Skip to main content
Top

Arabian Journal for Science and Engineering

Issue 2/2025

Content (41 Articles)

A Systematic Literature Review on Vulnerabilities, Mitigation Techniques, and Attacks in Field-Programmable Gate Arrays

  • Review Article--Computer Engineering and Computer Science

Ali Alsuwaiyan, Aliyu Abubakar Habib, Ali Bello Imoukhuede, Mohamed Osman Omar, Md Al Maruf, Mansour Alqarni, Aiman El-Maleh, Abdulaziz Tabbakh, Muhamad Felemban, Akramul Azim

Stacked LSTM Deep Neural Networks for Accurate Recognition of Prayer Activities with Smartphone Sensors

  • Research Article-Computer Engineering and Computer Science

Liyakathunisa Syed

Toward Detecting Rumor Initiator in Online Social Networks Using Ontology-Driven Model

  • Research Article-Computer Engineering and Computer Science

Shruti Bajpai, Amrita Chaturvedi

A Binary Chaotic Transient Search Optimization Algorithm for Enhancing Feature Selection

  • Research Article-Computer Engineering and Computer Science

Amir Mohammad Sharafaddini, Najme Mansouri

Uncertainty Modelling in Performability Prediction for Safety-Critical Systems

  • Research Article-Computer Engineering and Computer Science

Shakeel Ahamad, Ratneshwer Gupta

Elite Opposition-Based Bare Bones Mayfly Algorithm for Optimization Wireless Sensor Networks Coverage Problem

  • Research Article-Computer Engineering and Computer Science

Guo Zhou, Tian Zhang, Yongquan Zhou

Hybrid-Driven Car-Following Model Based on Improved Composite Network and IDM

  • Research Article-Computer Engineering and Computer Science

Fengmin Wu, Zupeng Zhou, Yihua Guo

Detection and Elimination of Dynamic Feature Points Based on YOLO and Geometric Constraints

  • Research Article-Computer Engineering and Computer Science

Jiajia Lu, Xianwei Wang, Yue Tang, Kan Xi, Yue Shen, Weichao Chen

Persian Traffic Sign Classification Using Convolutional Neural Network and Transfer Learning

  • Research Article-Computer Engineering and Computer Science

Seyed Mahdi Safavi, Hadi Seyedarabi, Reza Afrouzian

Design of Nonlinear Component of Block Cipher Over Non-Chain Semi-Local Ring with its Application to Color Image Encryption

  • Research Article-Computer Engineering and Computer Science

Muhammad Umair Safdar, Tariq Shah, Asif Ali

Triple-ATFME: Triple-Branch Attention Fusion Network for Micro-Expression Recognition

  • Research Article-Computer Engineering and Computer Science

Fei Li, Ping Nie, Meiming You, Zhichao Chen, Guoqiang Wang

CCLHF-Net: Constrained Convolution Layer and Hybrid Features-Based Skip Connection Network for Image Forgery Detection

  • Research Article-Computer Engineering and Computer Science

Koyya Deepthi Krishna Yadav, Ilaiah Kavati, Ramalingaswamy Cheruku

Lightweight ASIP Design for Lattice-Based Post-quantum Cryptography Algorithms

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Latif Akçay, Berna Örs Yalçın

Active Learning for Detecting Hardware Sensors-Based Side-Channel Attack on Smartphone

  • Research Article-Computer Engineering and Computer Science

Sidra Abbas, Shtwai Alsubai, Stephen Ojo, Gabriel Avelino Sampedro, Ahmad Almadhor, Abdullah Al Hejaili, Imen Bouazzi

TrustChain: Trusted Blockchain-Based System for Supply Chain Traceability

  • Research Article-Computer Engineering and Computer Science

Muhannad Mohammed, Muhannad Alzahrani, Abdulla Hejjou, Maher Alharby

A New Trajectory Reduction Method for Mobile Devices Operating Both Online and Offline

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Samet Diri, Mehmet Yildirim

Arabic Fake News Detection in Social Media Context Using Word Embeddings and Pre-trained Transformers

  • Research Article-Computer Engineering and Computer Science

Mohammad Azzeh, Abdallah Qusef, Omar Alabboushi

Control of Discrete Event Systems by Using Symbolic Transition Model: An Application to Power Grids

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Mete Özbaltan

Disrupting the Status Quo: Blockchain’s Potential for Overhauling Conventional Academic Systems

