Skip to Content

Most Viewed

  • Article
  • Open Access
59 Citations
48,545 Views
33 Pages

Cyberattacks and Security of Cloud Computing: A Complete Guideline

  • Muhammad Dawood,
  • Shanshan Tu,
  • Chuangbai Xiao,
  • Hisham Alasmary,
  • Muhammad Waqas and
  • Sadaqat Ur Rehman

26 October 2023

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-...

  • Article
  • Open Access
94 Citations
35,368 Views
24 Pages

Artificial Intelligence-Based Malware Detection, Analysis, and Mitigation

  • Amir Djenna,
  • Ahmed Bouridane,
  • Saddaf Rubab and
  • Ibrahim Moussa Marou

8 March 2023

Malware, a lethal weapon of cyber attackers, is becoming increasingly sophisticated, with rapid deployment and self-propagation. In addition, modern malware is one of the most devastating forms of cybercrime, as it can avoid detection, make digital f...

  • Review
  • Open Access
69 Citations
32,868 Views
30 Pages

A Review of Advanced Cooling Strategies for Battery Thermal Management Systems in Electric Vehicles

  • Kunal Sandip Garud,
  • Le Duc Tai,
  • Seong-Guk Hwang,
  • Nghia-Huu Nguyen and
  • Moo-Yeon Lee

28 June 2023

Electric vehicles (EVs) offer a potential solution to face the global energy crisis and climate change issues in the transportation sector. Currently, lithium-ion (Li-ion) batteries have gained popularity as a source of energy in EVs, owing to severa...

  • Review
  • Open Access
46 Citations
20,409 Views
25 Pages

7 December 2023

Considering the alarming increase in cyberattacks and their potential financial implications, the importance of cybersecurity education and training cannot be overstated. This paper presents a systematic literature review that examines different cybe...

  • Review
  • Open Access
89 Citations
20,187 Views
44 Pages

A Systematic Literature Review on Identifying Patterns Using Unsupervised Clustering Algorithms: A Data Mining Perspective

  • Mahnoor Chaudhry,
  • Imran Shafi,
  • Mahnoor Mahnoor,
  • Debora Libertad Ramírez Vargas,
  • Ernesto Bautista Thompson and
  • Imran Ashraf

31 August 2023

Data mining is an analytical approach that contributes to achieving a solution to many problems by extracting previously unknown, fascinating, nontrivial, and potentially valuable information from massive datasets. Clustering in data mining is used f...

  • Review
  • Open Access
24 Citations
19,112 Views
25 Pages

Handwritten Recognition Techniques: A Comprehensive Review

  • Husam Ahmad Alhamad,
  • Mohammad Shehab,
  • Mohd Khaled Y. Shambour,
  • Muhannad A. Abu-Hashem,
  • Ala Abuthawabeh,
  • Hussain Al-Aqrabi,
  • Mohammad Sh. Daoud and
  • Fatima B. Shannaq

2 June 2024

Given the prevalence of handwritten documents in human interactions, optical character recognition (OCR) for documents holds immense practical value. OCR is a field that empowers the translation of various document types and images into data that can...

  • Article
  • Open Access
1 Citations
19,017 Views
19 Pages

10 March 2023

Multiverse is a hypothetical idea that other universes can exist beyond our own. Various scientific theories have suggested scenarios such as the existence of bubble universes that constantly expand or string theory that attempts to merge gravity wit...

  • Review
  • Open Access
11 Citations
17,275 Views
20 Pages

Why Are Most Humans Right-Handed? The Modified Fighting Hypothesis

  • Matz Larsson,
  • Astrid Schepman and
  • Paul Rodway

19 April 2023

Humans show a population-level preference for using the right hand. The fighting hypothesis is an influential theory that suggests that left-handedness persists because its rarity provides a surprise advantage in fighting interactions, and that left-...

  • Review
  • Open Access
68 Citations
16,933 Views
40 Pages

A Review of Different Components of the Intelligent Traffic Management System (ITMS)

  • Nikhil Nigam,
  • Dhirendra Pratap Singh and
  • Jaytrilok Choudhary

23 February 2023

Traffic congestion is a serious challenge in urban areas. So, to address this challenge, the intelligent traffic management system (ITMS) is used to manage traffic on road networks. Managing traffic helps to focus on environmental impacts as well as...

  • Review
  • Open Access
42 Citations
16,897 Views
37 Pages

Thermal Behavior Modeling of Lithium-Ion Batteries: A Comprehensive Review

  • Seyed Saeed Madani,
  • Carlos Ziebert and
  • Mousa Marzband

17 August 2023

To enhance our understanding of the thermal characteristics of lithium-ion batteries and gain valuable insights into the thermal impacts of battery thermal management systems (BTMSs), it is crucial to develop precise thermal models for lithium-ion ba...

