Email: info@ijps.in | Mob: +91-9555269393

Submit Manuscript

Current Issue : Vol.19, Issue 1, Jan-Jun 2025

Design of AI based Malware Detection Technique: A Revolutionized Machine Learning Methodology

Yasir Mahmood Younus

Vol.19, Issue 1, Jan-Jun, 2025 1-10

This research aims at analyzing the performance of the SVM methodology in the detection of malware by examining cross-traffic in the network using the CICIDS 2017 dataset. First, t...

View Abstract Download PDF

http://doi.org/10.37648/ijps.v19i01.001


A Comparative Evaluation of Random Forest and XGBoost Models for Disease Detection Using Medical Indicators

Murteza Hanoon Tuama

Vol.19, Issue 1, Jan-Jun, 2025 11-18

In the field of 21st-century medicine, Machine Learning (ML) has become the cornerstone of healthcare by transforming disease detection at an earlier stage by facilitating early-...

View Abstract Download PDF

http://doi.org/10.37648/ijps.v19i01.002


Strategic Awareness And Its Role In Improving Crisis Management: An Exploratory Study Of The Opinions Of A Sample Of Security Leaders In The National Security Agency / National Directorate Of Security In Anbar

Namir Ghanem Hadi, Dr. Basem Faisal Abd

Vol.19, Issue 1, Jan-Jun, 2025 19-38

The current research aims to test the effect of strategic awareness in its dimensions (customer service awareness, product promotion awareness, service awareness, competitive envir...

View Abstract Download PDF

http://doi.org/10.37648/ijps.v19i01.003


Classification of Countries Based on AI Adoption Indicators: A Comparative Analysis Using the Global AI Vibrancy Measurement Tool

Wahhab Muslim Mashloosh

Vol.19, Issue 1, Jan-Jun, 2025 39-48

AI reshapes societies across the globe, and each country adopts AI with different levels of commitment and adapts to the shifts caused from cross-tech influences, economies, cultur...

View Abstract Download PDF

http://doi.org/10.37648/ijps.v19i01.004


Lightweight Cryptographic Models for IoT Devices: A Deep Learning Approach to Power Side-Channel Attack Prevention

Luheb K. Qurban

Vol.19, Issue 1, Jan-Jun, 2025 49-61

The implementation of lightweight cryptography is often found in unrolled architecture, which offers the advantages of low latency and high real-time performance but also runs the ...

View Abstract Download PDF

http://doi.org/10.37648/ijps.v19i01.005