| |||||||||||||||
IJCSIT 2025 : International Journal of Computer Science and Information Technology - H-index 59 | |||||||||||||||
Link: https://airccse.org/journal/ijcsit.html | |||||||||||||||
| |||||||||||||||
Call For Papers | |||||||||||||||
International Journal of Computer Science and Information Technology (IJCSIT) World Journal Clout Index (WJCI) Impact Factor : 0.242 (2020); 0.115 (2019) ----INSPEC,WJCI Indexed ---- Citations, h-index, i10-index of IJCSITScope and TopicsThe AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: case studies, technical reports etc. Topics of interest include but are not limited to, the following
Paper SubmissionAuthors are invited to submit papers for this journal through Email: ijcsit@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal. Important Dates
Related Journal
Current IssueDecember 2024, Volume 16, Number 6 Attention Mechanism for Attacks and Intrusion Detection Full Text Digital Interventions for Anxiety Management using AI-Driven Mobile Applications Full Text Exploring Fault Tolerance Strategies in Big Data Infrastructures and Their Impact on Processing Efficiency Full Text Analysis of Random Distortions in the Elements of the Basic Cell for an Analog-Digital Pipelined Converter Full Text The Installation Design of Solar Panels for Village Houses HK with Optimization-based Efficiency for Sustainable Environmental Full Text AI-Driven Test Case Optimization: Enhancing Efficiency in Software Testing Life Cycle Full Text Unveiling Patterns: Advanced Data Mining Techniques for Accurate Predictive Analytics Full Text October 2024, Volume 16, Number 5 Baoulé Related Parallel Corpora for Machine Translation Tasks: Mtbci-1.0 Full Text A Neural Network Approach to Understanding Employee Retention Dynamics: Insights from Feature Importance Analysis Full Text Enhancing Organizational Efficiency of the Lantern Festival in Penghu, Taiwan Through Information Technology: Key Factors Analysis Full Text Hema Durairaj1 and L Priya Dharshini2, 1Publicis Sapient Pvt. Ltd., India, 2Lady Doak College, India Resources Price Adjustment in Cloud Computing for Load Balancing and Fairness Between Users and Suppliers Full Text Lilia Chourou Gherir1, Ahmed Elleuch2 and Mohamed Jemni1, 1University of Tunis, Tunisia, 2University of Manouba, Tunisia Exploring the Selection and Training of Tour Leaders: An Evaluation Model Based on the Analytic Hierarchy Process Full Text Yuang-Liang Sun and Han-Chen Huang, Chung Hua University, Taiwan Analysis of Key Factors Influencing Penghu Tourism Development using the Delphi Method and AHP Full Text Pao-TsaiKuo and Han-Chen Huang, Chung Hua University, Taiwan Malware Detection and Classification using Generative Adversarial Network Full Text Krishna Kumar, Hardwari Lal Mandoria, Rajeev Singh, Shri Prakash Dwivedi and Paras, G. B. Pant University of Agriculture and Technology, India Utilizing Analytic Network Process for Evaluating Event Management Companies: A Case Study in Celebration Activities Full Text Han-Chen Huang, Chung Hua University, Taiwan August 2024, Volume 16, Number 4 Non-Deterministic and Risk Based Security Services Full Text Database Security Compliance with Anti-Money Laundering Status Full Text AI Strategy Formulation Across Various Game Genres - A Literature Review Full Text Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems Full Text Exploring White Fragility in Large Language Models Full Text A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods Full Text The Role of Cloud Providers in IoT Services Full Text FIX Protocol: The Backbone of Financial Trading Full Text Shadowed AHP for Multi-Criteria Supplier Selection Full Text Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional Responses, and Satisfaction Full Text June 2024, Volume 16, Number 3 The Impact of Blockchain Technology on the Financial Services Industry Full Text Streamlining Compliance and Risk Management with RegTech Solutions Full Text A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis Full Text The Energy Storage Operation Under Stochastic Renewable Generation Full Text Psychological and Graphic Aspects of Colors: Influence and Application in Product Design Full Text Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights Full Text Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans Full Text Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications Full Text Player Strategy Modeling in Classic Roleplaying Game Battle Environments Full Text Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and Future Prospects Full Text April 2024, Volume 16, Number 2 Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks Full Text The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States Full Text Big Data and Machine Learning in Defence Full Text AI-Based Home Security System Full Text February 2024, Volume 16, Number 1 Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile
Image Segmentation and Classification using Neural Network Full Text From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Full Text A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 Full Text Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using
