official Journal of AlNoor University
Keyword Index
A
  • AES Encryption Performance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
  • Attack Graph Simplify Attack Graph to Reduce Attack Graph Complexity Using Critical Path Preserving Graph Reduction [Volume 2, Issue 2, 2025, Pages 9-13]
  • Attention Mechanism Fire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
B
  • Blockchain Blockchain-Based Document Verification System [Volume 2, Issue 2, 2025, Pages 79-88]
C
  • CNN Advances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
  • CTM AI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
  • ChatGPT Leveraging ChatGPT in the Loop for Enhanced Robustness in Deep Learning Models [Volume 2, Issue 2, 2025, Pages 49-53]
  • CorEx AI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
  • Cyber Threat Detection Learning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
  • Cyber-attacks An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
D
  • Deep learning Advances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
  • Deep learning A Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
  • Deep learning Leveraging ChatGPT in the Loop for Enhanced Robustness in Deep Learning Models [Volume 2, Issue 2, 2025, Pages 49-53]
  • Deep learning Fire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
E
  • Educational Technology Dynamic Data Harmonization Through Supervised Learning Techniques in Technology-Rich Educational Spaces [Volume 2, Issue 2, 2025, Pages 41-48]
  • Ethereum Blockchain-Based Document Verification System [Volume 2, Issue 2, 2025, Pages 79-88]
G
  • Genetic Algorithm (GA) A Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
  • Graph Pruning Simplify Attack Graph to Reduce Attack Graph Complexity Using Critical Path Preserving Graph Reduction [Volume 2, Issue 2, 2025, Pages 9-13]
H
  • Human-Computer Interaction A Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
  • Hybrid Intelligence A Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
I
  • IDS Learning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
  • Intelligent IoT Deep Learning Edge Computing Real Self-Supervised Learning for Speech Recognition: A Comprehensive Review [Volume 2, Issue 1, 2025, Pages 19-22]
  • Internet of Things (IoT) An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
  • Intrusion Detection System (IDS) An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
K
  • K-means clustering A Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
  • Keywords: educational data mining Dynamic Data Harmonization Through Supervised Learning Techniques in Technology-Rich Educational Spaces [Volume 2, Issue 2, 2025, Pages 41-48]
L
  • Large Language Models (LLMs) Trends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
  • Learn to Learn Learning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
M
  • Machine Learning in Speech Integrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
  • Machine learning An Ensemble Approach for Detecting Network Attacks in IoT Environments [Volume 2, Issue 2, 2025, Pages 63-68]
  • Meta-Learning Learning to Secure: A Survey on Meta-Learning Approaches in Cyber Threat Detection and Response [Volume 2, Issue 2, 2025, Pages 1-7]
  • Model Efficiency Optimization Trends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
  • Multimodal Learning A Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
N
  • NLP Phishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
  • NPCR&UACI Performance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
  • Natural Language Processing Trends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
  • Natural language Interface Generative AI for Relational Database Management: A Comprehensive Review of Natural Language Interfaces for Text-to-SQL Conversion [Volume 2, Issue 2, 2025, Pages 85-94]
  • Network intrusion detection A Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
O
  • Optimization Advances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
P
  • PSNR Performance Analysis of Hybrid Cryptography and Steganography for Sustainable Cybersecurity and Data Protection [Volume 2, Issue 2, 2025, Pages 25-30]
  • Particle Swarm Optimization (PSO) A Hybrid Intelligence Framework for Enhanced Network Intrusion Detection and Classification [Volume 2, Issue 2, 2025, Pages 69-77]
  • Phishing URLs Phishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
R
  • RNN Advances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
  • Research Trends AI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
S
  • SQL Generative AI for Relational Database Management: A Comprehensive Review of Natural Language Interfaces for Text-to-SQL Conversion [Volume 2, Issue 2, 2025, Pages 85-94]
  • SSL Methodologies Integrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
  • Smart contract Blockchain-Based Document Verification System [Volume 2, Issue 2, 2025, Pages 79-88]
  • Speech Emotion Recognition A Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
  • Speech Recognition Integrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
  • Squeeze and Excitation Fire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]
  • Swarm Optimization Advances in High-Performance Models for Natural Language Processing: A Review [Volume 2, Issue 1, 2025, Pages 11-17]
T
  • Time Processing Sensor Networks Self-Supervised Learning for Speech Recognition: A Comprehensive Review [Volume 2, Issue 1, 2025, Pages 19-22]
  • Topic Modeling AI-Driven Topic Modeling of Research Trends in Computer Science (2000–2025): A Longitudinal Analysis of arXiv Data [Volume 2, Issue 2, 2025, Pages 15-23]
  • Transformer Architecture Trends Challenges and Future Directions for Intelligent IoT and Deep Learning: A Review [Volume 2, Issue 1, 2025, Pages 23-29]
  • Transformer Models A Comprehensive Review of Speech Emotion Recognition: Advances, Challenges, and Future Directions [Volume 2, Issue 1, 2025, Pages 31-36]
U
  • URL Attacks Phishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
  • URL Feature Extraction Phishing URL detection based on contextualized word representations [Volume 2, Issue 2, 2025, Pages 31-40]
  • Unlabelled Data Integrating Deep Learning and Swarm Intelligence for Speech Recognition: A Review [Volume 2, Issue 1, 2025, Pages 1-9]
W
  • Web3.js Blockchain-Based Document Verification System [Volume 2, Issue 2, 2025, Pages 79-88]
  • Wildfire Detection Fire-YOLO: Balancing Accuracy and Efficiency for Edge-Based Early Fire Warning Systems [Volume 2, Issue 2, 2025, Pages 56-61]