Publish with Us

Computing&AI Connect

Moussa Ayyash
Editor-in-Chief

Moussa Ayyash
Editor-in-Chief

View Profile

Computing&AI Connect is a peer-reviewed, open-access journal committed to fostering advancements and innovation in computing sciences and technologies, and artificial intelligence (AI). The journal encompasses a wide spectrum of topics including Computing Paradigms, Artificial Intelligence, Interdisciplinary Applications, Human-Computer Interaction, Data Science and Analytics, Emerging Technologies, Cloud Computing and Virtualization, Intelligent and Smart Systems, Educational Initiatives, Industry Trends, Open Challenges, and Future Directions. 

Volumes 3
Articles 34
Volume: 3, 2026

Insights

45 Days

Time to First Peer Review Decision

87 Days

Time to Final Acceptance

2 Days

Acceptance to First Online


Recent Articles

open-access Research Article

Available Online: 14 Apr 2026

Attention-Based LSTM for Sign Language Recognition Leveraging Spatial-Temporal Keypoint

Volume 3

open-access Research Article

Available Online: 03 Apr 2026

A Comparative Evaluation of Imputation Techniques for Missing Data: A Simulation-Based Analysis

Volume 3

Missing data frequently occur in research and if not properly addressed before analysis, can adversely affect the validity of findings. This article evaluates the efficiency of various imputation techniques as formal methods for replacing missing covariates’ data. Root Mean Squared Error (RMSE) were calculated for each missing data under mechanisms of MCAR and MAR to ascertain the method of imputation..

open-access Perspective

Available Online: 28 Jan 2026

Fine-tuning vs RAG: A Position Paper from the Perspective of LLM-based Cybersecurity Modeling

Volume 3

Large Language Models (LLMs) have revolutionized Natural Language Processing (NLP) tasks, enabling critical capabilities in fields such as business and finance with their cybersecurity analysis. In particular, LLMs are becoming vital in cybersecurity in providing more accurate solutions to different types of threats, vulnerabilities, and security challenges through pattern recognition, intelligent response generation, and automating threat detection. Although LLMs are..