International Journal of Computer Science and Information Technology (IJCSIT)
ISSN: 0975-3826(online); 0975-4660 (Print)
----INSPEC,WJCI Indexed ----
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: case studies, technical reports etc.
Authors are invited to submit papers for this journal through Email: ijcsit@aircconline.com or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Submission Deadline | : | October 05, 2024 |
Authors Notification | : | October 25, 2024 |
Final Manuscript Due | : | October 28, 2024 |
Publication Date | : | Determined by the Editor-in-Chief |
August 2024, Volume 16, Number 4
Non-Deterministic and Risk Based Security Services Full Text
Srinivas Rao Doddi1 and Akshay Krishna Kotamraju2, 1University of Los Angeles, USA, 2Founder Non-profit, USA
Database Security Compliance with Anti-Money Laundering Status Full Text
Opeyemi Ayanbanjo, New England College, Boston
AI Strategy Formulation Across Various Game Genres - A Literature Review Full Text
Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA
Application of Artificial Intelligence Technologies in Security of Cyber-Physical Systems Full Text
Rashid Alakbarov and Mammad Hashimov, Institute of Information Technology, Azerbaijan
Exploring White Fragility in Large Language Models Full Text
Janga Bussaja, Independent Researcher, USA
A Study on Evaluating Criteria for Electric Bicycle Purchase using ISM and ANP Methods Full Text
Han-Chen Huang, Chung Hua University, Taiwan
The Role of Cloud Providers in IoT Services Full Text
Hristina Dimova Popovska, Tome Dimovski and Filip Popovski, University St. Klement of Ohrid, Macedonia
FIX Protocol: The Backbone of Financial Trading Full Text
Swapnil Kognole, Director @ UBS, USA
Shadowed AHP for Multi-Criteria Supplier Selection Full Text
Mohamed Abdel Hameed El-Hawy, Modern Academy for Computer Science and Management Technology, Egypt
Analysis of Tourist Experiences at Dark Tourism Sites in Kinmen: Clustering Analysis of Motivations, Emotional Responses, and Satisfaction Full Text
Han-Chen Huang, Chung Hua University, Taiwan
June 2024, Volume 16, Number 3
The Impact of Blockchain Technology on the Financial Services Industry Full Text
Kinil Doshi, Citibank, USA
Streamlining Compliance and Risk Management with RegTech Solutions Full Text
Chintamani Bagwe, Citibank, USA
A Domain-Invariant Transfer Learning by Bert for Cross-Domain Sentiment Analysis Full Text
Al-Mahmud and Kazutaka Shimada, Kyushu Institute of Technology, Japan
The Energy Storage Operation Under Stochastic Renewable Generation Full Text
Tony Tsang and Chung Kwok Leung, Hong Kong College of Technology, Hong Kong
Psychological and Graphic Aspects of Colors: Influence and Application in Product Design Full Text
Filip Popovski1, Hristina Dimova Popovska1, Svetlana Mijakovska1 and Gorica Popovska Nalevska2, 1University St.Klement of Ohrid, Macedonia, 2Internacional Slavic University, Macedonia
Exploring Bayesian Hierarchical Models for Multi-Level Credit Risk Assessment: Detailed Insights Full Text
Sanjay Moolchandani, Citibank N.A., USA
Developing a Genetic Algorithm Based Daily Calorie Recommendation System for Humans Full Text
Rezaul Karim1,2Md. Badiuzzaman Biplob1 and Mohammad Shamsul Arefin1, 1Chittagong University of Engineering and Technology, Bangladesh, 2University of Chittagong, Bangladesh
Revolutionizing System Operation and Maintenance in the Automobile Industry Through Machine Learning Applications Full Text
Priyank Singh, Tanvi Hungund and Shobhit Kukreti, Rochester Institute of Technology, US
Player Strategy Modeling in Classic Roleplaying Game Battle Environments Full Text
Cheuk Man Chan and Robert Haralick, CUNY Graduate Center, USA
