Volume 21 (2025)Issue 1 |Issue 2 |Issue 3 Issue 1Open Call ArticlesCritical Function Placement based on Service Chains in Multi-administrative Federated NetworksDariusz Nogalski, Dallal Belabed, Alexandre Triollet, Konstanty Junosza-Szaniawski, Slim Abdellatif, Pascal Berthou, Stanislas Pedebearn, Adam DudkoPages: 1-12| PDF (1.55 MiB) | 2025-02-03 |0 views| 0 CrossRef citations0Views0CrossRef citationsPrivacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMsCarmen De Maio, Giuseppe Fenza, Domenico Furno, Teodoro Grauso, Vincenzo LoiaPages: 13-22| PDF (1.45 MiB) | 2025-02-10 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Hybrid Algorithm for Contour Thinning in Image ProcessingMamatov Narzullo, Niyozmatova Nilufar, Jalelova Malika, Samijonov Abdurashid, Samijonov BoymirzoPages: 23-33| PDF (2.51 MiB) | 2025-02-17 |0 views| 0 CrossRef citations0Views0CrossRef citationsGamification Classification as a Framework for Analysing Gamification Elements in Digital Educational ToolsAna Vrcelj Božić, Nataša Hoić-Božić, Martina Holenko Dlab, Kristian Stančin, Tomislav JaguštPages: 34-42| PDF (1.29 MiB) | 2025-03-06 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Distributed Algorithm to Critical Node Identification in IoT NetworksAli Lalouci, Zoubeyr FarahPages: 43-52| PDF (1.83 MiB) | 2025-03-10 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Hierarchical Fuzzy Inference System for Evaluating Cyclist Training PerformanceMiguel A. Wister, Fabricio Landero-Cristobal, Pablo Payro-Campos, Pedro Ivan Arias-VazquezPages: 53-65| PDF (1.88 MiB) | 2025-03-10 |0 views| 0 CrossRef citations0Views0CrossRef citationsA Framework to Evaluate Software Engineering Program Using SWEBOK Version 4Mohammad Zarour, Mamdouh Alenezi, Mohammed AkourPages: 66-78| PDF (1.60 MiB) | 2025-03-20 |0 views| 0 CrossRef citations0Views0CrossRef citationsCancerSeg-XA: Enhanced Breast Cancer Histo-pathology Segmentation Using Xception Backbone with Attention MechanismsAlaa Mohamed Youssef, Wessam Hassan El Behaidy, Aliaa Abdel-Haleim Abdel-Razik YoussifPages: 79-89| PDF (1.74 MiB) | 2025-03-26 |0 views| 0 CrossRef citations0Views0CrossRef citationsErrors Impacts of Multi-5G Waveforms in Cognitive Radio SystemsMokhalad Alghrairi, Aqeel k. Kadhim, Manar Adnan Nassrat, Bayan Mahdi Sabbar, Saad MutasharPages: 90-99| PDF (1.70 MiB) | 2025-03-25 |0 views| 0 CrossRef citations0Views0CrossRef citationsMiniaturized Wideband MIMO Antenna based on Hybrid Isolation TechniqueAhmed Read Al-Tameemi, Goh Chin Hock, Tiong Sieh Kiong, Taha Raad Al-Shaikhli, Mohammed S. Al Ani, Mohammad A. K. Al AniPages: 100-108| PDF (2.12 MiB) | 2025-03-25 |0 views| 0 CrossRef citations0Views0CrossRef citationsComparative Analysis of MTCNN and Haar Cascades for Face Detection in Images with Variation in Yaw Poses and Facial OcclusionsOmer Abdulhaleem Naser, Sharifah Mumtazah, Khairulmizam Samsudin, Marsyita Hanafi, Siti Mariam Binti, Nor Zarina ZamriPages: 109-119| PDF (1.72 MiB) | 2025-03-31 |0 views| 0 CrossRef citations0Views0CrossRef citationsHarnessing AI in Precision Agriculture for Sustainable Kiwifruit FarmingTheofanis Kalampokas, Eleni Vrochidou, Maria Tzampazaki, George A. PapakostasPages: 120-131| PDF (1.30 MiB) | 2025-03-31 |0 views| 0 CrossRef citations0Views0CrossRef citationsIssue 2Open Call ArticlesComparative Analysis of SMOTE and ROSE Oversampling Techniques for kNN-Based Autonomous Vehicle Behavior ModelingCeline Serbouh Touazi, Iness Ahriz, Ndeye Niang, Alain PipernoPages: 132-143| PDF (3.90 MiB) | 2025-04-24 |0 views| 0 CrossRef citations0Views0CrossRef citationsGenerating an Iris-based Seed for Key-pairs in a Blockchain PlatformMarco Fiore, Federico Carrozzino, Gianvito Coppola, Gianni Guariglia, Marina MongielloPages: 144-155| PDF (6.83 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsEnhancing Network Security: A Study on Classification Models for Intrusion Detection SystemsAbeer Abd Alhameed Mahmood, Azhar A. Hadi, Wasan Hashim Al-MasoodyPages: 156-165| PDF (1.31 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsExperimental Evaluation of Open-Source-based VoNR and OTT Voice Services in 5G SA Network DeploymentsElena-Ramona Modroiu, Joyce Mwangama, Marius Corici, Thomas MagedanzPages: 166-177| PDF (3.39 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsAI-Generated Questions in Context: A Contextualized Investigation Using Platform Data, Student Feedback, and Faculty ObservationsRachel Van Campenhout, Benny G. Johnson, Michelle Clark, Melissa Deininger, Shannon Harper, Kelly Odenweller, Erin WilgenbuschPages: 178-188| PDF (1.65 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citationsAn Approach Based on Sum Product Networks for Code Smells DetectionMostefai AbdelkaderPages: 189-200| PDF (2.84 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citationsComprehensive Modeling and Evaluation of Carrier Aggregation Effects on Network Performance Across Diverse ApplicationsZuhor Maher Ismail, Saad Ahmed AyoobPages: 201-209| PDF (1.28 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citationsEncryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor NetworkHaneen Mohammed Hussein, Ali Qasim Hanoon, Afrah Thamer AbdullahPages: 210-219| PDF (1.58 MiB) | 2025-05-21 |0 views| 0 CrossRef citations0Views0CrossRef citationsSparse-Recovery-Based Channel Estimation in Orthogonal Time-Frequency Space Modulation for High-Mobility Scenarios in 5G and BeyondSundaresan Sabapathy, Surendar Maruthu, Deepika SasiPages: 220-228| PDF (7.97 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citationsInvestigate the Use of Deep Learning in IoT Attack DetectionMohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar LaimechePages: 229-239| PDF (1.80 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citationsSpecial Issue on Smart Sustainable EnvironmentsParticipatory Design of Visual Analytics Tools for Different Target GroupsMilena Vuckovic, Dawid Wolosiuk, Johanna SchmidtPages: 240-249| PDF (2.88 MiB) | 2025-05-19 |0 views| 0 CrossRef citations0Views0CrossRef citationsIssue 3Open Call ArticlesValidating the оpenBCI Nodes through EEG-based BCI Application for Smart Home Automation ControlAdelina Kremenska, Anna Lekova, Svetoslav Kremenski, Georgi DimitrovPages: 250-261| PDF (2.01 MiB) | 2025-06-05 |0 views| 0 CrossRef citations0Views0CrossRef citationsLearning-Based Image Reconstruction for Spatial-Variant Single-Pixel ImagingZhenyong Shin, Chang Hong Pua, Tong-Yuen Chai, Xin Wang, Sing Yee ChuaPages: 262-269| PDF (8.55 MiB) | 2025-07-10 |0 views| 0 CrossRef citations0Views0CrossRef citationsSecrecy Performance Analysis of IRS-assisted NLoS Wireless Systems Over Nakagami-m Fading ChannelRavneet Kaur, Bajrang BansalPages: 270-282| PDF (1.97 MiB) | 2025-07-10 |0 views| 0 CrossRef citations0Views0CrossRef citationsAdaptive Multi-Connectivity Communication for Enhanced Reliability in B5G Vehicular NetworksAhmed Hameed Reja, Omar Nowfal M. T, Mazin Abdulaali HamzahPages: 283-293| PDF (1.13 MiB) | 2025-07-14 |0 