Principal Component Analysis For ATM Facial Recognition Security
Principal Component Analysis For ATM Facial Recognition Security
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
Introduction
When applied to the computer vision problem of human face recognition, a set of eigenvectors is
called "eigenfaces." Sirovich and Kirby (1987) created the Eigenfaces method for recognition, which
has been used by Matthew Turk and Alex Pentland for face classification [1]. The high-dimensional
face image vector space is used to calculate the covariance matrix, from which the eigenvectors are
calculated. The Eigenfaces provide a fundamental group of images from which to generate the
covariance matrix [2-7]. This decreases the number of dimensions needed to represent the original
training images, as the smaller set of basis images can do so. Comparisons of how different faces are
represented in the basis set allow for classification. The process of facial recognition divides the data
from images into distinct categories (persons) [8-15]. Although the input images are not completely
random, they do have significant variation due to factors such as lighting and pose. All input signals
share common characteristics despite their unique characteristics. Examples of universal patterns that
can be observed in any signal include the presence of specific anatomical features (eyes, nose, mouth)
in any given face and the distances between them [16-21]. Eigenfaces are the technical term for these
distinguishing characteristics in the field of facial recognition (or principal components generally).
Principal Component Analysis is a mathematical method for obtaining them from raw image data
(PCA) [22-26].
Using principal component analysis (PCA), each image in the training set can be converted into an
eigenface. By summing up the eigenfaces, PCA allows for the reconstruction of any image in the
training set [27-31]. Keep in mind that eigenfaces are simply distinctive features of the faces.
Therefore, the original face image can be reconstructed from eigenfaces by summing all the eigenfaces
(features) together in the correct proportion. Some features of the face may or may not be present in
the original image, but those features are all that are represented by each eigenface [32-37].
The proportion of an Eigen face's contribution to the "sum" of the Eigenfaces should increase if the
corresponding feature is more pronounced in the original image. If the opposite is true, then that detail
was likely added later and is not visible in the original image. A smaller (or null) contribution from the
corresponding eigenface to the total number of eigenfaces is desired [38-41]. Therefore, a weighted
sum of all eigenfaces must be constructed in order to reconstruct the original image from the
Eigenfaces. Each eigenface contributes a certain amount to the final reconstructed image. The value of
this weight indicates how prevalent the individual feature (eigenface) was in the base image [42-49].
Reconstructing the original images from the eigenfaces alone is possible if all the eigenfaces are used.
However, a subset of the eigenfaces can be used instead. If this is the case, the reconstructed image
will be close to the original. However, by leaving out certain eigenfaces, one can guarantee that losses
are kept to a minimum [50]. To achieve this, we prioritise only the most essential characteristics
(eigenfaces). Since computational resources are limited, eigenfaces must be ignored [51-57].
What does this have to do with biometrics? The fact that you can do both face extraction and eigenface
extraction from a given set of weights is a hint [58-63]. The opposite approach would be to derive the
weights from the eigenfaces and the target face. These values tell us exactly how dissimilar the target
face is to the "typical" faces reflected by the eigenfaces, and nothing else. As a result, with these
numbers, we can learn two very significant things [64-69].
Check to see if there is a face in the image. If the image's weights are drastically different from the
weights of known face images, then it is unlikely to be a face [70-75]. Images of faces that are similar
to one another share certain characteristics (eigenfaces) to a high degree (weights). Images can be
organised into clusters using extracted weights from all available images. Similar faces are more likely
to appear in all images with similar weights. Python, developed by Guido van Rossum and first
released in 1991, is a popular high-level programming language used for a wide variety of purposes
[76-81]. Python is an interpreted language with a design philosophy that prioritises code readability
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
(most notably, it makes use of whitespace indentation to delimit code blocks rather than curly braces
or keywords) and a syntax that enables programmers to express concepts in fewer lines of code than is
possible in languages like C++ or Java. The language's features are meant to facilitate the creation of
comprehensible programmes of varying sizes [82-87].
Review of Literature
Python is a flexible programming language that can be used for a wide range of projects due to its
dynamic type system and built-in support for automatic memory management and programming styles
like OOP, FP, and procedural code. It comes with a large and complete set of industry-standard books
[88-101]. Python is a multi-paradigm language, meaning that it supports more than one style of
programming. Object-oriented programming and structured programming are both fully supported,
and the language also offers extensive support for aspect-oriented programming [102-109]. Extensions
allow for the use of many different paradigms, such as design by contract and logic programming.
Python's memory management is based on dynamic typing, reference counting, and a garbage
collector that can detect cycles [110-115]. Python's dynamic name resolution (late binding) is a
powerful feature that binds the names of methods and variables as the programme runs [116].
Python does away with the need for curly braces and keywords in favour of indentation to separate
code blocks. After certain statements, the indentation level rises; when it falls, the current block ends.
This aspect is also known as the "off-side rule" in some contexts [117-119].
The equals sign (token '=') in an assignment statement. This fundamental mechanism (including the
nature of Python's version of variables) sheds light on a wide range of other language features and
operates differently than in conventional imperative programming languages. To assign a value to a
variable in C, as in x = 2, means to store the value 2 in the variable with the name x [120-127]. The
right-hand value is copied into the memory location whose name is represented by the left-hand
variable. The size of the variable's allocated memory is appropriate for the declared type. Using the
same example, the simplest form of assignment in Python is x = 2, which means "(generic) name x
receives a reference to a separate, dynamically allocated object of numeric (int) type with value 2." We
connect the name to the thing by doing this [128-133]. It is incorrect to refer to the storage location by
its name, since it does not contain the specified value. In the future, names can refer to anything from
strings to procedures to complex objects with data and methods, and everything in between [135-138].
Because statements cannot be included in expressions, expressions such as lists, other
comprehensions, and lambda expressions cannot contain statements [139-143]. The conditional
expression of a conditional statement cannot contain an assignment statement like a = 1, as an
example. As a result, you won't make the common C mistake of confusing the assignment operator =
with the equality operator == in a condition. While the C code if (c = 1) ... is valid syntax (albeit
unintentional), the Python code if (c = 1):... is not [144-149].
Methodology
The syntax instance.method(argument) is syntactic sugar for Class.method, which refers to a function
that is attached to an object's class (instance, argument). In contrast to other object-oriented languages
(e.g., C++, Java, Objective-C, or Ruby), Python's methods use an explicit self parameter to access
instance data. One of Python's many strengths is its extensive standard library, which includes a wide
variety of useful tools. This is on purpose, and is part of Python's "batteries included" philosophy.
Internet-facing applications can use a wide variety of common file formats and communication
protocols (like MIME and HTTP) [150-157]. Modules for GUI design, database connectivity, random
number generation, floating-point arithmetic, regular expression manipulation, and unit testing are all
provided. As of November 2016, over 92,000 packages offering a wide range of functionality were
available from the Python Package Index, the official repository containing third-party software for
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
Python [158-167]. If the terminal in question is linked to the main database, then the online PIN will
be verified. In banks, the customer's PIN is checked against both the reference PIN and the customer's
own PIN. One drawback is that if the network goes down, the ATM can't be used until the problem is
fixed [168-171].
Result
The ATM is not linked to a centralised database in off-line PIN validation. Off-line PIN validation
necessitates that the ATM be able to check the entered PIN against a stored reference PIN. The
terminal needs cryptographic processing power and access to appropriate encryption keys. The off-line
verification method is painfully sluggish and ineffective. Since ATMs can now connect to a central
server via secure wireless networks, offline PIN validation is no longer necessary [172-177].
In order to carry out a high-security interchange transaction, one of three PIN procedures must be
followed. A secret cryptographic key is used to encrypt the supplied PIN at the entry terminal. The
PIN, along with other transaction details, is sent to the acquirer's system in an encrypted format. From
there, the acquirer's system sends the encrypted PIN to the HSM [178-181].
The secret number is revealed there. When an interchange cryptographic key is decrypted, it is
immediately re-encrypted and sent to the issuer's system via the usual channels of communication.
Finally, the routed PIN is validated using online local PIN validation techniques after being decrypted
in the issuer's security module [182-185].
Message authentication, also known as "ZONE ENCRYPTION," is one of several transaction methods
used in shared ATMs for PIN encipherment. In this system, a reliable third party is designated to act
on behalf of a consortium of financial institutions to facilitate the exchange of messages regarding the
approval of ATM payments [186-191].
