Volume 3, Issue 2 (2022)
Original Studies
Identification Method of Power Internet Attack Information Based on Machine Learning
Yitong Niu and Korneev Andrei
Chaotic Dynamics in the 2D System of Nonsmooth OrdinaryDifferential Equations
Zain-Aldeen S. A. Rahman, Basil H. Jasim, and Yasir I. A. Al-Yasir
Characterizations ofsf-simple extension of topologies
Mohammed Abbas Yaseen and Raad Aziz Hussain
Evaluation Algorithms Based on Fuzzy C-means for the DataClustering of Cancer Gene Expression
Omar Al- anabee and Basad Al Sarray
TWO-STAGE SHRINKAGE BAYESIAN ESTIMATORS FORTHE SHAPE PARAMETER OF PARETO DISTRIBUTIONDEPENDENT ON KATTI’S REGIONS
Marwa Hashem Abd Ali, Alaa Khlaif Jiheel, and Zuhair Al Hemyari
Detection of pedophilia content online: A case study usingTelegram
Shafran Packeer and D.T.V Kannangara
Ensemble Machine Learning Techniques for Attack Prediction inNIDS Environment
T. Sreenivasula reddy and R Sathya
Survey on Generative Adversarial Behavior in Artificial NeuralTasks
Roheen Qamar, Naomi Bajao, Iswanto Suwarno, and Fareed Ahmed Jokhio
Big Data Streaming Platforms: A Review
Harish Kumar and Mohd Arfian Ismail
Socio-Transactional Impact of Recency, Frequency, and MonetaryFeatures oN Customers’ Behaviour in Telecoms’ Churn Prediction
Ayodeji O.J Ibitoye, Clement ONIME, Nashwan Dheyaa Zaki, and Olufade F.W Onifade
New Virtual Environment Based on Python Programming
Omar Abdulwahabe Mohamad
The Use of DCNN for Road Path Detection and Segmentation
Nada Mohammed Murad, Lilia Rejeb1, and Lamjed Ben Said