https://www.ijrcom.org/index.php/ijrc/issue/feedInternational Journal of Research in Computing 2026-01-14T00:00:00+00:00Editor in Chiefpradeep@kdu.ac.lkOpen Journal Systems<p data-start="352" data-end="739"><strong data-start="352" data-end="422">What is the International Journal of Research in Computing (IJRC)?</strong><br data-start="422" data-end="425" />The <em data-start="217" data-end="272">International Journal of Research in Computing (IJRC)</em> is a peer-reviewed, open-access journal published by the Faculty of Computing, General Sir John Kotelawala Defence University. IJRC follows COPE standards and employs AI-enabled publishing to ensure fast, high-quality dissemination of research. The journal follows a Diamond Open Access model, meaning publication is free for both authors and readers.</p> <p data-start="741" data-end="856"><strong data-start="741" data-end="775">What does the journal publish?</strong><br data-start="775" data-end="778" />IJRC publishes original research in all computing-related fields, including:</p> <ul data-start="857" data-end="987"> <li data-start="857" data-end="877"> <p data-start="859" data-end="877">Computer Science</p> </li> <li data-start="878" data-end="902"> <p data-start="880" data-end="902">Computer Engineering</p> </li> <li data-start="903" data-end="927"> <p data-start="905" data-end="927">Software Engineering</p> </li> <li data-start="928" data-end="957"> <p data-start="930" data-end="957">Information Systems & ICT</p> </li> <li data-start="958" data-end="987"> <p data-start="960" data-end="987">Computational Mathematics</p> </li> <li data-start="958" data-end="987"> <p data-start="960" data-end="987">Practical and transdisciplinary research, where authors integrate computing components into other fields. This includes innovations in engineering, sciences, healthcare, business, social sciences, and other areas where computing plays a key role in research outcomes.</p> </li> </ul> <p data-start="1296" data-end="1514"><strong data-start="1296" data-end="1317">Submission Format</strong><br data-start="1317" data-end="1320" />IJRC supports free-format submission: manuscripts can be prepared in a single-column layout using standard MS Word heading styles, making submission simple and author-friendly.</p> <p data-start="1516" data-end="1702"><strong data-start="1516" data-end="1544">Who can publish in IJRC?</strong><br data-start="1544" data-end="1547" />The journal welcomes submissions from scholars worldwide, including research presented at the International Research Conferences, provided that conference papers incorporate feedback received during the conference and implement suggested future work that demonstrates high research value in their final submission to the journal</p> <p data-start="1704" data-end="2040"><strong data-start="1704" data-end="1740">How is research quality ensured?</strong><br data-start="1740" data-end="1743" />All papers undergo double-blind peer review, and submissions follow FAIR principles for data management and Transparency and Openness Promotion (TOP) Guidelines. Each research article is also aligned with the United Nations Sustainable Development Goals (SDGs) wherever relevant.</p> <p data-start="2042" data-end="2182"><strong data-start="2042" data-end="2081">How often is the journal published?</strong><br data-start="2081" data-end="2084" />IJRC publishes two open-access issues per year, ensuring rapid visibility and accessibility.</p> <p data-start="2184" data-end="2341"><strong data-start="2184" data-end="2237">Does IJRC charge an Article Processing Fee (APC)?</strong><br data-start="2237" data-end="2240" />No. IJRC follows Diamond Open Access, meaning publication is free for both authors and readers.</p> <p data-start="2343" data-end="2382"><strong data-start="2343" data-end="2380">What are the journal identifiers?</strong></p> <ul data-start="2383" data-end="2443"> <li data-start="2383" data-end="2413"> <p data-start="2385" data-end="2413">Online ISSN: 2820-2147</p> </li> <li data-start="2414" data-end="2443"> <p data-start="2416" data-end="2443">Print ISSN: 2820-2139</p> </li> </ul> <p data-start="2445" data-end="2480"><strong data-start="2445" data-end="2478">What makes IJRC future-ready?