Maintaining secure connections between financial institutions and ATMs requires a cryptographic
module, also known as a security module. The safety component was built to withstand attempts at
modification. Multiple tasks, including PIN verification, PIN translation during exchange, Key
management, and message authentication, are handled by the security module. Since the security
module can convert PINs to the interchangeable format, their use raises security concerns.
Additionally, the security module creates, stores, and guards all user network keys [192-196] .
User-provided personal verification information is the first step in the personal verification process. A
personal identification number (PIN) and the customer's banking details are stored in this manner.
Skimming is a form of credit card theft in which criminals use a miniature device to steal card details
during a seemingly legitimate credit or debit card transaction [197-199].
A skimmer is a device that records information from the magnetic strip of a credit or debit card as the
card is swiped through it. Online or with fake credit cards, thieves use the stolen information to make
unauthorised purchases.
Some employees in retail and dining establishments who regularly handle credit cards are occasionally
recruited to join a skimming ring. During a routine transaction, these employees will use a portable
device to steal your credit card information. For instance, we commonly use credit cards to pay the bill
at restaurants. The waiter takes our credit cards and walks away, providing a dishonest waiter with a
perfect opportunity to steal our money using a credit card skimmer.
The information can then be used to make fraudulent purchases in person using a cloned credit card,
online using the victim's account, or resold online.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
Bank robbery that involves the systematic theft of money from ATMs is called an ATM looting. The
criminals conduct their plunder by using identity theft to fabricate counterfeit debit cards using the
banking information of unsuspecting victims.
Discussion and Finding
We propose a solution to the aforementioned security issues. We have improved the safety and
reliability of ATM withdrawals by adding a new layer of protection. Each bank account holder must
have a valid e-mail id on file with the institution for our proposed system to work. In addition,
multiple, well-lit photographs of the account holder's face are taken for processing purposes. In
addition, the area around the ATM should be well-lit to facilitate quick and precise facial recognition.
Our solution uses facial recognition technology to make using ATMs safer. The credit/debit card can
only be used by the legitimate account holder. Those who choose to use this feature will have their
accounts protected in a manner similar to online banking, but it is entirely voluntary.
The account holder's face is all that's needed for facial recognition. At the bank's location, the image is
captured for the first time from a number of different perspectives by bank officials. Some processing
is applied to these captured images in order to extract facial features that can then be used for
recognition. The finalised picture is kept in a data warehouse. If the user has enabled this function, the
recognizer software will receive a live feed from the ATM's camera following a card swipe. Facial
features will be extracted from the live feed after being detected by the recognizer. The facial features
are extracted and compared to previously extracted and stored facial features. If the facial features
don't match, the transaction is flagged as a "Unauthorized transaction" and denied. Otherwise, the
transaction will be treated as "Authorized" and processed accordingly. After the card is swiped, the
PIN is entered.
When a customer opens an account with a specific bank, the primary process on the bank's end is the
face registering process. The customer's face is photographed by the bank at a well-lit location and
then used to determine who is permitted to use the account's ATM card. The eigenfaces are generated
from the processed face scan. The captured image of the person is processed through dimension
reduction to convert it from 2 Dimensional images to 1 Dimensional, thereby reducing the image size
while maintaining the important characteristics used in the process. The Converted Eigenfaces are
linked to the user's account in the central database, where they will be available for use in subsequent
server operations. When a customer uses an ATM to withdraw money from their account, this action is
taken. Here, the ATM's built-in cameras are used for face recognition in real time. The ATM will
detect and record a live image of the user as soon as they approach the machine.
To decrease the file size of the live image captured by the ATM, its dimensions will be converted to
eigenvalues. This eigenface will be used to find a matching photo in the database. The live ATM
image will be transformed into an eigenface through this procedure. The converted value will be
compared to the person's preexisting eigenface value in the database. In this procedure, PCA is used.
Face values will be matched using principal component analysis.
If the card is used without the customer's permission and the PIN is attempted, a photo of the
cardholder will be sent to the account holder via e-mail. Even though it's not a security boost, this will
make sure that all transactions are recorded. The account holder can now visualise the fraudster in the
event of fraudulent activity. It's also convenient in the event of a police report, as officers won't have
to waste time waiting for the bank to release the relevant surveillance footage. The account holder's
photo provides the police with a starting point for their investigation.
Facial recognition for ATMs with an e-mailing feature was implemented in this project as a novel
approach to strengthening ATM security. Our new system offers a secure cash machine. This makes it
possible to put a stop to fraudulent activities. We can take our work in a number of exciting new
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
directions. Improved machine learning algorithms can process captured images of processes and store
them in a central server for future recognition, speeding up and improving the accuracy of the
recognition process. This allows for precision even in dim conditions.
When a customer opens an account with a specific bank, the primary process on the bank's end is the
face registering process. The customer's face is photographed by the bank at a well-lit location and
then used to determine who is permitted to use the account's ATM card. The eigenfaces are generated
from the processed face scan. The captured image of the person is processed through dimension
reduction to convert it from 2 Dimensional images to 1 Dimensional, thereby reducing the image size
while maintaining the important characteristics used in the process. The converted eigenfaces are
linked to the user's account in the central database from which the servers can pull them for further
processing.
Conclusion
When a customer uses an ATM to withdraw money from their account, this action is taken. Here, the
ATM's built-in cameras are used for face recognition in real time. The ATM will detect and record a
live image of the user as soon as they approach the machine. To decrease the file size of the live image
captured by the ATM, its dimensions will be converted to eigenvalues. This eigenface will be used to
find a matching photo in the database. The live ATM image will be transformed into an eigenface
through this procedure. The converted value will be compared to the person's preexisting eigenface
value in the database. In this procedure, PCA is used. If both the live and stored images have the same
eigenface values, PCA can be used to match the face values. After that, they'll be able to withdraw
cash from an ATM. The captured image and the user's E-Mail address will be sent to a blacklist if the
user tries to access the system.
References
1. Aakanksha Singhal and D.K. Sharma, “Seven Divergence Measures by CDF of fitting in
Exponential and Normal Distributions of COVID-19 Data”, Turkish Journal of Physiotherapy and
Rehabilitation, Vol.32(3), pp. 1212 - 1222, 2021.
2. D.K. Sharma and Haldhar Sharma, “A Study of Trend Growth Rate of Confirmed cases, Death
cases and Recovery cases in view of Covid-19 of Top Five States of India”, Solid State
Technology, Vol.64(2), pp. 4526-4541, 2021.
3. D.K. Sharma, “Information Measure Computation and its Impact in MICOCO Dataset”, IEEE
Conference Proceedings, 7th International Conference on Advanced Computing and
Communication Systems (ICACCS), Vol.1, pp. 2011-2014, 2021.
4. Aakanksha Singhal and D.K. Sharma, “Keyword extraction using Renyi entropy: a statistical and
domain independent method”, IEEE Conference Proceedings, 7th International Conference on
Advanced Computing and Communication Systems (ICACCS), Vol.1, pp. 1970-1975, 2021.
5. Aakanksha Singhal and D.K. Sharma, “Generalization of F-Divergence Measures for Probability
Distributions with Associated Utilities”, Solid State Technology, Vol.64(2), pp. 5525-5531, 2021.
6. Aakanksha Singhal and D.K. Sharma, “A Study of before and after Lockdown Situation of 10
Countries through Visualization of Data along With Entropy Analysis of Top Three Countries”,
International Journal of Future Generation Communication and Networking, Vol.14(1), pp. 496-
525, 2021.
7. Aakanksha Singhal and D.K. Sharma, “Generalized „Useful‟ Rényi & Tsallis Information
Measures, Some Discussions with Application to Rainfall Data", International Journal of Grid and
Distributed Computing, Vol. 13(2), pp. 681-688, 2020.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
8. Reetu Kumari and D. K. Sharma, “Generalized `Useful non-symmetric divergence measures and
Inequalities", Journal of Mathematical Inequalities, Vol. 13(2), pp. 451-466, 2019.
9. D.S. Hooda and D.K. Sharma, “On Characterization of Joint and Conditional Exponential
Survival Entropies", International Journal of Statistics and Reliability Engineering, Vol. 6(1), pp.
29-36, 2019.
10. Reetu Kumari and D. K. Sharma, “Generalized `Useful' AG and `Useful' JS-Divergence Measures
and their Bounds", International Journal of Engineering, Science and Mathematics, Vol. 7 (1), pp.
441-450, 2018.
11. D.S. Hooda, Reetu Kumari and D. K. Sharma, “Intuitionistic Fuzzy Soft Set Theory and Its
Application in Medical Diagnosis”, International Journal of Statistics in Medical Research, Vol.
