Most Recent Additions*
Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data
Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad
Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media
Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani
Energy Optimization in Wireless Sensor Networks: A Review
Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi
E-Learning Management Technology Integration for Laboratory Usage
Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb
The Significance of Cannibalism, Panic, and Sanctuary in the Interactions Between Prey and Predator with a Stage Structure
Ahmed Sami Abdulghafour and Raid Kamel Naji
Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques
Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi
Convolutional Neural Networks for Dementia Severity Classification: Ordinal Versus Regular Methods
Ambresh Bhadrashetty and P. Sandhya
New Three-Parameter Exponentiated Benini Distribution: Properties and Applications
Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay
Investigating Intrusion Detection System Using Federated Learning for IoT Security Challenges
Mohammed Q. Mohammed, Zena Abd Alrahman, and Aouf R. Shehab
Explainable Machine Learning Approach enables Computer-Aided Identification System for Children Autism Spectrum Disorder (C-ASD)
Karrar Hameed Abdulkareem, Zainab Hussein Arif, and Mazin Abed Mohammed
Stable Heterogeneous Traffic Flow with Effective Localization and Path Planning in Wireless Network Connected and Automated Vehicles in~Internet of Vehicular Things (IoVT)
Ahmed N. Rashid and Ahmed Mahdi Jubair
A Comprehensive Analysis of Partition Dimensions in Efavirenz Abacavir Lamivudine Doravirine of Anti-HIV Drug Structures
R. Nithya Raj, R. Sundara Rajan, and Hijaz Ahmad
Embedded Schemes of the Runge-Kutta Type for the Direct Solution of Fourth-Order Ordinary Differential Equations
F. A. Fawzi and Nizam G. Ghawadri
Robust-Fragile Watermarking Using Integer Wavelet Transform for Tampered Detection and Copyright Protection
Hendra Budi, Ferda Ernawan, and Agit Amrullah
Modelling Security Factors Influencing E-Wallet Adoption in Malaysia
Adi Badiozaman Ruhani, Nur Suhaili Mansor, Hapini Awang, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abderrahmane Benlahcene
Robust Image Watermarking Based on Schur Decomposition
Ahmad Toha, Ferda Ernawan, and Agit Amrullah
Image Watermarking using Firefly Algorithm–IWT-SVD for Copyright Protection
Anjahul Khuluq, Ferda Ernawan, Agit Amrullah, and Mohd Arfian Ismail
Robust Image Watermarking Based on IWT-DCT-SVD for Copyright Protection
Syafiqul Shubuh, Ferda Ernawan, Agit Amrullah, and Prajanto Wahyu
Automated Fake News Detection System
Saja A. Al-obaidi and Tuba Çağlıkantar
Posinormality of Operators Treated by Weyl's Theorem on Unbounded Hilbert Space
Abbas G. Rajij, Dalia S. Ali, Huseyin Cakalli, and Nadia M. G. Al-Saidi
*Updated as of 12/06/24.