Education for Women, India | Full Text |
219 | 15 | 4 | Intrusion Detection System(IDS) Development Using Tree-Based Machine Learning Algorithms | Witcha Chimphlee and Siriporn Chimphlee, Suan Dusit University, Thailand | Full Text |
220 | 15 | 4 | Machine Learning Based Ensemble Classifier for Android Malware Detection | P Sumalatha1 and G.S. Mahalakshmi2, 1Bhoj Reddy Engineering College for Women, India, 2Anna University, India | Full Text |
221 | 15 | 4 | Ransomware Attack Detection based on Pertinent System Calls Using Machine Learning Techniques | Ahmed Dib, Sabri Ghazi and Mendjel Mohamed Said Mehdi, Mokhtar Annaba University, Algeria | Full Text |
222 | 15 | 5 | BLE Beacon with Data Accumulation Functionality | KOBAYASHI Kakeru and FUJITA Satoshi, Hiroshima University, Japan | Full Text |
223 | 15 | 5 | Optimize the Network Coding Paths to Enhance the Coding Protection in Wireless Multimedia Sensor Network | Mohammadjavad Abbasi, A. S. Abdullah and N. Fisal, Universiti Teknologi Malaysia (UTM), Malaysia | Full Text |
224 | 15 | 5 | Energy-Efficient Improved Optimal K-Means: Dynamic Cluster Head Selection based on Delaying the First Node Death in MWSN-IoT | Awatef Chniguir and Zouhair Ben Jemaa, University of Tunis El Manar, Tunisia | Full Text |
225 | 15 | 5 | Optimal Coverage Path Planning in a Wireless Sensor Network for Intelligent Transportation System | Saureng Kumar and S C Sharma, IIT Roorkee, India | Full Text |
226 | 15 | 5 | Multi Objective Salp Swarm based Energy Efficient Routing Protocol for Heterogeneous Wireless Networks | Salima Nebti1 and Mohammed Redjimi2, 1Emir Abdelkader University, Algeria, 220 Août 1955 University, Algeria | Full Text |
227 | 15 | 5 | Analysis of System Capacity and Spectral Efficiency of Fixed-Grid Network | Adarsha M1, S. Malathi1 and Santosh Kumar2, 1M. S. Ramaiah University of Applied Sciences, India, 2Liaocheng University, China | Full Text |
228 | 15 | 5 | A Privacy-Aware Tracking and Tracing System | Ali M. Allam, Helwan University, Egypt | Full Text |
229 | 15 | 5 | A Survey on CDN Vulnerability to DoS Attacks | Maurizio D’Arienzo and Serena Gracco, Universit`a della Campania ”L.Vanvitelli”, Italy | Full Text |
230 | 15 | 6 | Trust Metric-Based Anomaly Detection via Deep Deterministic Policy Gradient Reinforcement Learning Framework | Shruthi N1 and Siddesh G K2, 1Visvesvaraya Technological University, India, 2ALVA’s Institute of Engineering & Technology, India | Full Text |
231 | 15 | 6 | Machine to Machine Authenticated Key Agreement with Forward Secrecy for Internet of Things | Batamu Anderson Chiphiko1 and Hyunsung Kim1,2, 1University of Malawi, Malawi, 2Kyungil University, Korea | Full Text |
232 | 15 | 6 | Unveiling the Landscape of Smart Contract Vulnerabilities: A Detailed Examination and Codification of Vulnerabilities in Prominent Blockchains | Oualid Zaazaa and Hanan El Bakkali, Mohammed V University in Rabat, Morocco | Full Text |
233 | 15 | 6 | Unveiling Advanced Persistence Techniques Through Application Shimming and Countermeasures | Akashdeep Bhardwaj1, Naresh Kumar2 and Shawon S. M. Rahman3, 1University of Petroleum and Energy Studies, India, 2University of Nizwa, Oman, 3University of Hawai‘i at Hilo, USA | Full Text |
234 | 15 | 6 | Channel Estimation in MIMO OFDM Systems with Tapped Delay Line Model | Ravi Hosamani and Yerriswamy T, K.L.E . Institute of Technology, India | Full Text |
235 | 15 | 6 | Maximum Throughput First Access Point Selection Scheme for Multi-Rate Software-Defined Wireless Network | Hassen A. Mogaibel and Majed Hashim, Al-Ahgaff University, Yemen | Full Text |
