Vol. 51 No. 2 (2025): Volume 51 Issue 2 Year 2025

Published: 2025-08-08

Articles

  • Abnormal Behavior in Online Exam: Distance Learning Assessments Dataset

    Muhanad Alkhalisy
    1-7
    DOI: https://doi.org/10.25195/ijci.v51i2.595
  • An Enhanced and Adaptive Algorithm for Secure Encryption of Data using Advanced Encryption

    Mohanad S. Taha
    8-23
    DOI: https://doi.org/10.25195/ijci.v51i2.599
  • A Comparative Analysis of the Effectiveness of Multiple Models for Predicting Heart Failure using Data Mining

    Ahmed Sami Jaddoa, Juliet Kadum, Amaal Kadum
    24-32
    DOI: https://doi.org/10.25195/ijci.v51i2.618
  • Enhancing Image Classification using Graph Attention Networks

    Hasan Maher Ahmed
    33-45
    DOI: https://doi.org/10.25195/ijci.v51i2.548
  • An Automated Tool for Streamlining Software Engineering: Information Extraction and Decision

    Rasha Gh. Alsarraj
    46-55
    DOI: https://doi.org/10.25195/ijci.v51i2.550
  • LLM Hallucination: The Curse That Cannot Be Broken

    Hussein Al-Mahmood
    56-69
    DOI: https://doi.org/10.25195/ijci.v51i2.546
  • Securing DNA Profiles Using AES Cryptography: New Approach to Encrypted Biometric Authentication in EHR Systems

    Zainab N. Al-Qudsy, Roaa Safi Abed Allah , Wasan Maddah Alaluosi
    70-85
    DOI: https://doi.org/10.25195/ijci.v51i2.598
  • A Systematic Review of Federated Learning: Emerging Techniques, Challenges, and Research Directions

    Mohammed Abdul Ameer Jabbar, Ahmed Sami Jaddoa, Usama Samir Mahmoud
    86-97
    DOI: https://doi.org/10.25195/ijci.v51i2.628
  • Assist Blind People in Road Crossing by Integrating a Smart System into Wearable Devices and Vehicle Applications

    atheer al-chalabi
    98- 108
    DOI: https://doi.org/10.25195/ijci.v51i2.616
  • Post-Quantum Cryptographic Techniques for Future-Proofing-Blockchain-Based Personal Data Sharing

    Godwin Mandinyenya, Vusumuzi Malele
    109-125
    DOI: https://doi.org/10.25195/ijci.v51i2.623
  • An Extractive Text News Summarization: A Hybrid Optimization with Ensemble Learning Approach

    Mohammad Reza Feizi Derakhshi, Estabraq Abdulreda Kadhim
    126-143
    DOI: https://doi.org/10.25195/ijci.v51i2.625
  • Optimized Security for Blockchain Edge-Fog Systems Performance Analysis and Optimization Strategies

    basman saman, Jolan Rokan Naif
    144-155
    DOI: https://doi.org/10.25195/ijci.v51i2.610
  • Post-Quantum Secure Blockchain-Based Federated Learning Framework for Enhancing Smart Grid Security

    Maad M. Mijwil, Guma Ali, Kabiito Simon Peter, Klodian Dhoska, Ioannis Adamopoulos
    156-223
    DOI: https://doi.org/10.25195/ijci.v51i2.637
  • User Authentication Based on Mouse Dynamics Using an Efficient-Net Model

    Semaa Hatem Aljoubory, Mohammed Salih Mahdi
    224-242
    DOI: https://doi.org/10.25195/ijci.v51i2.612
  • Reducing Bias in Classification using Fairness Stacking Meta-Learning

    omar shakir, Maan Y Anad Alsaleem, Dindar M Ahmed
    243-251
    DOI: https://doi.org/10.25195/ijci.v51i2.629
  • A Dataset-Driven Comparison of Traditional and Advanced Machine Learning Techniques for Phishing Detection in Low-Variance Environments

    Konaz Kawa Latif, Saman Mirza Abdullah
    252-267
    DOI: https://doi.org/10.25195/ijci.v51i2.632
  • CNN-Based Transfer Learning Approach for Cross-Platform IoT Malware Detection

    Hamad Abed Farhan
    268-282
    DOI: https://doi.org/10.25195/ijci.v51i2.636
  • Fog Computing and IoT Integration for Latency Reduction: A Case Study

    Turkan Khaleel
    283-289
    DOI: https://doi.org/10.25195/ijci.v51i2.627
  • Automated Object Detection and Count Estimation Based on Machine Learning Models

    Rafil Mohammed Jameel
    290-306
    DOI: https://doi.org/10.25195/ijci.v51i2.631