Vol. 3 No. 2 (2024)

Published: 2024-06-30

Computer

  • Cloud-Based Transaction Fraud Detection: An In-depth Analysis of ML Algorithms

    Ali Abbas Jasim
    19-31
    DOI: https://doi.org/10.31185/wjcms.253
  • A comparison of several intrusion detection methods using the NSL-KDD dataset

    hazem salim abdullah
    32-41
    DOI: https://doi.org/10.31185/wjcms.251
  • Reconfigurable Intelligent Surfaces Between the Reality and Imagination

    Asst. Prof. Haider ALRikabi, Adheed Sallomi, Hasan Khazaal, Ahmed Magdy, Iryna Svyd; IVAN OBOD
    42-50
    DOI: https://doi.org/10.31185/wjcms.266
  • Evaluating End-to-End Delay in Road-Based Routing Protocols for VANETs with Snake Optimization

    Hanadi Hassan karim Al-Maliki, Hamid AL-Asadi
    51-61
    DOI: https://doi.org/10.31185/wjcms.254

Mathematics

  • Generalized Projective product of semi-rings

    mohd Shahoodh
    DOI: https://doi.org/10.31185/wjcms.131
  • Combining Laplace transform and Variational iteration method for solving singular IVPs and BVPs of Lane–Emden type equation

    Mohamed H. Jassim, Waleed Mohammed Al-Hayani
    8-18
    DOI: https://doi.org/10.31185/wjcms.244