Integration of Decentralized Finance (DeFi) in the U.S. Supply Chain Finance: Opportunities, Challenges, and Future Prospects Full Text
Omoshola S. Owolabi, Prince C. Uche, Nathaniel T. Adeniken, Emmanuel Hinneha and Samuel Attakorah, Carolina University, USA
April 2024, Volume 16, Number 2
Latency and Residual Energy Analysis of MIMO Heterogeneous Wireless Sensor Networks Full Text
Saurabh Mishra1 ,Rakesh Ranjan2 Sonika Singh3 and , Gagan Singh4School of Engineering and Technology, Sushant University, Gurgaon, India1,Sushant University, Gurgaon, India 2,Department of EECE, DIT University, Dehradun, India 3Department of EECE, DIT University, Dehradun, India, 4,
The Impact of Cloud Computing in Promoting Economic Growth through SMEs in the United States Full Text
Omolola F. Hassan1 ,Oluwadare O. Aderibigbe1 Oghenekome P. Efijemue1 and , Tolulope D. Onasanya2Department of Computer Science, Austin Peay State University, Clarksville USA1Department of Computer Science, North Carolina Agricultural, Technical State University, Greensboro USA, 2
Big Data and Machine Learning in Defence Full Text
Yijie Weng1and Jianhao Wu2 , 1University of Maryland, USA, 2Cornell University, USA,
AI-Based Home Security System Full Text
Syeda Lamima Farhat, Likhitha Tubati, Metrine Osiemo, and Rushit Dave Department of Computer Information Science, Minnesota State University, USA
February 2024, Volume 16, Number 1
Exploring the EV Charging Ecosystem and Performing an Experimental Assessment of its Cloud and Mobile
Application Infrastructure Security Full Text
Pooja Patil1, Sara Acikkol Dogan1, Samir Tout1, and Ranu Parmar2, 1Eastern Michigan University, USA, 2Hitachi Energy, USA
Image Segmentation and Classification using Neural Network Full Text
Fatema Tuj Zohra, Rifa Tasfia Ratri, Shaheena Sultana, and Humayara Binte Rashid, Notre Dame University, Bangladesh
From Clicks to Security: Investigating Continuous Authentication via Mouse Dynamics Full Text
Rushit Dave, Marcho Handoko, Ali Rashid and Cole Schoenbauer, Minnesota State University, USA
A Comparative Study of Text Comprehension in IELTS Reading Exam using GPT-3 Full Text
Christopher Le1 and Tauheed Khan Mohd2, 1Augustana College, USA, 2Eastern Michigan University, USA
Your Device May Know You Better Than You Know Yourself-Continuous Authentication on Novel Dataset using
Machine Learning Full Text
Pedro Gomes do Nascimento, Pidge Witiak, Tucker MacCallum, Zachary Winterfeldt and Rushit Dave, Minnesota State University, USA
December 2023, Volume 15, Number 6
An Adaptive Network-Based Approach for Advanced Forecasting of Cryptocurrency Values Full Text
Ali Mehrban1 and Pegah Ahadian2, 1Newcastle University, UK, 2Kent State University, USA
Modelling Open-Source Software Reliability Incorporating Swarm Intelligence-Based Techniques Full Text
Omar Shatnawi, Al al-Bayt University, Jordan
The Alignment between International and National Academic Accreditations - An Application in Information Systems Bachelor Program at Kingdom of Saudi Arabia Full Text
Rania A. Aboalela, King Abdulaziz University, Saudi Arabia
Revealing the Foundations: The Strategic Influence of Test Design in Automation Full Text
Rohit Khankhoje, Independent Reseacher, USA
October 2023, Volume 15, Number 5
Secure Arcade: A Gamified Defense Against Cyber Attacks Full Text
Sean Loesch, Ryan Hrastich, Jordan Herbert, Ben Drangstveit, Jacob Weber and Mounika Vanamala, University of Wisconsin-Eau Claire, USA
Analysis of the Relationship between Self-Esteem and Depression Full Text
Rosalba Cuapa C., Adair Ponce, Meliza Contreras, Mireya Tovar and Fernando Zacarias F., Universidad Autónoma de Puebla, México
Recent Advancements in the Field of Deepfake Detection Full Text
