Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS <p data-sider-select-id="0a69b567-7e9f-4ed4-851b-54a97a9203a1">The <strong data-sider-select-id="2b1fe455-deda-4f74-9cbf-c2d1607fbfdf">Journal of Computers and Intelligent Systems (JCIS)</strong> bridges the gap between researchers and the dissemination of their research findings. JCIS is an open access international refereed research publishing journal with the focused aim of promoting and publishing original, high-quality research. The journal has an international perspective and publishes articles on a wide range of subjects and issues in computer science and its allied disciplines.</p> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>Publisher:</strong> Artificial Intelligence Research Group, NextSeer Foundation.</div> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>ISSN:</strong> 3007-3391<br /><strong>Frequency</strong>: Quarterly<br /><strong>Access:</strong> Open</div> <div data-sider-select-id="70b1f3f7-ad80-44d2-84e6-854f779a00e7"><strong>Scope: </strong>Engineering and Tecnology<br /><strong>Peer Review Process:</strong> Single-blind</div> <div> <p align="justify"> </p> <table> <tbody> <tr> <td width="37"> <p> </p> </td> <td width="37"> <p> </p> </td> <td width="78"><img src="https://journals.iub.edu.pk/public/site/images/jcis/submission-7c0b1856c3cd4c99b8d28898c75b1b5a.png" alt="" width="128" height="132" /></td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="48"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/guidelines.png" alt="" width="104" height="108" /></td> <td width="24"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="54"> <p> </p> </td> <td width="84"><img src="https://journals.iub.edu.pk/public/site/images/jcis/reviewer.png" alt="" width="112" height="110" /></td> <td width="42"> <p> </p> </td> </tr> <tr> <td width="37"> <p> </p> </td> <td colspan="3" width="163"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/submission/wizard">Submit Your Manuscript</a></p> </td> <td width="48"> <p> </p> </td> <td colspan="3" width="156"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/author">Submission Guidelines</a></p> </td> <td width="54"> <p> </p> </td> <td colspan="3" width="180"> <p><a href="https://journals.iub.edu.pk/index.php/jcis/reviewers">Instructions for Reviewers</a></p> </td> </tr> </tbody> </table> <p align="justify"> </p> <p align="justify"><strong>Conferences:</strong></p> <p align="justify">JCIS will publish the extended versions of the papers of the following international conferences:</p> <ul> <li><a href="https://nextsef.com/intap/2025/index.html">5<sup>th</sup> INTAP 2025</a></li> <li><a href="https://shu.edu.pk/conference/international-conference-on-computing-artificial-intelligence-2025/" target="_blank" rel="noopener">1<sup>st</sup> ICCA 2025</a></li> </ul> <p align="justify"><strong>Collaborations:</strong></p> <p align="justify">Our Collaboraters are refSeek, <a href="https://scicores.com/">SciCore Space</a>, <a href="https://nextsef.com/" target="_blank" rel="noopener">NextSeer Foundation</a>, and others. </p> </div> en-US muhammad.ibrahim@iub.edu.pk (Dr. Muhammad Ibrahim) marina.rasheed@iub.edu.pk (Marina Rasheed) Mon, 30 Jun 2025 00:00:00 +0000 OJS 3.3.0.13 http://blogs.law.harvard.edu/tech/rss 60 Detection and Classification of Alopecia Areata Using Diverse Feature-Set https://journals.iub.edu.pk/index.php/JCIS/article/view/3763 <p>Alopecia areata is a prevalent autoimmune disorder resulting in hair loss on the scalp and other body parts, affecting millions worldwide. This condition can significantly impact one's psychological well-being and self-esteem, highlighting the importance of early detection for better disease management and potential hair regrowth. This study uses computer vision techniques to propose a comprehensive method for detecting alopecia areata from camera images. Two distinct datasets, Dermnet for alopecia areata images and Figaro1k for healthy images are employed, with a preprocessing phase involving histogram equalization to enhance image quality. Subsequently, color, texture, and shape features are extracted from the images, followed by feature fusion and selection to maximize the discriminative power of the dataset. Several popular classifiers, such as Random Forest, SVM, Decision Tree, Logistic Regression, Naive Bayes, ANN, and KNN, are employed to identify the most effective models. The proposed technique achieves a remarkable accuracy of 96.43%, outperforming related research methods. This study shows considerable promise for improving the early detection and treatment of Alopecia Areata by utilizing sophisticated computer vision and machine learning methods, leading to enhanced patient outcomes and a better quality of life.</p> Amna Noreen, Haider Khan, Syed M Adnan Shah, Wakeel Ahmed, Syed Haseeb Amjad Copyright (c) 2025 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3763 Fri, 27 Jun 2025 00:00:00 +0000 Data Enhancing Cybersecurity through Botnet Security Isolation for Smart IoT Devices: A Deep Learning Approach https://journals.iub.edu.pk/index.php/JCIS/article/view/3816 <p>&nbsp;&nbsp;</p> <table width="702"> <tbody> <tr> <td rowspan="4" width="426"> <p>The Internet of Things (IoT) sector continues to expand rapidly to connect more than billions of devices throughout healthcare settings as well as transportation domains and smart residential spaces. Amazing network connectivity affords IoT systems to multiple security problems especially through botnet attacks that utilize illegally gained control over IoT devices to carry out harmful operations. Security solutions from the past struggle to stop and address these attacks because IoT devices present various resource limitations together with their diverse operational characteristics. The proposed research presents a deep learning botnet detection system for IoT networks by applying Convolutional Neural Networks (CNNs) together with Long Short-Term Memory Networks (LSTMs) and Autoencoders for analyzing IoT traffic patterns. The models received training using