Issue 2/2025
Content (41 Articles)
A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate Arrays
- Review Article--Computer Engineering and Computer Science
Ali Alsuwaiyan, Aliyu Abubakar Habib, Ali Bello Imoukhuede, Mohamed Osman Omar, Md Al Maruf, Mansour Alqarni, Aiman El-Maleh, Abdulaziz Tabbakh, Muhamad Felemban, Akramul Azim
Stacked LSTM Deep Neural Networks for Accurate Recognition of Prayer Activities with Smartphone Sensors
- Research Article-Computer Engineering and Computer Science
Liyakathunisa Syed
Toward Detecting Rumor Initiator in Online Social Networks Using Ontology-Driven Model
- Research Article-Computer Engineering and Computer Science
Shruti Bajpai, Amrita Chaturvedi
A Binary Chaotic Transient Search Optimization Algorithm for Enhancing Feature Selection
- Research Article-Computer Engineering and Computer Science
Amir Mohammad Sharafaddini, Najme Mansouri
Uncertainty Modelling in Performability Prediction for Safety-Critical Systems
- Research Article-Computer Engineering and Computer Science
Shakeel Ahamad, Ratneshwer Gupta
Elite Opposition-Based Bare Bones Mayfly Algorithm for Optimization Wireless Sensor Networks Coverage Problem
- Research Article-Computer Engineering and Computer Science
Guo Zhou, Tian Zhang, Yongquan Zhou
Hybrid-Driven Car-Following Model Based on Improved Composite Network and IDM
- Research Article-Computer Engineering and Computer Science
Fengmin Wu, Zupeng Zhou, Yihua Guo
Detection and Elimination of Dynamic Feature Points Based on YOLO and Geometric Constraints
- Research Article-Computer Engineering and Computer Science
Jiajia Lu, Xianwei Wang, Yue Tang, Kan Xi, Yue Shen, Weichao Chen
Persian Traffic Sign Classification Using Convolutional Neural Network and Transfer Learning
- Research Article-Computer Engineering and Computer Science
Seyed Mahdi Safavi, Hadi Seyedarabi, Reza Afrouzian
Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption
- Research Article-Computer Engineering and Computer Science
Muhammad Umair Safdar, Tariq Shah, Asif Ali
Triple-ATFME: Triple-Branch Attention Fusion Network for Micro-Expression Recognition
- Research Article-Computer Engineering and Computer Science
Fei Li, Ping Nie, Meiming You, Zhichao Chen, Guoqiang Wang
CCLHF-Net: Constrained Convolution Layer and Hybrid Features-Based Skip Connection Network for Image Forgery Detection
- Research Article-Computer Engineering and Computer Science
Koyya Deepthi Krishna Yadav, Ilaiah Kavati, Ramalingaswamy Cheruku
Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms
- Open Access
- Research Article-Computer Engineering and Computer Science
Latif Akçay, Berna Örs Yalçın
A Hybrid Principal Label Space Transformation-Based Binary Relevance Support Vector Machine and Q-Learning Algorithm for Multi-label Classification
- Research Article-Computer Engineering and Computer Science
Seyed Hossein Seyed Ebrahimi
Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on Smartphone
- Research Article-Computer Engineering and Computer Science
Sidra Abbas, Shtwai Alsubai, Stephen Ojo, Gabriel Avelino Sampedro, Ahmad Almadhor, Abdullah Al Hejaili, Imen Bouazzi
TrustChain: Trusted Blockchain-Based System for Supply Chain Traceability
- Research Article-Computer Engineering and Computer Science
Muhannad Mohammed, Muhannad Alzahrani, Abdulla Hejjou, Maher Alharby
A New Trajectory Reduction Method for Mobile Devices Operating Both Online and Offline
- Open Access
- Research Article-Computer Engineering and Computer Science
Samet Diri, Mehmet Yildirim
Arabic Fake News Detection in Social Media Context Using Word Embeddings and Pre-trained Transformers
- Research Article-Computer Engineering and Computer Science
Mohammad Azzeh, Abdallah Qusef, Omar Alabboushi
Control of Discrete Event Systems by Using Symbolic Transition Model: An Application to Power Grids
- Open Access
- Research Article-Computer Engineering and Computer Science
Mete Özbaltan
Disrupting the Status Quo: Blockchain’s Potential for Overhauling Conventional Academic Systems
- Research Article-Computer Engineering and Computer Science
Saeed M. Alshahrani
Recurrence Dynamic Modeling of Metropolitan Cellular Network Traffic
- Research Article-Computer Engineering and Computer Science
Yingqi Li, Yu Wang, Mingxiang Hao, Xiaochuan Sun
