https://journals.iub.edu.pk/index.php/JCIS/issue/feedJournal of Computers and Intelligent Systems2025-06-30T00:00:00+00:00Dr. Muhammad Ibrahimmuhammad.ibrahim@iub.edu.pkOpen Journal Systems<p data-sider-select-id="0a69b567-7e9f-4ed4-851b-54a97a9203a1">The <strong data-sider-select-id="2b1fe455-deda-4f74-9cbf-c2d1607fbfdf">Journal of Computers and Intelligent Systems (JCIS)</strong> bridges the gap between researchers and the dissemination of their research findings. JCIS is an open access international refereed research publishing journal with the focused aim of promoting and publishing original, high-quality research. The journal has an international perspective and publishes articles on a wide range of subjects and issues in computer science and its allied disciplines.</p> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>Publisher:</strong> Artificial Intelligence Research Group, NextSeer Foundation.</div> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>ISSN:</strong> 3007-3391<br /><strong>Frequency</strong>: Quarterly<br /><strong>Access:</strong> Open</div> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>Scope: </strong>Engineering and Tecnology<br /><strong>Peer Review Process:</strong> Single-blind</div> <div> <p align="justify"> </p> <table> <tbody> <tr> <td width="37"> <p> </p> </td> <td width="37"> <p> </p> </td> <td width="78"><img src="https://journals.iub.edu.pk/public/site/images/jcis/submission-7c0b1856c3cd4c99b8d28898c75b1b5a.png" alt="" width="128" height="132" /></td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/guidelines.png" alt="" width="104" height="108" /></td> <td width="24"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/reviewer.png" alt="" width="112" height="110" /></td> <td width="42"> <p> </p> </td> </tr> <tr> <td width="37"> <p> </p> </td> <td colspan="3" width="163"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/submission/wizard">Submit Your Manuscript</a></p> </td> <td width="48"> <p> </p> </td> <td colspan="3" width="156"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/author">Submission Guidelines</a></p> </td> <td width="54"> <p> </p> </td> <td colspan="3" width="180"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/reviewers">Instructions for Reviewers</a></p> </td> </tr> </tbody> </table> <p align="justify"> </p> <p align="justify"><strong>Conferences:</strong></p> <p align="justify">JCIS will publish the extended versions of the papers of the following international conferences:</p> <ul> <li><a href="https://nextsef.com/intap/2025/index.html">5<sup>th</sup> INTAP 2025</a></li> <li><a href="https://shu.edu.pk/conference/international-conference-on-computing-artificial-intelligence-2025/" target="_blank" rel="noopener">1<sup>st</sup> ICCA 2025</a></li> </ul> <p align="justify"><strong>Collaborations:</strong></p> <p align="justify">Our Collaboraters are refSeek, <a href="https://scicores.com/">SciCore Space</a>, <a href="https://nextsef.com/" target="_blank" rel="noopener">NextSeer Foundation</a>, and others. </p> </div>https://journals.iub.edu.pk/index.php/JCIS/article/view/3763Detection and Classification of Alopecia Areata Using Diverse Feature-Set2025-06-09T09:05:30+00:00Amna Noreenamna.noreenl@students.uettaxila.edu.pkHaider Khanhaider.khan@students.uettaxila.edu.pkSyed M Adnan Shahsyed.adnan@uettaxila.edu.pkWakeel Ahmedwakeel.ahmad@uettaxila.edu.pkSyed Haseeb Amjadsyed.haseeb@students.uettaxila.edu.pk<p>Alopecia areata is a prevalent autoimmune disorder resulting in hair loss on the scalp and other body parts, affecting millions worldwide. This condition can significantly impact one's psychological well-being and self-esteem, highlighting the importance of early detection for better disease management and potential hair regrowth. This study uses computer vision techniques to propose a comprehensive method for detecting alopecia areata from camera images. Two distinct datasets, Dermnet for alopecia areata images and Figaro1k for healthy images are employed, with a preprocessing phase involving histogram equalization to enhance image quality. Subsequently, color, texture, and shape features