posted by user: aircc_cfp || 676 views || tracked by 3 users: [display]

IJCSIT 2024 : International Journal of Computer Science and Information Technology - H-index 58

FacebookTwitterLinkedInGoogle

Link: https://airccse.org/journal/ijcsit.html
 
When N/A
Where N/A
Submission Deadline Nov 23, 2024
Notification Due Dec 10, 2024
Final Version Due Dec 17, 2024
Categories    education   information technology   software engineering   security
 

Call For Papers

International Journal of Computer Science and Information Technology (IJCSIT)

World Journal Clout Index (WJCI) Impact Factor : 0.242 (2020); 0.115 (2019)

----INSPEC,WJCI Indexed ----

Citations, h-index, i10-index of IJCSIT

Citations 12100 h-index 54  i10-index 282

Scope and Topics

The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.

IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: case studies, technical reports etc.

Topics of interest include but are not limited to, the following

  • Algorithms and Bioinformatics
  • Computer Architecture and Real Time Systems
  • Database and Data Mining
  • Dependable, Reliable and Autonomic Computing
  • Distributed and Parallel Systems & Algorithms
  • DSP/Image Processing/Pattern Recognition/Multimedia
  • Embedded System and Software
  • Game and Software Engineering
  • Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS)
  • Grid and Scalable Computing
  • Intelligent Information & Database Systems
  • IT policy and Business Management
  • Mobile and Ubiquitous Computing
  • Modeling and Simulation
  • Multimedia Systems and Services
  • Networking and Communications
  • Parallel and Distributed Systems
  • Security and Information Assurance
  • Soft Computing (AI, Neural Networks, Fuzzy Systems, etc.)
  • Software Engineering
  • Web and Internet Computing
  • Blockchain
  • Data Mining
  • Deep Learning
  • Big Data
  • Internet of Things
  • Machine Learning & Applications
  • NLP

Paper Submission

Authors are invited to submit papers for this journal through Email: ijcsit@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.

Important Dates

Submission Deadline:November 23, 2024
Authors Notification: December 10, 2024
Final Manuscript Due: December 17, 2024
Publication Date:Determined by the Editor-in-Chief


Related Journal

Current Issue

October 2024, Volume 16, Number 5

Baoulé Related Parallel Corpora for Machine Translation Tasks: Mtbci-1.0 Full Text
Kouassi Konan Jean-Claude, Bircham International University, Spain

A Neural Network Approach to Understanding Employee Retention Dynamics: Insights from Feature Importance Analysis Full Text
Han-Chen Huang, Chung Hua University, Taiwan

Enhancing Organizational Efficiency of the Lantern Festival in Penghu, Taiwan Through Information Technology: Key Factors Analysis Full Text
Shih-Ping Chang and Han-Chen Huang, Chung Hua University, Taiwan

Evaluating the Effect of Human Activity on Air Quality using Bayesian Networks and IDW Interpolation Full Text
Hema Durairaj1 and L Priya Dharshini2, 1Publicis Sapient Pvt. Ltd., India, 2Lady Doak College, India

Resources Price Adjustment in Cloud Computing for Load Balancing and Fairness Between Users and Suppliers Full Text
Lilia Chourou Gherir1, Ahmed Elleuch2 and Mohamed Jemni1, 1University of Tunis, Tunisia, 2University of Manouba, Tunisia

Exploring the Selection and Training of Tour Leaders: An Evaluation Model Based on the Analytic Hierarchy Process Full Text
Yuang-Liang Sun and Han-Chen Huang, Chung Hua University, Taiwan


Analysis of Key Factors Influencing Penghu Tourism Development using the Delphi Method and AHP Full Text
Pao-TsaiKuo and Han-Chen Huang, Chung Hua University, Taiwan

Malware Detection and Classification using Generative Adversarial Network Full Text
Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh, Shri Prakash Dwivedi and Paras, G. B. Pant University of Agriculture and Technology, India

Utilizing Analytic Network Process for Evaluating Event Management Companies: A Case Study in Celebration Activities Full Text
Han-Chen Huang, Chung Hua University, Taiwan

August 2024, Volume 16, Number 4

Non-Deterministic and Risk Based Security Services Full Text
Srinivas Rao Doddi1 and Akshay Krishna Kotamraju2, 1University of Los Angeles, USA, 2Founder Non-profit, USA