236 | 15 | 6 | Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicular Named Data Networks | Nithin Rao R and Rinki Sharma, Ramaiah University of Applied Sciences, India | Full Text |
237 | 15 | 6 | Random Relay Selection based Heuristic Optimization Model for the Scheduling and Effective Resource Allocation in the Cognitive Radio Network | Aravindkumaran.S and Dr.Saraswady.D, Puducherry Technological University, India | Full Text |
International Journal of Wireless & Mobile Networks (IJWMN)
238 | 15 | 1 | CFMS: A Cluster-based Convergecast Framework for Dense Multi-Sink Wireless Sensor Networks | Gokou Hervé Fabrice Diédié1, Koigny Fabrice Kouassi2 and Tchimou N’Takpé2, 1Université Peleforo Gon Coulibaly, Ivory Coast, 2Université Nangui Abrogoua, Ivory Coast | Full Text |
239 | 15 | 2/3 | Dual Band F-Antenna for Europe and North America | Prasad Samudrala, Justin Jose and Amit Kulkarni, Honeywell Building Technologies, India | Full Text |
240 | 15 | 2/3 | Design of Fractal-Based Tri-Band Microstrip Bandpass Filter for ISM,WLAN and Wimax Applications | Nagham Radhi and Mohammed Fadhil, University of Technology, Iraq | Full Text |
241 | 15 | 4 | The Effect of Accepted Handoff Signal Quality on the Queued Combined Guard Channel and Mobile Assisted Handoff Call Admission in 5G Networks | Nagla O. Mohamed, Yanbu Industrial College, KSA | Full Text |
242 | 15 | 5 | New Structure of Channel Coding: Serial Concatenation of Polar Codes | Mohammed Mensouri and Mustapha Eddahibi, Ibn Zohr University, Morocco | Full Text |
243 | 15 | 5 | Wireless Networks using Visible Light Communication: A Review | CorneliusA. D. Pahalson, Habila Nuhu and Biyas Alfred Zungkat, Plateau State Polytechnic Barkin Ladi, Nigeria | Full Text |
244 | 15 | 5 | Toward a Generic Vehicular Cloud Network Architecture: A Case of Virtual Vehicle as a Service | Fekri M. Abduljalil, University of Sana’a, Yemen | Full Text |
245 | 15 | 6 | A Hybrid GAPSO Optimization Approach | Lutfi Mohammed Omer Khanbary, Aden University, Yemen | Full Text |
246 | 15 | 6 | Malware Detection in IoT Systems using Machine Learning Techniques | Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA | Full Text |
247 | 15 | 6 | Effects Investigation of MAC and PHY Layer Parameters on the Performance of IEEE 802.15.6 CSMA/CA | Md. Abubakar Siddik, Most. Anju Ara Hasi, Md. Rajiul Islam and Jakia Akter Nitu, Hajee Mohammad Danesh Science and Technology University, Bangladesh | Full Text |
International Journal of Distributed and Parallel systems (IJDPS)
248 | 14 | 1/2/3/4/5/6 | Load Balancing Large Data Sets in a Hadoop Cluster | Andriavelonera Anselme A., Rivosoaniaina Alain N., Rakotomalala Francis, Mahatody Thomas and Manantsoa Victor, University of Fianarantsoa, Madagascar |
Full Text |
249 | 14 | 1/2/3/4/5/6 | Load Balancing in the Combined Technology of Li-fi and Wi-Fi based on Collaborative Game | Payam Porkar Rezayie1, Hamid Shokrzadeh2, Mehdi Dehghan Takht Foladi3, Amirmasoud Rahmani4, Sepideh Moosavi Nasab5, 1,4Islamic Azad University, Tehran, Iran, 2,5Pardis Branch, Islamic Azad University, Iran, 3Amirkabir University of Technology, Iran |
Full Text |
249 | 14 | 1/2/3/4/5/6 | Write Buffer Partitioning with Rename Register Capping in Multithreaded Cores | Allan Diaz and Wei-Ming Lin, The University of Texas at San Antonio, USA | Full Text |
International Journal on AdHoc Networking Systems (IJANS)
250 | 13 | 1 | A Patch Antenna design with Boosted Bandwidth for ISM band Applications | Md. Shaharul Islam, Md. Firoz Ahmed, Md. Hasnat Kabir, Md. Ashraful Islam and Md. Matiqul Islam, University of Rajshahi, Bangladesh |
Full Text |
251 | 13 | 2 | Microcontroller based AVR Hazardous Gas Detection System using IoT | Ram Prasad, VTU University, India | Full Text |