7, pp. 70-76, 2018.
12. D.K. Sharma and Sonali Saxena, “Generalized Coding Theorem with Different Source Coding
Schemes”, International Journal on Recent and Innovation Trends in Computing and
Communication, Vol. 5(6), pp. 253 – 257, 2017.
13. H. Bulut and R. F. Rashid , "The Zooplankton Of Some Streams Flow Into The Zab River,
(Northern Iraq)", Ecological Life Sciences, vol. 15, no. 3, pp. 94-98, Jul. 2020
14. Rashid, R. F., Çalta, M., & Başusta, A. (2018). Length-Weight Relationship of Common Carp
(Cyprinus carpio L., 1758) from Taqtaq Region of Little Zab River, Northern Iraq. Turkish
Journal of Science and Technology, 13(2), 69-72.
15. Pala, G., Caglar, M., Faruq, R., & Selamoglu, Z. (2021). Chlorophyta algae of Keban Dam Lake
Gülüşkür region with aquaculture criteria in Elazıg, Turkey. Iranian Journal of Aquatic Animal
Health, 7(1), 32-46.
16. Rashid, R. F., & Basusta, N. (2021). Evaluation and comparison of different calcified structures
for the ageing of cyprinid fish leuciscus vorax (heckel, 1843) from karakaya dam lake, turkey.
Fresenius environmental bulletin, 30(1), 550-559.
17. Rashid, R. (2017). Karakaya Baraj Gölünde (Malatya-Türkiye) yaşayan aspius vorax'da yaş tespiti
için en güvenilir kemiksi yapının belirlenmesi/Determination of most reliable bony structure for
ageing of aspius vorax inhabiting Karakaya Dam Lake (Malatya-Turkey).
18. S. Pandya, T. R. Gadekallu, P. K. Reddy, W. Wang and M. Alazab, "InfusedHeart: A Novel
Knowledge-Infused Learning Framework for Diagnosis of Cardiovascular Events," in IEEE
Transactions on Computational Social Systems.
19. Satyanaga, H. Rahardjo, and Q. Zhai, “Estimation of unimodal water characteristic curve for gap-
graded soil,” Soils and Foundations, vol. 57, no. 5, pp. 789–801, 2017.
20. Satyanaga & H. Rahardjo, “Unsaturated shear strength of soil with bimodal soil-water
characteristic curve,” Geotechnique, Vol. 69, No. 9, pp. 828-832, 2019.
21. Satyanaga, H. Rahardjo & C.J. Hua, “Numerical simulation of capillary barrier system under
rainfall infiltration,” ISSMGE International Journal of Geoengineering Case Histories, Vol 5, No
1, pp. 43-54, 2019.
22. Satyanaga & H. Rahardjo, “Role of unsaturated soil properties in the development of slope
susceptibility map,” Geotechnical Engineering. Vol 175, No 3, pp. 276-288, 2022.
23. Satyanaga & H. Rahardjo, “Stability of unsaturated soil slopes covered with Melastoma
Malabathricum in Singapore,” Geotechnical Engineering. Vol 7, No 6, pp. 393-403. 2020.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
24. Satyanaga, H. Rahardjo, Z.H. Koh & H. Mohamed. “Measurement of a soil-water characteristic
curve and unsaturated permeability using the evaporation method and the chilled-mirror method,”
Journal of Zhejiang University-SCIENCE A. Vol 20, No 5, pp. 368-375, 2019.
25. Satyanaga, N. Bairakhmetov, J.R. Kim & S.-W. Moon. “Role of bimodal water retention curve on
the unsaturated shear strength,” Applied Sciences. Vol 12, No 3, pp. 1266. 2022.
26. D. A. Al-maaitah, T. Majali, M. Alsoud, and T. A. Al-Maaitah, “The Role Of Leadership Styles
On Staffs Job Satisfaction In Public Organizations,” J. Contemp. Issues Bus. Gov., vol. 27, no. 1,
pp. 772–783, 2021.
27. T. A. Al-maaitah, T. Majah, M. Alsoud, and D. A. Al-maaitah, “The Impact of COVID 19 on the
Electronic Commerce Users Behavior,” J. Contemp. Issues Bus. Gov., vol. 27, no. 1, pp. 784–
793, 2021.
28. S. R. Vadyala, S. N. Betgeri, J. C. Matthews, and E. Matthews, “A review of physics-based
machine learning in civil engineering.” Results in Engineering, vol. 13, p. 100316, 2022.
29. S. R. Vadyala, S. N. Betgeri, and N. P. Betgeri, “Physics-informed neural network method for
solving one-dimensional advection equation using PyTorch.” Array, vol. 13, p. 100110, 2022.
30. S. R. Vadyala and E. A. Sherer, “Natural Language Processing Accurately Categorizes
Indications, Findings and Pathology Reports From Multicenter Colonoscopy (Preprint).” 2021.
31. S. R. Vadyala, S. N. Betgeri, E. A. Sherer, and A. Amritphale, “Prediction of the number of
COVID-19 confirmed cases based on K-means-LSTM.” Array, vol. 11, p. 100085, 2021.
32. D.K. Srivastava and B. Roychoudhury, “Words are important: A textual content based identity
resolution scheme across multiple online social networks,” Knowledge-Based Systems, vol. 195,
105624, 2020.
33. D.K. Srivastava and B. Roychoudhury, “Understanding the Factors that Influence Adoption of
Privacy Protection Features in Online Social Networks,” Journal of Global Information
Technology Management, vol.24, no.3, pp. 164-182, August 2021
34. R. Agarwal and N. Rao, “ML-based classifier for Sloan Digital Sky spectral objects,”
Neuroquantology, vol. 20, no. 6, pp. 8329–8358, 2022.
35. R. Agarwal, “Edge Detection in Images Using Modified Bit-Planes Sobel Operator,” 2014, pp.
203–210.
36. A. Rashi and R. Madamala, “Minimum relevant features to obtain ai explainable system for
predicting breast cancer in WDBC,” Int J Health Sci (Qassim), Sep. 2022.
37. R. A. A. Agarwal, “Decision Support System designed to detect yellow mosaic in Pigeon pea
using Computer Vision,” Design Engineering (Toronto), vol. 8, pp. 832–844, 2021.
38. R. Agarwal, S. Hariharan, M. Nagabhushana Rao, and A. Agarwal, “Weed Identification using K-
Means Clustering with Color Spaces Features in Multi-Spectral Images Taken by UAV,” in 2021
IEEE International Geoscience and Remote Sensing Symposium IGARSS, Jul. 2021, pp. 7047–
7050.
39. Khan, M. A., Kumar, N., Mohsan, S. A. H., Khan, W. U., Nasralla, M. M., Alsharif, M. H., Ullah,
I. (2023). Swarm of UAVs for network management in 6G: A technical review. IEEE
Transactions on Network and Service Management, 20(1), 741–761.
40. Mohsan, S. A. H., Othman, N. Q. H., Khan, M. A., Amjad, H., & Żywiołek, J. (2022). A
comprehensive review of micro UAV charging techniques. Micromachines, 13(6), 977.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
41. Tucmeanu, E. R., Tucmeanu, A. I., Iliescu, M. G., Żywiołek, J., & Yousaf, Z. (2022). Successful
management of IT projects in healthcare institutions after COVID-19: Role of digital orientation
and innovation adaption. Healthcare (Basel, Switzerland), 10(10), 2005.
42. Żywiołek, J., Tucmeanu, E. R., Tucmeanu, A. I., Isac, N., & Yousaf, Z. (2022). Nexus of
transformational leadership, employee adaptiveness, knowledge sharing, and employee creativity.
Sustainability, 14(18), 11607.
43. Al Shraah, A., Abu-Rumman, A., Alqhaiwi, L.A., & Alsha'ar, H. “The impact of sourcing
strategies and logistics capabilities on organizational performance during the COVID-19
pandemic: Evidence from Jordanian pharmaceutical industries”. Uncertain Supply Chain
Management. Vol. 10 No. 3, pp. 1077-1090. (2022).
44. Abu-Rumman, Ayman. "Effective Knowledge Sharing: A Guide to the Key Enablers and
Inhibitors." In Handbook of Research on Organizational Culture Strategies for Effective
Knowledge Management and Performance. Edited by Tessier, Dana, 133-156. Hershey, PA: IGI
Global, 2021.