  • Review
  • Open Access
114 Citations
16,803 Views
37 Pages

Green IoT: A Review and Future Research Directions

  • Mohammed H. Alsharif,
  • Abu Jahid,
  • Anabi Hilary Kelechi and
  • Raju Kannadasan

19 March 2023

The internet of things (IoT) has a significant economic and environmental impact owing to the billions or trillions of interconnected devices that use various types of sensors to communicate through the internet. It is well recognized that each senso...

  • Review
  • Open Access
48 Citations
16,612 Views
45 Pages

Time Series Analysis Based on Informer Algorithms: A Survey

  • Qingbo Zhu,
  • Jialin Han,
  • Kai Chai and
  • Cunsheng Zhao

21 April 2023

Long series time forecasting has become a popular research direction in recent years, due to the ability to predict weather changes, traffic conditions and so on. This paper provides a comprehensive discussion of long series time forecasting techniqu...

  • Article
  • Open Access
27 Citations
15,648 Views
26 Pages

IoT Vulnerabilities and Attacks: SILEX Malware Case Study

  • Basem Ibrahim Mukhtar,
  • Mahmoud Said Elsayed,
  • Anca D. Jurcut and
  • Marianne A. Azer

26 October 2023

The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more ga...

  • Review
  • Open Access
14 Citations
15,073 Views
29 Pages

A Review of Stable, Traversable Wormholes in f(R) Gravity Theories

  • Ramesh Radhakrishnan,
  • Patrick Brown,
  • Jacob Matulevich,
  • Eric Davis,
  • Delaram Mirfendereski and
  • Gerald Cleaver

7 August 2024

It has been proven that in standard Einstein gravity, exotic matter (i.e., matter violating the pointwise and averaged Weak and Null Energy Conditions) is required to stabilize traversable wormholes. Quantum field theory permits these violations due...

  • Article
  • Open Access
14 Citations
14,783 Views
9 Pages

Kinematic Analysis of the Forward Head Posture Associated with Smartphone Use

  • Justyna Fercho,
  • Michał Krakowiak,
  • Rami Yuser,
  • Tomasz Szmuda,
  • Piotr Zieliński,
  • Dariusz Szarek and
  • Grzegorz Miękisiak

7 March 2023

Background: Frequent use of mobile devices has a known association with musculoskeletal neck pain. This study sought out to localize the region with greatest flexion in the cervical spine and explored the role of symmetry in maintaining the pose duri...

  • Article
  • Open Access
12 Citations
12,122 Views
18 Pages

A Data-Driven Machine Learning Algorithm for Predicting the Outcomes of NBA Games

  • Tomislav Horvat,
  • Josip Job,
  • Robert Logozar and
  • Časlav Livada

24 March 2023

We propose a new, data-driven model for the prediction of the outcomes of NBA and possibly other basketball league games by using machine learning methods. The paper starts with a strict mathematical formulation of the basketball statistical quantiti...

  • Review
  • Open Access
64 Citations
12,000 Views
33 Pages

Security Concepts in Emerging 6G Communication: Threats, Countermeasures, Authentication Techniques and Research Directions

  • Syed Hussain Ali Kazmi,
  • Rosilah Hassan,
  • Faizan Qamar,
  • Kashif Nisar and
  • Ag Asri Ag Ibrahim

25 May 2023

Challenges faced in network security have significantly steered the deployment timeline of Fifth Generation (5G) communication at a global level; therefore, research in Sixth Generation (6G) security analysis is profoundly necessitated. The prerogati...

  • Feature Paper
  • Review
  • Open Access
216 Citations
11,531 Views
69 Pages

Recent Advances in Inflation

  • Sergei D. Odintsov,
  • Vasilis K. Oikonomou,
  • Ifigeneia Giannakoudi,
  • Fotis P. Fronimos and
  • Eirini C. Lymperiadou

5 September 2023

We review recent trends in inflationary dynamics in the context of viable modified gravity theories. After providing a general overview of the inflationary paradigm emphasizing on what problems hot Big Bang theory inflation solves, and a somewhat int...

  • Article
  • Open Access
7 Citations
11,445 Views
35 Pages

23 April 2025

Legal text summarization presents distinct challenges due to the intricate and domain-specific nature of legal language. This paper introduces a novel framework integrating dynamic Retrieval-Augmented Generation (RAG) with domain-specific adaptation...

  • Review
  • Open Access
4 Citations
10,694 Views
15 Pages

3 October 2024

The human pelvis is a complex structure, which participates in the biomechanical functioning of the musculoskeletal system. Although it is considered a symmetrical entity, the morphology of the pelvis is subject to different factors that alter its an...

