<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:prism="http://prismstandard.org/namespaces/basic/2.0/" xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns="http://purl.org/rss/1.0/" xmlns:admin="http://webns.net/mvcb/">
<channel rdf:about="https://thescipub.com/">
<title>Current Issue | Journal of Computer Science</title>
<description>Current Issue | Journal of Computer Science</description>
<link>https://thescipub.com/jcs/current</link>
<admin:generatorAgent rdf:resource="https://thescipub.com/"/>
<admin:errorReportsTo rdf:resource="mailto:support@scipub.org"/>
<dc:publisher>Science Publications</dc:publisher>
<dc:language>en</dc:language>
<prism:publicationName>Science Publications</prism:publicationName>
<items>
<rdf:Seq>
<rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1145.1157"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1158.1174"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1175.1188"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1189.1203"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1204.1217"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1218.1230"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1231.1253"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1254.1278"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1279.1297"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1298.1312"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1313.1329"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1330.1343"/><rdf:li rdf:resource="https://thescipub/abstract/jcssp.2026.1360.1369"/></rdf:Seq>
</items>
</channel><item rdf:about="https://thescipub/abstract/jcssp.2026.1145.1157">
    <title><![CDATA[Integration of Local Large Language Models, Retrieval-Augmented Generation, and Adaptive Learning]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1145.1157</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 26 March 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1145.1157">doi:10.3844/jcssp.2026.1145.1157</a></p>In recent years, many schools and teachers have started using closed Large Language Models (LLMs) to help with learning. These tools can be very helpful for tutoring and personal learning, but they al...]]></content:encoded>
    <dc:title><![CDATA[Integration of Local Large Language Models, Retrieval-Augmented Generation, and Adaptive Learning]]></dc:title><dc:creator>Anass   Belcaid</dc:creator><dc:creator>Kamal   Reklaoui</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1145.1157</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-03-26; | doi:10.3844/jcssp.2026.1145.1157</dc:source>
    <dc:date>2026-03-26</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1145.1157</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1145.1157</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1158.1174">
    <title><![CDATA[Enhancing Network Security through Accurate Asset Discovery Using Lightweight Agent-Based Approach]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1158.1174</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 28 March 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1158.1174">doi:10.3844/jcssp.2026.1158.1174</a></p>Any organization&#039;s network administrators and security professionals must have an accurate and real state of assets connected to the network to devise different policies for securing critical res...]]></content:encoded>
    <dc:title><![CDATA[Enhancing Network Security through Accurate Asset Discovery Using Lightweight Agent-Based Approach]]></dc:title><dc:creator>Ishu   Sharma</dc:creator><dc:creator>Ishu   Sharma</dc:creator><dc:creator>Ahthasham   Sajid</dc:creator><dc:creator>Ahthasham   Sajid</dc:creator><dc:creator>Mazliham Mohd Suud</dc:creator><dc:creator>Muhammad Mansoor Alam</dc:creator><dc:creator>Muhammad Mansoor Alam</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1158.1174</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-03-28; | doi:10.3844/jcssp.2026.1158.1174</dc:source>
    <dc:date>2026-03-28</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1158.1174</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1158.1174</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1175.1188">
    <title><![CDATA[Enhancing User Satisfaction and System Trust through Gamification in E-Commerce Platforms]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1175.1188</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 31 March 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1175.1188">doi:10.3844/jcssp.2026.1175.1188</a></p>The increasing adoption of gamification in e-commerce platforms has significantly transformed how people use, engage, and develop their trust in digital systems. Despite this, few empirical studies ha...]]></content:encoded>
    <dc:title><![CDATA[Enhancing User Satisfaction and System Trust through Gamification in E-Commerce Platforms]]></dc:title><dc:creator>Montela   Livanto</dc:creator><dc:creator>Viany Utami Tjhin</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1175.1188</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-03-31; | doi:10.3844/jcssp.2026.1175.1188</dc:source>
    <dc:date>2026-03-31</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1175.1188</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1175.1188</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1189.1203">
    <title><![CDATA[Hybrid Deep Learning Model for Evaluating Subjective Answers Based on Semantic Textual Similarity]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1189.1203</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 7 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1189.1203">doi:10.3844/jcssp.2026.1189.1203</a></p>Subjective answer evaluation requires accurately identifying semantic similarities between student and reference responses. This study introduces a Hybrid Deep Learning Model (HDLM) that integrates CN...]]></content:encoded>
