
The Iqra Journal of Engineering and Computing (IJEC) is a peer-reviewed, open-access journal published by the Faculty of Engineering Sciences and Technology at IQRA University. IJEC aims to be a leading bi-annual scientific publication that is freely accessible online, focusing on innovative research that addresses contemporary issues in engineering and computing.
The journal seeks to publish original research articles that span a broad spectrum of topics in engineering and computing, including but not limited to novel approaches, algorithms, applications, and theoretical advancements that contribute to societal development.
IJEC is committed to providing immediate open access to all accepted articles upon publication, ensuring that research is available to a global audience. Each published paper is licensed under Creative Commons and preserved in perpetuity on our platform.
The journal prioritizes high-quality academic rigor through a Double-Blind Peer Review process, ensuring that only original and impactful contributions are considered for publication. Submissions are welcomed from researchers worldwide, with a focus on studies that address real-world challenges through theoretical innovation and practical applications.
All manuscripts submitted to IJEC will undergo originality verification through an plagiarism checking tool.
Article Processing Charges: IJEC does not impose any article processing, editorial processing, or submission fees.
The editorial board expresses deep gratitude to the IQRA University for its unwavering support in sustaining the journal's operations.
The scope of a journal like this can cover a wide range of topics, including but not limited to:
Computer Science: Algorithms, Artificial Intelligence, Machine Learning, Data Science, and Cybersecurity.
Electrical and Electronics Engineering: Circuit design, communication systems, robotics, and embedded systems.
Software Engineering: Software development, programming languages, and software architecture.
Information Technology: Networking, databases, IT infrastructure, cloud computing, and IoT.
This selection covers a broad and relevant range of topics in the fields of software engineering, computer science, AI, cyber security, information security, and electrical engineering.
We encourage authors to refer to the Committee on Publication Ethics' International Standards for Authors and to review the publication ethics guidelines provided by COPE. Additionally, please consult the guidelines on good publication practices and the Code of Conduct established by the Committee on Publication Ethics (COPE).
The project is based on Google Map is formally known as Google Local, which is a Web mapping service application and technology provides by Google. The fundamental objective of this project is to plan an actual tour and to provide the best route and pictures of the place’s tourists are willing to visit. It includes the information about the places and snaps taken, but the people who had visited the places and they can also mark on Google maps. It will help other people to get information about places which they are planning their visit. Secondly, People will come to [...]
2025The natural language processing (NLP) sector re- quires sentiment analysis as its essential capability because deep learning advancements keep happening. Textual sentiment analysis capability allows automatic understanding of both positive and negative emotions found in movie titles which can help various industries perform better social media monitoring and marketing and customer feedback analysis. This paper investigates the implementation of a Bi-LSTM (Bidirectional Long Short-Term Memory) model that integrates GloVe (Global Vectors for Word Representation) embeddings as a solution for movie title sentiment classification. A Bi-LSTM model analyzes data sequences from start to end and back again which increases its ability [...]
2025The digital era has revolutionized the way we live, work, and interact, yet it has also exposed us to a new frontier of vulnerabilities. As the world becomes increasingly connected, the complexity and frequency of cyber threats have grown exponentially. Cybersecurity has emerged as a critical field, demanding innovative and adaptable solutions to protect sensitive data, safeguard infrastructure, and maintain trust in digital systems. Artificial Intelligence and Machine Learning (ML) stand at the forefront of this transformation, offering tools that are not only reactive but also predictive. Unlike traditional cybersecurity measures that often rely on predefined rules, AI and ML [...]
2025This study explores blockchain consensus algorithms, emphasizing their theoretical foundations, advancements, and security implications. It begins with an overview of key consensus mechanisms, including Proof of Work (PoW), Proof of Stake (PoS), and Byzantine Fault Tolerance, and examines their respective strengths and limitations. The study also investigates scalability and feasibility in real-world applications, highlighting innovations that enhance energy efficiency and fault tolerance. Furthermore, the research addresses potential vulnerabilities, such as Sybil attacks and centralization risks, proposing mitigation strategies to ensure robust network security. The findings contribute to the understanding and development of secure, efficient, and scalable blockchain systems, fostering innovation [...]
2025As we can see, different people are addicted to mobile and computer games nowadays and rejected the famous ancient games like chess. This paper depicts design and construction of smart electronic chess system using electronic circuits which change the playing ability of human chess game to a non-idealized behavior, it’s up to difficult mode. Chess Board environment and its searching methodology are given by to use of openly sourced chess game engine the "STOCK FISH ". It will be restructured by using python ide. When user play its move, the spawn’s original location and its current location are fed into [...]
2025