</strong></p> <ul data-start="2481" data-end="2836"> <li data-start="2481" data-end="2556"> <p data-start="2483" data-end="2556">Zero-click and Answer Engine Optimization for AI and search engines</p> </li> <li data-start="2557" data-end="2619"> <p data-start="2559" data-end="2619">SEO-optimized site structure for quick discoverability</p> </li> <li data-start="2620" data-end="2689"> <p data-start="2622" data-end="2689">Automatic latest articles section for immediate public access</p> </li> <li data-start="2690" data-end="2761"> <p data-start="2692" data-end="2761">Adoption of latest publishing techniques for faster publication</p> </li> <li data-start="2762" data-end="2836"> <p data-start="2764" data-end="2836">Promotion of open, transparent, and sustainable research practices</p> </li> </ul> <p><strong>How does IJRC support authors?</strong></p> <p>IJRC warmly supports authors throughout the publication journey. The journal prioritizes the novelty and scientific contribution of each submission, while also helping authors with drafting, formatting, and preparing manuscripts to meet journal and AEO-ready standards. Authors can directly contact the Editor-in-Chief or the academic staff of the Faculty of Computing for guidance and counselling on writing and publishing. All of these services are provided free of charge, reflecting IJRC’s commitment as a state university journal to provide an easy and supportive platform for sharing valuable research.</p>https://www.ijrcom.org/index.php/ijrc/article/view/200Technological Innovations and Their Impact on Alumni Engagement and Relationship Management in Higher Education2026-01-06T01:59:54+00:00Jagdeep Sharmasharmajagdeep001@gmail.com B.S. Bhatiabsbhatia29@hotmail.comSantosh Balibali.santosh7@gmail.com<p>The evolving digital ecosystem in higher education institutions (HEIs) has positioned alumni as critical stakeholders in institutional development, mentoring, and academic community building. Despite the growing adoption of digital platforms, empirical evidence on technology-mediated alumni engagement - particularly in the context of Indian HEIs – remains limited, creating a gap in understanding effective digital engagement strategies. This study aims to examine the role of technology-enabled alumni engagement practices in HEIs of Punjab, India, by analysing the relationship between demographic characteristics, digital interaction patterns, and perceived usefulness of technological tools in strengthening alumni–institution relationships. A mixed-method research design was employed, integrating quantitative survey data collected from 60 alumni across multiple HEIs with qualitative insights from two institutional representatives. Quantitative analysis involved descriptive statistics, Chi-square tests, and correlation analysis to evaluate associations among demographic variables, online engagement frequency, and satisfaction with digital tools. Qualitative data were used to contextualize and interpret institutional perspectives. Findings indicate that over 80% of alumni prefer digitally supported engagement mechanisms, with LinkedIn and WhatsApp emerging as the most utilized platforms. Chi-square analysis reveals significant associations between alumni participation and year of graduation, program type, and campus placement history. Correlation results demonstrate a positive relationship between frequency of digital interaction and satisfaction with engagement initiatives. Qualitative evidence highlights strong appreciation for mentorship programs, online seminars, and professional networking, while identifying incomplete alumni databases and limited institutional support as key challenges. The study underscores the strategic importance of digital technologies in enhancing alumni affiliation, professional networking, and intergenerational collaboration. It recommends integrated digital engagement systems, continuous data updating, and personalized communication strategies to foster long-term alumni loyalty and mutually beneficial institutional relationships.