Bot-IoT dataset to find their optimal performance through accuracy and precision and recall and F1-score evaluations. CNN generates better results than other examined models by achieving 94% accuracy while LSTM obtains 92% and Autoencoder provides 88%. The research established CNN as the best model for traditional botnet detection yet LSTM showed exceptional capability in detecting temporal patterns and Autoencoder achieved the best results for identifying new botnet traffic types. The system displays encouraging performance however it encounters technical challenges because of its issues with processing real-time data and model scalability issues as well as unbalanced IoT datasets. According to research findings deep learning models specifically Convolutional Neural Networks demonstrate substantial potential for enhancing botnet detection but ongoing research must focus on performance enhancement techniques for realistic ecosystem deployment and handling various IoT network configurations and scalability considerations.</p> </td> <td width="0">&nbsp;</td> </tr> </tbody> </table> <p>&nbsp;</p> Atiqa Iram, Talha Farooq Khan, Mubasher Malik, Muhammad Sabir, Muhammad Kamran Abid Copyright (c) 2025 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3816 Fri, 27 Jun 2025 00:00:00 +0000 GoogleNet’s Image Classification Performance Analysis: Effects of Dataset Size, Balancing, and Splits Ratios https://journals.iub.edu.pk/index.php/JCIS/article/view/3727 <p>In computer vision, image categorizing plays a condemnatory role in many real-world applications. GoogleNet is a intimate deep learning model especially expand for image clas- sification and object recognition tasks. It effectually categorizes images based on learned patterns.This study evaluates the per- formance of the GoogleNet architecture in image classification, focusing on three key aspects: the impact of dataset size, dataset balancing, and different train-test split ratios. We examined the model’s accuracy on the CIFAR-10 dataset by varying dataset sizes at 25%, 50%, 75%, and 100%, considering both balanced and unbalanced data. The findings indicate that dataset size and balance notably affect classification accuracy, with balanced datasets generally outperforming unbalanced ones. Additionally, when experimenting with different train-test split ratios 50%- 50%, 60%-40%, 70%-30%, 80%-20%, and 90%-10% the model achieved the best results when trained on 70% of the data and tested on the remaining 30%.</p> Mujeeb Ur Rehman, Mariyam Amreen Copyright (c) 2025 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3727 Fri, 27 Jun 2025 00:00:00 +0000 Cyber Threat and Vulnerability Classification Using NLP and Machine Learning Techniques on Text-Based Security Data https://journals.iub.edu.pk/index.php/JCIS/article/view/3815 <table width="702"> <tbody> <tr> <td width="426"> <p>The rapidly developing cybersecurity sector faces the essential problem of detecting and classifying cyber threats with precision. The rise of complicated data and its growing volume requires machine learning (ML) techniques to successfully automate threat detection operations through modern methods. The research evaluates six different ML algorithms for cybersecurity threat classification through Logistic Regression, SVM, Random Forest, Naive Bayes, LSTM, and BERT performance analysis. The systematic evaluation methodology analyzes these models by measuring their accuracy, together with precision and recall metrics, along with F1-score and execution time efficiency. Our examination starts with tokenization, then carries out stop-word elimination before performing TF-IDF vectorization for model enhancement purposes through various feature encoding approaches. The study examines the effects that employing both categorical and continuous feature encoding methods has on the outcomes. The research makes its original contribution through analyzing performance-speed tradeoffs between deep learning models and standard models applied to cybersecurity contexts. BERT proves to be the superior model since it delivers 93.8% accuracy and 96.2% ROC-AUC score at the cost of increased computational requirements. Random Forest and SVM exhibited comparable results, but Naive Bayes demonstrated the least effective performance with accuracy and recall statistics. BERT outperforms other models in cybersecurity, but its high computing requirements prevent it from real-time implementation.</p> <p>&nbsp;</p> </td> </tr> </tbody> </table> Talha Khan, Mubasher Malik, Zahid Aziz, Muhammad Kamran Abid, Muhammad Sabir Copyright (c) 2025 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3815 Fri, 27 Jun 2025 00:00:00 +0000 Applications of Stochastic Processes in Quantum cryptography for Secure Cryptographic Protocols https://journals.iub.edu.pk/index.php/JCIS/article/view/3735 <p>Quantum cryptography offers higher security than traditional cryptography but faces challenges due to noise and interference. Stochastic processes, particularly randomness and uncertainty, provide tools to model and protect quantum systems. This review paper explores the role of stochastic processes in quantum cryptography, focusing on quantum entanglement and secure protocols like Quantum Key Distribution (QKD). Key stochastic concepts, including probability distributions, Markov processes, and noise effects in quantum mechanics, are introduced. The research examines how stochastic models enhance performance and security in entanglement-based protocols while addressing challenges such as noise, decoherence, scalability, hardware limitations, and attack vulnerabilities. Potential research directions include efficient quantum error correction, quantum networking, and integrating classical and quantum cryptography to improve security and practicality</p> Shah Dad Hasil, Abdul Sattar, Fathima Merlin Stalin, Altaz Sher Muhammad, Danial Khan, Zahid, Gohram Wasim Copyright (c) 2025 Journal of Computers and Intelligent Systems https://journals.iub.edu.pk/index.php/JCIS/article/view/3735 Fri, 27 Jun 2025 00:00:00 +0000