Publish Your Research with C5K
C5K Academic Publishing

Publish Your Research with C5K

A Global Academic Publishing Platform

Join thousands of researchers worldwide. Submit, review, and publish peer-reviewed articles in information technology, business, health sciences, and more.

Fast & Rigorous Peer Review
C5K Academic Publishing

Fast & Rigorous Peer Review

Quality research, delivered quickly

Our expert reviewers ensure your work meets the highest academic standards — with average review times under 4 weeks so your discoveries reach the world sooner.

Global Reach & Impact
C5K Academic Publishing

Global Reach & Impact

Connect with researchers across 50+ countries

Your research deserves a global audience. C5K distributes published work to institutional libraries, databases, and indexing services worldwide.

Open Access for Everyone
C5K Academic Publishing

Open Access for Everyone

Breaking down barriers to knowledge

C5K is committed to open science. All published research is freely accessible to scholars, students, and practitioners around the globe — no paywall, no barriers.

Join the C5K Research Community
C5K Academic Publishing

Join the C5K Research Community

Collaborate, Review & Advance Science

Become part of a growing network of academics and researchers. Apply to be a reviewer, submit your dissertations, or explore our conference opportunities.

Latest Announcements

New Special Issue: AI Ethics and Governance

New Special Issue: AI Ethics and Governance

We are pleased to announce a special issue on AI Ethics and Governance in the Journal of Advanced Machine Learning and Artificial Intelligence (JAMLAI). Submission deadline: March 31, 2024.

Read More →
ICAIML 2024 Conference Registration Now Open

ICAIML 2024 Conference Registration Now Open

Early bird registration is now available for the International Conference on Artificial Intelligence and Machine Learning (ICAIML 2024) taking place June 15-17 in San Francisco.

Read More →
IJAISM Research Scholarship Program Announced

IJAISM Research Scholarship Program Announced

IJAISM is proud to launch a new scholarship program supporting doctoral researchers in information technology and business management. Applications open February 1, 2024.

Read More →
Updated Author Guidelines for 2024

Updated Author Guidelines for 2024

We have updated our author guidelines to include new formatting requirements and best practices. All authors should review the updated guidelines before submission.

Read More →
New Editorial Board Members Appointed

New Editorial Board Members Appointed

IJAISM welcomes five distinguished researchers to our editorial boards across multiple journals, strengthening our commitment to academic excellence.

Read More →
Call for Papers: Business Analytics Special Issue

Call for Papers: Business Analytics Special Issue

The Journal of Business Value and Data Analytics is seeking submissions for a special issue on advanced business analytics applications. Deadline: April 15, 2024.

Read More →

Latest Articles

DEMOGRAPHIC-RESEARCH-AND-SOCIAL-DEVELOPMENT-REVIEWS

Digital Societies: Impact of Technology on Social Structures and Interactions

Anupom Debnath

This study examines the intricate links between technological innovation systems (TIS) and the broader "context structures" that influence them. Historically, TIS research has acknowledged various contextual influences, but we propose that the TIS framework can be significantly enhanced by adopting a more detailed understanding of TIS context structures and their interactions. To achieve this objective, we delve into four particularly significant categories of contextual frameworks: technological, sectoral, geographical, and political. By analyzing these categories, we can uncover the diverse ways in which context structures interact with and shape a focal TIS. For instance, technological advancements can drive innovation within a TIS, while sectoral contexts can provide the necessary industry-specific conditions for TIS development. Geographical contexts offer unique regional advantages or limitations that affect TIS dynamics, and political contexts can either facilitate or hinder innovation through regulations and policies. By explicitly incorporating these context structures into the TIS framework, we enhance our understanding of the complex dynamics at play. This enriched perspective provides valuable insights for analysts, helping them to identify key factors that influence TIS performance and development. Furthermore, it sets a comprehensive research agenda aimed at exploring these interactions in greater depth, ultimately contributing to more effective and context-sensitive innovation strategies.