45. Al Shraah, A., Irtaimeh, H.J., & Rumman, M.A. “The Strategic Human Resource Management
Practices in Implying Total Quality Management (TQM): An Empirical Study on Jordanian
Banking Sector. International Journal of Management. Vol. 4, No. 5. Pp.179-190. (2013).
46. Abu-Rumman, A. And Qawasmeh, R. "Assessing international students' satisfaction of a
Jordanian university using the service quality model", Journal of Applied Research in Higher
Education, Vol. ahead-of-print No. ahead-of-print. (2021).
47. Khaled Lafi Al-Naif And Ata E. M. Al Shraah. “Working capital management and profitability:
Evidence from Jordanian mining and extraction industry sector. IUG Journal of Economics and
Business. Vol. 2, No. 1, pp 42-60. (2018)
48. Roja Boina, “Assessing the Increasing Rate of Parkinson's Disease in the US and its Prevention
Techniques”, International Journal of Biotechnology Research and Development, 3(1), pp. 1-18,
2022.
49. S. Dhanush, S.C. Mohanraj, V.S. Sruthi, S Cloudin, F.J. John Joseph, (2022). CODEDJ-Private
Permissioned Blockchain Based Digital Wallet with Enhanced Security, IEEE International
Conference on Bio-Neuro Informatics Models and Algorithms. IEEE.
50. A.J. John Joseph, F.J. John Joseph, O.M. Stanislaus, and D. Das (2022). Classification
methodologies in healthcare, Evolving Predictive Analytics in Healthcare: New AI techniques for
real-time interventions, p 55-73. IET.
51. F.J. John Joseph, (2022). IoT Based Aquarium Water Quality Monitoring and Predictive
Analytics Using Parameter Optimized Stack LSTM. In 2022 International Conference on
Information Technology (InCIT). IEEE
52. F.J. John Joseph, (2023). Time series forecast of Covid 19 Pandemic Using Auto Recurrent
Linear Regression. Journal of Engineering Research.
53. V. Pattana-anake, & F. J. John Joseph (2022). Hyper Parameter Optimization of Stack LSTM
Based Regression for PM 2.5 Data in Bangkok, in Proceedings of 2022 International Conference
on Business and Industrial Research (ICBIR). IEEE
54. N. Srisook, O. Tuntoolavest, P. Danphitsanuparn , V. Pattana-anake, & F. J. John Joseph,
“Convolutional Neural Network Based Nutrient Deficiency Classification in Leaves of Elaeis
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
guineensis Jacq” International Journal of Computer Information Systems and Industrial
Management Applications, vol. 14, pp. 19-27, April 2022.
55. F. J. John Joseph, “IoT-Based Unified Approach to Predict Particulate Matter Pollution in
Thailand” The Role of IoT and Blockchain: Techniques and Applications, 145-151, 2022.
56. F. J. J. John Joseph, “Twitter Based Outcome Predictions of 2019 Indian General Elections Using
Decision Tree,” in Proceedings of 2019 4th International Conference on Information Technology,
2019, no. October, pp. 50–53.
57. V. Pattana-anake, P. Danphitsanuparn, and F. J. J. John Joseph, “BettaNet : A Deep Learning
Architecture for Classification of Wild Siamese Betta Species,” IOP Conf. Ser. Mater. Sci. Eng.,
vol. 1055, 2021.
58. F. J. John Joseph and S. Nonsiri, “Region-Specific Opinion Mining from Tweets in a Mixed
Political Scenario,” in International Conference on Intelligent and Smart Computing in Data
Analytics, 2021, pp. 189–195.
59. A. R. Yeruva, C. S. L Vijaya Durga, G. B, K. Pant, P. Chaturvedi and A. P. Srivastava, "A Smart
Healthcare Monitoring System Based on Fog Computing Architecture," 2022 2nd International
Conference on Technological Advancements in Computational Sciences (ICTACS), 2022, pp.
904-909.
60. A. R. Yeruva, P. Choudhari, A. Shrivastava, D. Verma, S. Shaw and A. Rana, "Covid-19 Disease
Detection using Chest X-Ray Images by Means of CNN," 2022 2nd International Conference on
Technological Advancements in Computational Sciences (ICTACS), 2022, pp. 625-631.
61. A. Rana, A. Reddy, A. Shrivastava, D. Verma, M. S. Ansari and D. Singh, "Secure and Smart
Healthcare System using IoT and Deep Learning Models," 2022 2nd International Conference on
Technological Advancements in Computational Sciences (ICTACS), 2022, pp. 915-922.
62. K. Sridhar, Ajay Reddy Yeruva, Renjith P N, Asmita Dixit, Aatif Jamshed, and Ravi Rastogi,
“Enhanced Machine learning algorithms Lightweight Ensemble Classification of Normal versus
Leukemic Cel”, Journal of Pharmaceutical Negative Results, Vol.13, no.SI-9, pp. 496–505, 2022.
63. Nita S. patil, Sanjay M. Patil, Chandrashekhar M. Raut, Amol P. Pande, Ajay Reddy Yeruva, and
Harish Morwani, “An Efficient Approach for Object Detection using Deep Learning”, Journal of
Pharmaceutical Negative Results, Vol.13, no.SI-9, pp. 563–572, 2022.
64. P. William, M. Shamim, A. R. Yeruva, D. Gangodkar, S. Vashisht and A. Choudhury, "Deep
Learning based Drowsiness Detection and Monitoring using Behavioural Approach," 2022 2nd
International Conference on Technological Advancements in Computational Sciences (ICTACS),
2022, pp. 592-599.
65. T. Vinoth Kumar, A. R. Yeruva, S. Kumar, D. Gangodkar, A. L N Rao and P. Chaturvedi, "A
New Vehicle Tracking System with R-CNN and Random Forest Classifier for Disaster
Management Platform to Improve Performance," 2022 2nd International Conference on
Technological Advancements in Computational Sciences (ICTACS), 2022, pp. 797-804.
66. O. Fabela, S. Patil, S. Chintamani and B. H. Dennis, "Estimation of effective thermal conductivity
of porous Media utilizing inverse heat transfer analysis on cylindrical configuration," in ASME
2017 International Mechanical Engineering Congress and Exposition, 2017.
67. S. Patil, S. Chintamani, B. Dennis and R. Kumar, "Real time prediction of internal temperature of
heat generating bodies using neural network," Thermal Science and Engineering Progress, vol.
23, 2021.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
68. S. Patil, S. Chintamani, J. Grisham, R. Kumar and B. H. Dennis, "Inverse Determination of
Temperature Distribution in Partially Cooled Heat Generating Cylinder," in ASME 2015
International Mechanical Engineering Congress and Exposition , 2015.
69. Hashem Shatnawi, “Computational Fluid Flow Model for the Development of an Arterial Bypass
Graft”, CFD Lett., vol. 14, no. 10, pp. 99-111, Oct. 2022.
70. M., M., & Mesbah, S. (2016). Effective e-government and citizens adoption in Egypt.
International Journal of Computer Applications, 133(7), 7–13.
71. Ead, W. M., & Abbassy, M. M. (2021). IOT based on plant diseases detection and classification.
2021 7th International Conference on Advanced Computing and Communication Systems
(ICACCS).
72. Ead, W., & Abbassy, M. (2018). Intelligent Systems of Machine Learning Approaches for
developing E-services portals. EAI Endorsed Transactions on Energy Web, 167292.
73. Sadek, R. A., Abd-alazeem, D. M., & Abbassy, M. M. (2021). A new energy-efficient multi-hop
routing protocol for heterogeneous wireless sensor networks. International Journal of Advanced
Computer Science and Applications, 12(11).
74. Derindere Köseoğlu, S., Ead, W. M., & Abbassy, M. M. (2022). Basics of Financial Data
Analytics. Financial Data Analytics, 23–57.
75. Ead, W. M., & Abbassy, M. M. (2022). A general cyber hygiene approach for financial analytical
environment. Financial Data Analytics, 369–384.
76. Abbassy, M. M., & Ead, W. M. (2020). Intelligent Greenhouse Management System. 2020 6th
International Conference on Advanced Computing and Communication Systems (ICACCS).
77. Khalifa, I., Abd Al-glil, H., & M. Abbassy, M. (2013). Mobile hospitalization. International
Journal of Computer Applications, 80(13), 18–23.
78. Abbassy,M.M., & Mohamed A.A.(2016). “Mobile Expert System to Detect Liver Disease Kind”,
International Journal of Computer Applications, 14(5), 320–324.
