Abstract is missing.
- Analysis Of Cost Prediction In Medical Insurance Using Modern Regression ModelsHaitham M. Alzoubi, Nizar Sahawneh, Ahmad Qasim AlHamad, Umar Malik, Ameer Majid, Ayesha Atta. 1-10 [doi]
- An Empirical Study of Association Among Financial Literacy, Financial Attitude and Financial Behaviour of Gen - ZVijayalakshmi. R, B. Sudha, Maged Farouk, Gouher Ahmed. 1-6 [doi]
- NABA: Novel Adaptive Broadcast Storm Avoidance in NDN and SDN based FANETKaramath Ateeq, P. RamLal, Ossma Ali Thawabeh, Ahmad Arsalan, Muhammad Burhan, Muhammad Umar Nasir. 1-5 [doi]
- Simulation Comparison of Capacitance Voltage Characteristics in Nickel Oxide and Silicon dioxide-based MOS CapacitorD. Pandy, R. Sharma, Suresh Sharma. 1-5 [doi]
- Classification and Analysis of Virtual Private NetworkNikhil Barya, Azhar Ashraf, Maninder Kaur, Shikha Uniyal Gairola. 1-5 [doi]
- Direct Trust in Cloud Computing Based on Fuzzy LogicWaleed T. Al-Sit, Karamath Ateeq, Syed Quadir Moinuddin, Shoukat Aslam, Abdur Rehman, Tayba Asgher, Ossma Ali Thawabeh. 1-6 [doi]
- API LED Connectivity ApproachKirti Sharma, Kshamta, Ankita Joshi. 1-3 [doi]
- Agile Lifestyle of DevelopmentAyushi, Damandeep Kaur, Satbir S. Sehgal. 1-5 [doi]
- A Comparitive Study on Routing Protocols: RIP, OSPF and EIGRPAtul Duvedi, Azhar Ashraf, Shikha Uniyal Gairola. 1-4 [doi]
- Data Mining Model Framework for GTD (Global Terrorism Database)Naman Thakur, Satnam Singh Saini, Abhishek Kumar Pathak. 1-5 [doi]
- CSPM: A secure Cloud Computing Performance Management ModelGovind Sawhney, Gagandeep Kaur, Rajesh Deorari. 1-5 [doi]
- The Threat of Deep Fake Technology to Trusted Identity ManagementAtif Ali, Yasir Khan Jadoon, Zulqarnain Farid, Munir Ahmad, Naseem Abidi, Haitham M. Alzoubi, Ali A. Alzoubi. 1-5 [doi]
- English Algorithm Translation to C Program using Syntax Directed Translation SchemaUtkarsh Raj, Navneet Kaur, Babita Rawat. 1-3 [doi]
- Pendekar Siber: Empowering Young People to Combat Cyber ThreatsNurul Nuha Abdul Molok, Zahidah Zulkifli, Mohamed Ridza Wahiddin. 1-4 [doi]
- Reducing cognitive dissonance in health care: Design of a new Positive psychology intervention tool to regulate professional stress among nursesRachid Alami, Hamzah Elrehail, Amro Alzghoul. 1-8 [doi]
- Modelling of Critical Success Factors Affecting the Adoption of Enterprise Resources Planning: A mediated ModelMohammad A. K. Alsmairat, Noor Al-Ma'aitah, Ibrahim Alrafaty. 1-10 [doi]
- Estimation of Virtual Trust on Driverless Cars using Type-1 Fuzzy logicKhaled Mohamed Kayed Alhyasat, Nahia Mourad, Omar Sattar, Faiz Rasool, Ali Sheraz Akram, Tayba Asgher. 1-11 [doi]
- Skin Lesion Classification in Dermoscopic Images with High Accuracy using Support Vector Machine Comparing with Random Forest MethodA. Hareesh, K. Vidhya, V. Suresh. 1-6 [doi]
- Predictive Analysis on Multimodal Medicare ApplicationRitik Sharma, Sugandhi Midha, Amit Semwal. 1-5 [doi]
- Achieving liveness in validators' performance efficiency consensus (VPEC) based blockchain system using the Zakat principlesIslahuddin Jalal, Khairul Azmi Abu Bakar, Zarina Shukur, Norleyza Jailani. 1-5 [doi]
- Supervised and Unsupervised Prediction Application of Machine LearningAnurag Sharma, Amanpreet Kaur, Amit Semwal. 1-5 [doi]