</p>2026-01-14T00:00:00+00:00Copyright (c) 2026 Jagdeep Sharma, BS Bhatia, Santosh Balihttps://www.ijrcom.org/index.php/ijrc/article/view/160Underwater Waste Detection Using Deep Learning: A Performance Comparison of YOLOv7–10 and Faster R-CNN2025-10-16T01:54:27+00:00Malithimnawarathne20@gmail.comHMNS Kumarinadeeshabandara20@gmail.comHMLS Kumarilihinisangeetha99@gmail.com<p>Underwater pollution is one of today’s most significant environmental concerns, with vast volumes of garbage found in seas, rivers, and landscapes around the world. Accurate detection of these waste materials is crucial for successful waste management, environmental monitoring, and mitigation strategies. In this study, we investigated the performance of five cutting-edge object recognition algorithms, namely YOLO (You Only Look Once) models, including YOLOv7, YOLOv8, YOLOv9, YOLOv10, and Faster Region-Convolutional Neural Network (R-CNN), to identify which model was most effective at recognizing materials in underwater situations. The models were thoroughly trained and tested on a large dataset containing fifteen different classes under diverse conditions, such as low visibility and variable depths. From the above-mentioned models, YOLOv8 outperformed the others, with a mean Average Precision (mAP) of 80.9%, indicating a significant performance. This increased performance is attributed to YOLOv8’s architecture, which incorporates advanced features such as improved anchor-free mechanisms and self-supervised learning, allowing for more precise and efficient recognition of items in a variety of settings. These findings highlight the YOLOv8 model’s potential as an effective tool in the global fight against pollution, improving both the detection capabilities and scalability of underwater cleanup operations that will also aid environmental AI specialists and interested parties.</p>2026-01-14T00:00:00+00:00Copyright (c) 2026 UMMPK Nawarathne, HMNS Kumari, HMLS Kumarihttps://www.ijrcom.org/index.php/ijrc/article/view/179Enhancing E-Commerce Recommendation Systems Using Big Data Analytics by Analyzing Customer Engagement Factors2025-12-27T01:18:40+00:00Gayantha Dilshangayanthadilshan@gmail.comU.C. Wickramarathnechamouchirawick99@gmail.comM.G. Jayawickramaminushikaj.918@gmail.comSurani S. Tisserasurani@sci.sjp.ac.lk<p>ABSTRACT - This research explores the enhancement of e-commerce recommendation systems through Big Data analytics with a particular focus on understanding and leveraging customer engagement factors. The study aimed to identify the key drivers of consumer interaction, assess the impact of integrating Big Data analytics and develop a predictive model to improve the accuracy and relevance of personalized recommendations. A mixed-methods approach was employed, combining quantitative analysis of digital behavioral data with qualitative insights gathered through surveys. This integration enabled the development and robust validation of a Big Data-driven predictive model for personalized e-commerce recommendations. The findings show that combining digital behavioral data with consumer perceptions significantly enhances predictive accuracy as evidenced by improved error metrics (MAE, RMSE), higher explanatory power (R<sup>2</sup>) and stronger classification outcomes (precision, recall, AUC-ROC). Click frequency, session duration and perceived recommendation accuracy emerged as key predictors of engagement while data triangulation confirmed the model’s reliability. In conclusion, this study demonstrates the value of Big Data-driven personalization in e-commerce, offering practical benefits such as user engagement, marketing efficiency and conversion rates. Academically, it advances knowledge on predictive modeling and recommendation systems, underscoring the effectiveness of mixed methods and advanced analytics. Future research should examine refinements and the long-term impact of dynamic personalization strategies.</p> <p> </p> <p>INDEX TERMS - Big Data Analytics, Customer Engagement, E-Commerce Recommendation Systems, Personalization, Predictive Modeling </p>2026-01-14T00:00:00+00:00Copyright (c) 2026 G Dilshan, UC Wickramarathne, MG Jayawickrama, SS Tisserahttps://www.ijrcom.org/index.php/ijrc/article/view/192Computational Knightian Uncertainty: Undecidability and the Limits of Cyber Risk Quantification in Software-Intensive Firms2025-12-27T01:23:42+00:00Michel Nguyenmichel_ng@icloud.com<p>Frank Knight’s distinction between measurable risk and unmeasurable uncertainty is central in economics and finance. Contemporary practice often collapses uncertainty into risk by assuming that all material hazards can, in principle, be quantified given sufficient data and computation. This assumption breaks down when the asset in question is large-scale software. This paper argues that undecidability in computability theory, as exemplified by Turing’s halting problem and Rice’s theorem, creates a structural form of uncertainty for software-intensive firms that cannot be reduced to standard probabilistic risk. Many security, safety, and compliance properties