Main Navigation
Main Content
Sidebar
Register
Login
Toggle navigation
Applied Data Science and Analysis
Home
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Home
Archives
Vol. 2025 (2025)
In Progress
Published:
2025-01-10
Articles
Explainable AI: Methods, Challenges, and Future Directions
Ahmed Hussein Ali , Marwan Ali Shnan
1-2
PDF
Limitations of Deep Learning vs. Human Intelligence: Training Data, Interpretability, Bias, and Ethics
Yahya Layth Khaleel , Mustafa Abdulfattah Habeeb , Thierry Oscar Codjo EDOH
3-6
PDF
Bibliometric Analysis of Generative AI and Large Language Models in the Scopus Database: Trends, Insights, and Research Landscape
Ruchi Doshi, Akhmed Kaleel
7-18
PDF
Integration of Artificial Intelligence, Blockchain, and Quantum Cryptography for Securing the Industrial Internet of Things (IIoT): Recent Advancements and Future Trends
Guma Ali , Aziku Samuel , Simon Peter Kabiito , Zaward Morish , Adebo Thomas , Wamusi Robert , Asiku Denis , Malik Sallam , Maad M. Mijwil , Jenan Ayad , Ayodeji Olalekan Salau, Klodian Dhoska
19-82
PDF
The Evolution of Computational Linguistics: A Bibliometric Analysis of Research Trends from 1966 to 2023
Mohanad G. Yaseen , Hussein Alkattan , Laith Farhan
83-93
PDF
Predictive Modeling and Analysis of Monkeypox Outbreaks Using Machine Learning Techniques
Rand Mohanad Maher , Saba Hussein Rashid , Mustafa Abdulfattah Habeeb , Yahya Layth Khaleel , Fatimah N. Ameen
94-111
PDF
The Role of Artificial Intelligence (AI) in Transforming Small and Medium Enterprises (SMEs): A Narrative Review
Justin Mugisha, Akena Francis Adyanga, Johnson Ocan
112-117
PDF
An Analytical Approach to Bimonotone Linear Inequalities and Sublattice Structures
Nematollah Kadkhoda, Mostafa Abotaleb
118-124
PDF
Correcting Convexity Proofs for Two Signomial Functions in Geometric Programming
Benson Turyasingura , Byamukama Willbroad , Ahmed T. Alhasani , Wesam Sarahn deyab
125-131
PDF
Assessing the Impact of Quantum Computing on Data Encryption Practices and Information Security
Zinah Tareq Nayyef , Najwan Abed Hasan , Yasir A. F. Alaabedi , Mayasa M. Abdulrahman , J. F. Tawfeq , Ahmed Dheyaa Radhi
132-145
PDF