Database Security Compliance with Anti-Money Laundering Status Full Text
Opeyemi Ayanbanjo, New England College, Boston

AI Strategy Formulation Across Various Game Genres - A Literature Review Full Text
Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA

Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems Full Text
Rashid Alakbarov and Mammad Hashimov, Institute of Information Technology, Azerbaijan

Exploring White Fragility in Large Language Models Full Text
Janga Bussaja, Independent Researcher, USA

A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods Full Text
Han-Chen Huang, Chung Hua University, Taiwan

The Role of Cloud Providers in IoT Services Full Text
Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University St. Klement of Ohrid, Macedonia

FIX Protocol: The Backbone of Financial Trading Full Text
Swapnil Kognole, Director @ UBS, USA

Shadowed AHP for Multi-Criteria Supplier Selection Full Text
Mohamed Abdel Hameed El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt

Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional Responses, and Satisfaction Full Text
Han-Chen Huang, Chung Hua University, Taiwan

June 2024, Volume 16, Number 3

The Impact of Blockchain Technology on the Financial Services Industry Full Text
Kinil Doshi, Citibank, USA

Streamlining Compliance and Risk Management with RegTech Solutions Full Text
Chintamani Bagwe, Citibank, USA

A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis Full Text
Al-Mahmud and Kazutaka Shimada, Kyushu Institute of Technology, Japan

The Energy Storage Operation Under Stochastic Renewable Generation Full Text
Tony Tsang and Chung Kwok Leung, Hong Kong College of Technology, Hong Kong

Psychological and Graphic Aspects of Colors: Influence and Application in Product Design Full Text
Filip Popovski1, Hristina Dimova Popovska1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1University St.Klement of Ohrid, Macedonia, 2Internacional Slavic University, Macedonia

Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights Full Text
Sanjay Moolchandani, Citibank N.A., USA

Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans Full Text
Rezaul Karim1,2Md. Badiuzzaman Biplob1 and Mohammad Shamsul Arefin1, 1Chittagong University of Engineering and Technology, Bangladesh, 2University of Chittagong, Bangladesh

Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications Full Text
Priyank Singh, Tanvi Hungund and Shobhit Kukreti, Rochester Institute of Technology, US

Player Strategy Modeling in Classic Roleplaying Game Battle Environments Full Text
Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA

Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and Future Prospects Full Text
Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Emmanuel Hinneha and Samuel Attakorah, Carolina University, USA

April 2024, Volume 16, Number 2

Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks Full Text
Saurabh Mishra1 ,Rakesh Ranjan2 Sonika Singh3 and , Gagan Singh4School of Engineering and Technology, Sushant University, Gurgaon, India1,Sushant University, Gurgaon, India 2,Department of EECE, DIT University, Dehradun, India 3Department of EECE, DIT University, Dehradun, India, 4,

The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States Full Text
Omolola F. Hassan1 ,Oluwadare O. Aderibigbe1 Oghenekome P. Efijemue1 and , Tolulope D. Onasanya2Department of Computer Science, Austin Peay State University, Clarksville USA1Department of Computer Science, North Carolina Agricultural, Technical State University, Greensboro USA, 2

Big Data and Machine Learning in Defence Full Text
Yijie Weng1and Jianhao Wu2 , 1University of Maryland, USA, 2Cornell University, USA,

AI-Based Home Security System Full Text
Syeda Lamima Farhat, Likhitha Tubati, Metrine Osiemo, and Rushit Dave Department of Computer Information Science, Minnesota State University, USA

February 2024, Volume 16, Number 1

Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile
Application Infrastructure Security
Full Text
Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA

Image Segmentation and Classification using Neural Network Full Text
Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh

From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Full Text
Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA

A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 Full Text
Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA

Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using
Machine Learning
Full Text
Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA


December 2023, Volume 15, Number 6

An Adaptive Network-Based Approach for Advanced Forecasting of Cryptocurrency Values Full Text
Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA

Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-Based Techniques Full Text
Omar Shatnawi, Al al-Bayt University, Jordan

The Alignment between International and National Academic Accreditations - An Application in Information Systems Bachelor Program at Kingdom of Saudi Arabia Full Text
Rania A. Aboalela, King Abdulaziz University, Saudi Arabia