of interest to insurers, acquirers, and regulators are non-trivial semantic properties of programs and therefore undecidable in general, even under idealized conditions of perfect code visibility and unlimited classical computation. We call the resulting residual uncertainty computational Knightian uncertainty (CKU): a component of uncertainty that persists even if all observable information is known and arbitrarily robust classical computation is available. We introduce structural opacity the extent to which a codebase resists compression into a small set of regular patterns under a chosen description language [3] and explore approximate Kolmogorov complexity (KC) of codebases as one proxy for this opacity. We develop a conceptual model that links undecidability, structural opacity, and observable outcomes, including cyber incident severity, cyber insurance loss experience, and merger and acquisition (M&A) valuation discounts. In this model, KC and related metrics act as structural covariates that may correlate with CKU, rather than as direct risk measures. Two small synthetic simulations illustrate the empirical logic: first, a crude gzip-based compressibility index sharply separates highly regular from highly irregular synthetic code; second, a KC-like covariate is recoverable in regression when it truly affects incident severity and does not appear systematically when it does not. Our theoretical commitment is modest: computability results guarantee that CKU is non-zero for sufficiently expressive systems. The further claims that CKU is economically material in large, structurally opaque codebases and that structural metrics provide usable proxies are empirical hypotheses to be argued and tested, not consequences of undecidability alone.</p>2026-01-14T00:00:00+00:00Copyright (c) 2026 Michel Nguyenhttps://www.ijrcom.org/index.php/ijrc/article/view/163An Unsupervised Machine Learning Approach for Dynamic Anomaly Detection and Risk Defense in Cloud Servers2025-11-05T12:59:55+00:00N.W. Chanaka Lasanthachanaka.lasantha@gmail.comPasan Madurangapasanm@sjp.ac.lkRuvan Abeysekaracontactruvan@gmail.comSabyasachi Bhattacharyyasabya005@gmail.com<p>This paper presents a hybrid unsupervised machine learning model for real-time anomaly detection and dynamic risk defence in the cloud environment. Traditional security mechanisms such as Intrusion Detection Systems (IDS) and fixed firewall rules are often not sufficient to deal with the emerging threats in cloud computing, especially zero-day exploits and polymorphic malware that evade signature-based detection. The proposed system combines Isolation Forest (IF), Local Outlier Factor (LOF) and Density Based Spatial Clustering of Applications with Noise (DBSCAN) to identify both point and cluster anomalies from unlabelled cloud traffic. Integration with AWS Web Application Firewall (WAF) allows it to update its rules automatically and independently mitigate the threats detected. The model was trained and validated on 2.3 million AWS EC2 traffic records, in addition to the CICIDS2017 dataset which was split into a 70-30 training-validation split. The computation environment consisted of AWS EC2 t2.xlarge (4vCPUs, 16GB RAM) instances of Python 3.8, scikit-learn 0.24.2, MongoDB 4.4, and TensorFlow 2.6. Experiments showed a detection accuracy of 92 per cent with a false positive rate of four per cent. The comparative analysis demonstrated better adaptability and less manual intervention in comparison to traditional IDS (Snort, Suricata: 88 -90% accuracy, 7-9% false positives) and standalone ML models (IF: 87-90% accuracy, LOF: 86 -90% accuracy, DBSCAN: 84 -90% accuracy). The system was able to detect and block port scanning, DDoS, brute-force and data exfiltration patterns in real time with latency of less than 50ms. The reduction of false-positive by 43-56% led to 150-200 alerts per day being reduced in enterprise settings. The hybrid unsupervised model makes the cloud more resilient with adaptive defence without the need for labelled data. Removing manual firewall updates will save 15-20 hours per week for security teams. Future directions are encrypted traffic analysis based on metadata-based behavioural profiling, largescale distributed data processing (10M+ requests/minute), and multi-cloud integration between AWS, Azure, and GCP.</p>2026-01-14T00:00:00+00:00Copyright (c) 2026 NW Chanaka Lasantha, MWP Maduranga, Ruvan Abesekara, Sabyasachi Bhattacharyya