https://journals.iub.edu.pk/index.php/JCIS/issue/feed Journal of Computers and Intelligent Systems 2024-05-24T14:15:32+00:00 Dr. Muhammad Ibrahim muhammad.ibrahim@iub.edu.pk Open Journal Systems <p data-sider-select-id="0a69b567-7e9f-4ed4-851b-54a97a9203a1">The <strong data-sider-select-id="2b1fe455-deda-4f74-9cbf-c2d1607fbfdf">Journal of Computers and Intelligent Systems (JCIS)</strong> bridges the gap between researchers and the dissemination of their research findings. JCIS is an open access international refereed research publishing journal with the focused aim of promoting and publishing original, high-quality research. The journal has an international perspective and publishes articles on a wide range of subjects and issues in computer science and its allied disciplines.</p> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>Publisher:</strong> Department of Computer Science, The Islamia University of Bahawalpur, Pakistan.</div> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>ISSN:</strong> 3007-3391<br /><strong>Frequency</strong>: Bianually<br /><strong>Access:</strong> Open<br /><strong>Publication Charges</strong>: Free<br /><strong>Peer Review Process:</strong> Single-blind</div> <div> <p align="justify"> </p> <table> <tbody> <tr> <td width="37"> <p> </p> </td> <td width="37"> <p> </p> </td> <td width="78"><img src="https://journals.iub.edu.pk/public/site/images/jcis/submission-7c0b1856c3cd4c99b8d28898c75b1b5a.png" alt="" width="128" height="132" /></td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/guidelines.png" alt="" width="104" height="108" /></td> <td width="24"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/reviewer.png" alt="" width="112" height="110" /></td> <td width="42"> <p> </p> </td> </tr> <tr> <td width="37"> <p> </p> </td> <td colspan="3" width="163"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/submission/wizard">Submit Your Manuscript</a></p> </td> <td width="48"> <p> </p> </td> <td colspan="3" width="156"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/author">Submission Guidelines</a></p> </td> <td width="54"> <p> </p> </td> <td colspan="3" width="180"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/reviewers">Instructions for Reviewers</a></p> </td> </tr> </tbody> </table> <p align="justify"> </p> </div> https://journals.iub.edu.pk/index.php/JCIS/article/view/2552 Next-Generation Wireless Networks 2024-03-02T17:16:54+00:00 Burhan Naeem burhannaeem09@gmail.com <p data-sider-select-id="efcdac69-cfe1-4e88-a7c1-877a5fce7a3a">Next-generation wireless networks, commonly referred to as 5G and beyond (6G, 7G), are poised to revolutionize the way we communicate, connect, and interact in our increasingly digital world. With unprecedented speed, capacity, and reliability, these networks are expected to deliver ultra-low latency and support massive machine-to-machine communications, enabling a wide range of innovative applications and services. In this work, we offer a survey of the principal methods now in use and architectural principles driving the development of next-generation wireless networks. It explores deep into topics like millimeter-wave communication, huge MIMO systems, and network virtualization to explain their core ideas and principles. Potential advantages and disadvantages of such advanced networks are discussed. Topics covered include the introduction of Internet of Things (IoT) devices, the development of edge computing, and the requirement for increased security and privacy safeguards. Furthermore, this paper highlights ongoing research efforts and standardization activities in the field, aiming to ensure seamless interoperability and global deployment of next-generation wireless networks. As the demand for ubiquitous connectivity continues to escalate, the transition to next-generation wireless networks promises to reshape industries, empower smart cities, and unlock the full potential of emerging technologies such as autonomous vehicles, virtual reality, and artificial intelligence.</p> 2024-05-24T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/2712 Prediction Of Water Quality Using Effective Machine Learning Techniques 2024-05-13T08:43:33+00:00 Fariha Ashfaq Fariha.ashfaq@iub.edu.pk Uzma Aman khizra.saleem@iub.edu.pk <p>One of the most vital natural resources for all earth's living things is water. Life's fundamental need is access to clean water. Water quality has substantially declined over the previous few decades as a result of pollution and numerous other problems. In this study, machine learning (ML) algorithms are developed to predict water quality and water quality classification (WQC). For the prediction of water quality classification, six machine learning algorithms Naïve Bayes, Random Forest (RF), Gradient Boosting (GBoost), K-nearest neighbor (K-NN),Logistic Regression (LogR), and Decision Tree (DT), have been used. The models were evaluated based on 16 parameters. The machine learning model’s result demonstrates the Random Forest model out performed than the other models.