are extracted from the images, followed by feature fusion and selection to maximize the discriminative power of the dataset. Several popular classifiers, such as Random Forest, SVM, Decision Tree, Logistic Regression, Naive Bayes, ANN, and KNN, are employed to identify the most effective models. The proposed technique achieves a remarkable accuracy of 96.43%, outperforming related research methods. This study shows considerable promise for improving the early detection and treatment of Alopecia Areata by utilizing sophisticated computer vision and machine learning methods, leading to enhanced patient outcomes and a better quality of life.</p>2025-06-27T00:00:00+00:00Copyright (c) 2025 Journal of Computers and Intelligent Systemshttps://journals.iub.edu.pk/index.php/JCIS/article/view/3816Data Enhancing Cybersecurity through Botnet Security Isolation for Smart IoT Devices: A Deep Learning Approach2025-05-22T06:27:31+00:00Atiqa Iramatiqairam786@gmail.comTalha Farooq Khantalhafarooqkhan@gmail.comMubasher Malikhodcs@isp.edu.pkMuhammad Sabirmuhammadsabir@isp.edu.pkMuhammad Kamran AbidKamran.abid@eum.edu.pk<p> </p> <table width="702"> <tbody> <tr> <td rowspan="4" width="426"> <p>The Internet of Things (IoT) sector continues to expand rapidly to connect more than billions of devices throughout healthcare settings as well as transportation domains and smart residential spaces. Amazing network connectivity affords IoT systems to multiple security problems especially through botnet attacks that utilize illegally gained control over IoT devices to carry out harmful operations. Security solutions from the past struggle to stop and address these attacks because IoT devices present various resource limitations together with their diverse operational characteristics. The proposed research presents a deep learning botnet detection system for IoT networks by applying Convolutional Neural Networks (CNNs) together with Long Short-Term Memory Networks (LSTMs) and Autoencoders for analyzing IoT traffic patterns. The models received training using Bot-IoT dataset to find their optimal performance through accuracy and precision and recall and F1-score evaluations. CNN generates better results than other examined models by achieving 94% accuracy while LSTM obtains 92% and Autoencoder provides 88%. The research established CNN as the best model for traditional botnet detection yet LSTM showed exceptional capability in detecting temporal patterns and Autoencoder achieved the best results for identifying new botnet traffic types. The system displays encouraging performance however it encounters technical challenges because of its issues with processing real-time data and model scalability issues as well as unbalanced IoT datasets. According to research findings deep learning models specifically Convolutional Neural Networks demonstrate substantial potential for enhancing botnet detection but ongoing research must focus on performance enhancement techniques for realistic ecosystem deployment and handling various IoT network configurations and scalability considerations.</p> </td> <td width="0"> </td> </tr> </tbody> </table> <p> </p>2025-06-27T00:00:00+00:00Copyright (c) 2025 Journal of Computers and Intelligent Systemshttps://journals.iub.edu.pk/index.php/JCIS/article/view/3727GoogleNet’s Image Classification Performance Analysis: Effects of Dataset Size, Balancing, and Splits Ratios2025-05-21T07:14:48+00:00Mujeeb Ur Rehmanmujeeb.rehman@skt.umt.edu.pkMariyam Amreenmariyamamreen25@gmail.com<p>In computer vision, image categorizing plays a condemnatory role in many real-world applications. GoogleNet is a intimate deep learning model especially expand for image clas- sification and object recognition tasks. It effectually categorizes images based on learned patterns.This study evaluates the per- formance of the GoogleNet architecture in image classification, focusing on three key aspects: the impact of dataset size, dataset balancing, and different train-test split ratios. We examined the model’s accuracy on the CIFAR-10 dataset by varying dataset sizes at 25%, 50%, 75%, and 100%, considering both balanced and unbalanced data. The findings indicate that dataset size and balance notably affect classification accuracy, with balanced datasets generally outperforming unbalanced ones. Additionally, when experimenting with different train-test split ratios 50%- 50%, 60%-40%, 70%-30%, 80%-20%, and 90%-10% the model achieved the best results when trained on 70% of the data and tested on the remaining 30%.