Volume 13, Issue 10, Pages 1 - 133 ( October - 2024 )

1)
Bridging the Gap: Innovations in Supply Chain Technology Through ERP Integration and Intelligent Automation
Pages 1 - 15
Blessing Ameh, Oluwakemi Betty Arowosegbe, Jumoke Agbelusi, Monsurat Adeola Adeosun, Samuel Ossi Chukwunweike

10.7753/IJCATR1310.1001

Show Preview
  |  
Download PDF
3)
Big Data for Predictive Maintenance in Industry 4.0: Enhancing Operational Efficiency and Equipment Reliability
Pages 37 - 51
Eleojo Samuel Ocheni, Michael Onyekachukwu Nwabueze, Stella Olufinmilayo Egbelana, Bolape Alade

10.7753/IJCATR1310.1003

Show Preview
  |  
Download PDF
4)
A Theory-Based Deep Learning Approach for Insider Threat Detection and Classification
Pages 52 - 61
Everleen Nekesa Wanyonyi, Newton Wafula Masinde, Silvance Onyango Abeka

10.7753/IJCATR1310.1004

Show Preview
  |  
Download PDF
5)
Comparing Political Inclination Classification on Twitter Posts using Naive Bayes, SVM, and XGBoost
Pages 62 - 65
Shashank Shree Neupane, Atish Shakya, Bishan Rokka, Sagar Acharya

10.7753/IJCATR1310.1005

Show Preview
  |  
Download PDF
6)
Predictive Policing: The Role of AI in Crime Prevention
Pages 66 - 78
Ibrahim Raji, Damilola Bartholomew Sholademi

10.7753/IJCATR1310.1006

Show Preview
  |  
Download PDF
7)
Research on Edge Task Offloading Problem Based n Dual Fitness Genetic Algorithm
Pages 79 - 83
Chengyu Hou, Wenzao Li, Sai Yao

10.7753/IJCATR1310.1007

Show Preview
  |  
Download PDF
8)
LEACH-based Resilient Transmission Rounds LEACH
Pages 84 - 89
Cheng Zhang, Zhan Wen, Chengyu Wen, Miao He

10.7753/IJCATR1310.1008

Show Preview
  |  
Download PDF
9)
The Impact of Adversarial Attacks on 5G Network Systems
Pages 90 - 98
Okonkwo Chinonso Joseph, Prof Ogochukwu C. Okeke

10.7753/IJCATR1310.1009

Show Preview
  |  
Download PDF
10)
Digital Forensics in Cybercrime Investigation
Pages 99 - 110
Augustine Chibuzor Iwuh, Tobi Sonubi

10.7753/IJCATR1310.1010

Show Preview
  |  
Download PDF
11)
The Role of Emerging Technologies in Advancing Edge Computing for Cybersecurity Forensics
Pages 111 - 124
Isaac Emeteveke, Oladele J Adeyeye, Oluwatobi Emehin

10.7753/IJCATR1310.1011

Show Preview
  |  
Download PDF
12)
Cybersecurity Challenges and Invasion of Privacy: An In-Depth Analysis
Pages 125 - 133
Eseyin Joseph B., Ogbonna Chukwudi N., Falana Moses O., Betty Omowumi Bello

10.7753/IJCATR1310.1012

Show Preview
  |  
Download PDF