Enhancing Power Lines Detection Using Deep Learning and Feature-Level Fusion of Infrared and Visible Light Images
- Open Access
- Research Article-Computer Engineering and Computer Science
Hossam Aboalia, Sherif Hussein, Alaaeldin Mahmoud
A Secure and Efficient Multi-Step Multi-Index Image Encryption Scheme Using Hybrid Combination of Substitution, Permutation and Hyperchaotic Structure
- Research Article-Computer Engineering and Computer Science
Razi Arshad, Mudassar Jalil, Waheed Iqbal, Usama Habib Chaudhry
Quantized Orthogonal Experimentation SSA (QOX-SSA): A Hybrid Technique for Feature Selection (FS) and Neural Network Training
- Research Article-Computer Engineering and Computer Science
Ajit Kumar Mahapatra, Nibedan Panda, Binod Kumar Pattanayak
Innovative Clustering-Driven Techniques for Enhancing Initial Solutions in Euclidean Traveling Salesman Problems with Machine Learning Integration
- Research Article-Computer Engineering and Computer Science
Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet
Diabetic Retinopathy Detection Using Deep Learning Multistage Training Method
- Research Article-Computer Engineering and Computer Science
Sarra Guefrachi, Amira Echtioui, Habib Hamam
DSBAV-Net: Depthwise Separable Bottleneck Attention V-Shaped Network with Hybrid Convolution for Left Atrium Segmentation
- Open Access
- Research Article-Computer Engineering and Computer Science
Hakan Ocal
Less is More: Dimensionality Analysis of Pure Random Orthogonal Search Through the Lens of Degrees of Freedom
- Research Article-Computer Engineering and Computer Science
A. S. Syed Shahul Hameed, R. Allwin, Manindra Narayan Singh, Narendran Rajagopalan, Animesh Nanda
An Adaptive Query Approach for Extracting Medical Images for Disease Detection Applications
- Research Article-Computer Engineering and Computer Science
Aya Migdady, Yaser Khamayseh, Omar AlZoubi, Muneer Bani Yassein
Distributed Ensemble Method Using Deep Learning to Detect DDoS Attacks in IoT Networks
- Research Article-Computer Engineering and Computer Science
Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil
Extracting Urgent Questions from MOOC Discussions: A BERT-Based Multi-output Classification Approach
- Research Article-Computer Engineering and Computer Science
Mujtaba Sultani, Negin Daneshpour
Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques
- Open Access
- Research Article-Computer Engineering and Computer Science
Rezan Bakır, Halit Bakır
Efficient and Fast Algorithm for Attribute Reduction of Large Dimensional Data Using Rough Set Theory on Graphics Processing Unit
- Research Article-Computer Engineering and Computer Science
V. K. Hanuman Turaga, Srilatha Chebrolu
Fast and Memory-Efficient Approximate Minimum Spanning Tree Generation for Large Datasets
- Open Access
- Research Article-Computer Engineering and Computer Science
Mahmood K. M. Almansoori, Andras Meszaros, Miklos Telek
A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms
- Research Article-Computer Engineering and Computer Science
Yilmaz Aydin, Ali Murat Garipcan, Fatih Özkaynak
YOLO-HLFE: A UAV Perspective Target Detector With Hybrid Loss and Feature Enhancement Based on YOLOv7
- Research Article-Computer Engineering and Computer Science
Hao Sun, Jianhao Wang, Ziyu Hu, He Yang, Zhenwei Xu
Chaotic Artificial Algae Algorithm for Solving Global Optimization With Real-World Space Trajectory Design Problems
- Open Access
- Research Article-Computer Engineering and Computer Science
Bahaeddin Turkoglu, Sait Ali Uymaz, Ersin Kaya
HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT
- Research Article-Computer Engineering and Computer Science
Kumar Saurabh, Vaidik Sharma, Uphar Singh, Rahamatullah Khondoker, Ranjana Vyas, O. P. Vyas
Approximating M-matrix in Learning Directed Acyclic Graphs Using Methods Involve Semidefinite Matrix Constraints
- Research Article-Computer Engineering and Computer Science
Suliman Al-Homidan
Multi-omics-based Machine Learning for the Subtype Classification of Breast Cancer
- Open Access
- Research Article--Computer Engineering and Computer Science
Asmaa M. Hassan, Safaa M. Naeem, Mohamed A. A. Eldosoky, Mai S. Mabrouk
Correction: Uncertainty Modelling in Performability Prediction for Safety-Critical Systems
- Correction
Shakeel Ahamad, Ratneshwer Gupta