</p>2025-06-27T00:00:00+00:00Copyright (c) 2025 Journal of Computers and Intelligent Systemshttps://journals.iub.edu.pk/index.php/JCIS/article/view/3815Cyber Threat and Vulnerability Classification Using NLP and Machine Learning Techniques on Text-Based Security Data2025-05-22T06:24:45+00:00Talha Khantalhafarooqkhan@gmail.comMubasher Malikhodcs@isp.edu.pkZahid AzizZahid.aziz@eum.edu.pkMuhammad Kamran AbidKamran.abid@eum.edu.pkMuhammad Sabirmuhammadsabir@usp.edu.pk<table width="702"> <tbody> <tr> <td width="426"> <p>The rapidly developing cybersecurity sector faces the essential problem of detecting and classifying cyber threats with precision. The rise of complicated data and its growing volume requires machine learning (ML) techniques to successfully automate threat detection operations through modern methods. The research evaluates six different ML algorithms for cybersecurity threat classification through Logistic Regression, SVM, Random Forest, Naive Bayes, LSTM, and BERT performance analysis. The systematic evaluation methodology analyzes these models by measuring their accuracy, together with precision and recall metrics, along with F1-score and execution time efficiency. Our examination starts with tokenization, then carries out stop-word elimination before performing TF-IDF vectorization for model enhancement purposes through various feature encoding approaches. The study examines the effects that employing both categorical and continuous feature encoding methods has on the outcomes. The research makes its original contribution through analyzing performance-speed tradeoffs between deep learning models and standard models applied to cybersecurity contexts. BERT proves to be the superior model since it delivers 93.8% accuracy and 96.2% ROC-AUC score at the cost of increased computational requirements. Random Forest and SVM exhibited comparable results, but Naive Bayes demonstrated the least effective performance with accuracy and recall statistics. BERT outperforms other models in cybersecurity, but its high computing requirements prevent it from real-time implementation.</p> <p> </p> </td> </tr> </tbody> </table>2025-06-27T00:00:00+00:00Copyright (c) 2025 Journal of Computers and Intelligent Systemshttps://journals.iub.edu.pk/index.php/JCIS/article/view/3735Applications of Stochastic Processes in Quantum cryptography for Secure Cryptographic Protocols2025-04-12T14:24:49+00:00Shah Dad Hasilshahdadhasil.15@gmail.comAbdul Sattarabdulsattarbaloch12002@gmail.comFathima Merlin Stalinfatimachristy@gmail.comAltaz Sher Muhammadalthazsheer6@gmail.comDanial Khanmdanialkhan147@gmail.comZahidzaheeryounis9@gmail.comGohram Wasimgohramwaseem@gmail.com<p>Quantum cryptography offers higher security than traditional cryptography but faces challenges due to noise and interference. Stochastic processes, particularly randomness and uncertainty, provide tools to model and protect quantum systems. This review paper explores the role of stochastic processes in quantum cryptography, focusing on quantum entanglement and secure protocols like Quantum Key Distribution (QKD). Key stochastic concepts, including probability distributions, Markov processes, and noise effects in quantum mechanics, are introduced. The research examines how stochastic models enhance performance and security in entanglement-based protocols while addressing challenges such as noise, decoherence, scalability, hardware limitations, and attack vulnerabilities. Potential research directions include efficient quantum error correction, quantum networking, and integrating classical and quantum cryptography to improve security and practicality</p>2025-06-27T00:00:00+00:00Copyright (c) 2025 Journal of Computers and Intelligent Systems