Revealing the Foundations: The Strategic Influence of Test Design in Automation Full Text
Rohit Khankhoje, Independent Reseacher, USA


October 2023, Volume 15, Number 5

Secure Arcade: A Gamified Defense Against Cyber Attacks Full Text
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber and Mounika Vanamala, University of Wisconsin-Eau Claire, USA


Analysis of the Relationship between Self-Esteem and Depression Full Text
Rosalba Cuapa C., Adair Ponce, Meliza Contreras, Mireya Tovar and Fernando Zacarias F., Universidad Autónoma de Puebla, México


August 2023, Volume 15, Number 4

Recent Advancements in the Field of Deepfake Detection Full Text
Natalie Krueger1, Mounika Vanamala1 and Rushit Dave2, 1University of Wisconsin-Eau Claire, USA, 2Minnesota State University, USA

Detection of Structured Query Language Injection Attacks Using Machine Learning Techniques Full Text
Taapopi John Angula and Valerianus Hashiyana, University of Namibia, Namibia

Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning Approach Full Text
Md. Tofael Ahmed1,2, Nahida Akter1, Maqsudur Rahman1, Abu Zafor Muhammad Touhidul Islam2, Dipankar Das2 and Md. Golam Rashed2, 1Comilla University, Bangladesh, 2University of Rajshahi, Bangladesh

Wi-Fi Data Analysis based on Machine Learning Full Text
Nanumura Gedara Umal Anuraga Nanumura, University of South Wales, United Kingdom

Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers Full Text
Alexander Veach and Munther Abualkibash, Eastern Michigan University, USA

Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust,
Peer Influences, Perceived Usefulness and Ease of Use
Full Text
Waleed Al-Ghaith, Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia

Understanding the Role of Customer Trust in E-Commerce Full Text
Istiak Khan and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia

Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary Indicator in Municipalities of North Cotabato, Philippines Full Text
Michaelangelo R. Serrano, Nero L. Hontiveros, EJ Ryle C. Mosquera, Aura Mae M. Celestino, John Louie D. Vilar, Junuel S. Baroy and Mitziel C. Gelbolingo, Notre Dame of Midsayap College, Philippines

A Systematic Review on the Effectiveness of Using User-Generated Content in E-Commerce Marketing Full Text
Jubaer Akhter and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia

June 2023, Volume 15, Number 3

A Novel Exploit Traffic Traceback Method Based on Session Relationship Full Text
Yajing Liu, Ruijie Cai, Xiaokang Yin and Shengli Liu, State Key Laboratory of Mathematical Engineering and Advanced Computing, China

Confidential Computing in Edge- Cloud Hierarchy Full Text
Yeghisabet Alaverdyan1,2 Suren Poghosyan2 and Vahagn Poghosyans2,3, 1EKENG CJSC, Armenia, 2Institute for
Informatics and Automation Problems of NAS RA, Armenia, 3Synopsys, Armenia

The Design of a Lighting System for Hong Kong International Airport APM Tunnel for Energy Saving with
Artificial Intelligence (AI) Lighting Defect Detection System
Full Text
Tony Tsang and Chan Shui Hin, Hong Kong College of Technology, Hong Kong

Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges Full Text
Delali Kwasi Dake, University of Education, Ghana

A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate
Modeling
Full Text
Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao, Sun Yat-Sen University, China

Development of a Prototype for Census and Enumeration: A Case Study of Namibia Full Text
Theodora Mukaya, Johanna Nelulu, V Hashiyana and Chris M, Mazila, University of Namibia, Namibia

April 2023, Volume 15, Number 2

Application Security Self-Efficacy of Software Developers: A Correlational Study Full Text
Wisdom Umeugo, Independent Researcher, Canada

Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition Full Text
Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey

Linear Feedback Shift Register Genetically Adjusted for Sequence Copying Full Text
Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico

The Development of Climate Agrometeorological Application for Farmers in Namibia Full Text
Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia

February 2023, Volume 15, Number 1

Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry Full Text
Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA

Prediction of Anemia using Machine Learning Algorithms Full Text
Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal


Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms Full Text
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA


Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines Full Text
Kouassi Konan Jean-Claude, Bircham International University, Spain

Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality Full Text
Thongchai Jeeradist, Kasem Bundit University, Thailand