  • Research Article-Computer Engineering and Computer Science

Saeed M. Alshahrani

Recurrence Dynamic Modeling of Metropolitan Cellular Network Traffic

  • Research Article-Computer Engineering and Computer Science

Yingqi Li, Yu Wang, Mingxiang Hao, Xiaochuan Sun

Enhancing Power Lines Detection Using Deep Learning and Feature-Level Fusion of Infrared and Visible Light Images

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Hossam Aboalia, Sherif Hussein, Alaaeldin Mahmoud

A Secure and Efficient Multi-Step Multi-Index Image Encryption Scheme Using Hybrid Combination of Substitution, Permutation and Hyperchaotic Structure

  • Research Article-Computer Engineering and Computer Science

Razi Arshad, Mudassar Jalil, Waheed Iqbal, Usama Habib Chaudhry

Quantized Orthogonal Experimentation SSA (QOX-SSA): A Hybrid Technique for Feature Selection (FS) and Neural Network Training

  • Research Article-Computer Engineering and Computer Science

Ajit Kumar Mahapatra, Nibedan Panda, Binod Kumar Pattanayak

Innovative Clustering-Driven Techniques for Enhancing Initial Solutions in Euclidean Traveling Salesman Problems with Machine Learning Integration

  • Research Article-Computer Engineering and Computer Science

Aymen Takie Eddine Selmi, Mohamed Faouzi Zerarka, Abdelhakim Cheriet

Diabetic Retinopathy Detection Using Deep Learning Multistage Training Method

  • Research Article-Computer Engineering and Computer Science

Sarra Guefrachi, Amira Echtioui, Habib Hamam

DSBAV-Net: Depthwise Separable Bottleneck Attention V-Shaped Network with Hybrid Convolution for Left Atrium Segmentation

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Hakan Ocal

Less is More: Dimensionality Analysis of Pure Random Orthogonal Search Through the Lens of Degrees of Freedom

  • Research Article-Computer Engineering and Computer Science

A. S. Syed Shahul Hameed, R. Allwin, Manindra Narayan Singh, Narendran Rajagopalan, Animesh Nanda

An Adaptive Query Approach for Extracting Medical Images for Disease Detection Applications

  • Research Article-Computer Engineering and Computer Science

Aya Migdady, Yaser Khamayseh, Omar AlZoubi, Muneer Bani Yassein

Distributed Ensemble Method Using Deep Learning to Detect DDoS Attacks in IoT Networks

  • Research Article-Computer Engineering and Computer Science

Praveen Shukla, C. Rama Krishna, Nilesh Vishwasrao Patil

Extracting Urgent Questions from MOOC Discussions: A BERT-Based Multi-output Classification Approach

  • Research Article-Computer Engineering and Computer Science

Mujtaba Sultani, Negin Daneshpour

Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Rezan Bakır, Halit Bakır

Efficient and Fast Algorithm for Attribute Reduction of Large Dimensional Data Using Rough Set Theory on Graphics Processing Unit

  • Research Article-Computer Engineering and Computer Science

V. K. Hanuman Turaga, Srilatha Chebrolu

Fast and Memory-Efficient Approximate Minimum Spanning Tree Generation for Large Datasets

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Mahmood K. M. Almansoori, Andras Meszaros, Miklos Telek

A Novel Secure S-box Design Methodology Based on FPGA and SHA-256 Hash Algorithm for Block Cipher Algorithms

  • Research Article-Computer Engineering and Computer Science

Yilmaz Aydin, Ali Murat Garipcan, Fatih Özkaynak

YOLO-HLFE: A UAV Perspective Target Detector With Hybrid Loss and Feature Enhancement Based on YOLOv7

  • Research Article-Computer Engineering and Computer Science

Hao Sun, Jianhao Wang, Ziyu Hu, He Yang, Zhenwei Xu

Chaotic Artificial Algae Algorithm for Solving Global Optimization With Real-World Space Trajectory Design Problems

  • Open Access
  • Research Article-Computer Engineering and Computer Science

Bahaeddin Turkoglu, Sait Ali Uymaz, Ersin Kaya

HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT

  • Research Article-Computer Engineering and Computer Science

Kumar Saurabh, Vaidik Sharma, Uphar Singh, Rahamatullah Khondoker, Ranjana Vyas, O. P. Vyas

Approximating M-matrix in Learning Directed Acyclic Graphs Using Methods Involve Semidefinite Matrix Constraints

  • Research Article-Computer Engineering and Computer Science

Suliman Al-Homidan

Multi-omics-based Machine Learning for the Subtype Classification of Breast Cancer

  • Open Access
  • Research Article--Computer Engineering and Computer Science

Asmaa M. Hassan, Safaa M. Naeem, Mohamed A. A. Eldosoky, Mai S. Mabrouk

Premium Partners