79. Khalifa, I., Abd Al-glil, H., & M. Abbassy, M. (2014). Mobile hospitalization for Kidney
Transplantation. International Journal of Computer Applications, 92(6), 25–29.
80. Ead, W. M., Abbassy, M. M., & El-Abd, E. (2021). A general framework information loss of
utility-based anonymization in Data Publishing. Turkish Journal of Computer and Mathematics
Education, 12(5), 1450–1456.
81. Abbassy, M. M., & Abo-Alnadr, A. (2019). Rule-based emotion AI in Arabic Customer Review.
International Journal of Advanced Computer Science and Applications, 10(9).
82. Abbassy, M. M. (2020). The human brain signal detection of Health Information System IN
EDSAC: A novel cipher text attribute based encryption with EDSAC distributed storage access
control. Journal of Advanced Research in Dynamical and Control Systems, 12(SP7), 858–868.
83. Abbassy, M. M. (2020). Opinion mining for Arabic customer feedback using machine learning.
Journal of Advanced Research in Dynamical and Control Systems, 12(SP3), 209–217.
84. K. Shriram, M. K. Chakravarthi, Y. V. Pavan Kumar, V. B. Kumar, D. John Pradeep and C. P.
Reddy, "Acute Decisive Fuzzy Haptic Surface Response System for Tactile Sensitivity," 2022
International Conference on Decision Aid Sciences and Applications (DASA), 2022, pp. 438-442.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
85. K. K. Singh Gautam, R. Kumar, P. C. Sekhar, N. M. Kumar, K. Srinivasa Rao and M. K.
Chakravarthi, "Machine Learning Algorithms for 5G and Internet-of-Thing (IoT) Networks,"
2022 Second International Conference on Advances in Electrical, Computing, Communication
and Sustainable Technologies (ICAECT), 2022, pp. 1-4.
86. R. Doss, S. Gupta, M. K. Chakravarthi, H. K. Channi, A. V. Koti and P. Singh, "Understand the
Application of Efficient Green Cloud Computing Through Micro Smart Grid in Order to Power
Internet Data Center," 2022 2nd International Conference on Advance Computing and Innovative
Technologies in Engineering (ICACITE), 2022, pp. 336-340.
87. J. Surve, D. Umrao, M. Madhavi, T. S. Rajeswari, S. L. Bangare and M. K. Chakravarthi,
"Machine Learning Applications For Protecting The Information Of Health Care Department
Using Smart Internet Of Things Appliances -A REVIEW," 2022 2nd International Conference on
Advance Computing and Innovative Technologies in Engineering (ICACITE), 2022, pp. 893-898.
88. S. K. UmaMaheswaran, V. K. Nassa, B. P. Singh, U. K. Pandey, H. Satyala and M. K.
Chakravarthi, "An Inventory System Utilizing Neural Network in The Prediction of Machine
Learning Techniques," 2022 2nd International Conference on Advance Computing and Innovative
Technologies in Engineering (ICACITE), 2022, pp. 1087-1091.
89. S. Kumar, N. M. G. Kumar, B. T. Geetha, M. Sangeetha, M. K. Chakravarthi and V. Tripathi,
"Cluster, Cloud, Grid Computing via Network Communication Using Control Communication
and Monitoring of Smart Grid," 2022 2nd International Conference on Advance Computing and
Innovative Technologies in Engineering (ICACITE), 2022, pp. 1220-1224.
90. D. Singh, A. S. Keerthi Nayani, M. Sundar Rajan, R. Yadav, J. Alanya-Beltran and M. K.
Chakravarthi, "Implementation of Virual Instrumentation for Signal Acquisition and Processing,"
2022 International Conference on Innovative Computing, Intelligent Communication and Smart
Electrical Systems (ICSES), 2022, pp. 1-4.
91. A. Gehlot, L. Rajat Mohan, A. Gupta, H. Anandaram, J. Alanya-Beltran and M. Kalyan
Chakravarthi, "Smart Online Oxygen Supply Management though Internet of Things (IoT)," 2022
International Conference on Innovative Computing, Intelligent Communication and Smart
Electrical Systems (ICSES), 2022, pp. 1-6.
92. R. Singh, P. A. Mishra, A. Prakash, K. Tongkachok, M. Upadhyaya and M. Kalyan Chakravarthi,
"Smart Device for Effective Communication in the Healthcare System," 2022 International
Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems
(ICSES), 2022, pp. 1-6.
93. D. Buddhi, L. J. Varghese, N. B, S. S. Hamid, Ramya.D and M. K. Chakravarthi, "Harmonic
Distortion reduction in Power System to improve Reliability and power quality," 2022
International Conference on Innovative Computing, Intelligent Communication and Smart
Electrical Systems (ICSES), 2022, pp. 1-5.
94. M. Farman, A. Akgül, M.T. Tekin, M. M. Akram, A. Aqeel , E. E. Mahmoud, I. S. Yahia,
“Fractal fractional-order derivative for HIV/AIDS model with Mittag-Leffler kernel”, Alex. Eng.
J, vol. 61, no. 12,pp. 10965-10980, April 2022.
95. K.S. Nisar, A. Aqeel, M. Inc, M. Farman, H. Rezazadeh, L. Akinyemi, M.M. Mannan, “Analysis
of dengue transmission using fractional order scheme”, Aims Math, vol. 7 no. 5, pp. 8408–8429,
May 2022.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
96. M.M. Akram, M. Farman, A. Akgül, M. U. Saleem, A. Ahmad, M. Partohaghigh, F. Jarad,
“Analysis of HIV/AIDS model with Mittag-Leffler kernel”, Aims Math, vol. 7 no. 7, pp. 13383-
13401, July 2022.
97. Al-Abyadh, Mohammed Hasan Ali, and Hani Abdel Hafeez Abdel Azeem. (2022). "Academic
Achievement: Influences of University Students‟ Self-Management and Perceived Self-Efficacy"
Journal of Intelligence 10, no. 3: 55.
98. Abdel Azeem, H.A.H. and Al-Abyadh, M.H.A. (2021), "Self-compassion: the influences on the
university students‟ life satisfaction during the COVID-19 outbreak", International Journal of
Human Rights in Healthcare, ahead-of-print.
99. Al-Abrat N.A.S., Alabyad M.H.A. (2021) The Extent of Awareness of Faculty Members at Al-
bayda University About the Concept of Educational Technology and Their Attitudes Towards It.
In: Al-Bakry A.M. et al. (eds) New Trends in Information and Communications Technology
Applications. NTICT 2021. Communications in Computer and Information Science, vol 1511.
Springer, Cham.
100. ldbyani, A., & Al-Abyadh, M. H. A. (2022). Relationship between Dark Triad, Mental Health,
and Subjective Well-being Moderated by Mindfulness: A Study on Atheists and Muslim Students.
Islamic Guidance and Counseling Journal, 5(1), 71–87.
101. AbdulKader, H., ElAbd, E., & Ead, W. (2016). Protecting Online Social Networks Profiles by
Hiding Sensitive Data Attributes. Procedia Computer Science, 82, 20–27.
102. Fattoh, I. E., Kamal Alsheref, F., Ead, W. M., & Youssef, A. M. (2022). Semantic sentiment
classification for covid-19 tweets using universal sentence encoder. Computational Intelligence
and Neuroscience, 2022, 1–8.
103. Ead, W. M., Abdel-Wahed, W. F., & Abdul-Kader, H. (2013). Adaptive Fuzzy Classification-
Rule Algorithm In Detection Malicious Web Sites From Suspicious URLs. Int. Arab. J. E
Technol., 3, 1–9.
104. Abdelazim, M. A., Nasr, M. M., & Ead, W. M. (2020). A survey on classification analysis for
cancer genomics: Limitations and novel opportunity in the era of cancer classification and Target
Therapies. Annals of Tropical Medicine and Public Health, 23(24).
https://doi.org/10.36295/asro.2020.232434
105. Alsheref, F. K., Fattoh, I. E., & M.Ead, W. (2022). Automated prediction of employee attrition
using ensemble model based on machine learning algorithms. Computational Intelligence and
Neuroscience, 2022, 1–9.
106. SS Priscila, M Hemalatha, “Improving the performance of entropy ensembles of neural networks
(EENNS) on classification of heart disease prediction”, Int J Pure Appl Math 117 (7), 371-386,
2017.
107. S Silvia Priscila, M Hemalatha, “ Diagnosisof heart disease with particle bee-neural network”
Biomedical Research, Special Issue, pp. S40-S46, 2018.
