{"title":"Denim enumeration and tabulation solution for the garments manufacturing environment","authors":"Muhammad Shakir, Shahid Karim, Shahnawaz Ali, Shahzor Memon, Halar Mustafa, Rabia Shaikh","doi":"10.1504/ijesdf.2023.133965","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133965","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.10051940
Safwan Al Shdaifat N.A.
{"title":"The Criminal Confrontation of the Cryptocurrency (Bitcoin) and its Illegal Use","authors":"Safwan Al Shdaifat N.A.","doi":"10.1504/ijesdf.2023.10051940","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10051940","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66715967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.10052178
Xiaoxu Zhong
{"title":"Study on noise control of digital circuit signal transmission under strong magnetic field interference","authors":"Xiaoxu Zhong","doi":"10.1504/ijesdf.2023.10052178","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052178","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.133187
Indrajeet Singh, Naveen Kumar Chaudhary
{"title":"A study on methodology on VoIP-based communication investigation through network packet analysis","authors":"Indrajeet Singh, Naveen Kumar Chaudhary","doi":"10.1504/ijesdf.2023.133187","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133187","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134888670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specific features of legal regulation of relations under the licence agreement","authors":"Sayan Yesmaganbetov, Antonina Kizdarbekova, Botagoz Amanzholova, Aliya Nurzhanova, Nailya Akhmetova","doi":"10.1504/ijesdf.2023.133974","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133974","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136054111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.10051844
Rohit Saxena, D. Arora, Vishal Nagar
{"title":"Efficient blockchain addresses classification through cascading ensemble learning approach","authors":"Rohit Saxena, D. Arora, Vishal Nagar","doi":"10.1504/ijesdf.2023.10051844","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10051844","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.10052420
Ashima Kukkar, Dr.K.R.Ramkumar Kumar, Soni Singh
{"title":"Pandemic outbreak prediction with an enhanced parameter optimisation algorithm using machine learning models","authors":"Ashima Kukkar, Dr.K.R.Ramkumar Kumar, Soni Singh","doi":"10.1504/ijesdf.2023.10052420","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.10052420","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.133189
A. Abylkhanova, Gulmira Ashirbekova, Galiya Akseit, A. Pernebekova, B. Serdali
{"title":"Image of the country: problems of information security","authors":"A. Abylkhanova, Gulmira Ashirbekova, Galiya Akseit, A. Pernebekova, B. Serdali","doi":"10.1504/ijesdf.2023.133189","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133189","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"66716977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.133190
Abylaikhan Aben
{"title":"State immunity as an obstacle in civil proceedings","authors":"Abylaikhan Aben","doi":"10.1504/ijesdf.2023.133190","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.133190","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134888618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1504/ijesdf.2023.127745
A. Laghari, M. M. Rind, A. Khan, A. Shaikh
{"title":"Cloud forensics and digital ledger investigation: a new era of forensics investigation","authors":"A. Laghari, M. M. Rind, A. Khan, A. Shaikh","doi":"10.1504/ijesdf.2023.127745","DOIUrl":"https://doi.org/10.1504/ijesdf.2023.127745","url":null,"abstract":"","PeriodicalId":54070,"journal":{"name":"International Journal of Electronic Security and Digital Forensics","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72923157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}