Most Recent Additions*

PDF

Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data
Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad

PDF

Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media
Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani

PDF

Energy Optimization in Wireless Sensor Networks: A Review
Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi

PDF

E-Learning Management Technology Integration for Laboratory Usage
Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb

PDF

Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques
Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi

PDF

New Three-Parameter Exponentiated Benini Distribution: Properties and Applications
Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay

PDF

Modelling Security Factors Influencing E-Wallet Adoption in Malaysia
Adi Badiozaman Ruhani, Nur Suhaili Mansor, Hapini Awang, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abderrahmane Benlahcene

PDF

Robust Image Watermarking Based on Schur Decomposition
Ahmad Toha, Ferda Ernawan, and Agit Amrullah

PDF

Image Watermarking using Firefly Algorithm–IWT-SVD for Copyright Protection
Anjahul Khuluq, Ferda Ernawan, Agit Amrullah, and Mohd Arfian Ismail

PDF

Robust Image Watermarking Based on IWT-DCT-SVD for Copyright Protection
Syafiqul Shubuh, Ferda Ernawan, Agit Amrullah, and Prajanto Wahyu

PDF

Automated Fake News Detection System
Saja A. Al-obaidi and Tuba Çağlıkantar

PDF

Posinormality of Operators Treated by Weyl's Theorem on Unbounded Hilbert Space
Abbas G. Rajij, Dalia S. Ali, Huseyin Cakalli, and Nadia M. G. Al-Saidi

*Updated as of 12/06/24.