Natalie Krueger1, Mounika Vanamala1 and Rushit Dave2, 1University of Wisconsin-Eau Claire, USA, 2Minnesota State University, USA
Detection of Structured Query Language Injection Attacks Using Machine Learning Techniques Full Text
Taapopi John Angula and Valerianus Hashiyana, University of Namibia, Namibia
Multimodal Cyberbullying Meme Detection From Social Media Using Deep Learning Approach Full Text
Md. Tofael Ahmed1,2, Nahida Akter1, Maqsudur Rahman1, Abu Zafor Muhammad Touhidul Islam2, Dipankar Das2 and Md. Golam Rashed2, 1Comilla University, Bangladesh, 2University of Rajshahi, Bangladesh
Wi-Fi Data Analysis based on Machine Learning Full Text
Nanumura Gedara Umal Anuraga Nanumura, University of South Wales, United Kingdom
Analysing Chatgpt’s Potential Through the Lens of Creating Research Papers Full Text
Alexander Veach and Munther Abualkibash, Eastern Michigan University, USA
Exploring Cloud Computing Adoption in Higher Educational Environment: An Extension of the Tpb Model With Trust,
Peer Influences, Perceived Usefulness and Ease of Use Full Text
Waleed Al-Ghaith, Imam Mohammad Ibn Saud Islamic University (IMSIU), Saudi Arabia
Understanding the Role of Customer Trust in E-Commerce Full Text
Istiak Khan and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia
Inflation-Crime Nexus: A Predictive Analysis of Crime Rate Using Inflationary Indicator in Municipalities of North Cotabato, Philippines Full Text
Michaelangelo R. Serrano, Nero L. Hontiveros, EJ Ryle C. Mosquera, Aura Mae M. Celestino, John Louie D. Vilar, Junuel S. Baroy and Mitziel C. Gelbolingo, Notre Dame of Midsayap College, Philippines
A Systematic Review on the Effectiveness of Using User-Generated Content in E-Commerce Marketing Full Text
Jubaer Akhter and Noor Azizah Binti Mohamadali, International Islamic University Malaysia, Malaysia
June 2023, Volume 15, Number 3
A Novel Exploit Traffic Traceback Method Based on Session Relationship Full Text
Yajing Liu, Ruijie Cai, Xiaokang Yin and Shengli Liu, State Key Laboratory of Mathematical Engineering and Advanced Computing, China
Confidential Computing in Edge- Cloud Hierarchy Full Text
Yeghisabet Alaverdyan1,2 Suren Poghosyan2 and Vahagn Poghosyans2,3, 1EKENG CJSC, Armenia, 2Institute for
Informatics and Automation Problems of NAS RA, Armenia, 3Synopsys, Armenia
The Design of a Lighting System for Hong Kong International Airport APM Tunnel for Energy Saving with
Artificial Intelligence (AI) Lighting Defect Detection System Full Text
Tony Tsang and Chan Shui Hin, Hong Kong College of Technology, Hong Kong
Reinforcement Learning in Education 4.0: Open Applications and Deployment Challenges Full Text
Delali Kwasi Dake, University of Education, Ghana
A PC-kriging-HDMR Integrated with an Adaptive Sequential Sampling Strategy for High-Dimensional Approximate
Modeling Full Text
Yili Zhang, Hanyan Huang, Mei Xiong, Zengquan Yao, Sun Yat-Sen University, China
Development of a Prototype for Census and Enumeration: A Case Study of Namibia Full Text
Theodora Mukaya, Johanna Nelulu, V Hashiyana and Chris M, Mazila, University of Namibia, Namibia
Application Security Self-Efficacy of Software Developers: A Correlational Study Full Text
Wisdom Umeugo, Independent Researcher, Canada
Sex Detection in the Early Stage of Fertilized Chicken Eggsvia Image Recognition Full Text
Ufuk Asil and Efendi Nasibov, Dokuz Eylul University, Turkey
Linear Feedback Shift Register Genetically Adjusted for Sequence Copying Full Text
Ugalde-Franco Juan Manuel, Martinez-Gonzalez Ricardo Francisco and Mejia-Perez Juan Francisco, TecNM – Instituto Tecnologico de Veracruz, Mexico
The Development of Climate Agrometeorological Application for Farmers in Namibia Full Text