December 2023, Volume 15, Number 6 An Adaptive Network-Based Approach for Advanced Forecasting of Cryptocurrency Values Full Text Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-Based Techniques Full Text The Alignment between International and National Academic Accreditations - An Application in Information Systems Bachelor Program at Kingdom of Saudi Arabia Full Text Revealing the Foundations: The Strategic Influence of Test Design in Automation Full Text
Secure Arcade: A Gamified Defense Against Cyber Attacks Full Text Analysis of the Relationship between Self-Esteem and Depression Full Text August 2023, Volume 15, Number 4 Recent Advancements in the Field of Deepfake Detection Full Text Detection of Structured Query Language Injection Attacks Using Machine Learning Techniques Full Text Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning Approach Full Text Wi-Fi Data Analysis based on Machine Learning Full Text Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers Full Text Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust,
Understanding the Role of Customer Trust in E-Commerce Full Text Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary Indicator in Municipalities of North Cotabato, Philippines Full Text A Systematic Review on the Effectiveness of Using User-Generated Content in E-Commerce Marketing Full Text June 2023, Volume 15, Number 3 A Novel Exploit Traffic Traceback Method Based on Session Relationship Full Text Confidential Computing in Edge- Cloud Hierarchy Full Text The Design of a Lighting System for Hong Kong International Airport APM Tunnel for Energy Saving with
Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges Full Text A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate
Development of a Prototype for Census and Enumeration: A Case Study of Namibia Full Text Application Security Self-Efficacy of Software Developers: A Correlational Study Full Text Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition Full Text Linear Feedback Shift Register Genetically Adjusted for Sequence Copying Full Text The Development of Climate Agrometeorological Application for Farmers in Namibia Full Text Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry Full Text Prediction of Anemia using Machine Learning Algorithms Full Text Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms Full Text Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines Full Text Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality Full Text Behavioural Analytics in Cyber Security for Digital Forensics Application Full Text December 2022, Volume 14, Number 6 Effective Malware Detection Approach based on Deep Learning in Cyber-Physical Systems Full Text Electronic Letter of Guarantee for Banking System Full Text Testing-as-a-Service (TaaS) – Capabilities and Features for Real-Time Testing in Cloud Full Text Using Singular Value Decomposition in a Convolutional Neural Network to Improve Brain Tumor Segmentation Accuracy Full Text Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Full Text October 2022, Volume 14, Number 5 Quantifying the Theory Vs. Programming Disparity using Spectral Bipartivity Analysis and Principal Component Analysis Full Text Edge Controller Placement for Next Generation Wireless Sensor Networks Full Text Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Studying and Analyzing the Social Media Data Full Text Dyslexic Reading Assistance with Language Processing Algorithms Full Text Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems Full Text August 2022, Volume 14, Number 4 Compact Preservation of Scrambled CD-Rom Data Full Text Identify the Beehive Sound using Deep Learning Full Text SwarMED: A High-Throughput Interoperability Architecture Over Ethereum and Swarm for Big Biomedical Data Full Text Arabic Dataset for Farmers' Intent Identification Toward Developing a Chatbot Full Text Impact of 4IR Technology and its Impact on the Current Deployment Full Text A Short Survey on Constructing an IoT based Intelligent Road System Full Text Impact of Pandemic on E-Commerce in Asia Full Text June 2022, Volume 14, Number 3 Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks The Digital Carbon Footprint: Threat to an Environmentally Sustainable Future Full Text Combining Machine Learning and Semantic Analysis for Efficient Misinformation Detection of Arabic Covid-19 Tweets Full Text Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing Full Text Security in Wireless Sensor Networks: Comparative Study Full Text Big Data and Cloud Readiness Full Text The Professionalization of the Hacker Industry Full Text Visually Impaired People Monitoring in a Smart Home using Electronic White Cane Full Text Covid-19 Sparked the E-Commerce Revolution; Some Benefited, While Others Left in Cold Full Text Smsecurity: Security System and SMS Notification Cum Face Recognition Full Text Remote Work and Innovation During this Covid-19 Pandemic: An Employers’ Challenge Full Text Failure Free Cloud Computing Architectures Full Text User Experience Evaluation of a Student Information System Full Text
Mobile Device Users’ Susceptibility to Phishing Attacks Full Text Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation Full Text Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog Full Text Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route Full Text Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic Full Text Encryption based Watermarking Technique for Security of Medical Image Full Text Feature Extraction Methods for IRIS Recognition System: A Survey Full Text December 2021, Volume 13, Number 6
|
|