International Journal of Research in Computing
https://ijrcom.org/index.php/ijrc
<p data-start="352" data-end="739"><strong data-start="352" data-end="422">What is the International Journal of Research in Computing (IJRC)?</strong><br data-start="422" data-end="425" />The <em data-start="217" data-end="272">International Journal of Research in Computing (IJRC)</em> is a peer-reviewed, open-access journal published by the Faculty of Computing, General Sir John Kotelawala Defence University. IJRC follows COPE standards and employs AI-enabled publishing to ensure fast, high-quality dissemination of research. The journal follows a Diamond Open Access model, meaning publication is free for both authors and readers.</p> <p data-start="741" data-end="856"><strong data-start="741" data-end="775">What does the journal publish?</strong><br data-start="775" data-end="778" />IJRC publishes original research in all computing-related fields, including:</p> <ul data-start="857" data-end="987"> <li data-start="857" data-end="877"> <p data-start="859" data-end="877">Computer Science</p> </li> <li data-start="878" data-end="902"> <p data-start="880" data-end="902">Computer Engineering</p> </li> <li data-start="903" data-end="927"> <p data-start="905" data-end="927">Software Engineering</p> </li> <li data-start="928" data-end="957"> <p data-start="930" data-end="957">Information Systems & ICT</p> </li> <li data-start="958" data-end="987"> <p data-start="960" data-end="987">Computational Mathematics</p> </li> <li data-start="958" data-end="987"> <p data-start="960" data-end="987">Practical and transdisciplinary research, where authors integrate computing components into other fields. This includes innovations in engineering, sciences, healthcare, business, social sciences, and other areas where computing plays a key role in research outcomes.</p> </li> </ul> <p data-start="1296" data-end="1514"><strong data-start="1296" data-end="1317">Submission Format</strong><br data-start="1317" data-end="1320" />IJRC supports free-format submission: manuscripts can be prepared in a single-column layout using standard MS Word heading styles, making submission simple and author-friendly.</p> <p data-start="1516" data-end="1702"><strong data-start="1516" data-end="1544">Who can publish in IJRC?</strong><br data-start="1544" data-end="1547" />The journal welcomes submissions from scholars worldwide, including research presented at the International Research Conferences, provided that conference papers incorporate feedback received during the conference and implement suggested future work that demonstrates high research value in their final submission to the journal</p> <p data-start="1704" data-end="2040"><strong data-start="1704" data-end="1740">How is research quality ensured?</strong><br data-start="1740" data-end="1743" />All papers undergo double-blind peer review, and submissions follow FAIR principles for data management and Transparency and Openness Promotion (TOP) Guidelines. Each research article is also aligned with the United Nations Sustainable Development Goals (SDGs) wherever relevant.</p> <p data-start="2042" data-end="2182"><strong data-start="2042" data-end="2081">How often is the journal published?</strong><br data-start="2081" data-end="2084" />IJRC publishes two open-access issues per year, ensuring rapid visibility and accessibility.</p> <p data-start="2184" data-end="2341"><strong data-start="2184" data-end="2237">Does IJRC charge an Article Processing Fee (APC)?</strong><br data-start="2237" data-end="2240" />No. IJRC follows Diamond Open Access, meaning publication is free for both authors and readers.</p> <p data-start="2343" data-end="2382"><strong data-start="2343" data-end="2380">What are the journal identifiers?</strong></p> <ul data-start="2383" data-end="2443"> <li data-start="2383" data-end="2413"> <p data-start="2385" data-end="2413">Online ISSN: 2820-2147</p> </li> <li data-start="2414" data-end="2443"> <p data-start="2416" data-end="2443">Print ISSN: 2820-2139</p> </li> </ul> <p data-start="2445" data-end="2480"><strong data-start="2445" data-end="2478">What makes IJRC future-ready?</strong></p> <ul data-start="2481" data-end="2836"> <li data-start="2481" data-end="2556"> <p data-start="2483" data-end="2556">Zero-click and Answer Engine Optimization for AI and search engines</p> </li> <li data-start="2557" data-end="2619"> <p data-start="2559" data-end="2619">SEO-optimized site structure for quick discoverability</p> </li> <li data-start="2620" data-end="2689"> <p data-start="2622" data-end="2689">Automatic latest articles section for immediate public access</p> </li> <li data-start="2690" data-end="2761"> <p data-start="2692" data-end="2761">Adoption of latest publishing techniques for faster publication</p> </li> <li data-start="2762" data-end="2836"> <p data-start="2764" data-end="2836">Promotion of open, transparent, and sustainable research practices</p> </li> </ul> <p><strong>How does IJRC support authors?</strong></p> <p>IJRC warmly supports authors throughout the publication journey. The journal prioritizes the novelty and scientific contribution of each submission, while also helping authors with drafting, formatting, and preparing manuscripts to meet journal and AEO-ready standards. Authors can directly contact the Editor-in-Chief or the academic staff of the Faculty of Computing for guidance and counselling on writing and publishing. All of these services are provided free of charge, reflecting IJRC’s commitment as a state university journal to provide an easy and supportive platform for sharing valuable research.