    <dc:title><![CDATA[Hybrid Deep Learning Model for Evaluating Subjective Answers Based on Semantic Textual Similarity]]></dc:title><dc:creator>Siddhesh   Kudtarkar</dc:creator><dc:creator>Kavita   Shirsat</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1189.1203</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-07; | doi:10.3844/jcssp.2026.1189.1203</dc:source>
    <dc:date>2026-04-07</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1189.1203</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1189.1203</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1204.1217">
    <title><![CDATA[An Intrusion Detection Framework for MEC-Enabled IoT Networks]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1204.1217</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 1 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1204.1217">doi:10.3844/jcssp.2026.1204.1217</a></p>Mobile Edge Computing (MEC) has emerged as a promising paradigm for supporting latency-sensitive Internet of Things (IoT) applications by bringing computational resources closer to data sources. Howev...]]></content:encoded>
    <dc:title><![CDATA[An Intrusion Detection Framework for MEC-Enabled IoT Networks]]></dc:title><dc:creator>Rofaida   Tawfik</dc:creator><dc:creator>Abdelfattah   Hegazy</dc:creator><dc:creator>Hesham   Dahshan</dc:creator><dc:creator>Ahmed Gaber Abuabdallah</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1204.1217</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-01; | doi:10.3844/jcssp.2026.1204.1217</dc:source>
    <dc:date>2026-04-01</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1204.1217</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1204.1217</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1218.1230">
    <title><![CDATA[IoT-Integrated CNN Deep Learning for Automated Breast Cancer Detection and Diagnosis]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1218.1230</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 30 March 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1218.1230">doi:10.3844/jcssp.2026.1218.1230</a></p>Breast cancer continues to be a primary cause of death in women, requiring prompt and accurate diagnosis to enhance treatment results. Traditional diagnostic techniques depend on manual assessment, wh...]]></content:encoded>
    <dc:title><![CDATA[IoT-Integrated CNN Deep Learning for Automated Breast Cancer Detection and Diagnosis]]></dc:title><dc:creator>Yamini   Kalva</dc:creator><dc:creator>R. Ganesh Babu</dc:creator><dc:creator>Sindhu   V.</dc:creator><dc:creator>S. Gokul Pran</dc:creator><dc:creator>Garaga   Srilakshmi</dc:creator><dc:creator>Kavitha C T</dc:creator><dc:creator>Sathish Kumar Shanmugam</dc:creator><dc:creator>V.    Bhoopathy</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1218.1230</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-03-30; | doi:10.3844/jcssp.2026.1218.1230</dc:source>
    <dc:date>2026-03-30</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1218.1230</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1218.1230</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1231.1253">
    <title><![CDATA[Efficient Rainfall Forecasting Using Sequential Momentum-Based Artificial Neural Networks for Urban Flood Management]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1231.1253</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 9 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1231.1253">doi:10.3844/jcssp.2026.1231.1253</a></p>Urban floods cause severe disruption in densely populated cities and damage essential public infrastructure. Rapid urbanization and weak drainage systems further increase the risk during heavy rainfal...]]></content:encoded>
    <dc:title><![CDATA[Efficient Rainfall Forecasting Using Sequential Momentum-Based Artificial Neural Networks for Urban Flood Management]]></dc:title><dc:creator>Sherin K K</dc:creator><dc:creator>G.   Suganthi</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1231.1253</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-09; | doi:10.3844/jcssp.2026.1231.1253</dc:source>
    <dc:date>2026-04-09</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1231.1253</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1231.1253</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1254.1278">
    <title><![CDATA[A Detailed Preserving Medical Image Denoising Using Cluster-Wise PCA Thresholding and Iterative Mean Filtering]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1254.1278</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 18 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1254.1278">doi:10.3844/jcssp.2026.1254.1278</a></p>Image denoising is a vital process in medical imaging that involves removing noise or distortions introduced during image acquisition. Random noise can degrade image quality and reduce contrast, makin...]]></content:encoded>
    <dc:title><![CDATA[A Detailed Preserving Medical Image Denoising Using Cluster-Wise PCA Thresholding and Iterative Mean Filtering]]></dc:title><dc:creator>Mohit   Sharma</dc:creator><dc:creator>Ayush   Dogra</dc:creator><dc:creator>Anita   Gupta</dc:creator><dc:creator>Bhawna   Goyal</dc:creator><dc:creator>Dawa Chyophel Lepcha</dc:creator><dc:creator>Archana   Saini</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1254.1278</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-18; | doi:10.3844/jcssp.2026.1254.1278</dc:source>
    <dc:date>2026-04-18</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1254.1278</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1254.1278</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1279.1297">
    <title><![CDATA[An Application of the UTAUT Model to Investigate User Acceptance of Facial Recognition Technology in Mobile Banking: A Case Study from Thailand]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1279.1297</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 16 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1279.1297">doi:10.3844/jcssp.2026.1279.1297</a></p>This research examines the determinants affecting consumers&#039; willingness to embrace facial recognition technology for mobile payments in Thailand. Utilizing the Unified Theory of Acceptance and U...]]></content:encoded>