Behavioural Analytics in Cyber Security for Digital Forensics Application Full Text
Martin Luther Bwangah, Kabarak University, Kenya

December 2022, Volume 14, Number 6

Effective Malware Detection Approach based on Deep Learning in Cyber-Physical Systems Full Text
Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli, Ramya Thatikonda, Adithya Padthe,
University of the Cumberlands, USA

Electronic Letter of Guarantee for Banking System Full Text
Sherif Kamel Hussein1,Abdullah Alhayan2, 1October University for Modern Sciences and Arts, Egypt, & Arab East Colleges for Graduate Studies, KSA, 2Arab East Colleges for Graduate Studies, KSA

Testing-as-a-Service (TaaS) – Capabilities and Features for Real-Time Testing in Cloud Full Text
Pawankumar Sharma1,Pawankumar Sharma2,3,and Lotfollah Najjar1University of the Cumberlands, USA2Northwest Missouri State University, USA, 3University of Nebraska, USA

Using Singular Value Decomposition in a Convolutional Neural Network to Improve Brain Tumor Segmentation Accuracy Full Text
Pegah Ahadian, Maryam Babaei and Kourosh Parand, Shahid Beheshti University, Iran

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Full Text
Arshiya Khan and Chase Cotton, University of Delaware, USA

October 2022, Volume 14, Number 5

Quantifying the Theory Vs. Programming Disparity using Spectral Bipartivity Analysis and Principal Component Analysis Full Text
Natarajan Meghanathan, Jackson State University, USA

Edge Controller Placement for Next Generation Wireless Sensor Networks Full Text
Mohamed S. Abouzeid, Heba A. El-khobby, Mahmoud A. A. Ali and Mohamed E. Nasr, Tanta University, Egypt

Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Studying and Analyzing the Social Media Data Full Text
Sherif Kamel Hussein1,2, Sultanah AL-Sedairi2 and Nawal AL-Rahimi2, 1October University for Modern Sciences and Arts, Egypt 2Arab East Colleges for Graduate Studies, KSA

Dyslexic Reading Assistance with Language Processing Algorithms Full Text
Sharada Lakshmanan, Equifax, USA


Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems Full Text
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria


August 2022, Volume 14, Number 4

Compact Preservation of Scrambled CD-Rom Data Full Text
Jacob Hauenstein, The University of Alabama in Huntsville, USA

Identify the Beehive Sound using Deep Learning Full Text
Shah Jafor Sadeek Quaderi1, Sadia Afrin Labonno2, Sadia Mostafa2 and Shamim Akhter3, 1University of Malaya, Malaysia, 2AISIP Lab, International University of Business Agriculture and Technology, Bangladesh, 3Stamford University Bangladesh, Bangladesh

SwarMED: A High-Throughput Interoperability Architecture Over Ethereum and Swarm for Big Biomedical Data Full Text
Arghya Kusum Das, University of Alaska Fairbanks, USA

Arabic Dataset for Farmers' Intent Identification Toward Developing a Chatbot Full Text
Abdelrahman Elsayed and Susan F. Ellakwa, Agricultural Research Center, Giza, Egypt

Impact of 4IR Technology and its Impact on the Current Deployment Full Text
Bandar Alsulaimani1 and Amanul Islam2, 1King Fahad University of Petroleum and Minerals (KFUPM), Saudi Arabia, 2University of Malaya, Malaysia

A Short Survey on Constructing an IoT based Intelligent Road System Full Text
F. O. Okorodudu, G. C. Omede, S. A. Otegbalor, Delta State University, Nigeria

Impact of Pandemic on E-Commerce in Asia Full Text
Bilal Ahmed Wani and Noor Azizah BT. Mohamad Ali, Kulliyyah of Information and Communication Technology International Islamic University of Malaysia, Malaysia


June 2022, Volume 14, Number 3

Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks
Using the Mobile Unity
Full Text
Reham.A.Shihata, EL Menoufia University, Egypt

The Digital Carbon Footprint: Threat to an Environmentally Sustainable Future Full Text
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, USA

Combining Machine Learning and Semantic Analysis for Efficient Misinformation Detection of Arabic Covid-19 Tweets Full Text
Abdulrahim Alhaizaey and Jawad Berri, King Saud University, Saudi Arabia

Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing Full Text
Jacob Bushur and Chao Chen, Purdue University Fort Wayne Fort Wayne, USA