Read More →
AMLID

Blockchain Technology for Securing Digital Information: Opportunities and Challenges

Mahafuj Hassan

Modern Internet technology has developed because of information security. The password mechanism, programmed mechanism, decentralized mechanism, and distributed mechanism. The Blockchain's mechanism offers a whole new angle for the advancement of Internet information security technologies. The mechanisms used to store and distribute information within a network are redefined by Blockchain technology. It is not necessary for participants to know one another or for third-party certifying agencies to take part. It uses distributed technology to record, transmit, and store information value transfer activities. It also uses an asymmetric cryptographic algorithm to prevent data tampering and forgery. Finally, it allows all participants to agree on the current state of blockchain data information. Additionally, the use of blockchain technology in identity identification, data protection, and network security is explained by a recent industry study. The development of information security technology will be greatly accelerated by blockchain technology, which will also have a significant influence on the field's overall growth.

Read More →
DEMOGRAPHIC-RESEARCH-AND-SOCIAL-DEVELOPMENT-REVIEWS

Digital Transformation in Business: Strategies and Implications for Organizational Change

MD Ahsan Ullah Imran

Advanced algorithms, robotics, and analytics, among other digital technologies, are revolutionizing the dynamics of the workforce in organizations. Hence, the writers of this study have examined the consequences of emerging technology on Organizational Behavior. A significant proportion of the existing research on this topic has primarily examined the technology aspects, while neglecting the comprehensive perspective and its impact on organizational behavior. The uniqueness of this study resides in its ability to offer a comprehensive overview of the key digital technologies and assess their impact on employees and leadership. In order to achieve this objective, and considering the current relevance of the subject, the authors chose to examine the effects of digital technologies on organizational behavior. They accomplished this by conducting a thorough analysis of existing literature and organizing it according to the specific technologies and their implications. The article is divided into three sections. Firstly, the definitions of Organizational Behavior and digitalization were examined to establish a theoretical framework. This was followed by an analysis of the impacts and effects of digitalization on leadership and employees. Finally, the findings were summarized in a structured scheme.

Read More →
AMLID

AI-Driven Financial Security: Innovations in Protecting Assets and Mitigating Risks

Mani Prabha

The financial sector encounters numerous challenges such as cyber threats, fraud, and regulatory compliance. Traditional methods of safeguarding financial transactions and assets are becoming increasingly insufficient against advanced cyber-attacks. This thesis examines the transformative impact of Artificial Intelligence (AI) on financial security. It investigates various AI-driven innovations, their applications in asset protection, and risk mitigation, while also considering the ethical and regulatory implications. AI is reshaping financial risk management by offering advanced tools and techniques for identifying, assessing, and mitigating risks. This article explores the innovations and applications of AI-driven financial risk management, emphasizing its transformative effect on traditional risk management practices. We discuss various Artificial intelligence technology, such as natural language processing, predictive analytics, and machine learning and their applications in enhancing financial stability, regulatory compliance, and operational efficiency. As cyber threats grow more sophisticated, traditional network security approaches are becoming inadequate due to scalability issues, slow response times, and the inability to detect advanced threats. This highlights the need for research into more efficient security methods to protect against diverse network attacks. Cybercriminals use AI for data poisoning and model theft to automate attacks, emphasizing the need for AI-based cybersecurity techniques. This study introduces a cybersecurity technique based on AI for financial sector management (CS-FSM) to map and prevent unforeseen risks. By utilizing AI technologies like the K-Nearest Neighbor (KNN) algorithm with the Enhanced Encryption Standard (EES), the suggested approach improves data privacy, scalability, risk reduction, data protection, and attack avoidance, significantly improving the performance of cybersecurity systems in the financial sector.

Read More →
JSAE

Precision Farming Through the Use of Internet of Things (IoT) Innovations in Agriculture

Md Redwan Hussain

Using state-of-the-art technology, precision agriculture boosts agricultural output while minimizing negative environmental effects. Precision agriculture is a farming method that maximizes crop yields, reduces waste, and boosts production by using cutting-edge technology and data analysis. It is a viable tactic for addressing some of the main problems facing modern agriculture, such as feeding a growing global population while lessening its negative effects on the environment. This study looks at some recent developments in big data utilization and Internet of Things (IoT) based precision agriculture. The objective of this article is to present a summary of the latest advancements and potential applications of smart farming and precision agriculture. It provides a review of precision agriculture's current situation, taking into account the newest technological advancements such as machine learning, sensors, and drones.