252 | 13 | 3 | A Comparative Study for Block Chain Applications in the MANET | Sangheethaa S, University of Fujairah, UAE | Full Text |
253 | 13 | 4 | Comparative Performance Analysis of the IEEE802.11ax and 802.11ac MIMOLink for WLANs | Md. Delowar Hossain, Sumon Kumar Debnath, Iffat Ara Badhan, Md. Monirul Islam, Ad. Ahsan Habib, Md. Sharif Uddin, Md. Abul Munjer, Prodip Kumar Sarker, Ileas Pramanik, and Mutia Afroze Alin, Begum Rokeya University, Bangladesh |
Full Text |
254 | 13 | 4 | PAPR, Spectral Efficiency, BER and SNR Analysis of OFDM: A Novel Partial Transmit Sequence-Particle Swarm | Karthik Kumar Vaigandla, Ranjith Kumar Siddoju, Madhu Kumar Vanteru, Malothu Devsingh, Dudimetla Prasad, Balaji Institute of Technology & Science, India |
Full Text |
The International Journal of Ambient Systems and Applications (IJASA)
255 | 11 | 1/2/3/4 | A 5GHz Flexible Compact Microstrip Patch Antenna for WBAN Applications: Design, Simulation and Performance Analysis | Md. Samiul Islam, Md. Akramul Alim and Abu Zafor Md. Touhidul Islam, University of Rajshahi, Bangladesh | Full Text |
International Journal of Software Engineering & Applications (IJSEA)
256 | 14 | 1 | Education, Migration and Sustainability-Human Socioeconomic Development and Changing Technological Trends | Pawankumar Sharma, University of the Cumberlands, KY USA | Full Text |
257 | 14 | 1 | A New Complexity Metric for UML Sequence Diagrams | Nevy Kimani Maina, Geoffrey Muchiri Muketha and Geoffrey Mariga Wambugu, Murang'a University of Technology, Kenya | Full Text |
258 | 14 | 1 | Adventure and Quiz Learning Game Based on a Virtual Tour of a Video Game Museum | Mark Muhhin, Daniel Nael, Raimond-Hendrik Tunnel, Ulrich Norbisrath, University of Tartu, Tartu, Estonia | Full Text |
259 | 14 | 2 | Digital Community Currency Usability From the User’s Eyes: Cases of Sarafu and Maendeleo Trading Credit (MTCR.) | Alago Sabina, Solomon Ogara, Michael Oloko and Richard Kiaka, Jaramogi Oginga Odinga University of Science and Technology, Kenya | Full Text |
260 | 14 | 3 | Agile Software Architecture in Global Software Development Environment: Systematic Literature Mapping | Thiago Gomes, and Marcelo Marinho, Federal Rural University of Pernambuco, Brazil | Full Text |
261 | 14 | 3 | A Metrics-Based Model for Estimating the Maintenance Effort of Python Software | Catherine Wambui Mukunga, John Gichuki Ndia and Geoffrey Mariga Wambugu, Murang’a University of Technology, Murang’a Kenya | Full Text |
262 | 14 | 3 | The Effect of Time Pressure During COVID-19 on Software Quality | Asmaa Hassan1,2 and Omer Alrwais1, 1King Saud University, Saudi Arabia, 2King Khalid University, Saudi Arabia | Full Text |
263 | 14 | 4 | Transforming Software Requirements into Test Cases via Model Transformation | Nader Kesserwan1, Jameela Al-Jaroodi1, Nader Mohamed2 and Imad Jawhar3, 1Robert Morris University, USA,2Pennsylvania Western University, USA, 3AlMaaref University, Lebanon | Full Text |
264 | 14 | 5 | Agile, User-Centered Design and Quality in Software Processes for Mobile Application Development Teaching | Manuel Ignacio Castillo López, Ana Libia Eslava Cervantes, Gustavo de la Cruz Martínez and Jorge Luis Ortega Arjona, Universidad Nacional Autónoma de México, Mexico | Full Text |
265 | 14 | 5 | Analyzing Aircraft Landing Decision Making Through Fuzzy Logic Approach: A Comparative Study | Sarah A. Ibrahim, Khirallah s. Elfarjani, Mrwan BenIdris, University of Benghazi, Libya | Full Text |
266 | 14 | 5 | Redusharptor: A Tool to Simplify Developer-Written C# Unit Tests | David Weber and Arpit Christi, Weber State University, USA | Full Text |
