Volume 5, Issue 4 (2024)
Original Studies
Posinormality of Operators Treated by Weyl's Theorem on Unbounded Hilbert Space
Abbas G. Rajij, Dalia S. Ali, Huseyin Cakalli, and Nadia M. G. Al-Saidi
Automated Fake News Detection System
Saja A. Al-obaidi and Tuba Çağlıkantar
Robust Image Watermarking Based on IWT-DCT-SVD for Copyright Protection
Syafiqul Shubuh, Ferda Ernawan, Agit Amrullah, and Prajanto Wahyu
Image Watermarking using Firefly Algorithm–IWT-SVD for Copyright Protection
Anjahul Khuluq, Ferda Ernawan, Agit Amrullah, and Mohd Arfian Ismail
Robust Image Watermarking Based on Schur Decomposition
Ahmad Toha, Ferda Ernawan, and Agit Amrullah
Modelling Security Factors Influencing E-Wallet Adoption in Malaysia
Adi Badiozaman Ruhani, Nur Suhaili Mansor, Hapini Awang, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abderrahmane Benlahcene
Robust-Fragile Watermarking Using Integer Wavelet Transform for Tampered Detection and Copyright Protection
Hendra Budi, Ferda Ernawan, and Agit Amrullah
Embedded Schemes of the Runge-Kutta Type for the Direct Solution of Fourth-Order Ordinary Differential Equations
F. A. Fawzi and Nizam G. Ghawadri
A Comprehensive Analysis of Partition Dimensions in Efavirenz Abacavir Lamivudine Doravirine of Anti-HIV Drug Structures
R. Nithya Raj, R. Sundara Rajan, and Hijaz Ahmad
Stable Heterogeneous Traffic Flow with Effective Localization and Path Planning in Wireless Network Connected and Automated Vehicles in~Internet of Vehicular Things (IoVT)
Ahmed N. Rashid and Ahmed Mahdi Jubair
Explainable Machine Learning Approach enables Computer-Aided Identification System for Children Autism Spectrum Disorder (C-ASD)
Karrar Hameed Abdulkareem, Zainab Hussein Arif, and Mazin Abed Mohammed
Investigating Intrusion Detection System Using Federated Learning for IoT Security Challenges
Mohammed Q. Mohammed, Zena Abd Alrahman, and Aouf R. Shehab
New Three-Parameter Exponentiated Benini Distribution: Properties and Applications
Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay
Convolutional Neural Networks for Dementia Severity Classification: Ordinal Versus Regular Methods
Ambresh Bhadrashetty and P. Sandhya
Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques
Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi
The Significance of Cannibalism, Panic, and Sanctuary in the Interactions Between Prey and Predator with a Stage Structure
Ahmed Sami Abdulghafour and Raid Kamel Naji
E-Learning Management Technology Integration for Laboratory Usage
Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb
Energy Optimization in Wireless Sensor Networks: A Review
Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi
Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media
Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani
Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data
Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad
Integrating Image Data Fusion and ResNet Method for Accurate Fish Freshness Classification
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, and Ghadeer Ghazi Shayea
Secure Healthcare Systems and Big Data: A Bibliometrics Analysis
Rasha Talal Hameed, Saad Ahmed Dheyab, Saba Abdulbaqi Salman, Ahmed Hussein Ali, and Omar Abdulwahabe Mohamad