</p> 2024-05-05T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/2733 Agile Ontology Development: A Comprehensive Framework from Preliminary Investigations to Evaluation 2024-05-24T13:10:37+00:00 Muhammad Imran Ali imranali@isp.edu.pk <table width="702"> <tbody> <tr> <td rowspan="4" width="426"> <p>This research proposes a comprehensive framework for ontology development within the database domain, integrating agile methodologies from initial investigations to evaluation. The framework comprises three main phases: Preliminary Investigations, Ontology Design and Development, and Ontology Evaluation, each encompassing specific sub-stages. In the Preliminary Investigations phase, entity recognition is conducted through interviews, document analysis, and keyword extraction using tools like Monkey Learn. Relationships between entities are identified to establish hierarchies and associations, facilitating semantic representation. The Ontology Design and Development phase involves domain modeling and ontology implementation, including the transformation of entity relations into OWL classes and properties. Guidelines for mapping entity relations to OWL are provided, ensuring a seamless transition from Entity Relation Diagrams (ERD) to ontology representation. Finally, the Ontology Evaluation phase employs two methods: Domain Experts Evaluation and Pellet Reasoner. Domain experts assess the ontology's credibility, consistency, completeness, and conciseness, while the Pellet Reasoner ensures logical consistency and provides essential inference services. The proposed framework offers a systematic and agile approach to ontology development, particularly beneficial in dynamic domains like database management.</p> </td> <td width="0">&nbsp;</td> </tr> </tbody> </table> 2024-05-24T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/2734 Application Layer Issues and Challenges in Supply Chain 4.0 2024-05-23T04:35:52+00:00 Muzzamil Mustafa muzzamilmustafa0@gmail.com Zaima Mubarak zaimamubarak@gmail.com Muhammad Zulkifl Hasan zulkifl.hasan@ucp.edu.pk Muhammad Zunnurain Hussain zunnurain.bulc@bahria.edu.pk Muhammad Atif Yaqub atif.yaqoub@gmail.com Adeel Ahmad Siddiqui siddiquison6@gmail.com <p><em>Computer networks have improved throughout time and are now more suited to meet contemporary demands, but this evolution has also led to a rise in network risks and assaults. As computer networks aid in the secure and effective movement of data, they also store sensitive information that might be useful to persons and groups outside the network who would want to steal it and use it for their own ends. This might lead to serious network security concerns and vulnerabilities. Supply Chain 4.0 is one of the most emerging phenomena derived from the IR 4.0 that includes the applications of (Internet of thing) IoT, Wireless Sensor Networks (WSN’s) and robots to collectively work and develop a productive environment. Supply chain was mostly a manual and hectic process but with the modern communication and network advancements it is being introduced to more extensive digitization where IoT and advances networking approaches are being carried out. This article highlights the majority of issues, challenges of the application layer in supply chain 4.0. Moreover, the respective attacks targeting specific application layer protocols are stated in detail along with the limitations of the current work with the required research development is also mentioned.</em></p> 2024-05-24T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/2806 Resume Ranking Using Natural Language Processing 2024-05-24T14:15:32+00:00 Zainab Naveed hasanzainab42@gmail.com Bakhtawar Nisar bakhtawarnisar796@gmail.com Dr. Muhammad Saifullah msaifullah@gsec.edu.pk Junaid Iqbal Baig junaidiqbalbaig@cuivehari.edu.pk <p>Finding the ideal candidate for a position is one of a company’s most important and crucial tasks. The conventional approaches typically necessitate spending a significant amount of time manually going through each applicant’s application, reviewing their resumes, and compiling a shortlist of candidates who ought to be contacted for an interview. Numerous resumes are received by companies, many of which are poorly formatted. On the other hand, selecting a candidate based on their resume has not yet been completely automated. The applicant will be able to upload their pdf resume on our website. We will use Natural Language Processing to rank abilities and work insight from the unstructured resumes. Our model will rank the best candidate in each category. The process of screening is made easier by the removal of all irrelevant information, and recruiters are able to better analyze each resume in less time.</p> 2024-05-24T00:00:00+00:00 Copyright (c) 2024 Journal of Computers and Intelligent Systems