- Smartphone Security Hardening: Threats to Organizational Security and Risk MitigationAtif Ali, Nafees Ahmed Somroo, Umer Farooq, Muhammad Asif 0010, Iman Akour, Wathiq Mansoor. 1-12 [doi]
- Sorting Algorithm visualizerAditya Thakkar, Kavita, Sonali Dash, Sanjeev Kumar Joshi. 1-5 [doi]
- VOICE ASSISTANT USING PYTHONAabhas Kumar, Damandep Kaur, Abhishek Kumar Pathak. 1-4 [doi]
- Chatbot: A Bridge Between Technology and LearnSakshi, Satnam Singh, Reeta Rautela. 1-3 [doi]
- Performance and stability Comparison of React and Flutter: Cross-platform Application DevelopmentKamal Kishore, Shanu Khare, Vaibhav Uniyal, Sahil Verma. 1-4 [doi]
- Hiding Information in images using LSBSteganography techniqueDevansh Mehta, Sanjeev Kumar Joshi. 1-4 [doi]
- Improved Hybrid Model for Phishing Detection by Using Machine LearningShahan Yamin Siddiqui, Ali Sheraz Akram, Hafiz Muhammad Usama, Alaa M. Momani, Nidal A. Al-Dmour, Waleed T. Al-Sit. 1-5 [doi]
- Use of Different Machine Learning Algorithms for Hate Speech DetectionMuhammad Sohail Munir, Kausar Parveen, Umer Farooq, Khaled Shaalan, Abedallah Zaid Abualkishik, Abdul Salam Mohammed. 1-7 [doi]
- A Cyber-Security Framework For Boiler of Steam Power Plant Using Simulation Data to Train Machine Learning ModelAla Abdelrazaq Alhammadi, Hussam Al Hamadi, Chan Yeob Yeun, Ernesto Damiani. 1-9 [doi]
- An Intelligent Approach for Predicting Bankruptcy Empowered with Machine Learning TechniqueN. eyara Radwan, Haitham M. Alzoubi, Nizar Sahawneh, Areej Fatima, Abdur Rehman, Shan Khan. 1-5 [doi]
- Hospital Management System Based on IoTMd Meraj Ahmed, Navneet Kaur, Shikha Uniyal Gairola. 1-5 [doi]
- Decentralize Smart Contract Voting SystemDivyansh Singh, Reema Goyal, Anil Kumar Dixit. 1-5 [doi]
- Real Time Drowsiness Detection SystemNikhil Tyagi, Reema Goyal, Reeta Rautela. 1-3 [doi]
- Classification of Large Data Storage using Sine Optimization Algorithm and Comparison of Accuracy in terms of Distributed Community Discovery AlgorithmH. Sudarsan Kumar Raju, M. Nalini, P. Senthil Murugan. 1-4 [doi]
- IA2SKAbs: Intelligent automated and accurate system for classification of kidney abnormalitiesSaira Kanwal, Muhammad Adnan Khan 0001, Areej Fatima, Mahmoud M. Al-Sakhnini, Omar Sattar, Hamza Alrababah. 1-10 [doi]
- Distributed Search Engine Query Optimization Using Artificial Neural NetworkLiaqat Ali, Mahmoud M. Al-Sakhnini, Deepak Kalra, Farheen Afzaal, Madiha Pervaiz, Muhammad Farrukh Khan. 1-5 [doi]
- Diagnosis Ovarian Cancer & Prostate Cancer using Mamdani System of Fuzzy InterfaceMohammad Salahat, Harish K. G. Nair, Rasha Almajed, Naila Samar Naz, Aziz Ur Rehman, Muhammad Sheraz Javeid. 1-10 [doi]
- Classification of White Blood Cells Empowered with Auto Encoder and CNNSaif E. A. Alnawayseh, Waleed T. Al-Sit, Hamza Alrababah, Nasir Shahzad Yasin, Mayraj Fatima, Nasir Mehmood. 1-7 [doi]
- Brain Stroke Prediction Using ANNGhassan F. Issa, Khaled Shaalan, Yara Shaalan, Hafiza Afia Saeed, Noor Fatima, Abd Ur Rehman. 1-9 [doi]
- Research Paper on Path-finding Algorithm VisualizerLukesh Singh, Shanu Khare, Anjum Parvez, Sahil Verma. 1-4 [doi]