</p>Faculty of Computing, General Sir John Kotelawala Defence Universityen-USInternational Journal of Research in Computing 2820-2139<h2 id="copyright-licensing-and-intellectual-property-poli" class="mb-2 mt-6 text-base font-[500] first:mt-0 md:text-lg dark:font-[475] [hr+&]:mt-4">Copyright, Licensing, and Intellectual Property Policy</h2> <p class="my-0"><strong>1. Copyright and Author Rights</strong><br />Authors retain full copyright of their work upon submission. By submitting a manuscript to IJRC, authors grant the journal an <em>exclusive license</em> to publish, distribute, and disseminate the work worldwide in all current and future media formats—including print and electronic—once the manuscript is accepted for publication. This license covers the first publication and ongoing availability of the article.</p> <p class="my-0"><strong>2. Exclusive Submission and Peer Review Rights</strong><br />Manuscripts must be original, unpublished, and not under consideration elsewhere during the peer review process. Submission to IJRC grants the journal exclusive consideration rights throughout the review. Simultaneous submissions to other journals or venues are strictly prohibited.</p> <p class="my-0">Once the peer review process has formally commenced, authors may not withdraw their manuscript except under very exceptional and compelling circumstances approved by the editorial office. Withdrawal requests made after peer review starts may incur penalties or restrictions, as such withdrawal adversely affects editorial procedures and reviewer efforts.</p> <p class="my-0">Upon rejection or permitted withdrawal (only before peer review begins), all publication rights fully and immediately revert to the author without restrictions.</p> <p class="my-0"><strong>3. Open Access Publishing and Licensing</strong><br />IJRC operates under the <strong>Diamond Open Access</strong> model: all published articles are freely accessible to readers worldwide immediately upon publication without any subscription or article processing charges (APCs) to authors.</p> <p class="my-0">Articles are published under the <strong>Creative Commons Attribution 4.0 International License (CC BY 4.0)</strong>. This license allows anyone to share, copy, distribute, and adapt the work—even for commercial purposes—as long as proper attribution is provided to the original author(s) and IJRC as the publisher. The full license details can be found here: <a class="break-word hover:text-super hover:decoration-super underline decoration-from-font underline-offset-1 transition-all duration-300" href="https://creativecommons.org/licenses/by/4.0/" target="_blank" rel="nofollow noopener">https://creativecommons.org/licenses/by/4.0/</a>.</p> <p class="my-0"><strong>4. Permissions for Third-Party Material</strong><br />Authors are responsible for obtaining all necessary permissions for any third-party material (e.g., figures, images, data, tables) included in their submission and for providing appropriate attribution. IJRC disclaims responsibility for unauthorized use of third-party content.</p> <p class="my-0"><strong>5. Licensing Terms and Publication Agreement</strong><br />Submission of a manuscript constitutes a binding agreement granting IJRC the necessary publishing rights as described above. No separate copyright transfer or license signing is routinely required unless specifically requested after acceptance. Licensing terms are clearly indicated on each published article in all formats (HTML, PDF).</p> <p class="my-0"><strong>6. Compliance with COPE Principles</strong><br />This policy complies fully with the Committee on Publication Ethics (COPE) Core Practices concerning intellectual property, ensuring transparency, fairness, and respect for authors’ rights. IJRC regularly reviews these policies to uphold international best practices.</p> <p class="my-0"><strong>7. Authors’ Responsibilities</strong><br />Authors must ensure the originality and ethical integrity of their work, properly cite all sources, secure permissions for third-party content, and adhere strictly to the licensing and submission policies stated here. Compliance with these responsibilities is mandatory for manuscript consideration and publication.</p> <p class="my-0"><strong>By submitting to IJRC, authors acknowledge and agree to abide by these terms, which support responsible research dissemination and uphold the principles of equitable open access publishing.</strong></p>Technological Innovations and Their Impact on Alumni Engagement and Relationship Management in Higher Education
https://ijrcom.org/index.php/ijrc/article/view/200