Read More →
JSAE

Circular Economy in Agriculture: Transforming Waste into Wealth

Rakibul Hasan

The incorporation of a circular economy within the framework of the agriculture sector provides a way of managing wastes through the utilization of residues from crops, animal products, and other organic materials through renewal energy sources and organic manure. This paper aims to examine the possibility of applying circular economy to agricultural systems in terms of the economic and environmental impacts and limitations of circular economy application. The findings also suggest that circular strategies can create substantial value from waste, decrease input costs, enhance farmers’ revenues and profits, and support ecological improvements. However, factors including high initial costs, low awareness levels, and inadequate infrastructure resist its use in many areas. This paper gives solutions to the above challenges and how the circular economy can be integrated into agriculture.

Read More →
JITMB

Involving Cybersecurity to Protect Small to Medium-Sized Businesses

Shuchona Malek Orthi

Risk management is a fundamental element for organizations, particularly small and medium-sized enterprises (SMEs), to protect their systems and data from cyberattacks. Information technology (IT) is a fundamental requirement for SMEs, providing access to essential services and data sharing. Cybersecurity is crucial for organizations to prevent unauthorized access to data centers and other computerized systems, ensuring a strong security posture against malicious attacks. SMEs should have multiple layers of protection across potential access points, including data, software, hardware, and connected networks. Employees should be trained on compliance and security processes, and tools like unified threat management systems can detect, isolate, and remediate potential threats. Data protection approaches, including data privacy, integrity, and availability, are essential for protecting critical data. Cybersecurity plays a significant role in IT technology issues, involving tools, policies, security concepts, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies. SMEs face various forms of cyberattacks, such as malware, denial of service (DoS) assaults, and phishing, which can cause significant financial losses and damage to their reputation. The purpose of the study is to shed light on the cyberthreats that small and medium-sized enterprises face as well as some preventative measures.

Read More →
PMSRI

E-commerce Platforms Innovations and Strategies for Market Expansion

Md Wali Ullah

The study offers a thorough examination of the innovative e-commerce techniques employed by prominent online merchants, with a specific focus on the highly competitive sector. The primary objective of this research is to investigate the efficacy of different forms of innovation implemented by prominent global e-commerce platforms, with a specific focus on renowned brands like Amazon (Nasdaq: AMZN), Trendyol (Alibaba), and Hepsiburada (Nasdaq: Heps). In order to accomplish this, the study used the "ten types of innovation" framework to analyze the various aspects of innovation in the e-commerce field. Our analysis reveals the factors that contributed to Amazon's inability to successfully penetrate the Turkish market. The research aims to discover potential innovative opportunities that can facilitate the implementation of blue ocean plans.

Read More →

Most Viewed Articles

TBFLI👁️ 364 views

Forecasting Stock Prices: A Machine Learning-Based Approach for Predictive Analytics Through a Case Study

Stock price prediction has always been a challenging task, requiring careful observation of trends and dynamics of the market because of the volatile and complex nature of financial markets. Various factors affect market behavior all the time. Even some unquantifiable factors like 25 Oct 2025 (Published Online) emotions of the masses, social and political dynamics, etc., also play a great role. So perfect Machine Learning, Deep Learning, behaviors into consideration is crucial for better prediction of the ups and downs of prices. SMA, EMA, RSI, MACD, Bollinger Various machine learning and deep learning models have been proposed to tackle the challenges Bands, RFE, Random Forest by capturing and interpreting complex patterns and relationships in historical price data. Regressor, Multivariate Analysis, Technical features are important for understanding market trends and thus improving the LSTM. accuracy of stock price predictions. In this paper, we calculate key technical indicators such as Simple Moving Average (SMA), Exponential Moving Average (EMA), Relative Strength Index (RSI), Moving Average Convergence Divergence (MACD), Bollinger Bands, and others. We then focus on selecting the most relevant indicators by employing feature selection methods from these to enhance the extraction of meaningful features reflecting underlying market behavior and increase the probability of more precise prediction. Here, Recursive Feature Elimination (RFE) and Random Forest Regressor-based importance ranking methods have been applied for the feature selection task. To get a better forecast of market price, it is important to capture long- term dependencies and patterns over time. Long Short-Term Memory (LSTM) networks are well- suited for modeling and predicting sequential data like stock prices. By leveraging an LSTM model and taking the selected features, we do a multivariate analysis to forecast stock price based on historical data, identifying the trends fairly accurately with some lags here and there.