  • Article
  • Open Access
35 Citations
10,221 Views
19 Pages

A Malware Detection Approach Based on Deep Learning and Memory Forensics

  • Shuhui Zhang,
  • Changdong Hu,
  • Lianhai Wang,
  • Miodrag J. Mihaljevic,
  • Shujiang Xu and
  • Tian Lan

19 March 2023

As cyber attacks grow more complex and sophisticated, new types of malware become more dangerous and challenging to detect. In particular, fileless malware injects malicious code into the physical memory directly without leaving attack traces on disk...

  • Review
  • Open Access
8 Citations
10,067 Views
19 Pages

Multilevel Diffractive Lenses: Recent Advances and Applications

  • Chenyu Shi,
  • Weipeng Zhao,
  • Sai Chen and
  • Wenli Li

16 October 2024

Multilevel diffractive lenses (MDLs) has undergone considerable advancements, marked by their exceptional efficiency and diverse focusing capabilities, resulting in their widespread use in optical systems. In recent times, MDLs have consistently been...

  • Article
  • Open Access
4 Citations
10,012 Views
32 Pages

17 April 2025

Traditional marketing uplift models suffer from a fundamental limitation: they typically operate under static assumptions that fail to capture the temporal dynamics of customer responses to marketing interventions. This paper introduces a novel frame...

  • Systematic Review
  • Open Access
8 Citations
9,762 Views
30 Pages

7 July 2025

Artificial intelligence (AI)-powered mental health chatbots have evolved quickly as scalable means for psychological support, bringing novel solutions through natural language processing (NLP), mobile accessibility, and generative AI. This systematic...

  • Review
  • Open Access
3 Citations
9,627 Views
31 Pages

26 August 2023

The exploration of topologically nontrivial states in condensed matter systems, along with their novel transport properties, has garnered significant research interest. This review aims to provide a comprehensive overview of representative topologica...

  • Feature Paper
  • Article
  • Open Access
6 Citations
9,572 Views
24 Pages

Implicit and Explicit Preferences for Golden Ratio

  • Claudia Salera,
  • Camilla Vallebella,
  • Marco Iosa and
  • Anna Pecchinenda

9 March 2024

The golden ratio, also known as Phi (ϕ ≈ 1.618034), attracted the interest of mathematicians, artists, and intellectuals for many centuries, probably from when it was discovered in human anthropometry. Even in recent times, researchers fou...

  • Article
  • Open Access
35 Citations
9,397 Views
16 Pages

AutoEncoder and LightGBM for Credit Card Fraud Detection Problems

  • Haichao Du,
  • Li Lv,
  • An Guo and
  • Hongliang Wang

6 April 2023

This paper proposes a method called autoencoder with probabilistic LightGBM (AED-LGB) for detecting credit card frauds. This deep learning-based AED-LGB algorithm first extracts low-dimensional feature data from high-dimensional bank credit card feat...

  • Review
  • Open Access
25 Citations
9,211 Views
21 Pages

Advanced Algorithms in Battery Management Systems for Electric Vehicles: A Comprehensive Review

  • Anith Khairunnisa Ghazali,
  • Nor Azlina Ab. Aziz and
  • Mohd Khair Hassan

21 February 2025

Electric vehicles and hybrid electric vehicles (EV) are increasingly common on roads today compared to a decade ago, driven by advancements in technology and a growing focus on sustainable transportation. These vehicles are powered by rechargeable li...

  • Article
  • Open Access
5 Citations
8,938 Views
20 Pages

13 May 2024

This pioneering investigation introduces two innovative estimators crafted to evaluate the finite population distribution function of a study variable, employing auxiliary variables within the framework of stratified random sampling and post-stratifi...

  • Article
  • Open Access
17 Citations
8,902 Views
17 Pages

2 April 2023

Optical character recognition (OCR) is the process of acquiring text and layout information through analysis and recognition of text data image files. It is also a process to identify the geometric location and orientation of the texts and their symm...

  • Article
  • Open Access
16 Citations
8,385 Views
14 Pages

5 May 2023

Many investigations have performed sentiment analysis to gauge public opinions in various languages, including English, French, Chinese, and others. The most spoken language in South Asia is Urdu. However, less work has been carried out on Urdu, as R...

  • Article
  • Open Access
105 Citations
8,323 Views
18 Pages

11 December 2023

In the realm of data analysis and machine learning, achieving an optimal balance of feature importance, known as feature weighting, plays a pivotal role, especially when considering the nuanced interplay between the symmetry of data distribution and...

