Most Recent Additions*
A Proposed Secure Video Using Lightweight ChaCha20 based on Chaotic Map
Hadeel Mohammed Taher and Ali Makki Sagheer
Application of Adversarial Volumetric CNNs to 3D Face Generation Using Latent Space Gaussian Embeddings
Ali Raad Abdulkareem, Marwa Jabberi, Islem Jarraya, Tarek M. Hamdani, Khmaies Ouahada, and Adel M. Alimi
Fuzzy Backstepping Approach to Stabilizing Fuzzy Parabolic Partial Differential Equations
Zainab John, Fadhel S. Fadhel, Samsul Ariffin Abdul Karim, and Teh Yuan Ying
Improving Road Safety Through Multimodal Deep Learning for Driver Drowsiness Detection
Hadel A. Hussain, Mohammed A. Subhi, Ahmed S. Al Tmeme, Ahmed D. Radhi, and Marwan Ali Albahar
Deep Learning-Based Fog-Cloud Approach Intrusion Detection System in IoMT
Yahya Rbah, Mohammed Mahfoudi, Mohammed Fattah, Younes Balboul, Said Mazer, and Moulhime Elbekkali
MultiTaskVenationNet: A Multi-Task Deep Neural Network with Strip Pooling and Hybrid Upsampling for Leaf Vein Segmentation
Ishak Ariawan, Ahmad Ashari, and Moh. Edi Wibowo
Artificial Intelligence in Higher Education: Opportunities and Challenges
Maytha AL-Ali, Adam Marks, Jasur Umirzokov, and Noura Metawa
AI-Driven Flood Prediction, Monitoring, and Warning Systems: Design, Evaluation, and Simulation
Abdel Rahman A. Alkharabsheh and Lina M. Momani
Blind Medical Image Watermarking Method Using Combined NSCT/2D-DCT Domains
Ali Kouadri, Ali Benziane, Abdelhalim Rabehi, and Mohamed Lebcir
An Enhanced Cyber Security for Finger Knuckle Print Recognition System Using Rubik’s Cube with Rabbit Encryption Algorithm
Haitham Salman Chyad and Tarek Abbes
Recognition of Bangla and English Words in Bengali Texts Using a Modified BERT-base-NER Model
Md Parvez Hossain, Ohidujjaman Ohidujjaman, Mohammad Shorif Uddin, Mohammad Nurul Huda, and Tetsuya Shimamura
A Novel Hybrid Intrusion Detection Model: A New Metaheuristic Approach for Feature Selection Based on AI Techniques for Cyber Threat Detection
Maryam Mahdi Alhusseini and Alireza Rouhi
A Robust and Energy-Efficient Federated IDS for IIoT Using Spiking Neural Networks and Differential Evolution with Adversarial Resilience
Mohammad Othman Nassar
Analysis of Energy Sector CO2 Emanations Using Wavelet-Based Numerical Technique
Yeshwanth R. and Kumbinarasaiah S.
Study of ~-Topological Space by ~-Binary Relation in Cluster System
Mustafa Hasan Hadi and Luay Abd Al haine Al swidi
Adaptive Crossover and Mutation Mechanisms for Enhanced LPB Algorithm Performance
Abbas M. Ahmed and Tarik A. Rashid
IoT-Enabled Machine Learning Framework for Prediction of Eutrophication
Hocine Dai, Akli Abbas, Houssam Eddine-Othman Lachemat, and Aicha Aid
Multi Features Data Clustering Using Novel Statistical Method with Application to Color Images
Husham Y. A. Alameen and Ali Karah Bash
A New Approach for Multiprocessor System-On-Chip Application Scheduling in Multi-Objective Flow Shops
Tahani Jabbar Khraibet, Bayda Atiya Kalaf, and Ahmed Abbas Jasim
Comparison of Liu-Type Estimator for Multicollinearity in Fuzzy Logistic Regression Model
Ayad Habib Shemail, Ahmed Razzaq Al-Lami, and Amal Hadi Rashid
*Updated as of 12/26/25.