Volume 5, Issue 1 (2026)
Articles
Enhancing Intrusion Detection Systems with Adaptive Neuro-Fuzzy Inference Systems
Jitender Sharma, Sonia ., Karan Kumar, Pankaj Jain, Pankaj Jain, and Hussein Alkattan
Improvement of Internet of Things (IoT) Interference Based on Pre-Coding Techniques over 5G Networks
Inas F. Jaleel, Rasha S. Ali, and Ghassan A. Abed
Hybrid Cooperative Spectrum Structured (HCSS) Approach for Adaptive Routing in Cognitive Radio Ad Hoc Networks
Sadeem Dheyaa Shamsi, Ameer Sameer Hamood Mohammed Ali, and Wameed Deyah Shamsi
Data Mining and Machine Learning-Based Healthcare Monitoring in Cloud-IoT
Sarah Amer, Rania Hazim, and Wassan Kader
Department of Computer Engineering, University of Diyala, 32001 Diyala, Iraq.
Mustafa Abdulfattah Habeeb and Yahya Layth Khaleel
Exploring the Impact of Blockchain Revolution on the Healthcare Ecosystem: A Critical Review
Maad M. Mijwil, Mohammad Aljanabi, Mostafa Abotaleb, Ban Salman Shukur, Ban Salman Shukur, Indu Bala, Kamal Kant Hiran, Ruchi Doshi, and Klodian Dhoska
Encrypting Text Messages via Iris Recognition and Gaze Tracking Technology
Sura Abed Sarab Hussien, Basim Najim Al-din Abed, and Kamaran Adil Ibrahim
AntDroidNet Cybersecurity Model: A Hybrid Integration of Ant Colony Optimization and Deep Neural Networks for Android Malware Detection
Riyadh Rahef Nuiaa Al Ogaili, Osamah Adil Raheem, Mohamed H Ghaleb Abdkhaleq, Zaid Abdi Alkareem Alyasseri, Zaid Abdi Alkareem Alyasseri, Ali Hakem Alsaeedi, Yousif Raad Muhsen, and Selvakumar Manickam
Enhancing Crime Detection in Video Surveillance via a Lightweight Blockchain and Homomorphic Encryption-based Computer Vision System
Tanya Abdulsattar Jaber
Improved Blockchain Technique based on Modified SLIM Algorithm for Cyber Security
Sarah Mohammed Shareef and Rehab Flaih Hassan
Smartphone Authentication Based on 3D Touch Sensor and Finger Locations on Touchscreens via Decision-Making Techniques
Moceheb Lazam Shuwandy, Rawan Adel Fawzi Alsharida, and Maytham M. Hammood
Enhanced Audio Encryption Scheme: Integrating Blowfish, HMAC-SHA256, and MD5 for Secure Communication
Jenan Ayad, Noor Qaddoori, and Hasanain Maytham
Enhancing Cybersecurity with Machine Learning: A Hybrid Approach for Anomaly Detection and Threat Prediction
Adil M. Salman, Bashar Talib Al-Nuaimi, Alhumaima Ali Subhi, Hussein Alkattan, and Hussein Alkattan
Secured Multi-Objective Optimisation-Based Protocol for Reliable Data Transmission in Underwater Wireless Sensor Networks
Mostfa Albdair, Zainab Rustum mohsin, Ahmed Saihood, Aqeel M. Hamad, and Aqeel M. Hamad
Enhancing Traffic Data Security in Smart Cities Using Optimized Quantum-Based Digital Signatures and Privacy-Preserving Techniques
Tuqa Ghani Tregi and Mishall Al-Zubaidie
Learning Techniques-Based Malware Detection: A Comprehensive Review
Sarah Fouad Ali, Musaab Riyadh Abdulrazzaq, and Methaq Talib Gaata
Robust and Efficient Methods for Key Generation using Chaotic Maps and A2C Algorithm
Ali A. Mahdi and Mays M. Hoobi