108. S Silvia Priscila, M Hemalatha, “ Heart Disease Prediction Using Integer-Coded Genetic
Algorithm (ICGA) Based Particle Clonal Neural Network (ICGA-PCNN)”, Bonfring
International Journal of Industrial Engineering and Management Science 8 (2), 15-19, 2018.
109. Nayak, H., Kushwaha, A., Behera, P.C., Shahi, N.C., Kushwaha, K.P.S., Kumar, A. & Mishra,
K.K. (2021). The pink oyster mushroom, Pleurotus djamor (Agaricomycetes): A potent
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
antioxidant and hypoglycemic agent. International Journal of Medicinal Mushrooms, Vol.23,
No.12, pp.29-36. DOI: 10.1615/IntJMedMushrooms.2021041411
110. Amit Kumar Jain, “Overview of Serverless Architecture,” International Journal of Engineering
Research & Technology, vol. 11, no. 09, p. 3, 2022.
111. Amit Kumar Jain, “Multi-Cloud Computing & Why do we need to Embrace it,” International
Journal Of Engineering Research & Technology, vol. 11, no. 09, p. 1, 2022.
112. Amit Kumar Jain, “Hybrid Cloud Computing: A Perspective,” International Journal of
Engineering Research & Technology, vol. 11, no. 10, p. 1, 2022.
113. Haq, M. A., Ahmed, A., Khan, I., Gyani, J., Mohamed, A., Attia, E.-A., Mangan, P., & Pandi, D.
(2022). Analysis of environmental factors using AI and ML methods. Scientific Reports, 12(1),
13267.
114. Haq, M. A., Ghosh, A., Rahaman, G., & Baral, P. (2019). Artificial neural network-based
modeling of snow properties using field data and hyperspectral imagery. Natural Resource
Modeling, 32(4).
115. Haq, M. A., & Baral, P. (2019). Study of permafrost distribution in Sikkim Himalayas using
Sentinel-2 satellite images and logistic regression modelling. Geomorphology, 333, 123–136.
116. Haq, M. A., Alshehri, M., Rahaman, G., Ghosh, A., Baral, P., & Shekhar, C. (2021). Snow and
glacial feature identification using Hyperion dataset and machine learning algorithms. Arabian
Journal of Geosciences, 14(15).
117. Mangan, P., Pandi, D., Haq, M. A., Sinha, A., Nagarajan, R., Dasani, T., Keshta, I., & Alshehri,
M. (2022). Analytic Hierarchy Process Based Land Suitability for Organic Farming in the Arid
Region. Sustainability, 14(4542), 1–16.
118. Haq, M. A. (2021). DNNBoT: Deep Neural Network-Based Botnet Detection and Classification.
Computers Materials and Continua, 71(1), 1769–1788.
119. Haq, M. A. (2022). CDLSTM: A novel model for climate change forecasting. Computers,
Materials and Continua, 71(2), 2363–2381.
120. Haq, M. A. (2021). SMOTEDNN: A Novel Model for Air Pollution Forecasting and AQI
Classification. Computers Materials and Continua, 71(1), 1403–1425.
121. Haq, M. A., Azam, M. F., & Vincent, C. (2021). Efficiency of artificial neural networks for
glacier ice-thickness estimation: A case study in western Himalaya, India. Journal of Glaciology,
67(264), 671–684.
122. Haq, M. A. (2022). CNN Based Automated Weed Detection System Using UAV Imagery.
Computer Systems Science and Engineering, 42(2), 837–849.
123. Viktor, P., & Szeghegyi, Á. (2022). Safety of the Introduction of Self-driving Vehicles in a
Logistics Environment. Periodica Polytechnica Transportation Engineering, 50(4), 387–399.
124. Viktor, P., & Reicher, R. (2020). Magyarországi leányvállalatok centralizált beszerzései.
Logisztikai Trendek És Legjobb Gyakorlatok, 6(2), 35–44.
http://doi.org/10.21405/logtrend.2020.6.2.35
125. Viktor, P., Molnár, A., & Fodor, M. (2022). The Current State of Vocational Schools in Hungary
and New Strategies in Teaching. Specialusis Ugdymas, 2(43), 3497–3515.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
126. Albert, M., Patrik, V., Dániel, S., & Ágnes, C.-K. (2021). Frequency analysis of anomalous
negative price fluctuations in stock market indices as a crisis forecasting tool. Macrotheme
Review: A Multidisciplinary Journal Of Global Macro Trends, 10(1), 9–26.
127. Patrik, V. (2021). Conditions for the introduction of autonomous vehicles. Macrotheme Review:
A Multidisciplinary Journal Of Global Macro Trends, 10(1), 77–85.
128. Patrik, V., Albert, M., Claudia, C., & Mónika, G.-F. (2021). Consumer habits of purchasing food
products, grown in Hungary. Macrotheme Review: A Multidisciplinary Journal Of Global Macro
Trends, 10(1), 27–39.
129. Dániel, S., & Patrik, V. (2021). The importance of project risk management in practice.
Macrotheme Review: A Multidisciplinary Journal Of Global Macro Trends, 10(1), 68–76.
130. Mónika, F., & Patrik, V. (2022). IOT devices and 5G network security option from generation
aspects. In IEEE 10th Jubilee International Conference on Computational Cybernetics and Cyber-
Medical Systems ICCC 2022 (pp. 265–269).
131. Szeghegyi, Á., & Viktor, P. (2022). Impact of the Energy Crisis on Demand for Plug-in Hybrid
Vehicles. In IEEE Joint 22nd International Symposium on Computational Intelligence And
Informatics and 8th International Conference on Recent Achievements in Mechatronics,
Automation, Computer Science and Robotics (CINTI-MACRo 2022) (pp. 215–219).
132. Patrik, V., Dániel, S., & Albert, M. (2021). Consumer habits and autonomous vehicles. In
FIKUSZ 2021 XVI. International Conference Proceedings (pp. 73–81).
133. R. Oak, M. Du, D. Yan, H. Takawale, and I. Amit, “Malware detection on highly imbalanced data
through sequence modeling,” in Proceedings of the 12th ACM Workshop on Artificial
Intelligence and Security - AISec‟19, 2019.
134. Aryal, A., Stricklin, I., Behzadirad, M., Branch, D. W., Siddiqui, A., & Busani, T. (2022). High-
Quality Dry Etching of LiNbO3 Assisted by Proton Substitution through H2-Plasma Surface
Treatment. Nanomaterials, 12(16), 2836.
135. Paldi, Robynne L., Arjun Aryal, Mahmoud Behzadirad, Tito Busani, Aleem Siddiqui, and Haiyan
Wang. "Nanocomposite-seeded Single-Domain Growth of Lithium Niobate Thin Films for
Photonic Applications." In 2021 Conference on Lasers and Electro-Optics (CLEO), pp. 1-2.
IEEE, 2021.
136. Shifat, A. Z., Stricklin, I., Chityala, R. K., Aryal, A., Esteves, G., Siddiqui, A., & Busani, T.
(2023). Vertical Etching of Scandium Aluminum Nitride Thin Films Using TMAH Solution.
Nanomaterials, 13(2), 274.
137. V. S. R. Kosuru and A. K. Venkitaraman, “Developing a Deep Q-Learning and Neural Network
Framework for Trajectory Planning”, EJENG, vol. 7, no. 6, pp. 148–157, Dec. 2022.
138. K. Venkitaraman and V. S. R. Kosuru, “Hybrid Deep Learning Mechanism for Charging Control
and Management of Electric Vehicles”, EJECE, vol. 7, no. 1, pp. 38–46, Jan. 2023.
139. A, V. V. ., T, S. ., S, S. N. ., & Rajest, D. S. S. . (2022). IoT-Based Automated Oxygen Pumping
System for Acute Asthma Patients. European Journal of Life Safety and Stability (2660-9630), 19
(7), 8-34.
140. A. I. Zannah, S. Rachakonda, A. M. Abubakar, S. Devkota, and E. C. Nneka, “Control for
Hydrogen Recovery in Pressuring Swing Adsorption System Modeling,” FMDB Transactions on
Sustainable Energy Sequence, vol. 1, no. 1, pp. 1–10, 2023.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
141. A. Thakur and S. K. Mishra, “Review on vision-based control using artificial intelligence in
autonomous ground vehicle,” in Proceedings of the International Conference on Paradigms of
Computing, Communication and Data Sciences, Singapore: Springer Nature Singapore, 2023, pp.
617–626.