- Predicting the Fare of a Flight Ticket with Machine Learning AlgorithmsManoj Mulkalla, Deepika, Ankita Joshi. 1-5 [doi]
- Battle of Deep Fakes: Artificial Intelligence Set to Become a Major Threat to the Individual and National SecurityAtif Ali, Khushboo Farid Khan Ghouri, Hina Naseem, Tariq Rahim Soomro, Wathiq Mansoor, Alaa M. Momani. 1-5 [doi]
- JavaScript Quiz GameGurpartap Singh, Anup Lal Yadav, Satbir S. Sehgal. 1-5 [doi]
- Online Voting SystemKetan, Shanu Khare, Maninder Kaur, Tarun Parashar. 1-7 [doi]
- DeFi: A risky business or silver bullet for SMEs?Srinidhi Vasudevan. 1-5 [doi]
- Understanding Dark Web: A Systematic Literature ReviewTamer Mohamed Abdellatif, Raed A. Said, Taher M. Ghazal. 1-10 [doi]
- Heart Disease Prediction Using Machine Learning MethodMafia Rasheed, Muhammad Adnan Khan, Nouh Sabri Elmitwally, Ghassan F. Issa, Taher M. Ghazal, Hamza Alrababah, Beenu Mago. 1-6 [doi]
- An Intelligent Model to Predict Pneumonia Using Deep Extreme Machine Learning: *Note: Sub-titles are not captured in Xplore and should not be usedFaiza Khaliq, Muhammad Farhan Khan, Muhammad Sajid Farooq, Manas Ranjan Pradhan, Muhammad Asghar Khan, Tariq Rahim Somroo. 1-7 [doi]
- Development of an Email System using Java and comparison with other Email ApplicationsSunny Kumar, Sonali Dash, Lakshmipriya Vinjamuri, Kavita. 1-5 [doi]
- Challenges and Opportunities of Integrating, and Securing IoT technology in public placesZina Ahmed Abohaia. 1-8 [doi]
- Detection and classification of Melanoma image of skin cancer based on Convolutional Neural Network and comparison with Coactive Neuro Fuzzy Inference SystemM. Muniteja, M. K. Mariam Bee, V. Suresh. 1-5 [doi]
- Towards Privacy Provisioning for Internet of Things (IoT)Taher M. Ghazal, Mohammad Kamrul Hasan, Amelia Natasya Abdul Wahab, Amer Ibrahim, Wasim Ahmad Khan, Neha Zulfiqar Raza, Ayesha Atta, Beenu Mago. 1-7 [doi]
- Feature Encoding For High Cardinality Categorical Variables Using Entity Embeddings: A Case Study in Customs Fraud DetectionEric Khoo Jiun Hooi, Anazida Zainal, Mohamad Nizam Kassim, Zaily Ayub. 1-5 [doi]
- iFogSim: A Tool for Simulating Cloud and Fog ApplicationsUrooj Yousuf Khan, Tariq Rahim Soomro, Muhammad Nawaz Brohi. 1-5 [doi]
- Real Time Object DetectionSimranjeet Kaur, Anup Lal Yadav, Abhishek Joshi. 1-5 [doi]
- Digital Transformation and Disruptive Technologies: Effect of Blockchain on Managing Construction ProjectsMounir El Khatib, Sara Bin Khadim, Wadha Al Ketbi, Noura Hamad Al Kuwaiti, Ali El Khatib. 1-9 [doi]
- Comparative Analysis on PAPR Reduction scheme by using Novel Enhanced Active Constellation Scheme with selective level mapping for OFDM based systemsD. Alaik Venu Madhav, A. Raja, Jayalakshmi Somasundaram. 1-4 [doi]
- Performance Analysis of Multi-objective Data Placement Technique and Sine Optimization Algorithm to Measure Prediction in Large Volume of Data StorageH. Sudarsan Kumar Raju, M. Nalini, P. Senthil Murugan. 1-5 [doi]
- Implementation of an Intelligent Animal Monitoring System Using Wireless Sensor Network and IoT PlatformAteeq Ur Rehman 0002, Jehangir Arshad, Muhammad Tariq Sadiq, Abdul Rehman 0003, Munir Ahmad, Mohammad Kamrul Hasan, Hussam Al Hamadi, Tauqeer Faiz. 1-11 [doi]