views| 0 CrossRef citations0Views0CrossRef citationsBig Data Access Control for Cloud-Native Hadoop EnvironmentsFidele Tsognong, Benoit Martin Azanguezet Quimatio, Marcellin Julius NkenlifackPages: 294-305| PDF (3.35 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citationsVoStackSDD: A Novel Ensemble Technique for Software Defect Density PredictionJasmeet Kaur, Arvinder Kaur, Kamaldeep KaurPages: 306-316| PDF (1.40 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citationsDeep Reinforcement Learning Based Load Balancing Scheme in Dense Cellular Network Using RoF TechnologyMahfida Amjad Dipa, Syamsuri Yakoob, Fadlee Rasid, Faisul Ahmad, Azwan MahmudPages: 317-326| PDF (1.60 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citationsP-LIME: PSO-based Local Interpretable Model-Agnostic Explanations Approach for More Reliable AI ExplanationsKhaled Bechoua, Ahmed Taki Eddine DIB, Hichem Haouassi, Hichem RahabPages: 327-337| PDF (1.52 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citationsPerformance Analysis of Linear Cellular Networks on HighwaysSarab Kamal Mahmood, Basma Nazar, Jaafar Qassim KadhimPages: 338-347| PDF (1.86 MiB) | 2025-07-22 |0 views| 0 CrossRef citations0Views0CrossRef citationsAnalysis of Isolation Techniques for Mutual Coupling Reduction in MIMO AntennasAhmed Read Al-tameemi, Goh Chin Hock, Tiong Sieh Kiong, Taha Raad Al-Shaikhli, Mohammed S. Al Ani, Mohammad A. K. Al AniPages: 348-359| PDF (1.46 MiB) | 2025-07-22 |0 views| 0 CrossRef citations0Views0CrossRef citationsA D2D Based Captious Communication Architecture for Automatic Emergency Response and Disaster ManagementSambi Reddy Gottam, Udit Narayana KarPages: 360-371| PDF (22.77 MiB) | 2025-07-24 |0 views| 0 CrossRef citations0Views0CrossRef citations
Critical Function Placement based on Service Chains in Multi-administrative Federated NetworksDariusz Nogalski, Dallal Belabed, Alexandre Triollet, Konstanty Junosza-Szaniawski, Slim Abdellatif, Pascal Berthou, Stanislas Pedebearn, Adam DudkoPages: 1-12| PDF (1.55 MiB) | 2025-02-03 |0 views| 0 CrossRef citations0Views0CrossRef citations
Privacy-Preserving Healthcare Data Interactions: A Multi-Agent Approach Using LLMsCarmen De Maio, Giuseppe Fenza, Domenico Furno, Teodoro Grauso, Vincenzo LoiaPages: 13-22| PDF (1.45 MiB) | 2025-02-10 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Hybrid Algorithm for Contour Thinning in Image ProcessingMamatov Narzullo, Niyozmatova Nilufar, Jalelova Malika, Samijonov Abdurashid, Samijonov BoymirzoPages: 23-33| PDF (2.51 MiB) | 2025-02-17 |0 views| 0 CrossRef citations0Views0CrossRef citations
Gamification Classification as a Framework for Analysing Gamification Elements in Digital Educational ToolsAna Vrcelj Božić, Nataša Hoić-Božić, Martina Holenko Dlab, Kristian Stančin, Tomislav JaguštPages: 34-42| PDF (1.29 MiB) | 2025-03-06 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Distributed Algorithm to Critical Node Identification in IoT NetworksAli Lalouci, Zoubeyr FarahPages: 43-52| PDF (1.83 MiB) | 2025-03-10 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Hierarchical Fuzzy Inference System for Evaluating Cyclist Training PerformanceMiguel A. Wister, Fabricio Landero-Cristobal, Pablo Payro-Campos, Pedro Ivan Arias-VazquezPages: 53-65| PDF (1.88 MiB) | 2025-03-10 |0 views| 0 CrossRef citations0Views0CrossRef citations
A Framework to Evaluate Software Engineering Program Using SWEBOK Version 4Mohammad Zarour, Mamdouh Alenezi, Mohammed AkourPages: 66-78| PDF (1.60 MiB) | 2025-03-20 |0 views| 0 CrossRef citations0Views0CrossRef citations