267 | 14 | 6 | Code Swarm: A Code Generation Tool based on the Automatic Derivation of Transformation Rule Set | Hina Mahmood1, Atif Aftab Jilani2 and Abdul Rauf3, 1McMaster University, Canada, 2FAST-National University of Computer and Emerging Sciences, Pakistan, 3Knightec AB, Sweden | Full Text |
International Journal of Network Security & Its Applications (IJNSA)
International Journal of Security, Privacy and Trust Management (IJSPTM)
International Journal of Database Management Systems (IJDMS)
294 | 15 | 1 | A Review of the Use of R Programming for data Science Research in Botswana | Simisani Ndaba, University of Botswana, Botswana | Full Text |
295 | 15 | 1 | Scaling Distributed Database Joins by Decoupling Computation and Communication | Abhirup Chakraborty, ACM Member | Full Text |
296 | 15 | 2/3 | A Comparative Analysis of Data Mining Methods and Hierarchical Linear Modeling Using PISA 2018 Data | Wenting Weng1 and Wen Luo2, 1Johns Hopkins University, USA, 2Texas A&M University, USA | Full Text |
297 | 15 | 4/5 | Gendarmerie Drones Used in National Security Missions | Verónica Mendes Pinto1,2, 3, Tiago Gonçalves Silva1,2,3, José Silvestre Silva1,3,4, 1Portuguese Military Academy, Lisbon, Portugal, 2Guarda Nacional Republicana (GNR), Portugal, 3Military Academy Research Center (CINAMIL), Portugal, 4Universidade de Coimbra, Portugal | Full Text |
298 | 15 | 6 | Data Anonymization Process Challenges and Context Missions | Hassane Tahir and Patrick Brezillon, Sorbonne Université, France | Full Text |
International Journal of Data Mining & Knowledge Management Process (IJDKP)
299 | 13 | 1/2 | The Stock Market Volatility Between China and Asean Countries Association Studies Based on Complex Networks | Wangke Yu, Shuhua Liu, Ruoqi Pan, Ke Huang, Linyun Deng, Nanning University, China | Full Text |
300 | 13 | 1/2 | Class Imbalance Handling Techniques used in Depression Prediction and Detection | Simisani Ndaba, University of Botswana, Botswana | Full Text |
301 | 13 | 1/2 | Demand Forecasting of a Perishable Dairy Drink: An ARIMA Approach | T. Musora, Z. Chazuka, A. Jaison, J. Mapurisa, and J. Kamusha, Chinhoyi University of Technology, Zimbabwe | Full Text |
302 | 13 | 3 | Heart Disease Prediction using Machine Learning and Deep Learning | Dinesh Kalla and Arvind Chandrasekaran, Colorado Technical University, USA | Full Text |
303 | 13 | 4/5 | When Should They Buy? Surviving Machine Learning Models for Purchase Timing | Diego Vallarino, Independent Researcher, Spain | Full Text |
International Journal of Multimedia & Its Applications (IJMA)
304 | 15 | 1/2 | A Comparative Study on Human Views in Mythologies and Webtoons | Y.S. Seo, Hankuk University of Foreign Studies, Korea | Full Text |
305 | 15 | 3 | Altruistic ASD (Autism Spectrum Disorder) Virtual Reality Game | Taraf Alshalan, Ghala Alamri and Maali Alabullhafith, Princess Norah University, Saudi Arabia | Full Text |
306 | 15 | 3 | Digital Malaysian Tradition Game: A Case Study of Baling Tin | Nur Sufilea Izzati, Suzana Ahmad, Marina Ismail, Norizan Mat Diah, Norharziana Yahaya Rashdi, Sumarni Abu Bakar, Universiti Teknologi MARA, Malaysia | Full Text |
307 | 15 | 4 | Exploring the Aspects of Educational Robotics: A Mini Systematic Literature Review | Theinmoli Munusamy, Maizatul Hayati Mohamad Yatim and Suhazlan bin Suhaimi, Universiti Pendidikan Sultan Idris (UPSI), Malaysia | Full Text |
308 | 15 | 5 | A Preliminary Study on Multidisciplinary Design Framework in a Virtual Reality Learning Environment | Choong Wai Keng1, Maizatul Hayati Mohamad Yatim2 and Noorhayati Saad1, 1Taylor’s University, Malaysia, 2Sultan Idris Education University, Malaysia | Full Text |
International Journal of Computer Graphics & Animation (IJCGA)