- Activity Based Easy Learning Of PushDown AutomataLiaqat Ali, Nizar Sahawneh, Yousuf Agha, Saira Kanwal, Imran, Nouh Sabri Elmitwally. 1-8 [doi]
- Analytical Survey on the Security Framework of Cyber-Physical Systems for Smart Power System NetworksAhmed Hadi Ali AL-Jumaili, Ravie Chandren Muniyandi, Mohammad Kamrul Hasan, Mandeep Jit Singh, Johnny Koh Siaw Paw. 1-8 [doi]
- Digital Transformation and Disruptive Technologies: Effect of 3D Printing on Managing ProjectsMounir El Khatib, Afnan Ibrahim, Shamma Al Blooshi, Sara Almansoori, Ali El Khatib. 1-13 [doi]
- A Deep-Learning Method to Predicting Traffic Accidents Due to DrowseShivam Singh, Shreya Bansal, Anjum Parvez. 1-6 [doi]
- Design of Micro-Strip Patch Antenna using Metamaterial Substrate to improve the Directivity compared to FR4 SubstrateGA. Uday Kiran, K. Chanthirasekaran, N. Thiyaneswaran. 1-7 [doi]
- Intelligent Hand Gesture Recognition System Empowered With CNNTamer Mohamed, Amer Ibrahim, Tauqeer Faiz, Waseem Alhasan, Ayesha Atta, Vansh Mago, Muhammad Ahzam Ejaz, Salman Munir. 1-8 [doi]
- A Review of Cyber Threats to Medical Devices Integration with Electronic Medical RecordsAeshah Alhammad, Maryati Mohd. Yusof, Dian Indrayani Jambari. 1-6 [doi]
- Educational technology partnerships and entrepreneurship education: the impact of technology on students' achievementsTurki Fahed Al Masaeid, Hamzah Elrehail, Ayesha Kalim. 1-5 [doi]
- Shape Based Feature Extraction for Currency recognition and compare the accuracy and sensitivity with ORB algorithmS. Koti Niteesh Reddy, S. Prem Kumar, R. Karthikeyan. 1-5 [doi]
- Fintech and Leverage Of Virtual Reality An Outlook From UAEAqila Begum, Sophia Rahaman, Jesus Cuauhtemoc Tellez Gaytan. 1-7 [doi]
- Bone Fracture Identification using ANN Algorithm and Comparing the Accuracy with SVM AlgorithmB. Sumanth, G. Ramkumar, Vinay Sivasamy. 1-5 [doi]
- Innovativeness and Involvement: An Unexpected Purchase Due to a Referral BehaviorFizza Ramzan, Izza Ramzan, Muhammad Ibrahim, Kiran Tangri, Amer Hani Al-Kassem, Mohammad Inairat, Sunita Marwaha, Mounir El Khatib. 1-12 [doi]
- Crop Yield Prediction in Agriculture Using Gradient Boosting Algorithm Compared with Random ForestMys. Karthik Yasaswy, T. Manimegalai, Jayalakshmi Somasundaram. 1-4 [doi]
- Cybersecurity Trends in Health Information SystemsAhmad Mustafa Mohamad Al-Aboosi, Siti Norul Huda Sheikh Abdullah, Mohd Zamri Murah, Ghassan Saleh Al-Dharhani. 1-4 [doi]
- Smart Attenedence System Using Face RecognitionAnsh Jain, Gurinder Singh, Amit Semwal. 1-3 [doi]
- ReactJS For Trading ApplicationsPalak Dwivedi, Kshamta, Abhishek Joshi. 1-7 [doi]
- Machine Learning Based Prediction of Stock Exchange on NASDAQ 100: A Twitter Mining ApproachSaida Harguem, Zakariya Chabani, Samar Noaman, Muhammad Amjad, Muhammad Bux Alvi, Muhammad Asif, Muhammad Hassaan Mehmood, Amer Hani Al-Kassem. 1-10 [doi]
- Real-Time Drowsiness System Using Image ProcessingAviral Jindal, Deepika, Abhishek Joshi. 1-7 [doi]
- Modeling the Influence of data amount on the response time of CRUD Operations under OracleOmar Kassem Khalil, Rasha Hasan. 1-5 [doi]