<p>The evolving digital ecosystem in higher education institutions (HEIs) has positioned alumni as critical stakeholders in institutional development, mentoring, and academic community building. Despite the growing adoption of digital platforms, empirical evidence on technology-mediated alumni engagement - particularly in the context of Indian HEIs – remains limited, creating a gap in understanding effective digital engagement strategies. This study aims to examine the role of technology-enabled alumni engagement practices in HEIs of Punjab, India, by analysing the relationship between demographic characteristics, digital interaction patterns, and perceived usefulness of technological tools in strengthening alumni–institution relationships. A mixed-method research design was employed, integrating quantitative survey data collected from 60 alumni across multiple HEIs with qualitative insights from two institutional representatives. Quantitative analysis involved descriptive statistics, Chi-square tests, and correlation analysis to evaluate associations among demographic variables, online engagement frequency, and satisfaction with digital tools. Qualitative data were used to contextualize and interpret institutional perspectives. Findings indicate that over 80% of alumni prefer digitally supported engagement mechanisms, with LinkedIn and WhatsApp emerging as the most utilized platforms. Chi-square analysis reveals significant associations between alumni participation and year of graduation, program type, and campus placement history. Correlation results demonstrate a positive relationship between frequency of digital interaction and satisfaction with engagement initiatives. Qualitative evidence highlights strong appreciation for mentorship programs, online seminars, and professional networking, while identifying incomplete alumni databases and limited institutional support as key challenges. The study underscores the strategic importance of digital technologies in enhancing alumni affiliation, professional networking, and intergenerational collaboration. It recommends integrated digital engagement systems, continuous data updating, and personalized communication strategies to foster long-term alumni loyalty and mutually beneficial institutional relationships.</p>Jagdeep Sharma B.S. BhatiaSantosh Bali
Copyright (c) 2026 Jagdeep Sharma, BS Bhatia, Santosh Bali
https://creativecommons.org/licenses/by/4.0
2026-01-142026-01-145I5773Underwater Waste Detection Using Deep Learning: A Performance Comparison of YOLOv7–10 and Faster R-CNN
https://ijrcom.org/index.php/ijrc/article/view/160
<p>Underwater pollution is one of today’s most significant environmental concerns, with vast volumes of garbage found in seas, rivers, and landscapes around the world. Accurate detection of these waste materials is crucial for successful waste management, environmental monitoring, and mitigation strategies. In this study, we investigated the performance of five cutting-edge object recognition algorithms, namely YOLO (You Only Look Once) models, including YOLOv7, YOLOv8, YOLOv9, YOLOv10, and Faster Region-Convolutional Neural Network (R-CNN), to identify which model was most effective at recognizing materials in underwater situations. The models were thoroughly trained and tested on a large dataset containing fifteen different classes under diverse conditions, such as low visibility and variable depths. From the above-mentioned models, YOLOv8 outperformed the others, with a mean Average Precision (mAP) of 80.9%, indicating a significant performance. This increased performance is attributed to YOLOv8’s architecture, which incorporates advanced features such as improved anchor-free mechanisms and self-supervised learning, allowing for more precise and efficient recognition of items in a variety of settings. These findings highlight the YOLOv8 model’s potential as an effective tool in the global fight against pollution, improving both the detection capabilities and scalability of underwater cleanup operations that will also aid environmental AI specialists and interested parties.</p>MalithiHMNS KumariHMLS Kumari
Copyright (c) 2026 UMMPK Nawarathne, HMNS Kumari, HMLS Kumari
https://creativecommons.org/licenses/by/4.0
2026-01-142026-01-145I0113Enhancing E-Commerce Recommendation Systems Using Big Data Analytics by Analyzing Customer Engagement Factors
https://ijrcom.org/index.php/ijrc/article/view/179
<p>ABSTRACT - This research explores the enhancement of e-commerce recommendation systems through Big Data analytics with a particular focus on understanding and leveraging customer engagement factors. The study aimed to identify the key drivers of consumer interaction, assess the impact of integrating Big Data analytics and develop a predictive model to improve the accuracy and relevance of personalized recommendations. A mixed-methods approach was employed, combining quantitative analysis of digital behavioral data with qualitative insights gathered through surveys. This integration enabled the development and robust validation of a Big Data-driven predictive model for personalized e-commerce recommendations. The findings show that combining digital behavioral data with consumer perceptions significantly enhances predictive accuracy as evidenced by improved error metrics (MAE, RMSE), higher explanatory power (R<sup>2</sup>) and stronger classification outcomes (precision, recall, AUC-ROC). Click frequency, session duration and perceived recommendation accuracy emerged as key predictors of engagement while data triangulation confirmed the model’s reliability. In conclusion, this study demonstrates the value of Big Data-driven personalization in e-commerce, offering practical benefits such as user engagement, marketing efficiency and conversion rates. Academically, it advances knowledge on predictive modeling and recommendation systems, underscoring the effectiveness of mixed methods and advanced analytics. Future research should examine refinements and the long-term impact of dynamic personalization strategies.</p> <p> </p> <p>INDEX TERMS - Big Data Analytics, Customer Engagement, E-Commerce Recommendation Systems, Personalization, Predictive Modeling </p>Gayantha DilshanU.C. WickramarathneM.G. JayawickramaSurani S. Tissera