309 | 13 | 1 | Negative Attributes of the Metaverse Based on Thematic Analysis of Movie “belle” and “ready Player One” | Y.S. Seo1 and Austin Kang2, 1Hankuk University of Foreign Studies Graduate School, Korea and 2Seoul National University, Korea | Full Text |
310 | 13 | 2 | History and Future Trends of Multicore Computer Architecture | Abdulrahman Alseqyani and Abdullah Almutairi, Zulfi College of Technology, Saudi Arabia | Full Text |
International Journal of Web & Semantic Technology (IJWesT)
311 | 15 | 1 | Enhancing Web Accessibility - Navigating the Upgrade of Design Systems from WCAG 2.0 to WCAG 2.1 | Hardik Shah, Rochester Institute of Technology, USA | Full Text |
312 | 15 | 1 | Advancing Web Development - Enhancing Component-Based Software Engineering and Design Systems Through HTML5 Customized Built-in Elements | Hardik Shah, Rochester Institute of Technology, USA | Full Text |
International Journal on Cloud Computing: Services and Architecture (IJCCSA)
313 | 13 | 1 | Security and Privacy Aware Programming Model for IoT Applications in Cloud Environment | Subba Reddy Borra, Smitha Khond and D. Srivalli, Malla Reddy Engineering College for Women (Autonomous), India | Full Text |
314 | 13 | 2 | Users’ Perception Towards Cloud Computing: A Case of Department Statistic South Africa | Mosima Naphtaline Phasha and Alfred Thaga Kgopa, Tshwane University of Technology, Pretoria, South Africa | Full Text |
315 | 13 | 2 | Achieving Seamless Migration to Private-Cloud Infrastructure for Multi-Campus Universities | Niki Kyriakou, Zoi Lachana, Dimitrios N. Skoutas, Charalampos Skianis and Yannis Charalabidis, University of the Aegean, Greece | Full Text |
316 | 13 | 3/4 | Experimental Study to Maintain Stability in the Case of Industrial Cloudlets Network | Amel Ben Lazreg, Sousse University, Tunisia | Full Text |
International Journal of Artificial Intelligence & Applications (IJAIA)
317 | 14 | 1 | An Authorship Identification Empirical Evaluation of Writing Style Features in Cross-Topic and Cross-genre Documents | Simisani Ndaba, Edwin Thuma, Gontlafetse Mosweunyane, University of Botswana, Gaborone, Botswana | Full Text |
318 | 14 | 1 | Investigating the Effect of BD-CRAFT to Text Detection Algorithms | Clarisa V. Albarillo1 and Proceso L. Fernandez, Jr.2, 1Don Mariano Marcos Memorial State University, Philippines, 2Ateneo de Manila University, Philippines | Full Text |
319 | 14 | 2 | Spot-the-Camel: Computer Vision for Safer Roads | Khalid AlNujaidi, Ghadah AlHabib, and Abdulaziz AlOdhieb, Prince Mohammad Bin Fahd University, Saudi Arabia | Full Text |
320 | 14 | 2 | Stock Broad-Index Trend Patterns Learning via Domain Knowledge Informed Generative Network | Jingyi Gu, Fadi P. Deek and Guiling Wang, New Jersey Institute of Technology, USA | Full Text |
321 | 14 | 2 | Psychological Emotion Recognition of Students using Machine Learning based Chatbot | Suha Khalil Assayed1, Khaled Shaalan1, Sana Alsayed2, Manar Alkhatib1,1The British University, UAE,2Philadelphia University, Jordan | Full Text |
322 | 14 | 2 | A Comparison of Document Similarity Algorithms | Nicholas Gahman and Vinayak Elangovan, Penn State University, USA | Full Text |
323 | 14 | 2 | Design That Uses AI to Overturn Stereotypes: Make Witches Wicked Again | Xiaohan Feng and Makoto Murakami, Toyo University, Japan | Full Text |
324 | 14 | 2 | Development of an Intelligent Vital Sign Monitoring Robot System | Yu-Ping Liao Wen-Hsiang Yeh, Hong-Xin Wu, and Yi-Lin Cheng, Chung Yuan Christian University, Taiwan | Full Text |
325 | 14 | 2 | EDGE-Net: Efficient Deep-Learning Gradients Extraction Network | Nasrin Akbari and Amirali Baniasadi, University of Victoria, Canada | Full Text |