CancerSeg-XA: Enhanced Breast Cancer Histo-pathology Segmentation Using Xception Backbone with Attention MechanismsAlaa Mohamed Youssef, Wessam Hassan El Behaidy, Aliaa Abdel-Haleim Abdel-Razik YoussifPages: 79-89| PDF (1.74 MiB) | 2025-03-26 |0 views| 0 CrossRef citations0Views0CrossRef citations
Errors Impacts of Multi-5G Waveforms in Cognitive Radio SystemsMokhalad Alghrairi, Aqeel k. Kadhim, Manar Adnan Nassrat, Bayan Mahdi Sabbar, Saad MutasharPages: 90-99| PDF (1.70 MiB) | 2025-03-25 |0 views| 0 CrossRef citations0Views0CrossRef citations
Miniaturized Wideband MIMO Antenna based on Hybrid Isolation TechniqueAhmed Read Al-Tameemi, Goh Chin Hock, Tiong Sieh Kiong, Taha Raad Al-Shaikhli, Mohammed S. Al Ani, Mohammad A. K. Al AniPages: 100-108| PDF (2.12 MiB) | 2025-03-25 |0 views| 0 CrossRef citations0Views0CrossRef citations
Comparative Analysis of MTCNN and Haar Cascades for Face Detection in Images with Variation in Yaw Poses and Facial OcclusionsOmer Abdulhaleem Naser, Sharifah Mumtazah, Khairulmizam Samsudin, Marsyita Hanafi, Siti Mariam Binti, Nor Zarina ZamriPages: 109-119| PDF (1.72 MiB) | 2025-03-31 |0 views| 0 CrossRef citations0Views0CrossRef citations
Harnessing AI in Precision Agriculture for Sustainable Kiwifruit FarmingTheofanis Kalampokas, Eleni Vrochidou, Maria Tzampazaki, George A. PapakostasPages: 120-131| PDF (1.30 MiB) | 2025-03-31 |0 views| 0 CrossRef citations0Views0CrossRef citations
Comparative Analysis of SMOTE and ROSE Oversampling Techniques for kNN-Based Autonomous Vehicle Behavior ModelingCeline Serbouh Touazi, Iness Ahriz, Ndeye Niang, Alain PipernoPages: 132-143| PDF (3.90 MiB) | 2025-04-24 |0 views| 0 CrossRef citations0Views0CrossRef citations
Generating an Iris-based Seed for Key-pairs in a Blockchain PlatformMarco Fiore, Federico Carrozzino, Gianvito Coppola, Gianni Guariglia, Marina MongielloPages: 144-155| PDF (6.83 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
Enhancing Network Security: A Study on Classification Models for Intrusion Detection SystemsAbeer Abd Alhameed Mahmood, Azhar A. Hadi, Wasan Hashim Al-MasoodyPages: 156-165| PDF (1.31 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
Experimental Evaluation of Open-Source-based VoNR and OTT Voice Services in 5G SA Network DeploymentsElena-Ramona Modroiu, Joyce Mwangama, Marius Corici, Thomas MagedanzPages: 166-177| PDF (3.39 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
AI-Generated Questions in Context: A Contextualized Investigation Using Platform Data, Student Feedback, and Faculty ObservationsRachel Van Campenhout, Benny G. Johnson, Michelle Clark, Melissa Deininger, Shannon Harper, Kelly Odenweller, Erin WilgenbuschPages: 178-188| PDF (1.65 MiB) | 2025-05-13 |0 views| 0 CrossRef citations0Views0CrossRef citations
An Approach Based on Sum Product Networks for Code Smells DetectionMostefai AbdelkaderPages: 189-200| PDF (2.84 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citations
Comprehensive Modeling and Evaluation of Carrier Aggregation Effects on Network Performance Across Diverse ApplicationsZuhor Maher Ismail, Saad Ahmed AyoobPages: 201-209| PDF (1.28 MiB) | 2025-05-14 |0 views| 0 CrossRef citations0Views0CrossRef citations
Encryption of a Message by HillAli Cipher and Security of Routing Path by DSR in Wireless Sensor NetworkHaneen Mohammed Hussein, Ali Qasim Hanoon, Afrah Thamer AbdullahPages: 210-219| PDF (1.58 MiB) | 2025-05-21 |0 views| 0 CrossRef citations0Views0CrossRef citations