Copyright (c) 2026 G Dilshan, UC Wickramarathne, MG Jayawickrama, SS Tissera
https://creativecommons.org/licenses/by/4.0
2026-01-142026-01-145I7491Computational Knightian Uncertainty: Undecidability and the Limits of Cyber Risk Quantification in Software-Intensive Firms
https://ijrcom.org/index.php/ijrc/article/view/192
<p>Frank Knight’s distinction between measurable risk and unmeasurable uncertainty is central in economics and finance. Contemporary practice often collapses uncertainty into risk by assuming that all material hazards can, in principle, be quantified given sufficient data and computation. This assumption breaks down when the asset in question is large-scale software. This paper argues that undecidability in computability theory, as exemplified by Turing’s halting problem and Rice’s theorem, creates a structural form of uncertainty for software-intensive firms that cannot be reduced to standard probabilistic risk. Many security, safety, and compliance properties of interest to insurers, acquirers, and regulators are non-trivial semantic properties of programs and therefore undecidable in general, even under idealized conditions of perfect code visibility and unlimited classical computation. We call the resulting residual uncertainty computational Knightian uncertainty (CKU): a component of uncertainty that persists even if all observable information is known and arbitrarily robust classical computation is available. We introduce structural opacity the extent to which a codebase resists compression into a small set of regular patterns under a chosen description language [3] and explore approximate Kolmogorov complexity (KC) of codebases as one proxy for this opacity. We develop a conceptual model that links undecidability, structural opacity, and observable outcomes, including cyber incident severity, cyber insurance loss experience, and merger and acquisition (M&A) valuation discounts. In this model, KC and related metrics act as structural covariates that may correlate with CKU, rather than as direct risk measures. Two small synthetic simulations illustrate the empirical logic: first, a crude gzip-based compressibility index sharply separates highly regular from highly irregular synthetic code; second, a KC-like covariate is recoverable in regression when it truly affects incident severity and does not appear systematically when it does not. Our theoretical commitment is modest: computability results guarantee that CKU is non-zero for sufficiently expressive systems. The further claims that CKU is economically material in large, structurally opaque codebases and that structural metrics provide usable proxies are empirical hypotheses to be argued and tested, not consequences of undecidability alone.</p>Michel Nguyen
Copyright (c) 2026 Michel Nguyen
https://creativecommons.org/licenses/by/4.0/
2026-01-142026-01-145I4156An Unsupervised Machine Learning Approach for Dynamic Anomaly Detection and Risk Defense in Cloud Servers
https://ijrcom.org/index.php/ijrc/article/view/163
<p>This paper presents a hybrid unsupervised machine learning model for real-time anomaly detection and dynamic risk defence in the cloud environment. Traditional security mechanisms such as Intrusion Detection Systems (IDS) and fixed firewall rules are often not sufficient to deal with the emerging threats in cloud computing, especially zero-day exploits and polymorphic malware that evade signature-based detection. The proposed system combines Isolation Forest (IF), Local Outlier Factor (LOF) and Density Based Spatial Clustering of Applications with Noise (DBSCAN) to identify both point and cluster anomalies from unlabelled cloud traffic. Integration with AWS Web Application Firewall (WAF) allows it to update its rules automatically and independently mitigate the threats detected. The model was trained and validated on 2.3 million AWS EC2 traffic records, in addition to the CICIDS2017 dataset which was split into a 70-30 training-validation split. The computation environment consisted of AWS EC2 t2.xlarge (4vCPUs, 16GB RAM) instances of Python 3.8, scikit-learn 0.24.2, MongoDB 4.4, and TensorFlow 2.6. Experiments showed a detection accuracy of 92 per cent with a false positive rate of four per cent. The comparative analysis demonstrated better adaptability and less manual intervention in comparison to traditional IDS (Snort, Suricata: 88 -90% accuracy, 7-9% false positives) and standalone ML models (IF: 87-90% accuracy, LOF: 86 -90% accuracy, DBSCAN: 84 -90% accuracy). The system was able to detect and block port scanning, DDoS, brute-force and data exfiltration patterns in real time with latency of less than 50ms. The reduction of false-positive by 43-56% led to 150-200 alerts per day being reduced in enterprise settings. The hybrid unsupervised model makes the cloud more resilient with adaptive defence without the need for labelled data. Removing manual firewall updates will save 15-20 hours per week for security teams. Future directions are encrypted traffic analysis based on metadata-based behavioural profiling, largescale distributed data processing (10M+ requests/minute), and multi-cloud integration between AWS, Azure, and GCP.</p>N.W. Chanaka LasanthaPasan MadurangaRuvan AbeysekaraSabyasachi Bhattacharyya
Copyright (c) 2026 NW Chanaka Lasantha, MWP Maduranga, Ruvan Abesekara, Sabyasachi Bhattacharyya
https://creativecommons.org/licenses/by/4.0
2026-01-142026-01-145I1440