News & Updates

News & Insight

Blogs

Augmented reality in video conference-based learning

Sunardi et al. (2022) conducted research by implementing augmented reality (AR) in video conference-based learning during the COVID-19 pandemic in higher education....

IAES Nawala: Machine learning

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala from the Institute of Advanced Engineering and...

PSO on renewable and non-renewable energy

Periasamy et al. (2022) researched the application of the particle swarm optimization (PSO) method in renewable and non-renewable energy sources. Their research...

IAES Nawala: Neural network

Greetings, fellow Nawala! May you always be in good health. This is the IAES Nawala of the Institute of Advanced Engineering and...
1 2 3 4 5 19

Announcements

Top 3 topics in IJRA March 2024 

IAES International Journal of Robotics and Automation (IJRA) is an international journal that publishes the latest discoveries and developments in the field...

Top 3 topics in IJRES March 2024 

The International Journal of Reconfigurable and Embedded Systems (IJRES) aims to share innovative work on reconfigurable systems, embedded systems, VLSI design, and...

Top 3 topics in CSIT March 2024

The Journal of Computer Science and Information Technologies (CSIT) is an open-access, peer-reviewed international journal that publishes original research articles and short...

Top 4 power engineering topics in IJAPE March 2024 

International Journal of Applied Power Engineering (IJAPE) is a journal that publishes research on power and energy. The journal focuses on applied...
1 2 3 4 5 14

News

Scopus CiteScore: an overview

In academia, evaluating the impact and quality of scholarly journals is very important for researchers, institutions, and publishers. Created by indexing companies...

The pervasive integration of AI into academic journals is on the rise, presenting a difficulty in detecting such instances

The use of AI in academic journals is becoming more prevalent, and it is proving difficult to detect. Some authors are using...

The MavenGate attack could let hackers to take control of Java and Android systems by exploiting abandoned libraries

attack is a supply chain attack method that allows hackers to hijack popular abandoned libraries in Java and Android applications, potentially injecting...

Enhance the Security of Your Software Supply Chain with These Strategies

Software Supply Chain Security (SSCS) is the practice of implementing security measures and best practices throughout the entire software development and distribution...
1 2 3 4 5 23