326 | 14 | 3 | Large Language Models for Ciphers | David Noever, PeopleTec, USA | Full Text |
327 | 14 | 3 | Procedural Generation in 2D Metroidvania Game with Answer Set Programming and Perlin Noise | John Xu1 and John Morris2, 1USA, 2California State Polytechnic University, USA | Full Text |
328 | 14 | 4 | Real Time Deep Learning Weapon Detection Techniques for Mitigating Lone Wolf Attacks | Akhila Kambhatla and Ahmed R Khaled, Southern Illinois University, USA | Full Text |
329 | 14 | 4 | Uncertainty Estimation in Neural Networks Through Multi-Task Learning | Ashish James and Anusha James, Insitute for Infocomm Research (I2R), Singapore | Full Text |
330 | 14 | 4 | Answer Set Programming (DLV – Clingo):Connect 4 Solver | Rosalba Cuapa C, Fernando Zacarias F and Adair Ponce, Universidad Autónoma de Puebla, México | Full Text |
331 | 14 | 4 | Segmentation of the Gastrointestinal Tract MRI Using Deep Learning | J. Roy and A. Abdel-Dayem, Laurentian University, Canada | Full Text |
332 | 14 | 5 | Performance Evaluation of Block-Sized Algorithms for Majority Vote in Facial Recognition | Andrea Ruiz-Hernandez, Jennifer Lee, Nawal Rehman, Jayanthi Raghavan and Majid Ahmadi, University of Windsor, Canada | Full Text |
333 | 14 | 5 | Subverting Characters Stereotypes: Exploring the Role of AI in Stereotype Subversion | Xiaohan Feng and Makoto Murakami, Toyo University, Kawagoe, Japan | Full Text |
334 | 14 | 5 | Characteristics of Networks Generated by Kernel Growing Neural Gas | Kazuhisa Fujita, Komatsu University, Japan | Full Text |
335 | 14 | 5 | Sentiment Analysis in Indian Elections: Unraveling Public Perception of the Karnataka Elections With Transformers | Pranav Gunhal, Artificial Intelligence Coalition, USA | Full Text |
336 | 14 | 5 | Identifying Text Classification Failures in Multilingual AI-Generated Content | Raghav Subramaniam, Independent Researcher | Full Text |
337 | 14 | 6 | Building Python Application for Webmail Interfaces Navigation using Voice Recognition Technology | Mokhtar Alkhattali1, Mostafa Dow2, Khawla Azwee1 and Mohamed Sayah2, 1High Institute of Science and Technology, Libya, 2College of Science and Technology, Libya | Full Text |
338 | 14 | 6 | English to Arabic Machine Translation of Mathematical Documents | Mustapha Eddahibi and Mohammed Mensouri, Ibnou Zohr University, Morocco | Full Text |
339 | 14 | 5 | Smart Crosswalk: Machine Learning and Image Processing based Pedestrian and Vehicle Monitoring System | Hiruni J.M.D.K, Weerakoon L.M.R, Weerasinghe T.R, Jayasinghe S.J.A.S.M.S, Jenny Krishara, Sanjeevi Chandrasiri, Sri Lanka Institute of Information Technology, Sri Lanka | Full Text |
340 | 14 | 6 | Learning Spline Models with the EM Algorithm for Shape Recognition | Abdullah A. Al-Shaher, Yousef S. AlKhawari, Public Authority for Applied Education and Training, Kuwait | Full Text |
International Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)
341 | 12 | 1/2 | A Hybrid Methods DSS for the Best Performing Lecturers Selection | Teotino G. Soares1, Marcelo F. X. Cham2, Abdullah Z. Abidin3 and Tenia Wahyuningrum4, 1,2Dili Institute of Technology (DIT), Timor Leste, 3Professional IT Consultant Enterprise, Malaysia, 4Institut Teknologi Telkom Purwokerto, Indonesia | Full Text |
Machine Learning and Applications: An International Journal (MLAIJ)
342 | 10 | 1 | A Machine Learning Method for Prediction of Yogurt Quality and Consumers Preferencesusing Sensory Attributes and Image Processing Techniques | MahaHany1, Shaheera Rashwan1 and Neveen M. Abdelmotilib2, 1Informatics Research Institute, Egypt, 2Arid Lands Cultivation Research Institute, Egypt | Full Text |