Sparse-Recovery-Based Channel Estimation in Orthogonal Time-Frequency Space Modulation for High-Mobility Scenarios in 5G and BeyondSundaresan Sabapathy, Surendar Maruthu, Deepika SasiPages: 220-228| PDF (7.97 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citations
Investigate the Use of Deep Learning in IoT Attack DetectionMohamed Saddek Ghozlane, Adlen Kerboua, Smaine Mazouzi, Lakhdar LaimechePages: 229-239| PDF (1.80 MiB) | 2025-05-23 |0 views| 0 CrossRef citations0Views0CrossRef citations
Participatory Design of Visual Analytics Tools for Different Target GroupsMilena Vuckovic, Dawid Wolosiuk, Johanna SchmidtPages: 240-249| PDF (2.88 MiB) | 2025-05-19 |0 views| 0 CrossRef citations0Views0CrossRef citations
Validating the оpenBCI Nodes through EEG-based BCI Application for Smart Home Automation ControlAdelina Kremenska, Anna Lekova, Svetoslav Kremenski, Georgi DimitrovPages: 250-261| PDF (2.01 MiB) | 2025-06-05 |0 views| 0 CrossRef citations0Views0CrossRef citations
Learning-Based Image Reconstruction for Spatial-Variant Single-Pixel ImagingZhenyong Shin, Chang Hong Pua, Tong-Yuen Chai, Xin Wang, Sing Yee ChuaPages: 262-269| PDF (8.55 MiB) | 2025-07-10 |0 views| 0 CrossRef citations0Views0CrossRef citations
Secrecy Performance Analysis of IRS-assisted NLoS Wireless Systems Over Nakagami-m Fading ChannelRavneet Kaur, Bajrang BansalPages: 270-282| PDF (1.97 MiB) | 2025-07-10 |0 views| 0 CrossRef citations0Views0CrossRef citations
Adaptive Multi-Connectivity Communication for Enhanced Reliability in B5G Vehicular NetworksAhmed Hameed Reja, Omar Nowfal M. T, Mazin Abdulaali HamzahPages: 283-293| PDF (1.13 MiB) | 2025-07-14 |0 views| 0 CrossRef citations0Views0CrossRef citations
Big Data Access Control for Cloud-Native Hadoop EnvironmentsFidele Tsognong, Benoit Martin Azanguezet Quimatio, Marcellin Julius NkenlifackPages: 294-305| PDF (3.35 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citations
VoStackSDD: A Novel Ensemble Technique for Software Defect Density PredictionJasmeet Kaur, Arvinder Kaur, Kamaldeep KaurPages: 306-316| PDF (1.40 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citations
Deep Reinforcement Learning Based Load Balancing Scheme in Dense Cellular Network Using RoF TechnologyMahfida Amjad Dipa, Syamsuri Yakoob, Fadlee Rasid, Faisul Ahmad, Azwan MahmudPages: 317-326| PDF (1.60 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citations
P-LIME: PSO-based Local Interpretable Model-Agnostic Explanations Approach for More Reliable AI ExplanationsKhaled Bechoua, Ahmed Taki Eddine DIB, Hichem Haouassi, Hichem RahabPages: 327-337| PDF (1.52 MiB) | 2025-07-15 |0 views| 0 CrossRef citations0Views0CrossRef citations
Performance Analysis of Linear Cellular Networks on HighwaysSarab Kamal Mahmood, Basma Nazar, Jaafar Qassim KadhimPages: 338-347| PDF (1.86 MiB) | 2025-07-22 |0 views| 0 CrossRef citations0Views0CrossRef citations
Analysis of Isolation Techniques for Mutual Coupling Reduction in MIMO AntennasAhmed Read Al-tameemi, Goh Chin Hock, Tiong Sieh Kiong, Taha Raad Al-Shaikhli, Mohammed S. Al Ani, Mohammad A. K. Al AniPages: 348-359| PDF (1.46 MiB) | 2025-07-22 |0 views| 0 CrossRef citations0Views0CrossRef citations
A D2D Based Captious Communication Architecture for Automatic Emergency Response and Disaster ManagementSambi Reddy Gottam, Udit Narayana KarPages: 360-371| PDF (22.77 MiB) | 2025-07-24 |0 views| 0 CrossRef citations0Views0CrossRef citations