- Vehicular Grounding Situation For Intelligent Transportation Administration Using AODV to Decrease the Round Trip in Urban and Semi Urban Using Smart Transport Techniques Comparing With Traffic Analysis Zone NetworksMys. Karthik Yasaswy, Arasu Sivagami, V. Suresh. 1-6 [doi]
- The Impact of Emotional Intelligence on Transformational Leadership in the Jordanian Islamic banksGhassan Issa Alomari, Raed Ibrahim Ibrahim, Mazen Alomari, Mohammad Ali Al-Qudah. 1-11 [doi]
- Detection of Dengue Disease Empowered with Fused Machine LearningMohammad Rustom Al Nasar, Iftikhar Nasir, Tamer Mohamed, Nouh Sabri Elmitwally, Mahmoud M. Al-Sakhnini, Tayba Asgher. 1-10 [doi]
- Security Analysis for Virtual Machine Allocation in Cloud ComputingTahir Alyas, Karamath Ateeq, Mohammed Alqahtani, Saigeeta Kukunuru, Nadia Tabassum, Rukshanda Kamran. 1-9 [doi]
- A Cost-efficient and Scalable Framework for E-Voting System based on Ethereum BlockchainUzma Jafar, Mohd Juzaiddin Ab Aziz, Zarina Shukur, Hafiz Adnan Hussain. 1-6 [doi]
- Qualitative Factors in Organizational Cyber ResilienceSrinidhi Vasudevan, Anna Piazza, Madeline Carr. 1-5 [doi]
- The Impact of IT on Knowledge Sharing Environment and Management PracticeAbdulghader Abu Reemah A Abdullah, Adamu Sa'ad Madaki, Ibrahim Mohamed, Nurhizam Safie Bin Mohd, Kamsuriah Ahmad. 1-7 [doi]
- Girl Child Security System based on IOT Technology with GPS Tracker Comparing with Fuzzy Classifier Based Safety DeviceJyothi Swaroop, T. J. Nagalakshmi, S. Subash Sharma. 1-6 [doi]
- Voice Enabled WebsiteBhavesh Kumar, Damandeep Kaur, Bharti Ramola. 1-5 [doi]
- An Empirical Study Exploring the Factors of Stress Level among DoctorsMubashra Mehmood, Noor Fatima, Abedallah Zaid Abualkishik, Umer Farooq, Amer Ibrahim, Kakul Agha. 1-8 [doi]
- An Application to Automate the Google Form SubmissionPawanjot Kaur, Divya K, Lakshmipriya Vinjamuri. 1-4 [doi]
- Object Detection Using Coco DatasetSwasti Jain, Sonali Dash, Rajesh Deorari, Kavita. 1-4 [doi]
- Using Cycling 3D Chaotic Map and DNA Sequences for Introducing a Novel Algorithm for Color Image EncryptionMahdi Sahlabadi, Morteza Saberikamarposhti, Ravie Chandren Muniyandi, Zarina Shukur. 1-7 [doi]
- Big Data and Electronic Records Management Systems for Public Sector Organizations CompetencyMuaadh Mukred, Burkan Hawash, Mohammed Islam Nofal, Umi Asma' Mokhtar, Zawiyah Mohammad Yusof. 1-7 [doi]
- Text-Based Emotion Detection and Applications: A Literature ReviewMashary N. Alrasheedy, Ravie Chandren Muniyandi, Fariza Fauzi. 1-9 [doi]
- ASSMA-SLM: Autonomous System for Smart Motor-Vehicles integrating Artificial and Soft Learning MechanismsMuhamamd Saleem, Assma Khadim, Mayraj Fatima, Muhammad Asghar Khan, Harish K. G. Nair, Muhammad Asif. 1-6 [doi]
- Detection and Mitigation of DDOS based Attacks using Machine Learning AlgorithmD. Satyanarayana, Aisha Said Alasmi. 1-5 [doi]
- A Review on Nature, Cybercrime and Best Practices of Digital FootprintsNurdiana Jamal, Jasni Mohamad Zain. 1-6 [doi]
- Simulation cycle for network scenario based on AD-Campus solutionZhang Wenhua, Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehudin, Yanke Zhang. 1-5 [doi]
- Simulation Comparison of Electrical Characterization in PZT and PVDF on Copper (Cu) substrate based MEMS piezoelectric harvesterM. Chakradhar, Cyril Robinson Azariah J, V. Suresh. 1-5 [doi]