Valerianus Hashiyana, Nalina Suresh and Abel Natangwe Mwedihanga, University of Namibia, Namibia
Big Data and Metaverse Revolutionizing the Futuristic Fintech Industry Full Text
Nikhitha Yathiraju and Bibhu Dash, University of the Cumberlands, USA
Prediction of Anemia using Machine Learning Algorithms Full Text
Prakriti Dhakal, Santosh Khanal, and Rabindra Bista, Kathmandu University, Nepal
Active Noise Cancellation in Microsoft Teams Using AI & NLP Powered Algorithms Full Text
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, KY USA
Understanding the Worldwide Paths Towards the Creation of True Intelligence for Machines Full Text
Kouassi Konan Jean-Claude, Bircham International University, Spain
Using Airport Collaborative Decision Making (A-CDM) Network to Improved Aviation Industry Service Quality Full Text
Thongchai Jeeradist, Kasem Bundit University, Thailand
Behavioural Analytics in Cyber Security for Digital Forensics Application Full Text
Martin Luther Bwangah, Kabarak University, Kenya
December 2022, Volume 14, Number 6
Effective Malware Detection Approach based on Deep Learning in Cyber-Physical Systems Full Text
Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli, Ramya Thatikonda, Adithya Padthe,
University of the Cumberlands, USA
Electronic Letter of Guarantee for Banking System Full Text
Sherif Kamel Hussein1,Abdullah Alhayan2, 1October University for Modern Sciences and Arts, Egypt, & Arab East Colleges for Graduate Studies, KSA, 2Arab East Colleges for Graduate Studies, KSA
Testing-as-a-Service (TaaS) – Capabilities and Features for Real-Time Testing in Cloud Full Text
Pawankumar Sharma1,Pawankumar Sharma2,3,and Lotfollah Najjar1University of the Cumberlands, USA2Northwest Missouri State University, USA, 3University of Nebraska, USA
Using Singular Value Decomposition in a Convolutional Neural Network to Improve Brain Tumor Segmentation Accuracy Full Text
Pegah Ahadian, Maryam Babaei and Kourosh Parand, Shahid Beheshti University, Iran
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning Full Text
Arshiya Khan and Chase Cotton, University of Delaware, USA
October 2022, Volume 14, Number 5
Quantifying the Theory Vs. Programming Disparity using Spectral Bipartivity Analysis and Principal Component Analysis Full Text
Natarajan Meghanathan, Jackson State University, USA
Edge Controller Placement for Next Generation Wireless Sensor Networks Full Text
Mohamed S. Abouzeid, Heba A. El-khobby, Mahmoud A. A. Ali and Mohamed E. Nasr, Tanta University, Egypt
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Studying and Analyzing the Social Media Data Full Text
Sherif Kamel Hussein1,2, Sultanah AL-Sedairi2 and Nawal AL-Rahimi2, 1October University for Modern Sciences and Arts, Egypt 2Arab East Colleges for Graduate Studies, KSA
Dyslexic Reading Assistance with Language Processing Algorithms Full Text
Sharada Lakshmanan, Equifax, USA
Robust Watermarking Method for Secure Transmission of Medical Images in EHR Systems Full Text
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria
August 2022, Volume 14, Number 4
Compact Preservation of Scrambled CD-Rom Data Full Text
Jacob Hauenstein, The University of Alabama in Huntsville, USA
Identify the Beehive Sound using Deep Learning Full Text
Shah Jafor Sadeek Quaderi1, Sadia Afrin Labonno2, Sadia Mostafa2 and Shamim Akhter3, 1University of Malaya, Malaysia, 2AISIP Lab, International University of Business Agriculture and Technology, Bangladesh, 3Stamford University Bangladesh, Bangladesh
SwarMED: A High-Throughput Interoperability Architecture Over Ethereum and Swarm for Big Biomedical Data Full Text
Arghya Kusum Das, University of Alaska Fairbanks, USA
