Most Recent Additions*
Enhancing Smartphone Authentication by Integrating Decision-Making Model with Touch Pressure, Finger Location Data, and Advanced Cybersecurity Techniques
Maytham M. Hamood, Moceheb Lazam Shuwandy, and Rawan Adel Fawzi Alsharida
Enhancing Accuracy in Predicting Continuous Values through Regression
Ahmed Aljuboori and M. M. A. Abdulrazzq
Enhancing Multi-Robot SLAM: Centralized LiDAR-Based Loop Closure Detection Approach
Basma Ahmed Jalil and Ibraheem Kasim Ibraheem
Evaluating the Effect of Students' Behavioural Intention to Use Social Media for Collaborative Learning
Nur Shamsiah Abdul Rahman and Noor Azida Sahabudin
Secure Healthcare Systems and Big Data: A Bibliometrics Analysis
Rasha Talal Hameed, Saad Ahmed Dheyab, Saba Abdulbaqi Salman, Ahmed Hussein Ali, and Omar Abdulwahabe Mohamad
Integrating Image Data Fusion and ResNet Method for Accurate Fish Freshness Classification
Yahya Layth Khaleel, Mustafa Abdulfattah Habeeb, and Ghadeer Ghazi Shayea
Develop Secure Software specifications for Android App concealing the Information and Safeguarding Data
Huda Abdulaali Abdulbaqi, Ahmmad Mohamad Ghandour, and Thekrayat Abbas Jawad
Unveiling The Shadows: The Influence of Anonymity and Fake Accounts on Cyberbully Intention in Social Media
Muzdalini Malik, Hapini Awang, Nur Suhaili Mansor, Mohamad Fadli Zolkipli, Khuzairi Mohd Zaini, and Abdulrazak F. Shahatha Al-Mashhadani
Energy Optimization in Wireless Sensor Networks: A Review
Zahraa Hammodi, Ahmed Al Hilli, and Mohanad Al-Ibadi
E-Learning Management Technology Integration for Laboratory Usage
Mohammed Khaleel Hussein, Mohammed Ahmed Subhi, Saleh Mahdi Mohammed, and Mayasah Al-khateeb
The Significance of Cannibalism, Panic, and Sanctuary in the Interactions Between Prey and Predator with a Stage Structure
Ahmed Sami Abdulghafour and Raid Kamel Naji
Secure Blind Medical Image Watermarking Using Hybrid Feature Extraction Techniques
Sawsan D. Mahmood, Yassine Aribi, Fadoua Drira, and Adel M. Alimi
Convolutional Neural Networks for Dementia Severity Classification: Ordinal Versus Regular Methods
Ambresh Bhadrashetty and P. Sandhya
New Three-Parameter Exponentiated Benini Distribution: Properties and Applications
Elif Yıldırım, Gamze Özel, Christophe Chesneaul, Farrukh Jamal, and Ahmed M. Gemeay
Investigating Intrusion Detection System Using Federated Learning for IoT Security Challenges
Mohammed Q. Mohammed, Zena Abd Alrahman, and Aouf R. Shehab
Explainable Machine Learning Approach enables Computer-Aided Identification System for Children Autism Spectrum Disorder (C-ASD)
Karrar Hameed Abdulkareem, Zainab Hussein Arif, and Mazin Abed Mohammed
Stable Heterogeneous Traffic Flow with Effective Localization and Path Planning in Wireless Network Connected and Automated Vehicles in~Internet of Vehicular Things (IoVT)
Ahmed N. Rashid and Ahmed Mahdi Jubair
A Comprehensive Analysis of Partition Dimensions in Efavirenz Abacavir Lamivudine Doravirine of Anti-HIV Drug Structures
R. Nithya Raj, R. Sundara Rajan, and Hijaz Ahmad
Embedded Schemes of the Runge-Kutta Type for the Direct Solution of Fourth-Order Ordinary Differential Equations
F. A. Fawzi and Nizam G. Ghawadri
Robust-Fragile Watermarking Using Integer Wavelet Transform for Tampered Detection and Copyright Protection
Hendra Budi, Ferda Ernawan, and Agit Amrullah
*Updated as of 01/17/25.