Computational Methods

ISSN (online): 3048-7447

Register Login

Open access International Journal

Computational Methods is an open access and peer-reviewed journal, published by Jagua Publication.

Journal Poster

Computational Methods (ISSN: 3048-7447) is an international open access journal of computational science and engineering. It publishes surveys papers, regular research papers and brief communications. Consequently, there's no confinement on the length of the papers.

Year Started: 2024
Frequency: Two issues per year (August and December)
Next Issue: December 2025
Language: English
Subject: Multidisciplinary Subjects
Review Process: Peer review
Any queries: cm@jpub.org


LATEST ARTICLES

Research Article

Blockchain-based supply chain management system

  • By Mfoniso Ukpabio, Philip Asuquo, Emmanuel Udoiwod, Bliss Utibe-Abasi Stephen - 25 Apr 2026
  • Computational Methods, Volume : 3 (2026), Issue: 1 (January-June), Pages: 37 - 47
  • https://doi.org/10.58614/cm315
  • Received: 23.02.2026; Accepted: 15.04.2026; Published: 25.04.2026
Abstract:  

Supply chain is an integral part of transaction and business in human society, this study introduces a blockchain-based supply chain management system designed to be secured, transparent, efficient, and adaptable between industries, henc Read more

Research Article

Smart Building Strategies for Seamless IoT Integration without Structural Remodelling: A Case Study on Dakkada Tower, Uyo, Nigeria

  • By Jewel Omon, Philip Asuquo, Imoh Enang, Michael Okon, Aniefiok Samson, Bliss Stephen - 25 Apr 2026
  • Computational Methods, Volume : 3 (2026), Issue: 1 (January-June), Pages: 26 - 36
  • https://doi.org/10.58614/cm314
  • Received: 23.01.2026; Accepted: 18.04.2026; Published: 25.04.2026
Abstract:  

This study explores ways to integrate Internet of Things (IoT) solutions into existing structures without undergoing structural renovation, using Nigeria’s Dakkada Tower as a case study. Retrofit feasibility was evaluated using a m Read more

Research Article

Height and Fixed Points in m-Topological Transformation Semigroup Spaces

  • By Shafii Abdulkadir Alhassan, Musa Bawa, Chinwendu Jacinta Okigbo, Hannah Ogijo - 21 Mar 2026
  • Computational Methods, Volume : 3 (2026), Issue: 1 (January-June), Pages: 18 - 25
  • https://doi.org/10.58614/cm313
  • Received: 26.02.2026; Accepted: 15.03.2026; Published: 21.03.2026
Abstract:  

We investigate two enumerative invariants in three m-topological transformation semigroup spaces associated with full finite transformations, namely MTn , MCTn and Clp(MCTn ). The first invariant is the height distribution, which classifies elemen Read more

Research Article

A comprehensive analysis on the implementation of Multifactor Authentication for online banking systems in Nigeria

  • By Samuel Okure, Israel Umana, Ofonime Okon Dominic, Emmanuel Udoiwod, Florence Atakpo, Bliss Utibe-Abasi Stephen - 21 Mar 2026
  • Computational Methods, Volume : 3 (2026), Issue: 1 (January-June), Pages: 8 - 17
  • https://doi.org/10.58614/cm312
  • Received: 23.01.2026; Accepted: 15.03.2026; Published: 21.03.2026
Abstract:  

Nigeria’s banking sector has grown rapidly through digital transformation, but this growth has also brought more cybersecurity threats. Because of this, multifactor authentication (MFA) has become an essential layer of protection. This Read more

Research Article

Extended Evaluation of Cybersecurity Tools

  • By Godsproof Kindness, Philip Asuquo, Israel Sylvester Umana, Uwakmfonabasi Ette, Godwin Chukwukaeze, Egbaji Wiseman Ike-Ochowo, Bliss Utibe-Abasi Stephen - 11 Jan 2026
  • Computational Methods, Volume : 3 (2026), Issue: 1 (January-June), Pages: 1 - 7
  • https://doi.org/10.58614/cm311
  • Received: 1.12.2025; Accepted: 02.01.2026; Published: 11.01.2026
Abstract:  