Read More →
DEMOGRAPHIC-RESEARCH-AND-SOCIAL-DEVELOPMENT-REVIEWS👁️ 154 views

Digital Transformation in Business: Strategies and Implications for Organizational Change

By MD Ahsan Ullah Imran

Advanced algorithms, robotics, and analytics, among other digital technologies, are revolutionizing the dynamics of the workforce in organizations. Hence, the writers of this study have examined the consequences of emerging technology on Organizational Behavior. A significant proportion of the existing research on this topic has primarily examined the technology aspects, while neglecting the comprehensive perspective and its impact on organizational behavior. The uniqueness of this study resides in its ability to offer a comprehensive overview of the key digital technologies and assess their impact on employees and leadership. In order to achieve this objective, and considering the current relevance of the subject, the authors chose to examine the effects of digital technologies on organizational behavior. They accomplished this by conducting a thorough analysis of existing literature and organizing it according to the specific technologies and their implications. The article is divided into three sections. Firstly, the definitions of Organizational Behavior and digitalization were examined to establish a theoretical framework. This was followed by an analysis of the impacts and effects of digitalization on leadership and employees. Finally, the findings were summarized in a structured scheme.

Read More →
AESI👁️ 127 views

Dynamic Analysis of a G+13 Story RCC Building Using Shear Wall in Three Different Locations on Various Seismic Zones

By Md. Kawsarul Islam Kabbo

Currently, Seismic impacts are a very serious concern when designing multi-storied reinforced concrete structures. Seismic tremors have occurred in numerous parts of the globe. High-rise structures should have proper stiffness to resist lateral loads caused by Earthquakes and Winds. Consequently, Engineers are extremely concerned about finding suitable solutions that will allow structures to survive without major damage. Shear walls are structural members that are designed to carry earthquake loads and oppose lateral loads significantly. They are a good choice to increase the stiffness of high-rise structures. This paper aims to use shear walls in various locations of a G+13 multi-storied residential building and to determine the best shear wall placement in high slender buildings by analyzing story displacement, story drift, base shear, and the fundamental time period in various seismic zones according to IS 1893:2016. Three models are prepared and compared under different seismic zones. Shear walls are at the core of the building, and shear walls are at the four corners of the building, which is a combination of both. Our study's goal is to test a structure's ability to bear lateral load applied to it according to the Code and also when it exceeds the limit of allowable deformation. The prepared model for this experimentation is considered to be located on medium soil, and wind velocity is high, like 148mph. The experiment concluded that building with a shear wall combination of both core and corner will show better results in resisting lateral forces, though the combination isn’t enough to help withstand the high slender structure against very powerful earthquake attacks like Zone-V.

Read More →
PMSRI👁️ 127 views

Navigating the AI Revolution in Business Management: New Strategies and Innovations

By Mustakim Bin Aziz

Artificial Intelligence (AI) has changed a paradigm shift in business management, presenting unprecedented opportunities for innovation and strategic enhancement. This research explores the transformative impact of AI technologies on contemporary business practices. This paper presents, how AI reshapes decision-making processes, optimizes operational efficiency, and fuels innovative strategies to maintain competitive advantage in a rapidly evolving market. Through case studies and a comprehensive analysis of industry applications, the research identifies key AI-driven tools and methods that revolutionize various aspects of business management, including supply chain optimization, customer relationship management, and predictive analytics. The study also examines the challenges and ethical considerations associated with AI integration, providing insights into best practices for successful implementation. By synthesizing theoretical frameworks with practical examples, this study aims to provide a holistic understanding of the dynamic interplay between AI and business management. It emphasizes the need for businesses to adapt to this technological revolution and outlines strategic recommendations for using AI to drive sustainable growth and innovation. By synthesizing theoretical frameworks with practical examples, this thesis aims to offer a holistic understanding of the dynamic interplay between AI and business management. It underscores the necessity for businesses to adapt to this technological revolution and outlines strategic recommendations for leveraging AI to drive sustainable growth and innovation.

