News & Updates

News & Insight

Blogs

Predictors of childbirth services in Indonesia

Factors that influence childbirth services in Indonesia include geography, education, and economics. Non-resident women tend to use private health facilities rather than...

Synergetic control of piezoelectric actuator

Synergistic control is applied to a piezoelectric positioning mechanism or piezoelectric actuator (PEA) to improve its stability and performance. This technique is...

Augmented reality in video conference-based learning

Sunardi et al. (2022) conducted research by implementing augmented reality (AR) in video conference-based learning during the COVID-19 pandemic in higher education....

IAES Nawala: Machine learning

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala from the Institute of Advanced Engineering and...
1 2 3 17

Announcements

Top 3 topics in IJEECS April 2024

Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) is an international journal published by the Institute of Advanced Engineering and Science...

Top 3 topics in IJPEDS March 2024 

International Journal of Power Electronics and Drive Systems (IJPEDS) is a SCOPUS and ScimagoJR indexed journal. The scope of the journal covers...

Top 3 public health topics in IJPHS March 2024

The International Journal of Public Health Science (IJPHS) is an interdisciplinary journal that publishes material on all aspects of public health science....

Top 3 topics in IJRA March 2024 

IAES International Journal of Robotics and Automation (IJRA) is an international journal that publishes the latest discoveries and developments in the field...
1 2 3 13

News

The pervasive integration of AI into academic journals is on the rise, presenting a difficulty in detecting such instances

The use of AI in academic journals is becoming more prevalent, and it is proving difficult to detect. Some authors are using...

The MavenGate attack could let hackers to take control of Java and Android systems by exploiting abandoned libraries

attack is a supply chain attack method that allows hackers to hijack popular abandoned libraries in Java and Android applications, potentially injecting...

Enhance the Security of Your Software Supply Chain with These Strategies

Software Supply Chain Security (SSCS) is the practice of implementing security measures and best practices throughout the entire software development and distribution...

GitHub warns users to enable 2FA before upcoming deadline

Two-factor authentication (2FA) is an extra layer of security used when logging into websites or apps. With 2FA, users have to log...
1 2 3 21