- Enhancing the Performance Accuracy of Student Monitoring System by Face Detection and Tracking in Classroom Environment using RNN over MTCNN AlgorithmsN. Kamal Koushik, D. J. Gino Sinthia, P. Kiran Kumar. 1-5 [doi]
- Sign language recognition Using PythonGurpartap Singh, Anup Lal Yadav, Satbir S. Sehgal. 1-5 [doi]
- Improved Accuracy in Automatic Detection of Tuberculosis Disease from Lung CT images using Support Vector Machine Classifier over K-Nearest Neighbours ClassifierTishya Shakya, R. Beaulah Jeyavathana, P. Kiran Kumar. 1-5 [doi]
- An Effective Approach for the Prediction of Car Loan Default Based-on Accuracy, Precision, Recall Using Extreme Logistic Regression Algorithm and K-Nearest Neighbors Algorithm on Financial Institution Loan DatasetDadithota Jaya Prakash Reddy, M. Gunasekaran, K. K. Shantha Sundari. 1-5 [doi]
- Classification of Skin Cancer empowered with convolutional neural networkAyesha Atta, Muhammad Adnan Khan 0001, Muhammad Asif 0010, Ghassan F. Issa, Raed A. Said, Tauqeer Faiz. 1-6 [doi]
- Skin Cancer Detection and Classification Based on Deep LearningRaed A. Said, Hammad Raza, Salman Muneer, Kamran Amjad, Abdul Salam Mohammed, Syed Shehryar Akbar, Muhammad Zonain, Muhammad Arslan Aslam. 1-11 [doi]
- Bring Your Own Device Information Security Policy Compliance Framework: A Systematic Literature Review and Bibliometric Analysis (2017-2022)Odai Ali Ali Sharfadeen AL-Azazi, Azah-Anir Norman, Norjihan Binti Abdul Ghani. 1-8 [doi]
- Genetic Algorithm-Based Feature Selection and Self-Organizing Auto-Encoder (SOAE) For SNP Genomics Data ClassificationD. Karthika, M. Deepika, Neyara Radwan, Amer Hani Al-Kassem. 1-6 [doi]
- Fusion Based Self Diagnosis Expert System Empowered with Leven-berg Marquardt AlgorithmShahan Yamin Siddiqui, Muhammad Ubaid Ullah, Aqsa Anwar, Alaa M. Momani, Liaqat Ali, Mohammed Salahat. 1-6 [doi]
- Implementation of EIGRP Using Packet TracerRounak Agarwala, Reema Goyal, Babita Rawat. 1-4 [doi]
- Prediction of Heart Disease Using Naive Bayes in Comparison with KNN Based on AccuracyGunasekhar Reddy Thummala, Radhika Baskar, N. Thiyaneswaran. 1-4 [doi]
- Detection of forest fire using support vector machine in comparison with random forest to measure accuracy, precision and recallInturi Susmitha, Roseline J. Femila, Vinay Sivasamy. 1-6 [doi]
- Showrooming and Webrooming: Investigating the Consumer's Path to Purchase IntentionIzza Ramzan, Fizza Ramzan, Muhammad Ibrahim, Naseem Abidi, Amer Hani Al-Kassem, Riktesh Srivastava. 1-11 [doi]
- Determine the optimal Hidden Layers and Neurons in the Generative Adversarial Networks topology for the Intrusion Detection SystemsAli Lamjid, Khairul Akram Zainol Ariffin, Mohd Juzaiddin Ab Aziz, Nor Samsiah Sani. 1-7 [doi]
- Real-Time Based Driver's Drowsiness and Fatigue Detection SystemAshish Srivastava, Shreya Bansal, Satbir S. Sehgal. 1-6 [doi]
- Neurological Disorder Detection Using OCT Scan Image of EyeMuhammad Arslan Aslam, Muhammad Zonain, Salman Muneer, Omar Sattar, Mohammad Salahat, Muhammad Saleem. 1-13 [doi]