This research evaluates five cybersecurity tools: NMAP, Wireshark, Nessus, Metasploit, and John the Ripper, using controlled testbed environments and simulated enterprise networks to address the need for improved assessment methodologies. Wit Read more

Research Article

A Proof-of-Concept Architecture for A Blockchain-Based Electoral System for Nigeria

  • By Uwakmfonabasi Ette, Israel Sylvester Umana, Bliss Utibe-Abasi Stephen, Philip Asuquo, Godwin Chukwukaeze, Egbaji Wiseman Ike-Ochowo - 17 Dec 2025
  • Computational Methods, Volume : 2 (2025), Issue: 2 (December), Pages: 13 - 22
  • https://doi.org/10.58614/cm223
  • Received: 30.10.2025; Accepted: 12.12.2025; Published: 17.12.2025
Abstract:  

Background of the study: Nigeria’s electoral process has faced systemic ailments like voter intimidation, stuffing of ballot boxes, results alteration, and collation delays leading to a massive decline in voter turnout over the years.&n Read more

Research Article

Nonlinear Nonparametric Uncertain Autoregressive Time Series Model

  • By Mengqin Tian, Yuanguo Zhu - 10 Dec 2025
  • Computational Methods, Volume : 2 (2025), Issue: 2 (December), Pages: 7 - 12
  • https://doi.org/10.58614/cm222
  • Received: 10.11.2025; Accepted: 01.12.2025; Published: 10.12.2025
Abstract:  

Uncertain time series analysis provides a framework for modeling data shaped by human belief and cognitive limitations rather than randomness. However, existing models are largely parametric and assume uncertain normal residuals, which often Read more

Research Article

The equation of order 6 of the NLS hierarchy

  • By Pierre Gaillard - 07 Nov 2025
  • Computational Methods, Volume : 2 (2025), Issue: 2 (December), Pages: 1 - 6
  • https://doi.org/10.58614/cm221
  • Received: 01.10.2025; Accepted: 25.10.2025; Published: 07.11.2025
Abstract:  

The equation of order 6 of the NLS hierarchy is considered and particular solutions are given. Explicit expressions of these solutions are constructed for the first orders depending on multi-parameters. We study patterns of these solutio Read more

Research Article

Fundamental IoT Network and Framework-Based Intrusion Detection

  • By A. Gowtham, V. Manudeep, K.S Divya - 30 Aug 2025
  • Computational Methods, Volume : 2 (2025), Issue: 1 (August), Pages: 38 - 42
  • https://doi.org/10.58614/cm215
  • Received: 01.08.2025; Accepted: 21.08.2025; Published: 30.08.2025
Abstract:  

Protecting Internet of Things (IoT) environments from intrusions is essential in today’s digitally linked society. A novel machine learning framework for intrusion detection in Internet of Things systems is presented in this study. By u Read more

Research Article

Region-Based Isolation and Enhanced CNN Architectures for Pneumonia Detection and Severity Classification in Chest X-Rays

  • By Kandyala Yaswanth Sai, Chinta Swathi, Chakali Yeswanth Kumar, Veliginti Vedavyas - 30 Aug 2025
  • Computational Methods, Volume : 2 (2025), Issue: 1 (August), Pages: 29 - 37
  • https://doi.org/10.58614/cm214
  • Received: 01.08.2025; Accepted: 25.08.2025; Published: 30.08.2025
Abstract:  

Globally, pneumonia is still a major health concern, particularly in areas with poor diagnostic facilities. This paper compares two CNN architectures, ConvXNet and a CustomCNN, for deep learning-based pneumonia identification using chest X-ra Read more