Early Access PapersVolume 21 - Issue 4 In preparationOpen Call ArticlesCRETA: Cross-layer RPL with Efficient Trickle and Adaptive Radio Duty Cycle Designed for Mobile IoT ApplicationSoumya Vastrad, Shobha K. R.Pages: 372-382| PDF (2.39 MiB) | 2025-09-30 |0 views| 0 CrossRef citations0Views0CrossRef citationsBinary Tuna Swarm Optimization Algorithm-Based Feature Selection for Intrusion Detection SystemsAbdelouaheb Khiar, Smaine Mazouzi, Rohallah Benaboud, Hichem HaouassiPages: 383-393| PDF (1.31 MiB) | 2025-09-30 |0 views| 0 CrossRef citations0Views0CrossRef citationsLeveraging XLM-RoBERTa with CNN and BiLSTM for Hinglish Toxicity DetectionNikita Singhal, Avadhesh Yadav, Ankush , Giriraj Singh, Ronak KumarPages: 394-403| PDF (2.40 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citationsFormal Verification of the Correctness and Soundness of a Pomset-to-LTS Transformation AlgorithmAsma Bezza, Rohallah Benaboud, Toufik-Messaoud Maarouk, Rabea Ameur-BoulifaPages: 404-413| PDF (2.19 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Reliable LoRa-based Vehicle-to-Vehicle Communication SystemAmeer A. Al-Shammaa, Doaa H. Al-HadrawiPages: 414-426| PDF (1.88 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citationsFortifying E-Voting Systems: Integrating Visual Cryptography with ECC and ChaCha20-Poly1305 for Enhanced SecurityGaurav Thakur, Pradeep Chouksey, Mayank Chopra, Parveen SadotraPages: 427-435| PDF (1.36 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citationsProactive Hybrid Half and Joint D2D Handover Scheme in Multi-access Mobile Edge Computing (MEC)Muayad Khalil Murtadha, Baydaa Mohammad MushgilPages: 436-446| PDF (1.80 MiB) | 2025-10-22 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Comparative Study of Compressive Sensing Techniques for Sparse Signal Recovery in Massive MIMOMahmoud Mohamed, Mhd Walid KoubeisiPages: 447-454| PDF (1.15 MiB) | 2025-10-28 |0 views| 0 CrossRef citations0Views0CrossRef citations
CRETA: Cross-layer RPL with Efficient Trickle and Adaptive Radio Duty Cycle Designed for Mobile IoT ApplicationSoumya Vastrad, Shobha K. R.Pages: 372-382| PDF (2.39 MiB) | 2025-09-30 |0 views| 0 CrossRef citations0Views0CrossRef citations
Binary Tuna Swarm Optimization Algorithm-Based Feature Selection for Intrusion Detection SystemsAbdelouaheb Khiar, Smaine Mazouzi, Rohallah Benaboud, Hichem HaouassiPages: 383-393| PDF (1.31 MiB) | 2025-09-30 |0 views| 0 CrossRef citations0Views0CrossRef citations
Leveraging XLM-RoBERTa with CNN and BiLSTM for Hinglish Toxicity DetectionNikita Singhal, Avadhesh Yadav, Ankush , Giriraj Singh, Ronak KumarPages: 394-403| PDF (2.40 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citations
Formal Verification of the Correctness and Soundness of a Pomset-to-LTS Transformation AlgorithmAsma Bezza, Rohallah Benaboud, Toufik-Messaoud Maarouk, Rabea Ameur-BoulifaPages: 404-413| PDF (2.19 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Reliable LoRa-based Vehicle-to-Vehicle Communication SystemAmeer A. Al-Shammaa, Doaa H. Al-HadrawiPages: 414-426| PDF (1.88 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citations
Fortifying E-Voting Systems: Integrating Visual Cryptography with ECC and ChaCha20-Poly1305 for Enhanced SecurityGaurav Thakur, Pradeep Chouksey, Mayank Chopra, Parveen SadotraPages: 427-435| PDF (1.36 MiB) | 2025-10-20 |0 views| 0 CrossRef citations0Views0CrossRef citations
Proactive Hybrid Half and Joint D2D Handover Scheme in Multi-access Mobile Edge Computing (MEC)Muayad Khalil Murtadha, Baydaa Mohammad MushgilPages: 436-446| PDF (1.80 MiB) | 2025-10-22 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Comparative Study of Compressive Sensing Techniques for Sparse Signal Recovery in Massive MIMOMahmoud Mohamed, Mhd Walid KoubeisiPages: 447-454| PDF (1.15 MiB) | 2025-10-28 |0 views| 0 CrossRef citations0Views0CrossRef citations