    <dc:title><![CDATA[An Application of the UTAUT Model to Investigate User Acceptance of Facial Recognition Technology in Mobile Banking: A Case Study from Thailand]]></dc:title><dc:creator>Kriangsak   Chanthinok</dc:creator><dc:creator>Radyan   Dananjoyo</dc:creator><dc:creator>Palan   Jantarajaturapath</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1279.1297</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-16; | doi:10.3844/jcssp.2026.1279.1297</dc:source>
    <dc:date>2026-04-16</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1279.1297</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1279.1297</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1298.1312">
    <title><![CDATA[Dengue Fever Prediction Empowered by Radial Basis Function Networks, Dynamic Mode Decomposition, and Learning-Based Foraging Algorithm]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1298.1312</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 16 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1298.1312">doi:10.3844/jcssp.2026.1298.1312</a></p>Dengue fever is presently considered a major health threat that must be addressed. External and internal factors that induce nonlinear oscillations in the occurrence of dengue disease have made optima...]]></content:encoded>
    <dc:title><![CDATA[Dengue Fever Prediction Empowered by Radial Basis Function Networks, Dynamic Mode Decomposition, and Learning-Based Foraging Algorithm]]></dc:title><dc:creator>Archana   T</dc:creator><dc:creator>Faritha Banu J</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1298.1312</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-16; | doi:10.3844/jcssp.2026.1298.1312</dc:source>
    <dc:date>2026-04-16</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1298.1312</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1298.1312</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1313.1329">
    <title><![CDATA[Arabic Fake News Detection Across Generational Text Representations: From Traditional Models to Transformer-Based Methodologies]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1313.1329</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 17 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1313.1329">doi:10.3844/jcssp.2026.1313.1329</a></p>The rapid proliferation of fake news on Arabic social media has amplified societal and political risks, yet research on automatic detection in Arabic remains limited due to scarce datasets, morphologi...]]></content:encoded>
    <dc:title><![CDATA[Arabic Fake News Detection Across Generational Text Representations: From Traditional Models to Transformer-Based Methodologies]]></dc:title><dc:creator>Noor M. Alkudah</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1313.1329</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-17; | doi:10.3844/jcssp.2026.1313.1329</dc:source>
    <dc:date>2026-04-17</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1313.1329</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1313.1329</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1330.1343">
    <title><![CDATA[Money Laundering Detection in Financial Institutions Using Machine Learning]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1330.1343</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 16 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1330.1343">doi:10.3844/jcssp.2026.1330.1343</a></p>This research aims to develop a system based on machine learning techniques for the accurate detection and classification of money laundering transactions. This system utilizes real and synthetic fina...]]></content:encoded>
    <dc:title><![CDATA[Money Laundering Detection in Financial Institutions Using Machine Learning]]></dc:title><dc:creator>Noor Samer Masood</dc:creator><dc:creator>Rasha Hassan Sakr</dc:creator><dc:creator>Amal Abou Eleneen</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1330.1343</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-16; | doi:10.3844/jcssp.2026.1330.1343</dc:source>
    <dc:date>2026-04-16</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1330.1343</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1330.1343</prism:url>
    </item><item rdf:about="https://thescipub/abstract/jcssp.2026.1360.1369">
    <title><![CDATA[Blockchain-NFV for Smart Digital and Secure Physical Structures in E-Government, Healthcare, and Network Systems]]></title>
    <link>https://thescipub/abstract/jcssp.2026.1360.1369</link>
    <content:encoded>
        <![CDATA[<p>Journal of Computer Science, Published online: 21 April 2026; <a href="https://thescipub.com/abstract/jcssp.2026.1360.1369">doi:10.3844/jcssp.2026.1360.1369</a></p>This paper proposed a combined model that melds Blockchain technology with Network Function Virtualization (NFV) to promote many areas, such as smart, secure, and scalable physical and digital infrast...]]></content:encoded>
    <dc:title><![CDATA[Blockchain-NFV for Smart Digital and Secure Physical Structures in E-Government, Healthcare, and Network Systems]]></dc:title><dc:creator>Hayder Abdulsattar Nahi</dc:creator><dc:creator>Ebtehal Akeel Hamed</dc:creator><dc:creator>Rusul A. Salman</dc:creator><dc:creator>Akmam Majed Mosa</dc:creator><dc:identifier>doi:10.3844/jcssp.2026.1360.1369</dc:identifier>
    <dc:source>Journal of Computer Science, Published online: 2026-04-21; | doi:10.3844/jcssp.2026.1360.1369</dc:source>
    <dc:date>2026-04-21</dc:date>
    <prism:publicationName>Science Publications</prism:publicationName>
    <prism:doi>10.3844/jcssp.2026.1360.1369</prism:doi>
    <prism:url>https://thescipub/abstract/jcssp.2026.1360.1369</prism:url>
    </item></rdf:RDF>