142. Abrar Ahmed Chhipa, Prasun Chakrabarti, Vadim Bolshev , Tulika Chakrabarti , Gennady
Samarin, Alexey N. Vasiyev, Sandeep Ghosh, Alexander Kudryavtsev, “Modeling and Control
Strategy of Wind Energy Conversion System with Grid-Connected Doubly Fed Induction
Genenator”, Energies , 15, 6694, 2022.
143. Akhilesh Deep Arya, Sourabh Singh Verma, Prasun Chakrabarti, Tulika Chakrabarti, Ahmed A
Elngar, Mohammad Nami, Ali-Mohammad Kamali, “A Systematic Review on Machine Learning
and Deep Learning Techniques in the Effective Diagnosis of Alzheimer‟s Disease”, Pre-print,
2022.
144. Akhilesh Kumar Sharma , Shamik Tiwari, Gaurav Aggarwal, Nitika Goenka, Anil Kumar, Prasun
Chakrabarti, Tulika Chakrabarti, Radomir Gono, Zbigniew Leonowicz, Michal Jasiński ,
“Dermatologist-Level Classification of Skin Cancer Using Cascaded Ensembling of
Convolutional Neural Network and Handcrafted Features Based Deep Neural Network”, IEEE
Access , 10 : 17920-17932, 2022.
145. B Murali Krishna. V and V. Sandeep, “Design and Simulation of Current Sensor based Electronic
Load Controller for Small Scale Three Phase Self Excited Induction Generator System”,
International Journal of Renewable Energy Research, Vol. 10, No. 4, pp. 1638- 1644, December
2020. ISSN: 1309-0127, DOI: https://doi.org/10.20508/ijrer.v10i4.11374.g8048
146. B Murali Krishna. V, V. Sandeep and Rupa Rani, “Design and Simulation of Voltage Sensor-
based Electronic Load Balance Controller for SEIG based Isolated Load Applications”, Journal of
Advanced Research in Dynamical & Control Systems, Vol. 12, No. 3, pp. 345-352, March 2020.
147. B Prasanalakshmi , Bui Thanh Hung, Prasun Chakrabarti, Xue-bo Jin, Tulika Chakrabarti, Ahmed
Elngar, “A Novel Artificial Intelligence-Based Predictive Analytics Technique to Detect Skin
Cancer”, 2022.
148. Bala Murali Krishna. V, A. Srihari Babu, J. Jithendranath and Ch. Uma Maheswara Rao, “An
Isolated Wind Hydro Hybrid System with Two Back-to-Back Power Converters and a Battery
Energy Storage System Using Neural Network Compensator‟‟, 2014 IEEE International
Conference on Circuit, Power and Computing Technologies, Kumaracoil, India, 20-21 March
2014, pp. 273- 279.
149. Cristian Laverde Albarracín, Srinath Venkatesan, Arnaldo Yana Torres, Patricio Yánez-Moretta,
Juan Carlos Juarez Vargas, “Exploration on Cloud Computing Techniques and Its Energy
Concern”, MSEA, vol. 72, no. 1, pp. 749–758, Feb. 2023.
150. D. Al-Maaitah, M. Abdul Mutalib, A. Zumrah and T. Al-Maaitah, "A Conceptual Approach of
Human Resource Management Practices Towards Organisation Performance: An Evidence from
the Private Universities in Jordan," International Journal of Economics, Commerce and
Management, vol. 3, no. 8, pp. 426-434, 2015.
151. D. Al-maaitah, R. Alias and T. Al-maaitah, "The Impact of Human Resource Management
Practices and Leader Member Exchange on Job Performance: A moderating Role of Job
Satisfaction in Jordanian Public Universities," Indian Journal of Science and Technology, vol. 12,
no. 11, p. 5, 2019.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
152. D. AL-maaitah, T. AL-maaitah and A. Al-shourah, "Factors Affecting Human Resource Practices
In A Sample Of Diversified," International Journal Of Research Science & Management, vol. 12,
no. 2, pp. 23-28, 2015.
153. D. AL-Maaitah, T. AL-Maaitah and O. alkharabsheh, "The impact of job satisfaction on the
employees turnover intention at public universities (Northern Border University)," International
Journal of Advanced and Applied Sciences, vol. 8, no. 5, pp. 53-58, 2021.
154. D. Maaitah, R. Alias and T. Maaitah, "The Impact Of Human Resource Management Practices On
Job Performance In (University Of Jordan)," national academy of managerial staff of culture and
arts herald, vol. 1, no. 1, pp. 1180-1183, 2018.
155. D. Maaitah, R. Allias, A. Azmin and T. Maaitah, "Leader member exchange and job performance
with job satisfaction as a moderator," National Academy of Managerial Staff of Culture and Arts
Herald, vol. 1, no. 1, pp. 1176-1179, 2018.
156. D. Saxena, S. Khandare and S. Chaudhary, “An Overview of ChatGPT: Impact on Academic
Learning,” FMDB Transactions on Sustainable Techno Learning., vol. 1, no. 1, pp. 11–20, 2023.
157. F. Yassine, T. Maaitah, D. Maaitah and J. Al-Gasawneh, "Impact Of Covid-19 On The University
Education System In Jordan," Journal of Southwest Jiaotong University, vol. 57, no. 1, pp. 1-15,
2022.
158. Gaurav Kumawat, Santosh Kumar Viswakarma, Prasun Chakrabarti , Pankaj Chittora, Tulika
Chakrabarti , Jerry Chun-Wei Lin, “Prognosis of Cervical Cancer Disease by Applying Machine
Learning Techniques”, Journal of Circuits, Systems, and Computers, 2022.
159. Giovanny Haro-Sosa , Srinath Venkatesan, “Personified Health Care Transitions With Automated
Doctor Appointment System: Logistics”, Journal of Pharmaceutical Negative Results, pp. 2832–
2839, Feb. 2023.
160. Jerusha Angelene Christabel G, Shynu T, S. Suman Rajest, R. Regin, & Steffi. R. (2022). The use
of Internet of Things (Iot) Technology in the Context of “Smart Gardens” is Becoming
Increasingly Popular. International Journal of Biological Engineering and Agriculture, 1(2), 1–13.
161. K Suvarna Vani, Bui Thanh Hung, Prasun Chakrabarti, Tulika Chakrabarti, Ahmed A Elngar,
“Detection and Classification of Invasive Ductal Carcinoma using Artificial Intelligence”, Pre-
print, 2022.
162. Kumar, J. & Anjali (2022). Role of the Internet of Things (IoT) in Digital Financial Inclusion. In
IoT Based Smart Applications (pp. 363-373). Cham: Springer International Publishing.
163. Kumar, J. (2016). Evaluating Superiority of Modern Vis-A-Vis Traditional Financial Performance
Measures: Evidences from Indian Pharmaceutical Industry. JIMS8M: The Journal of Indian
Management & Strategy, 21(1), 21-30.
164. Kumar, J. (2016). Synoptic View on Economic Value Added (EVA)-Literature Review Summary.
Wealth: International Journal of Money, Banking & Finance, 5(2), 34-57.
165. Kumar, J., & Prince, N. (2022). Overconfidence bias in the Indian stock market in diverse market
situations: an empirical study. International Journal of System Assurance Engineering and
Management, 1-17.
166. Kumar, J., & Rani, V. (2022). Journey of Financial Technology (FinTech): A Systematic
Literature Review and Future Research Agenda. Exploring the Latest Trends in Management
Literature, 1, 89-108.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
167. Nagendra Singh, Manish Tiwari, Tulika Chakrabarti, Prasun Chakrabarti, Om Prakash Jena,
Ahmed A Elngar, Vinayakumar Ravi, Martin Margala, “Minimization of Environmental Emission
and cost of generation by using economic load dispatch”, Pre-print, 2022.
168. Naveen S Pagad, N Pradeep, Tulika Chakrabarti, Prasun Chakrabarti, Ahmed A Elngar, Martin
Margala, Mohammad Nami, Neha Sharma, Samuel Frimpong, “Clinical XLNet-based End-to-
End Knowledge Discovery on Clinical Text Data using Natural Language Processing”, Pre-print,
2022
169. O. Alkarabsheh, A. Jaaffar, p. Wei Fong, D. Almaaitah and Z. Alkharabsheh, "The relationship
between leadership style and turnover intention of nurses in the public hospitals of Jordan,"
Cogent Business & Management, Vols. 9, 2022, no. Issue 1, p. Page 1 of 19, 2022.