- Blockchain Technology in Requisites of Openscience, Bigdata It's ApplicationsUmang Srivastava, Bhupinder Kaur, Amit Semwal. 1-4 [doi]
- The Summer Heat of Cryptojacking Season: Detecting Cryptojacking using Heatmap and FuzzyAhmad Firdaus, Ghassan Saleh AlDharhani, Zahian Ismail, Mohd Faizal Ab Razak. 1-5 [doi]
- Employee Hiring using Machine LearningVaibhav Rathor, Navneet Kaur, Reeta Rautela. 1-3 [doi]
- Brain Tumor detection with GLCM feature extraction and hybrid classification approachShardeep Kaur Sooch, Darpan Anand, Rajesh Deorari. 1-5 [doi]
- Computational Model Based Approach to Analyze Calcium (Ca2+) Concentration Effects in Ventricular Cells for Action Potential Generation Using Euler Integration Method-A Simulation StudyK. Tejasree, G. Gulothungan, R. Navaneethan. 1-5 [doi]
- Recognition of Handwritten Digit Using Different Machine Learning AlgorithmsKumar Priyadarshini, Satnam Singh, Anil Kumar Dixit. 1-4 [doi]
- A Detailed Study of Blockchain and dappsSourav Verma, Sonali Dash, Ankita Joshi, Kavita. 1-5 [doi]
- The mediating effect of attitudes on the relationship between e-learning adoption and business students' performance in Jordanian universitiesMufleh Amin Jarrah, Tayseer M. AL Afaishat, Ghassan Issa Al Omari, Hamza Salim Khraim. 1-13 [doi]
- Cryptography in Network SecurityShivam, Sugandhi Midha, Bharti Ramola. 1-5 [doi]
- Machine Learning in Healthcare Industry: An AnalysisKanhaiya Jee, Amanpreet Kaur, Abhishek Joshi. 1-4 [doi]
- Smart face detection and recognition in Pose variant images using Alexnet CNN compare accuracy with SVMS. Mahesh, G. Ramkuma, K. Anjaneyulu. 1-4 [doi]
- Estate Price Predictor for Multan City Townships Using Marching LearningBarween Al Kurdi, Hammad Raza, Salman Muneer, Muhammad Bux Alvi, Naseem Abidi, Muhammad Turki Alshurideh. 1-5 [doi]
- Drones network security enhancement using smart based block-chain technologyFatima Fayyaz, Taher M. Ghazal, Mohammed A. M. Afifi, Sagheer Abbas, Hussam M. N. Al Hamadi. 1-6 [doi]
- Wi-Fi Aided Home Energy Management System and AC Prediction through Temperature and Humidity SensorsMuhammad Tahir, Abdul Salam Mohammed, Sunita Marwaha, Mohit Vij, Yousaf Saeed, Muhammad Atif, Iqra Kanwal, Muhammad Hassan Ghulam Muhammad. 1-9 [doi]
- Facial Expression Detection using Convolutional Neural NetworkMudit, K. Divya, Sanjeev Kumar Joshi, Sahil Verma. 1-5 [doi]
- Designing an MI-PCA based Agile Intrusion Detection SystemSunil Kaushik, Akashdeep Bhardwaj, Ateeq Ur Rehman 0002, Salil Bharany, Saida Harguem, Saigeeta Kukunuru, Ossma Ali Thawabeh. 1-7 [doi]
- Design of RF MEMS Series Switch using Different Switch Materials to Enhance the RF Performances at DC to 40 GHz 'zeB. Shaik Tabrash, G. Anitha, O. R. Hemavathy. 1-7 [doi]
- JavaScript API Deprecation Landscape: A Mining StudyPriyanshu Sharma, Damandeep Kaur, Bharti Ramola. 1-5 [doi]
- The effectiveness of Women 4IR Cyber 3A #Aware, Avoid, Act Program in MalaysiaSiti Baizura Mohd Yusof, Siti Norul Huda Sheikh Abdullah, Masnizah Mohd, Noridayu Adnan, Raja Jamilah Raja Yusof, Umi Asma' Mokhtar, Azah-Anir Norman, Wan Fariza Paizi Fauzi. 1-5 [doi]
- Cloud-based Data Extraction From Mobile Devices: A Preliminary AnalysisMuhammad Haziq Mohd Zainudin, Khairul Akram Zainol Ariffin, Dahlia Asyiqin Ahmad Zainaddin, Ahmad Tarmizi Abdul Ghani, Siti Norul Huda Sheikh Abdullah. 1-5 [doi]
