Volume 22 - Issue 3 (March 2025)
Cybersecurity in Namibia: Challenges, strategies and prospects
Article DOI: 10.30574/gjeta.2025.22.3.0048DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0048
View AbstractRansomware trends and mitigation strategies: A comprehensive review
Article DOI: 10.30574/gjeta.2025.22.3.0038DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0038
View AbstractThe contribution of emerging technologies to E-learning: The metaverse as a pedagogical revolution
Article DOI: 10.30574/gjeta.2025.22.3.0036DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0036
View AbstractMulti-agent systems and online learning environments
Article DOI: 10.30574/gjeta.2025.22.3.0030DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0030
View AbstractAn orderly charging optimization method for electric vehicles based on user demand response
Article DOI: 10.30574/gjeta.2025.22.3.0033DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0033
View AbstractAI-Assisted 3D reconstruction of Organs from MRI and CT Data
Article DOI: 10.30574/gjeta.2025.22.3.0039DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0039
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0050
View AbstractDevelopment of Aluminium smelting furnace for recycling and recovery of Aluminium from waste
Article DOI: 10.30574/gjeta.2025.22.3.0023DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0023
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0053
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0046
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0056
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0055
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0051
View AbstractOptimising the gas-oil ratio for enhanced production
Article DOI: 10.30574/gjeta.2025.22.3.0052DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0052
View AbstractConsidering the spatiotemporal optimal scheduling strategy of electric vehicles entering the network
Article DOI: 10.30574/gjeta.2025.22.3.0066DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0066
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0070
View AbstractEfficient malware detection in software systems using handcrafted features, Bi-GRUs, and VAEs
Article DOI: 10.30574/gjeta.2025.22.3.0060DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0060
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0059
View AbstractIot-based smart agricultural watering robot using fuzzy-PID hybrid control
Article DOI: 10.30574/gjeta.2025.22.3.0062DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0062
View AbstractSmart contract vulnerability in DeFi: Assessing security risk in blockchain-based lending platforms
Article DOI: 10.30574/gjeta.2025.22.3.0064DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0064
View AbstractPlant derived Starch for the Production of Biodegradable Plastic
Article DOI: 10.30574/gjeta.2025.22.3.0058DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0058
View AbstractApplications of 3D printing technology and limitations-An update
Article DOI: 10.30574/gjeta.2025.22.3.0069DOI url: https://doi.org/10.30574/gjeta.2025.22.3.0069
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0072
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0065
View AbstractDOI url: https://doi.org/10.30574/gjeta.2025.22.3.0071
View Abstract