Security in Wireless Sensor Networks: Comparative Study Full Text
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei and Aseel Abdullah Alfaidi, Jeddah University, Saudi Arabia

Big Data and Cloud Readiness Full Text
Hazirah Bee Yusof Ali and Lili Marziana Abdullah, Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Malaysia

The Professionalization of the Hacker Industry Full Text
Tyson Brooks, Syracuse University, USA

Visually Impaired People Monitoring in a Smart Home using Electronic White Cane Full Text
Mikaël A. Mousse, Institut Universitaire de Technologie, Université de Parakou, Benin

Covid-19 Sparked the E-Commerce Revolution; Some Benefited, While Others Left in Cold Full Text
Bilal Ahmed Wani and Dr. Noor Azizah BT. MohamadAli, International Islamic University of Malaysia, Malaysia

April 2022, Volume 14, Number 2

Smsecurity: Security System and SMS Notification Cum Face Recognition Full Text
Winston G. Domingo1, Arnold Dela Cruz2, Klaida Nicolas2, Jennifer A. Gamay MIT2, Erwin N. Lardizabal2 and Virdi C. Gonzales3, 1Quirino State University, Philippines, 2Cagayan Valley Computer and Information Technology, Philippines,3Southern Isabela Medical Center, Philippines

Remote Work and Innovation During this Covid-19 Pandemic: An Employers’ Challenge Full Text
Bibhu Dash, University of the Cumberlands, USA

Failure Free Cloud Computing Architectures Full Text
Yolam Zimba1, Hastings Maboshe Libati2 and Derrick Ntalasha2, 1University of Lusaka, Zambia, 2Copperbelt University, Zambia

User Experience Evaluation of a Student Information System Full Text
Asaad Alzayed and Bareeq Alghannam, Public Authority for Applied Education and Trainin, Kuwait




February 2022, Volume 14, Number 1

Mobile Device Users’ Susceptibility to Phishing Attacks Full Text
F. Ley Sylvester, Tarrant County College, USA

Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation Full Text
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation

Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog Full Text
Márcio Miguel Gomes1, Rodrigo da Rosa Righi1, Cristiano André da Costa1 and Dalvan Griebler2, 1University of Vale do Rio dos Sinos - Brazil, 2Pontifical Catholic University of Rio Grande do Su1, Brazil

Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route Full Text
Joe Dumas, University of Tennessee at Chattanooga, USA


Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic Full Text
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma and Osman Kandara, Southern University and A&M College, USA

Encryption based Watermarking Technique for Security of Medical Image Full Text
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria

Feature Extraction Methods for IRIS Recognition System: A Survey Full Text
Tara Othman Qadir1, Nik Shahidah Afifi Md Taujuddin1 and Sundas Naqeeb Khan2, 1Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia, 2Universiti Tun Hussein Onn Malaysia, Malaysia



December 2021, Volume 13, Number 6

Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches Full Text
Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3,1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France

Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks Full Text
Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran

Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models Full Text
Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia

SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines) Full Text
Amelie Anne Gutierrez, Holy Angel University, Philippines

Creating 3D Models with 3D Printing Process Full Text
Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia



October 2021, Volume 13, Number 5

Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles Full Text
Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA

Information Retrieval based on Cluster Analysis Approach

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SPIE-Ei/Scopus-DMNLP 2025   2025 2nd International Conference on Data Mining and Natural Language Processing (DMNLP 2025)-EI Compendex&Scopus
IEEE-Ei/Scopus-CNIOT 2025   2025 IEEE 6th International Conference on Computing, Networks and Internet of Things (CNIOT 2025) -EI Compendex
EEI 2024   10th International Conference on Emerging Trends in Electrical, Electronics & Instrumentation Engineering
FCSIT 2025   2025 4th Eurasian Conference on Frontiers of Computer Science and Information Technology
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
MAT 2024   10th International Conference of Advances in Materials Science and Engineering
CCET 2025   2025 8th International Conference on Computer and Communication Engineering Technology (CCET 2025)
EduTeach 2025   9th Canadian Conference on Advances in Education, Teaching & Technology 2025
SPIE-Ei/Scopus-CMLDS 2025   2025 2nd International Conference on Computing, Machine Learning and Data Science (CMLDS 2025) -EI Compendex & Scopus