- Harvesting Period Prediction Based on Stages of Mango Ripening Using CNN over Decision TreeSriram AdiVishnu, V. Nagaraju, K. K. Shantha Sundari. 1-4 [doi]
- Voice Controlled Personal AssistantAman Kumar Gupta, Sugandhi Midha, Vaibhav Uniyal. 1-3 [doi]
- Privacy-based framework for Cyber Resilience of Healthcare based data for use with Machine Learning algorithmsVarun Sapra, Mohammad Kamrul Hasan, Taher M. Ghazal, Akashdeep Bhardwaj, Salil Bharany, Munir Ahmad, Ateeq Ur Rehman 0002, Tamer Mohamed. 1-6 [doi]
- Responsive Webpage Using HTML CSSUtkarsh Kaushal, Gurinder Singh, Tarun Parashar. 1-4 [doi]
- Imperceptible Image Steganography Technique Using a Novel PIT-Based TechniqueSami Ghoul, Rossilawati Sulaiman. 1-7 [doi]
- A Review on Security Attacks and countermeasure in Home Area Network (HAN)Jehangir Arshad, Ateeq Ur Rehman 0002, Shiza Gull Niazi, Deepak Kalra, Wathiq Mansoor. 1-6 [doi]
- Custom Analytics Module and Admin Panel for Websites built in PHP (Laravel)Vaibhav Dalip, Anup Lal Yadav, Ankita Joshi. 1-4 [doi]
- Real-Time Gesture Recognition System using CNNShubham Bhardwaj, Divya K, Abhishek Kumar Pathak. 1-3 [doi]
- Prediction of Early Stage of Fatty Liver Disease in Patients using Logistic Regression and Naive Bayes AlgorithmO. Pavithra, G. PadmaPriya, R. Karthikeyan. 1-5 [doi]
- IoT-Based Warehouse Management SystemMohammad Kamrul Hasan, Ma Junjie, A K. M. Ahasan Habib, Abdullah Al Mamun, Taher M. Ghazal, Rashid A. Saeed. 1-6 [doi]
- Intelligence Skin Cancer Detection using IoT with a Fuzzy Expert SystemNidal A. Al-Dmour, Mohammad Salahat, Harish K. G. Nair, Nayab Kanwal, Muhammad Saleem, Nauman Aziz. 1-6 [doi]
- Customization of Bookkeeping system for Blockchain System Analysis: A ReviewKapil Joshi, Richa Pandey, Salil Bharany, Ateeq Ur Rehman 0002, Nasser Taleb, Deepak Kalra. 1-5 [doi]
- Influencing Factors of E-Learning Towards E-Learner's SatisfactionSaida Harguem, Sunita Marwaha, Samar Noaman, Naeem Ali, Nasir Ali, Khadija Kanwal. 1-9 [doi]
- The Impact of Artificial Intelligence on Global TrendsAvani Bhandari, Nanmaran R, Lakshmipriya Vinjamuri. 1-6 [doi]
- Cyber-attack Group Representation based on Adversary Artifacts with Machine LearningAhmad Asyraf Mustafar, Noor Faridatul Ainun Zainal, Tajul Azhar Mohd Tajul Ariffin, Siti Norul Huda Sheikh Abdullah, Kauthar Mohd Daud, Yau Ti Dun. 1-6 [doi]
- Explainable Artificial Intelligence to Detect Image Spam Using Convolutional Neural NetworkZhibo Zhang, Ernesto Damiani, Hussam M. N. Al Hamadi, Chan Yeob Yeun, Fatma Taher. 1-5 [doi]
- Prediction of Prices Car Price Prediction with Machne LearningSachin Kumar, Damandeep Kaur, Anjum Parvez. 1-4 [doi]
- Hybrid Development in Flutter and its WidgitsSwati Sharma, Shanu Khare, Vaibhav Unival, Sahil Verma. 1-4 [doi]
- Drowsiness Detector Using Python For Reducing AccidentMD Taammimul Haque, Amanpreet Kaur, Tarun Parashar. 1-5 [doi]
- A Systematic Literature Review of Security in 5G based Social NetworksMuhammad Turki Alshurideh, Bader Y. Obeidat, Vorobeva Victoria, Haitham M. Alzoubi, Areej Fatima, Amna Ilyas, Iqra Rustam. 1-5 [doi]