170. Pankaj Chittora, Tulika Chakrabarti, Papiya Debnath, Amit Gupta, Prasun Chakrabarti, S Phani
Praveen, Martin Margala, Ahmed A Elngar , “Experimental analysis of earthquake prediction
using machine learning classifiers, curve fitting, and neural modeling”, Pre-print, 2022.
171. Priscila, S. S., Rajest, S. S., T, S. and G, G. (2022) “An Improvised Virtual Queue Algorithm to
Manipulate the Congestion in High-Speed Network”, Central Asian Journal of Medical and
Natural Science, 3(6), pp. 343-360.
172. R. Regin, Steffi. R, Jerusha Angelene Christabel G, Shynu T, S. Suman Rajest (2022), “Internet
of Things (IoT) System Using Interrelated Computing Devices in Billing System”, Journal of
Advanced Research in Dynamical and Control Systems, Vol.14, no.1, pp. 24-40.
173. R. Steffi, G. Jerusha Angelene Christabel, T. Shynu, S. Suman Rajest, R. Regin (2022), “ A
Method for the Administration of the Work Performed by Employees”, Journal of Advanced
Research in Dynamical and Control Systems, Vol.14, no.1, pp. 7-23.
174. Rajest, S. S. ., Regin, R. ., T, S. ., G, J. A. C. ., & R, S. . (2022). Production of Blockchains as
Well as their Implementation. Vital Annex : International Journal of Novel Research in Advanced
Sciences, 1(2), 21–44.
175. Rajest, S. S., Regin, R., T, S., & R, S. (2023). A New Natural Language Processing-Based Essay
Grading Algorithm. International Journal on Integrated Education, 6(3), 1-22.
176. Regin, D. R., Rajest, D. S. S., T, S., G, J. A. C., & R, S. (2022). An Automated Conversation
System Using Natural Language Processing (NLP) Chatbot in Python. Central Asian Journal Of
Medical And Natural Sciences, 3(4), 314-336.
177. Regin, R., Rajest, S. S., T, S., & R, S. (2023). A Review of Secure Neural Networks and Big Data
Mining Applications in Financial Risk Assessment. Central Asian Journal of Innovations on
Tourism Management and Finance, 4(2), 73-90.
178. Regin, R., Rajest, S. S., T, S., & R, S. (2023). An Analytical Study of Development in Response
to the COVID-19 Pandemic. Central Asian Journal of Medical and Natural Science, 4(1), 199-
216.
179. S Ningthoujam, T Chingkheinganba, S K Chakraborty, A Elngar, Prasun Chakrabarti, Tulika
Chakrabarti, Praveen, S. Phani , Amit Gupta, Margala, Martin, “Performance Analysis for
Molecular Communication Under Feedback Channel Using Multipath and Single Path
Technique”, Pre-print, 2022.
180. S. S. Rajest, R. Regin, S. T, J. A. C. G, and S. R, “Improving Infrastructure and Transportation
Systems Using Internet of Things Based Smart City”, CAJOTAS, vol. 3, no. 9, pp. 125-141, Sep.
2022.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
181. S. Tripathi and A. Al -Zubaidi, “A Study within Salalah‟s Higher Education Institutions on
Online Learning Motivation and Engagement Challenges during Covid-19,” FMDB Transactions
on Sustainable Techno Learning., vol. 1, no. 1, pp. 1–10, 2023.
182. S. Tripathi and M. Al-Shahri, “Problems and Prospects on the Evolution of Advertising and
Public Relations Industries in Oman,” FMDB Transactions on Sustainable Management Letters.,
vol. 1, no. 1, pp. 1–11, 2023.
183. Sandeep V, Bala Murali Krishna V, K. K. Namala and D. N. Rao, "Grid connected wind power
system driven by PMSG with MPPT technique using neural network compensator", 2016 IEEE
International Conference on Energy Efficient Technologies for Sustainability (ICEETS), 07-08
April 2016, Nagercoil, India, pp. 917-921.
184. Srinath Venkatesan, "Utilization of Media Skills and Technology Use Among Students and
Educators in The State of New York", Neuroquantology, Vol. 21, No 5, pp. 111-124, (2023).
185. Srinath Venkatesan, “Challenges of Datafication: Theoretical, Training, And Communication
Aspects of Artificial Intelligence” Ion exchange and adsorption. Volume 23, Issue 1, 2023.
186. Srinath Venkatesan, “Design an Intrusion Detection System based on Feature Selection Using ML
Algorithms”, MSEA, vol. 72, no. 1, pp. 702–710, Feb. 2023.
187. Srinath Venkatesan, “Identification Protocol Heterogeneous Systems in Cloud Computing”,
MSEA, vol. 72, no. 1, pp. 615–621, Feb. 2023.
188. Srinath Venkatesan, “Perspectives and Challenges of Artificial Intelligence Techniques in
Commercial Social Networks”Volume 21, No 5 (2023).
189. Srinath Venkatesan, Sandeep Bhatnagar, Iván Mesias Hidalgo Cajo, Xavier Leopoldo Gracia
Cervantes, "Efficient Public Key Cryptosystem for wireless Network", Neuroquantology, Vol. 21,
No 5, pp. 600-606, (2023).
190. Srinath Venkatesan, Sandeep Bhatnagar, José Luis Tinajero León, "A Recommender System
Based on Matrix Factorization Techniques Using Collaborative Filtering Algorithm",
neuroquantology, vol. 21, no. 5, pp. 864-872, march 2023.
191. Srinath Venkatesan, Zubaida Rehman, “The Power Of 5g Networks and Emerging Technology
and Innovation: Overcoming Ongoing Century Challenges” Ion exchange and adsorption,
Volume 23, Issue 1, 2023.
192. Suchismita Gupta, Bikramjit Sarkar, Subhrajyoti Saha, Indranath Sarkar, Prasun Chakrabarti,
Sudipta Sahana, Tulika Chakrabarti, Ahmed A Elngar, “A Novel Approach Toward the
Prevention of the Side Channel Attacks for Enhancing the Network Security”, Pre-print, 2022.
193. T, S., Rajest, S. S., Regin, R., & R, S. (2023). A Review on Using Machine Learning to Conduct
Facial Analysis in Real Time for Real-Time Profiling. International Journal of Human Computing
Studies, 5(2), 18-37.
194. T, S., Rajest, S. S., Regin, R., Christabel G, J. A., & R, S. (2022). Automation And Control Of
Industrial Operations Using Android Mobile Devices Based On The Internet Of Things. Central
Asian Journal of Mathematical Theory and Computer Sciences, 3(9), 1-33.
195. T. AL-Maaitah, A. Osman, M. Suberi, D. AL-Maaitah and F. AL-Dhmour, "Review study on the
security of electronic payment systems," International Journal of Economics, Commerce and
Management, vol. 3, no. 9, pp. 821-829, 2015.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/
CAJMNS Volume: 04 Issue: 03 | May-Jun 2023
196. T. AL-Maaitah, A. Osman, M. Suberi, D. AL-Maaitah and M. AL-Maaitah, "Factors Influencing
the Adoption of Electronic Banking in Jordan," Australian Journal of Basic and Applied Sciences,
vol. 9, no. 12, pp. 104-108, 2015.
197. Tulika Chakrabarti, Sibabrata Mukhopadhyay, Prasun Chakrabarti, Gholamreza Hatam,
Mohammad Nami, “Phenyl Ethanoid Glycoside from the Bark of Oroxylum indicum Vent: a
Potential Inhibitor of DNA Topoisomerase IB of Leishmania donovani”, Journal of Advanced
Medical Sciences and Applied Technologies, 2022
198. Umesh Agarwal, Abrar Ahmed Chhipa, Tulika Chakrabarti, Amit Gupta, S Phani Praveen, Prasun
Chakrabarti, Neha Sharma, Ahmed A Elngar , “Reliability Evaluation of Radial Distribution
Network for Educational purpose using Greedy Search Approach-Distribution Network Data and
Results”, Pre-print, 2022.
199. V. B Murali Krishna, V. Sandeep, Kishore Yadlapati and Tripura Pidikiti, “A Study on Excitation
Requirement and Power Balance of Self Excitation Induction Generator for Off-grid Applications
Through Experiment and Simulation”, Journal of Engineering Science and Technology Review,
Vol. 14, No. 6, 2021, pp. 162 – 168.
Copyright (c) 2023 Author (s). This is an open-access article distributed under the terms of Creative Commons
Attribution License (CC BY).To view a copy of this license, visit https://creativecommons.org/licenses/by/4.0/