Arabic Dataset for Farmers' Intent Identification Toward Developing a Chatbot Full Text
Abdelrahman Elsayed and Susan F. Ellakwa, Agricultural Research Center, Giza, Egypt
Impact of 4IR Technology and its Impact on the Current Deployment Full Text
Bandar Alsulaimani1 and Amanul Islam2, 1King Fahad University of Petroleum and Minerals (KFUPM), Saudi Arabia, 2University of Malaya, Malaysia
A Short Survey on Constructing an IoT based Intelligent Road System Full Text
F. O. Okorodudu, G. C. Omede, S. A. Otegbalor, Delta State University, Nigeria
Impact of Pandemic on E-Commerce in Asia Full Text
Bilal Ahmed Wani and Noor Azizah BT. Mohamad Ali, Kulliyyah of Information and Communication Technology International Islamic University of Malaysia, Malaysia
June 2022, Volume 14, Number 3
Formal Specification for Implementing Atomic Read/Write Shared Memory in Mobile Ad Hoc Networks
Using the Mobile Unity Full Text
Reham.A.Shihata, EL Menoufia University, Egypt
The Digital Carbon Footprint: Threat to an Environmentally Sustainable Future Full Text
Pawankumar Sharma and Bibhu Dash, University of the Cumberlands, USA
Combining Machine Learning and Semantic Analysis for Efficient Misinformation Detection of Arabic Covid-19 Tweets Full Text
Abdulrahim Alhaizaey and Jawad Berri, King Saud University, Saudi Arabia
Exploiting Raspberry PI Clusters and Campus Lab Computers for Distributed Computing Full Text
Jacob Bushur and Chao Chen, Purdue University Fort Wayne Fort Wayne, USA
Security in Wireless Sensor Networks: Comparative Study Full Text
Fatimah Khalil Aljwari, Hajer Abdullah Alwadei and Aseel Abdullah Alfaidi, Jeddah University, Saudi Arabia
Big Data and Cloud Readiness Full Text
Hazirah Bee Yusof Ali and Lili Marziana Abdullah, Kulliyyah of Information and Communication Technology (KICT), International Islamic University Malaysia, Malaysia
The Professionalization of the Hacker Industry Full Text
Tyson Brooks, Syracuse University, USA
Visually Impaired People Monitoring in a Smart Home using Electronic White Cane Full Text
Mikaël A. Mousse, Institut Universitaire de Technologie, Université de Parakou, Benin
Covid-19 Sparked the E-Commerce Revolution; Some Benefited, While Others Left in Cold Full Text
Bilal Ahmed Wani and Dr. Noor Azizah BT. MohamadAli, International Islamic University of Malaysia, Malaysia
Smsecurity: Security System and SMS Notification Cum Face Recognition Full Text
Winston G. Domingo1, Arnold Dela Cruz2, Klaida Nicolas2, Jennifer A. Gamay MIT2, Erwin N. Lardizabal2 and Virdi C. Gonzales3, 1Quirino State University, Philippines, 2Cagayan Valley Computer and Information Technology, Philippines,3Southern Isabela Medical Center, Philippines
Remote Work and Innovation During this Covid-19 Pandemic: An Employers’ Challenge Full Text
Bibhu Dash, University of the Cumberlands, USA
Failure Free Cloud Computing Architectures Full Text
Yolam Zimba1, Hastings Maboshe Libati2 and Derrick Ntalasha2, 1University of Lusaka, Zambia, 2Copperbelt University, Zambia
User Experience Evaluation of a Student Information System Full Text
Asaad Alzayed and Bareeq Alghannam, Public Authority for Applied Education and Trainin, Kuwait
February 2022, Volume 14, Number 1
Mobile Device Users’ Susceptibility to Phishing Attacks Full Text
F. Ley Sylvester, Tarrant County College, USA
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation Full Text
Shortcomings and Flaws in the Mathematical Derivation of the Fundamental Matrix Equation
Steam++ An Extensible End-to-end Framework for Developing IoT Data Processing Applications in the Fog Full Text
Márcio Miguel Gomes1, Rodrigo da Rosa Righi1, Cristiano André da Costa1 and Dalvan Griebler2, 1University of Vale do Rio dos Sinos - Brazil, 2Pontifical Catholic University of Rio Grande do Su1, Brazil