  • Article
  • Open Access
14 Citations
8,246 Views
14 Pages

Modeling and Improving the Efficiency of Crushing Equipment

  • Natalia Vasilyeva,
  • Uliana Golyshevskaia and
  • Aleksandra Sniatkova

30 June 2023

Over the last few decades, the demand for energy-efficient mineral-processing methods has continued. The necessity to develop energy-efficient technologies for the mineral industry will increase in the future, considering the exhaustion of high-quali...

  • Article
  • Open Access
2 Citations
8,220 Views
12 Pages

Relapse after Orthodontic-Surgical Treatment: A Retrospective Longitudinal Study

  • João Matos,
  • Raquel Travassos,
  • Francisco Caramelo,
  • Madalena Prata Ribeiro,
  • Filipa Marques,
  • Carlos Miguel Marto,
  • Anabela Baptista Paula,
  • Catarina Nunes,
  • Inês Francisco and
  • Francisco Vale

15 May 2023

Long-term stability is a crucial point in order to keep the patient’s aesthetic and functional balance. The aim of this study was to evaluate dental and skeletal relapse in patients who underwent orthodontic-surgical treatment. This retrospecti...

  • Article
  • Open Access
16 Citations
8,191 Views
14 Pages

25 March 2023

This paper proposes a novel wheel−leg hybrid robot that can be applied on both flat and rugged terrains, it utilizes two passive transformable symmetrical wheels that combine the stability of the circular wheel and the obstacle climbing ability...

  • Feature Paper
  • Review
  • Open Access
5 Citations
7,885 Views
38 Pages

10 July 2023

The second part of the article Azulene, Reactivity, and Scientific Interest Inversely Proportional to Ring Size deals with the chemical behavior of the seven-atom azulenic ring. As the title states, the ability of this system to react is lesser compa...

  • Review
  • Open Access
28 Citations
7,874 Views
39 Pages

17 October 2023

This paper provides an overview of the significance of precise thermal analysis in the context of lithium-ion battery systems. It underscores the requirement for additional research to create efficient methodologies for modeling and controlling therm...

  • Feature Paper
  • Review
  • Open Access
13 Citations
7,726 Views
31 Pages

Symmetry Perception and Psychedelic Experience

  • Alexis D. J. Makin,
  • Marco Roccato,
  • Elena Karakashevska,
  • John Tyson-Carr and
  • Marco Bertamini

30 June 2023

This review of symmetry perception has six parts. Psychophysical studies have investigated symmetry perception for over 100 years (part 1). Neuroscientific studies on symmetry perception have accumulated in the last 20 years. Functional MRI and EEG e...

  • Review
  • Open Access
12 Citations
7,638 Views
29 Pages

20 March 2025

Artificial intelligence (AI) is playing a dominant role in advancing heart failure detection and diagnosis, significantly furthering personalized healthcare. This review synthesizes AI-driven innovations by examining methodologies, applications, and...

  • Article
  • Open Access
7,626 Views
58 Pages

19 April 2025

This article provides a survey of polyhedral embeddings of triangular regular maps of genus g, 2g14, and of neighborly spatial polyhedra. An old conjecture of Grünbaum from 1967, although disproved in 2000, lies behind this inves...

  • Feature Paper
  • Review
  • Open Access
29 Citations
7,608 Views
113 Pages

Introduction to Renormalization Theory and Chiral Gauge Theories in Dimensional Regularization with Non-Anticommuting γ5

  • Hermès Bélusca-Maïto,
  • Amon Ilakovac,
  • Paul Kühler,
  • Marija Mađor-Božinović,
  • Dominik Stöckinger and
  • Matthias Weißwange

1 March 2023

This review provides a detailed introduction to chiral gauge theories, renormalization theory, and the application of dimensional regularization with the non-anticommuting BMHV scheme for γ5. One goal was to show how chiral gauge theories can b...

  • Review
  • Open Access
11 Citations
7,601 Views
19 Pages

5 August 2024

The large and interconnected nature of the Internet of Things (IoT) presents unique security challenges, even as it revolutionizes various sectors. With numerous devices, often limited in resources, traditional perimeter-based security methods strugg...

  • Article
  • Open Access
13 Citations
7,542 Views
23 Pages

Convolutional Neural Networks: A Comprehensive Evaluation and Benchmarking of Pooling Layer Variants

  • Afia Zafar,
  • Noushin Saba,
  • Ali Arshad,
  • Amerah Alabrah,
  • Saman Riaz,
  • Mohsin Suleman,
  • Shahneer Zafar and
  • Muhammad Nadeem

12 November 2024

Convolutional Neural Networks (CNNs) are a class of deep neural networks that have proven highly effective in areas such as image and video recognition. CNNs typically include several types of layers, such as convolutional layers, activation layers,...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Symmetry - ISSN 2073-8994