Coming Issue

Current Issue  August 2025Volume 17 | Number 1

Journal allows immediate open access to content in HTML + PDF


Articles under review

A Hybrid Approach to Image and Signal Encryption Using Wavelet Analysis and Permutation Schemes

Kashif Sultan*

View:    Abstract |  HTML Full Text | 

In an age of rapid digital communication and data exchange, the protection of multimedia information such as images and signals is of paramount importance. This paper presents a hybrid encryption approach that combines wavelet transform and permutation techniques to enhance data security. The proposed method leverages the multi-resolution capabilities of wavelet analysis to decompose data, followed by a permutation scheme to disrupt pixel or signal sample positions, ensuring high confusion and diffusion properties. The results demonstrate improved security metrics, including entropy, correlation coefficients, and histogram uniformity, compared to traditional encryption methods. This hybrid framework proves to be both efficient and robust for real-time multimedia encryption.

Hide Abstract


Views    PDF Download PDF Downloads: 263
[hupso]


Advanced Strategies for Virtual Machine Mobility in Cloud Systems

Rajeev Singh1* Irfan Husain2   Yousuf Jamal2

View:    Abstract |  HTML Full Text | 

Virtual Machine (VM) mobility is crucial in dynamic cloud environments to achieve efficient resource utilization, high availability, and reduced operational costs. This paper investigates the advanced strategies for VM migration, focusing on optimization techniques, AI-driven scheduling, security concerns, and real-time migration scenarios. Simulation experiments demonstrate how these strategies enhance system performance, minimize downtime, and reduce energy consumption compared to traditional approaches.

Hide Abstract


Views    PDF Download PDF Downloads: 240
[hupso]


A Spectral Clustering-Based Decentralized Self-Adaptation Framework for Cloud-Native Service-Oriented Applications

Reena Sharma*

View:    Abstract |  HTML Full Text | 

As cloud-native architectures become more prevalent, service-based applications demand robust, scalable, and autonomous management strategies. This paper presents a decentralized self-adaptation mechanism using spectral clustering to dynamically manage services in a cloud environment. The proposed framework enables services to adapt to changing workloads and environmental conditions without centralized control, promoting resilience, scalability, and efficiency.

Hide Abstract


Views    PDF Download PDF Downloads: 254
[hupso]


Optimized Big Data Handling with Cloud-Based Parallel Divide and Conquer Techniques(A Review)

Rajeev Singh1* , Yousuf Jamal2

View:    Abstract |  HTML Full Text | 

The explosive growth of data across industries has challenged traditional data processing systems, necessitating scalable, efficient, and distributed solutions. This review explores the integration of the divide and conquer paradigm with parallel computing and cloud technologies to address Big Data handling. By examining current techniques, frameworks, and challenges, the article offers a comprehensive overview of how cloud-based parallel divide and conquer strategies optimize Big Data processing in terms of performance, scalability, and cost-efficiency.

Hide Abstract


Views    PDF Download PDF Downloads: 254
[hupso]


Evolution, Applications, and Future Directions of Chatbots in the Age of Artificial Intelligence

Junaid Ahmed*

View:    Abstract |  HTML Full Text | 

This paper explores the rise and influence of chatbots in the digital age, driven by advancements in natural language processing (NLP) and artificial intelligence (AI). We examine their historical development, practical applications across diverse sectors, and the challenges faced in their deployment. Through literature review and practical case analysis, we evaluate chatbot performance in domains such as customer service, healthcare, and education. Additionally, the study discusses key performance metrics, user satisfaction, ethical considerations, and future prospects. The findings offer insights into enhancing chatbot design and effectiveness, supporting ongoing innovation in AI-powered conversational systems.

Hide Abstract


Views    PDF Download PDF Downloads: 270
[hupso]


The Role of Artificial Intelligence and Machine Learning in Transforming Telecommunications: Opportunities, Challenges, and Future Directions

S.S. Asadi*

View:    Abstract |  HTML Full Text | 

Artificial Intelligence (AI) and Machine Learning (ML) are transforming the telecommunications industry through smarter networks, advanced customer engagement systems, predictive maintenance, and innovative services. This research provides an in-depth examination of AI and ML adoption in telecom, highlighting their growing role in improving operational efficiency, enhancing customer satisfaction, and shaping future telecom ecosystems. The paper also explores significant challenges including data privacy risks, high implementation costs, regulatory complexities, and workforce skill shortages. Using doctrinal research methodology, supplemented by case studies, surveys, and policy analysis, this study provides evidence-based insights. Data tables, figures, and adoption trends illustrate sectoral impacts, while international regulatory comparisons highlight contrasting approaches. Findings reveal that AI and ML are central to the future of telecom, but balanced investments in technology, expertise, and governance are vital. The study concludes with a framework for ethical, secure, and sustainable AI adoption in telecommunications.

Hide Abstract


Views    PDF Download PDF Downloads: 306
[hupso]


Artificial Intelligence and Security: Enhancing Cyber Defense Mechanisms

H. Toya

View:    Abstract |  HTML Full Text | 

The rapid evolution of Artificial Intelligence (AI) has significantly impacted cybersecurity, offering both opportunities and challenges. While AI enhances threat detection, anomaly identification, and automated response systems, it also introduces new vulnerabilities, such as adversarial attacks and AI-powered cyber threats. This PhD thesis explores the intersection of AI and security, focusing on machine learning (ML) and deep learning (DL) techniques for cyber defense, the risks posed by malicious AI, and strategies to mitigate these threats. The research proposes novel AI-driven security frameworks, evaluates their effectiveness against emerging cyber threats, and discusses ethical considerations in AI-based security solutions.

Hide Abstract


Views    PDF Download PDF Downloads: 250
[hupso]


Artificial Intelligence in IoT Security: Uncovering Opportunities and Threats

1Fasel Qadir, 2Imtiyaz Hassan

 

View:    Abstract |  HTML Full Text | 

The integration of Artificial Intelligence (AI) into the Internet of Things (IoT) ecosystem has transformed the landscape of cybersecurity. While IoT systems enable ubiquitous connectivity and automation across industries, they are also highly susceptible to cyberattacks due to their heterogeneity, limited resources, and scalability challenges. AI-based techniques, including machine learning, deep learning, and reinforcement learning, offer promising approaches to detecting anomalies, preventing intrusions, and predicting emerging threats in IoT networks. However, these opportunities are accompanied by significant challenges such as adversarial attacks, data privacy concerns, computational limitations, and the interpretability of AI models. This review article critically analyzes the dual role of AI in IoT security, highlighting its potential as both a defender and an enabler of cyber threats. Various AI-driven techniques are systematically reviewed, their applications in IoT security are discussed, and emerging risks are evaluated. The article further identifies future directions, emphasizing the importance of explainable AI, lightweight security frameworks, and robust adversarial defense mechanisms for sustainable and resilient IoT ecosystems.

Hide Abstract


Views    PDF Download PDF Downloads: 257
[hupso]