Most Popular Papers*
A Comprehensive Review of Software Development Life Cycle methodologies: Pros, Cons, and Future Directions
Qahtan M. Yas, Abdulbasit ALazzawi, and Bahbibi Rahmatullah
An Enhanced Cyber Security for Finger Knuckle Print Recognition System Using Rubik’s Cube with Rabbit Encryption Algorithm
Haitham Salman Chyad and Tarek Abbes
Artificial Intelligence in Education: Mathematics Teachers’ Perspectives, Practices and Challenges
Mohammad A. Tashtoush, Yousef Wardat, Rommel Al Ali, and Shoeb Saleh
A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, and Mostafa Abotaleb
Quantum Machine and Deep Learning for Medical Image Classification: A Systematic Review of Trends, Methodologies, and Future Directions
Eman A. Radhi, Mohammed Y. Kamil, and Mazin Abed Mohammed
A Robust and Energy-Efficient Federated IDS for IIoT Using Spiking Neural Networks and Differential Evolution with Adversarial Resilience
Mohammad Othman Nassar
The Efficacy of Utilizing Artificial Intelligence Techniques in Developing Critical Thinking in Mathematics among Secondary School Students and their Attitudes Toward it
Mohammad A. Tashtoush, Aida B. Qasimi, Nawal H. Shirawia, and Lubna A. Hussein
Implementing an Automated Inventory Management System for Small and Medium-sized Enterprises
Mohanad Ghazi, Hayder Sabah Salih, and Mohammad Al janabi
Recognition of Bangla and English Words in Bengali Texts Using a Modified BERT-base-NER Model
Md Parvez Hossain, Ohidujjaman Ohidujjaman, Mohammad Shorif Uddin, Mohammad Nurul Huda, and Tetsuya Shimamura
Detection of pedophilia content online: A case study usingTelegram
Shafran Packeer and D.T.V Kannangara
* Based on the average number of full-text downloads per day since the paper was posted.