Read More →
JITMB👁️ 117 views

Intelligence-driven Risk Management in Information Security Systems

By Anamika Tiwari

The task of making decisions in information security, when faced with unclear probabilities and unforeseen consequences of events in the constantly evolving cyber threat landscape, has gained significant importance. Cyber threat intelligence equips decision-makers with essential information and context to comprehend and predict future threats, hence minimizing ambiguity and enhancing the precision of risk assessments. Addressing uncertainty in decision-making demands the adoption of a new methodology led by threat intelligence (TI) and a risk analysis approach. This is a crucial aspect of evidence-based decision-making. Our proposed solution to this difficulty involves the implementation of a TI-based security assessment methodology and a decision-making strategy that takes into account both known unknowns and unknown unknowns. The proposed methodology seeks to improve decision-making quality by utilizing causal graphs, which provide an alternative to current methodologies that rely on attack trees, hence reducing uncertainty. In addition, we analyze strategies, methods, and protocols that are feasible, likely, and credible, enhancing our capacity to anticipate enemy actions. Our proposed approach offers practical counsel to information security leaders, enabling them to make well-informed decisions in uncertain circumstances. This paper presents a novel approach to tackling the problem of making decisions in uncertain situations in the field of information security. It introduces a methodology that can assist decision-makers in navigating the complexities of the ever-changing and dynamic world of cyber threats.

Read More →
PRAIHI👁️ 104 views

Perioperative Medicine: Investigating Preoperative and Postoperative Management, Including Reducing Complications in Diabetic and Obese Patients

By Sheikh Ummey Salma Tonu

Perioperative medicine is crucial for optimizing outcomes for patients with comorbidities like diabetes and obesity. It involves a multidisciplinary approach to preoperative assessment, intraoperative management, and postoperative care to reduce complications and improve recovery. Diabetes and obesity increase the risk of perioperative complications, such as infections, cardiovascular events, and delayed wound healing. Perioperative medicine ensures personalized risk management, reducing problems and speeding up recovery. This comprehensive approach reduces hospital stays, enhances patient safety, and improves long-term health. This paper investigates preoperative and postoperative care for reducing complications in patients with diabetes and obesity, using interviews and symmetric analysis. Preoperative strategies focus on optimizing glycemic control, managing weight, and addressing risk factors through personalized care plans. Intraoperative techniques maintain hemodynamic stability, minimize insulin resistance, and use appropriate anaesthetic protocols. Postoperatively, vigilant monitoring of blood glucose levels, early mobilization, and nutritional support are pivotal for mitigating complications and enhancing recovery. Emerging research highlights the value of rehabilitation programs, tailored pharmacological interventions, and enhanced recovery pathways for high-risk populations. Advancements in minimally invasive surgical techniques and real-time monitoring technologies have shown promise in reducing adverse outcomes.

Read More →

Latest from Our Blog

Neuromorphic Engineering: Mimicking the Human Brain

Neuromorphic Engineering: Mimicking the Human Brain

Hardware architectures inspired by neurobiology promise lower power consumption and parallel processing capabilities.

Read More →
Blockchain for IoT Device Authentication

Blockchain for IoT Device Authentication

Addressing the massive security vulnerabilities in IoT networks using distributed ledger technology.

Read More →
Edge AI vs. Cloud AI: Architectural Trade-offs

Edge AI vs. Cloud AI: Architectural Trade-offs

Analyzing the latency, privacy, and computational trade-offs of deploying machine learning models to edge devices.

Read More →
Solid-State Batteries: The End of Lithium-Ion?

Solid-State Batteries: The End of Lithium-Ion?

Solid electrolytes promise higher energy densities and supreme safety for the next generation of EVs.

Read More →
Autonomous Swarm Drones in Agriculture

Autonomous Swarm Drones in Agriculture

How decentralized control algorithms are allowing massive swarms of UAVs to optimize crop yields.

Read More →
CRISPR-Cas9 in Bioinformatics: Data-Driven Gene Editing

CRISPR-Cas9 in Bioinformatics: Data-Driven Gene Editing

How machine learning models are predicting off-target effects in CRISPR gene editing workflows.

Read More →

Newsletter Subscription

Stay informed about the latest research, publications, and academic events.

Platform Statistics

12
Academic Journals
77+
Published Articles
248+
Active Researchers
50+
Countries