- Home
- A-Z Publications
- Recent Advances in Computer Science and Communications
- Previous Issues
- Volume 18, Issue 2, 2025
Recent Advances in Computer Science and Communications - Volume 18, Issue 2, 2025
Volume 18, Issue 2, 2025
-
-
A Generic Integrated Framework of Unsupervised Learning and Natural Language Processing Techniques for Digital Healthcare: A Comprehensive Review and Future Research Directions
More LessThe increasing availability of digital healthcare data has opened up fresh prospects for improving healthcare through data analysis. Machine learning (ML) procedures exhibit great promise in analyzing large volumes of healthcare data to extract insights that could be utilized to improve patient outcomes and healthcare delivery. In this work, we suggest an integrated framework for digital healthcare data analysis by integ Read More
-
-
-
Exploring Deep Learning Approaches for Ransomware Detection: A Comprehensive Survey
Ransomware, a form of malicious software originating from cryptovirology, poses a serious threat by coercing victims to pay a ransom under the risk of exposing their data or permanently restricting access. While basic ransomware may lock a system without causing harm to files, more sophisticated variants utilize cryptoviral extortion techniques. The danger of ransomware is significant, with ongoing discoveries of new Read More
-
-
-
Low-complexity User Scheduling Framework for mmWave Hybrid Beam-forming OFDM System under Non-ideal CSI
More LessIntroductionUser scheduling in millimeter-wave (mmWave) multi-user hybrid beam-forming Orthogonal Frequency Division Multiplexing (OFDM) systems involves the joint optimization of resource block group (RBG) allocation, beam pairing, and user selection. However, choosing the optimal scheduled User Equipment (UE), allocated RBGs, and communicating beams in practical mmWave hybrid beam-forming systems with no Read More
-
-
-
A Multimodal Fusion and Ensemble Approach for Robust Fake News Detection through Deep Learning, Reinforcement Learning, and Using Blockchain to Enhance Security and Authorization
Authors: Vivek Kumar, Satveer, Waseem Ahmad and Satendra KumarBackgroundComputer science significantly influences modern culture, especially with the rapid breakthroughs and technology in social media networking. Social media platforms have become significant channels for sharing and exchanging daily news and information on many issues in the current digital environment, which is known for its massive data collection and transmission capabilities. While there are many benefits t Read More
-
-
-
oa Exploring the Reality behind Augmented Reality Applications in Retailing: The Role of Value Orientation and Use Frequency
Authors: Mais A. Al-Sharqi and Haitham S. HasanBackgroundAugmented reality (AR) technology has altered the retail business while also improving the shopping experience. Several studies have been conducted to investigate the factors that influence the relevance of perceived AR technology values, as well as how these values influence customer enjoyment and the desire to spread good word of mouth (WOM). This study explores how the perceived value of AR affects cu Read More
-
-
-
A Developed Model Based on Machine Learning Algorithms for Phishing Website Detection
Authors: Hussein Abdel-Jaber, Hussein Al Bazar and Muawya NaserIntroductionUsers are accessing websites for many purposes, such as obtaining information about a particular topic, buying items, accessing their accounts, etc. Cybercriminals use phishing websites to attain the sensitive information of the users, like usernames and passwords, credit card details, etc. Detecting phishing websites helps in protecting the information and the money of people. Machine learning algorithms can b Read More
-
-
-
Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis
Authors: Purushottam Singh, Sandip Dutta and Prashant PranavBackgroundIn the wake of escalating cyber threats and the indispensability of robust network security mechanisms, it becomes crucial to understand the evolving landscape of cryptographic research. Recognizing the significant contributions and discerning emerging trends can guide future strategies and technological advancements. Our study endeavors to shed light on this through a bibliometric analysis of publicatio Read More
-
Most Read This Month
Article
content/journals/rascs
Journal
10
5
false
en