343 | 10 | 2/3 | Face Mask Detection Model Using Convolutional Neural Network | Mamdouh M. Gomaa1, Alaa Elnashar1, Mahmoud M. Eelsherif2, and Alaa M. Zaki1, 1Minia University, Egypt, 2Sinai university, Egypt | Full Text |
344 | 10 | 2/3 | Breast Tumor Detection Using Efficient Machine Learning and Deep Learning Techniques | Ankita Patra1, Santi Kumari Behera2, Prabira Kumar Sethy1, Nalini Kanta Barpanda1, Ipsa Mahapatra2, 1Sambalpur University, India, 2VSSUT Burla, India | Full Text |
345 | 10 | 2/3 | Sentiment-Driven Cryptocurrency Price Prediction: A Machine Learning Approach Utilizing Historical Data and Social Media Sentiment Analysis | Saachin Bhatt, Mustansar Ghazanfar, and Mohammad Hossein Amirhosseini, University of East London, United Kingdom | Full Text |
346 | 10 | 4 | Evaluating the Accuracy of Classification Algorithms for Detecting Heart Disease Risk | Alhaam Alariyibi, Mohamed El-Jarai and Abdelsalam Maatuk, Benghazi University, Libya | Full Text |
Signal & Image Processing : An International Journal (SIPIJ)
347 | 14 | 1 | Evaluating the Accuracy of a Linear Regression Model in Predicting the Dissolution of Tablets Based on Raman Maps | Gábor Knyihár, Kristóf Csorba and Hassan Charaf, Budapest University of Technology and Economics Budapest, Hungary | Full Text |
348 | 14 | 1 | Scaling Distributed Database Joins by Decoupling Computation and Communication | Abhirup Chakraborty, ACM Member | Full Text |
349 | 14 | 2/3 | A Comparative Analysis of Data Mining Methods and Hierarchical Linear Modeling Using PISA 2018 Data | Wenting Weng1 and Wen Luo2, 1Johns Hopkins University, USA, 2Texas A&M University, USA | Full Text |
350 | 14 | 4/5 | Gendarmerie Drones Used in National Security Missions | Verónica Mendes Pinto1,2, 3, Tiago Gonçalves Silva1,2,3, José Silvestre Silva1,3,4, 1Portuguese Military Academy, Lisbon, Portugal, 2Guarda Nacional Republicana (GNR), Portugal, 3Military Academy Research Center (CINAMIL), Portugal, 4Universidade de Coimbra, Portugal | Full Text |
351 | 14 | 6 | Data Anonymization Process Challenges and Context Missions | Hassane Tahir and Patrick Brezillon, Sorbonne Université, France | Full Text |
352 | 14 | 6 | Data Anonymization Process Challenges and Context Missions | Hassane Tahir and Patrick Brezillon, Sorbonne Université, France | Full Text |
International Journal on Soft Computing ( IJSC )
353 | 14 | 1 | Exploring Sentiment Analysis Research: A Social Media Data Perspective | Zahra Dahish1,2 and Shah J Miah1, 1University of Newcastle, Australia, 2Jazan University, Saudi Arabia | Full Text |
354 | 14 | 2 | Texts Classification with the usage of Neural Network based on the Word2vec’s Words Representation | D. V. Iatsenko, Southern Federal University, Russia | Full Text |
355 | 14 | 3 | Insider Threat Prevention in the US Banking System | Oghenekome Efijemue1, Ifunanya Ejimofor1 and Omoshola Simon Owolabi2, 1Austin Peay State University, Clarksville USA, 2Carolina University, USA | Full Text |
356 | 14 | 3 | Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Financial Fraud in the United States Financial Sectors | Efijemue Oghenekome Paul1, Obunadike Callistus1, Olisah Somtobe1, Taiwo Esther1, Kizor-Akaraiwe Somto2, Odooh Clement1 and Ifunanya Ejimofor1, 1Austin Peay State University, Clarksville USA, 2University of Washington, Seattle USA | Full Text |
357 | 14 | 4 | Analytic Approach in Accessing Trends and Impacts of Medicaid-Medicare Dual Enrollment in the United States | Clement Odooh and Regina Robert, Austin Peay State University, USA | Full Text |
358 | 14 | 4 | A Review of Data Intelligence Applications Within Healthcare Sector in the United States | Clement Odooh, Regina Robert and Efijemue Oghenekome Paul, Austin Peay State University, USA | Full Text |