Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Submit Paper
English
Home
JSSHL
IJOMSR
Register
Login
Current
Archives
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Submit Paper
Language
English
Search
Home
JSSHL
IJOMSR
Register
Login
Vol. 8 No. 7 (2025)
Home
/
Archives
/
Vol. 8 No. 7 (2025)
Published:
2025-07-14
COVERPAGE&CONTENT
Articles
Threat Factors and Prevention Strategies for Computer Network Security
Okita Dan Odhiambo
1-5
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).01
Cyber Threat Intelligence Sharing Mechanism and Implementation Based on Blockchain Smart Contracts
Alexander Bilenko
6-10
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).02
Inquiry into the Integration of Communication Technology and Computer Technology
Abdul Rauf
11-15
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).03
Discuss the Application of Big Data Technology in Computer Information Security
Budiman Rusli
16-19
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).04
Predictive Modeling of Student Academic Performance in Higher Education: A Machine Learning Framework for Learning Analytics
Xin Li
20-24
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).05
Threat Mitigation in Big Data Ecosystems: Machine Learning-Driven Anomaly Detection for Zero Trust Network Security Architectures
Yi Zhang
25-29
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).06
Emerging Vulnerabilities in Next-Generation Network Infrastructures: Threat Mitigation Frameworks for 5G-Edge-IoT Convergence Environments
Zhiyong Zhang
30-35
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).07
Research on the Mechanisms and Leading Value of Digital Empowerment for the Sustainable Development of Traditional Opera Troupes
Zongxiang Hu
36-42
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).08
D-SELACFP: Visible-Infrared Person Re-Identification via Local Attention and Cross-Modal Feature Perception Enhancement
Li Fan
43-49
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).09
Research on System Modeling and Strategic Optimization of Low-altitude Economic Regional Synergistic Development in the Pearl River-West River Economic Belt
Wenyan Li, Guiying Li, Shuang Peng, Sichen Zhang
50-58
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).10
A Practical Path of Multi-AI Agents Collaboration Based on Low-Code Coze Platform to Empower Students’ English Learning Efficiency
Huyue Liao
59-67
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).11
Practical Exploration of AI-enabled “Writing and Communication” Course Construction under the OBE Concept
Zhiling Zhou
68-73
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).12
Advancements in Multimodal Image Fusion and Deep Learning-based Segmentation Techniques for Gliomas: A Comprehensive Review
Lirong Chen, Liqiang Wang, Wei Wang
74-87
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).13
Research on the Support and Influence of Italian Phonetic Characteristics on Bel Canto Singing
Zhen Fu
88-92
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).14
Design of a Portable Surface Electromyography Acquisition System for Lumbar Muscles
Bo Deng
93-99
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).15
A Study on Actors’ Emotional Experience and Expression in Theatrical Performance
Yuwen Sun, Jacquline Tham
100-103
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).16
A Rational Review of Geometric Reasoning
Wenyan Li
104-107
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).17
Research on Quality Control and Management of Construction Engineering
Chao Li
108-115
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).18
Research on Copyright Protection Obligations of Online Disk Service Providers
Mingfeng Chen
116-126
PDF
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).19
Exploration of the Application of Chemical Raw Materials in Oil Painting Creation
Alimujiang Maitikasimu
127-130
pdf
DOI:
https://doi.org/10.53469/wjimt.2025.08(07).20
Loading...