Journal: Comput. Syst. Sci. Eng.

Volume 37, Issue 3

297 -- 311Fahd N. Al-Wesabi, Saleh AlZahrani, Fuad Ali Mohammed Al-Yarimi, Mohammed Abdul, Nadhem Nemri, Mohammed M. Almazah. A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship
313 -- 329Abdulaziz Attaallah, Sabita Khatri, Mohd Nadeem, Syed Anas Ansar, Abhishek Kumar Pandey, Alka Agrawal. Prediction of COVID-19 Pandemic Spread in Kingdom of Saudi Arabia
331 -- 346Prasantha Bharathi Dhandapani, Dumitru Baleanu, Jayakumar Thippan, Vinoth Sivakumar. New Fuzzy Fractional Epidemic Model Involving Death Population
347 -- 360Wael Alosaimi, Abdullah Alharbi, Hashem Alyami, Masood Ahmad, Abhishek Kumar Pandey, Rajeev Kumar 0001, Raees Ahmad Khan. Impact of Tools and Techniques for Securing Consultancy Services
361 -- 380N. Z. Jhanjhi, Mamoona Humayun, Saleh Naif Almuayqil. Cyber Security and Privacy Issues in Industrial Internet of Things
381 -- 398Jiayi Wang, Xinhui Liu, Jinshi Chen, Tongjian Wang, Xin Wang. Mechanical-Hydraulic Co-Simulation of Full Hydraulic Articulated Steering System
399 -- 413Ali Mustafa, Muhammad Najam-ul-Islam, Salman Ahmed. Average Convergence for Directed & Undirected Graphs in Distributed Systems
415 -- 421D. Gurukumaresan, C. Duraisamy, R. Srinivasan. Optimal Solution of Fuzzy Transportation Problem Using Octagonal Fuzzy Numbers
423 -- 442Qi Yue, Xiang Li, Dan Li. Chinese Relation Extraction on Forestry Knowledge Graph Construction
443 -- 461Qiang Zhi, Shuji Morisaki. An Evaluation of Value-Oriented Review for Software Requirements Specification

Volume 37, Issue 2

149 -- 158Mohammed Hayder Kadhim, Farhad Mardukhi. A Novel IoT Application Recommendation System Using Metaheuristic Multi-Criteria Analysis
159 -- 167Mamdouh Alenezi. Safeguarding Cloud Computing Infrastructure: A Security Analysis
169 -- 186Muhammad Asim Mubarik, Zhijian Wang, Yunyoung Nam, Seifedine Kadry 0001, Muhammad Azam Waqar. Instagram Mobile Application Digital Forensics
187 -- 202Malik Khlaif Gharaibeh, Natheer Khlaif Gharaibeh, MOHAMMAD AYOUB KHAN, Waleed Abdel Karim Abu-Ain, Musab Kasim AlQudah. Intention to Use Mobile Augmented Reality in the Tourism Sector
203 -- 218Luis Eduardo Bautista Villalpando, Alain Abran. A Data Security Framework for Cloud Computing Services
219 -- 231Hegazy Rezk, Mohamed A. Mohamed, Ahmed A. Zaki Diab, N. Kanagaraj. Load Frequency Control of Multi-interconnected Renewable Energy Plants Using Multi-Verse Optimizer
233 -- 245V. Vidya Lakshmi, J. S. Leena Jasmine. A Hybrid Artificial Intelligence Model for Skin Cancer Diagnosis
247 -- 263Zhuorong Li, Huawei Tian, Yanhui Xiao, Yunqi Tang, Anhong Wang. An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files
265 -- 281Xizi Peng, Jinquan Zhang, Shibin Zhang, Wunan Wan, Hao Chen, Jinyue Xia. A Secure Signcryption Scheme for Electronic Health Records Sharing in Blockchain
283 -- 295Qiyuan Liu 0007, Shuhua Lu, Lingqiang Lan. YOLOv3 Attention Face Detector with High Accuracy and Efficiency

Volume 37, Issue 1

1 -- 18Shakeel Ahmed, Abdulaziz Alhumam. Unified Computational Modelling for Healthcare Device Security Assessment
19 -- 32Kaisarul Islam, Tabia Hossain, Mohammad Monirujjaman Khan, Mehedi Masud, Roobaea Alroobaea. Comparative Design and Study of A 60 GHz Antenna for Body-Centric Wireless Communications
33 -- 46Sinil Mubarak, Mohamed Hadi Habaebi, Md. Rafiqul Islam 0005, Abdul Rahman Farah Diyana, Mohammad Tahir. Anomaly Detection in ICS Datasets with Machine Learning Algorithms
47 -- 62Mustafa M. M. Al Qudah, Ahmad S. A. Mohamed, Syaheerah L. Lutfi. Affective State Recognition Using Thermal-Based Imaging: A Survey
63 -- 71Ahmed Naif M. Alahmadi, Hegazy Rezk. A Robust Single-Sensor MPPT Strategy for Shaded Photovoltaic-Battery System
73 -- 87Shahrul Nizam Ismail, Suraya Hamid, Muneer Ahmad, A. Alaboudi, N. Z. Jhanjhi. Exploring Students Engagement Towards the Learning Management System (LMS) Using Learning Analytics
89 -- 104Hua-Rui Wu 0001, Huaji Zhu, Xiao Han, Wei Xu. Layout Optimization for Greenhouse WSN Based on Path Loss Analysis
105 -- 119Zhengqiu Weng, Timing Chen, Tiantian Zhu, Hang Dong, Dan Zhou, Osama Alfarraj. TLSmell: Direct Identification on Malicious HTTPs Encryption Traffic with Simple Connection-Specific Indicators
121 -- 133Zihao Shen, Hui Wang, Kun Liu, Peiqian Liu, Menglong Ba, Mengyao Zhao. RP-NBSR: A Novel Network Attack Detection Model Based on Machine Learning
135 -- 148Xiaoyu Duan, Shi Ying, Wanli Yuan, Hailong Cheng, Xiang Yin. A Generative Adversarial Networks for Log Anomaly Detection