Accuracy of Garmin GPS Running Watches over Repetitive Trials on the Same Route Full Text
Joe Dumas, University of Tennessee at Chattanooga, USA
Safely Scaling Virtual Private Network for a Major Telecom Company during A Pandemic Full Text
Shannon Roberson, Mohammad Abdus Salam, Mathieu Kourouma and Osman Kandara, Southern University and A&M College, USA
Encryption based Watermarking Technique for Security of Medical Image Full Text
Abderrahmane Daham and Mohamed ouslim, University of Science and Technology of Oran (USTO), Algeria
Feature Extraction Methods for IRIS Recognition System: A Survey Full Text
Tara Othman Qadir1, Nik Shahidah Afifi Md Taujuddin1 and Sundas Naqeeb Khan2, 1Universiti Tun Hussein Onn Malaysia (UTHM), Malaysia, 2Universiti Tun Hussein Onn Malaysia, Malaysia
December 2021, Volume 13, Number 6
Recommendation Generation Justified for Information Access Assistance Service (IAAS) : Study of Architectural Approaches Full Text
Kyelem Yacouba1, Kabore Kiswendsida Kisito1, Ouedraogo TounwendyamFrédéric2 and Sèdes Florence3,1Université Joseph Ki-Zerbo, Burkina Faso, 2Université Norbert Zongo, Burkina Faso, 3IRIT, Toulouse, France
Provides an Approach based on Adaptive Forwarding and Label Switching to Improve the Speed of Packet Forwarding in NDN Networks Full Text
Hadis Rezaei, Sahar Sadeghi and Leila Badeli,Science and Research Tehran Branch, Iran
Immersive Technologies in 5G-Enabled Applications: Some Technical Challenges of the Novel Usage Models Full Text
Nikola Rendevski, Andrijana Bocevska, Zoran Kotevski and Tome Dimovski, University St. Kliment Ohridski – Bitola, Macedonia
SECURETI: Advanced SDLC and Project Management Tool for TI (Philippines) Full Text
Amelie Anne Gutierrez, Holy Angel University, Philippines
Creating 3D Models with 3D Printing Process Full Text
Filip Popovski1, Svetlana Mijakovska1, Hristina Dimova Popovska2 and Gorica Popovska Nalevska3, 1SS Kliment Ohridski, R. Macedonia, 2SABA High School, R. Macedonia, 3International Slavic University Gavrilo Romanovic Derzavin, R. Macedonia
October 2021, Volume 13, Number 5
Examining Modern Data Security and Privacy Protocols in Autonomous Vehicles Full Text
Mingfu Huang, Rushit Dave, Nyle Siddiqui and Naeem Seliya, University of Wisconsin, USA
Information Retrieval based on Cluster Analysis Approach Full Text
Orabe Almanaseer, The University of Jordan, Jordan
Blockchain Technology in Agriculture: A Case Study of Blockchain Start-Up Companies Full Text
Chandra Sekhar Bhusal, Information Technology and Physical Sciences Federation University, Australia
Improving the Privacy-Preserving of Covid-19 Bluetooth-Based Contact Tracing Applications Against Tracking Attacks Full Text
Ali M. Allam, Helwan University, Egypt
August 2021, Volume 13, Number 4
Online Learning During Covid-19 Pandemic, and Possibility of Adopting Computer-Based Test Full Text
Rabea Emdas1 and Ahmed Alruwaili2, 1Swinburne University of Technology, Australia, 2La Trobe University, Australia
Web Scraper Utilizes Google Street View Images to Power a University Tour Full Text
Peiyuan Sun1 and Yu Sun2, 1USA, 2California State Polytechnic University, USA
Cloak-Reduce Load Balancing Strategy for Mapreduce Full Text
Mamadou Diarra and Telesphore Tiendrebeogo, Nazi Boni University, Burkina Faso
June 2021, Volume 13, Number 3
Fabric Defect Detection based on Improved Object as Point Full Text
Yuan He, Xin-Yue Huang and Francis Eng Hock Tay, National University of Singapore, Singapore
Circuit Break Connect Monitoring to 5G Mobile Application Full Text
Ton Tsang and Cheung Yip Kan, Hong Kong College of Technology, Hong Kong
User Name : shira
Posted 01-10-2024 on 19:25:32 AEDT