


default search action
International Journal of Computing, Volume 19
Volume 19, 2020
- El mehdi Cherrat, Rachid Alaoui, Hassane Bouzahir:

Score fusion of finger Vein and Face for Human Recognition based on Convolutional Neural Network Model. 11-19 - Avazjon R. Marakhimov, Kabul K. Khudaybergenov

:
Approach to the synthesis of Neural Network Structure during Classification. 20-26 - Oscar Karnalim, Gisela Kurniawati:

Programming Style on Source Code Plagiarism and Collusion Detection. 27-38 - Asya Stoyanova-Doycheva, Vanya Ivanova, Todorka Glushkova

, Stanimir Stoyanov, Irina Radeva:
Dynamic Generation of Cultural Routes in a Tourist Guide. 39-48 - Marcin Lawnik, Arkadiusz Banasik, Adrian Kapczynski:

Generation of Values from discrete Probability distributions with the Use of Chaotic Maps. 49-54 - Iryna Khomytska, Vasyl Teslyuk, Iryna Bazylevych, Inna Shylinska:

Approach for Minimization of phoneme Groups in Authorship Attribution. 55-62 - Maureen Nettie Linan, Bobby D. Gerardo, Ruji Medina:

Self-Organizing Map with Nguyen-Widrow Initialization Algorithm for groundwater Vulnerability Assessment. 63-69 - Sergei Anfilets, Sergei V. Bezobrazov, Vladimir A. Golovko, Anatoliy Sachenko, Myroslav Komar, Raman Dolny, Valery Kasyanik, Pavlo Bykovyy, Egor Mikhno, Oleksandr Osolinskyi:

Deep multilayer Neural Network for Predicting the Winner of Football Matches. 70-77 - Vijayalakshmi Anand, Chittaranjan Hota:

Motivation of Participants in Crowdsourcing Platforms using Intelligent Agents. 78-87 - Viktor V. Morozov, Olena V. Kalnichenko, Olga O. Mezentseva:

The method of Interaction Modeling on Basis of Deep Learning the Neural Networks in Complex IT-Projects. 88-96 - Ahmed Mohammed Hussein, Hadeel Qasem Gheni, Wed Kadhim Oleiwi, Zahraa Yaseen Hasan:

Prediction of credit Card Payment Next month through Tree Net Data Mining Techniques. 97-105 - Ahmed Sultan Alhegami, Hussein Alkhader Alsaeedi:

A Framework for Incremental Parallel Mining of Interesting Association Patterns for Big Data. 106-117 - Tatiana Batura

, Aigerim Bakiyeva, Maria Charintseva:
A method for Automatic Text Summarization based on Rhetorical Analysis and Topic Modeling. 118-127 - Svitlana Krepych, Iryna Spivak:

Model of Human weight correction based on interval Data Analysis. 128-136 - Rathish Radhakrishnan, Karpagavadivu Karuppusamy:

Cost Effective Energy Efficient Scheme for Mobile Adhoc Network. 137-146 - Giva Andriana Mutiara, Periyadi Periyadi, Andry Dupti Agnas, Velly Darma:

Smart Vest and Monitoring System for Airsoft Sport-Games using vibration Sensor. 173-180 - Markiyan Nakonechnyi, Orest Ivakhiv, Oleksandr Viter:

Synthesis of the regulator for robot's arm Serving by poles method Placement using. 181-189 - Oleg Savenko, Anatoliy Sachenko, Sergii Lysenko, George Markowsky, Nadiia Vasylkiv:

Botnet Detection Approach based on the Distributed Systems. 190-198 - Roman Melnyk, Ruslan Tushnytskyy, Roman Kvit:

Cloudiness Images Multilevel Segmentation by piecewise linear Approximation of Cumulative Histogram. 199-207 - Mina N. Abadeer, Rowayda A. Sadek, Gamal Ibrahim Selim:

Real-Time Interactive Mechanism for Live Streaming on Peer-to-Peer Networks. 208-215 - Maryna Litvinova, Oleg Dudchenko, Oleksandr Shtanko, Svitlana Karpova:

Using the Technical Experiment in the Computer simulation Training for prospecting Software Engineers. 216-223 - Indira Karymsakova, Natalya Denissova, Saule Kumargazhanova, Iurii Krak:

Robotic plasma Spraying System for implants of Complex Structure: 3D Model and motion Planning. 224-232 - Alexandr Kuznetsov, Vyacheslav Kalashnikov, Robert Brumnik, Sergii Kavun:

Editorial "Computational Aspects of Critical Infrastructures Security", "Security and Post-quantum Cryptography". 233-236 - Victor Krasnobayev, Sergey Koshman, Sergey Moroz, Vyacheslav Kalashnikov, Vitaly Kalashnikov:

Data errors control in the Modular number System based on the Nullification procedure. 237-246 - Alexandr Kuznetsov, Oleksandr Potii, Nikolay Poluyanenko

, Oleksii Smirnov, Igor Stelnyk, Danylo Mialkovskyi:
Combining and filtering Functions in the Framework of nonlinear-feedback Shift Register. 247-256 - Alexander Zamula, Vladyslav Morozov, Nataliya I. Kalashnykova, Robert Brumnik:

Properties and formation of OFDM and derived signals. 257-266 - Yuliia Kovalova, Tetyana Babenko, Oleksandr Oksiiuk, Larysa Myrutenko:

Optimization of Lifetime in Wireless Monitoring Networks. 267-272 - Mariia Rodinko, Roman Oliynykov, Khalicha Yubuzova:

Differential Cryptanalysis of the Lightweight Block Cipher Cypress-256. 273-281 - Kostiantyn Zashcholkin, Oleksandr Drozd, Yulian Sulima, Olena Ivanova, Ihor Perebeinos:

Detection method of the Probable Integrity Violation areas in FPGA-based Safety-Critical Systems. 282-289 - Dmytro Chumachenko, Oleksandr Sokolov, Sergiy Yakovlev:

Fuzzy Recurrent mappings in Multiagent simulation of Population dynamics Systems. 290-297 - Berik Akhmetov, Sergiy Gnatyuk

, Vasyl Kinzeryavyy, Khalicha Yubuzova:
Studies on Practical Cryptographic Security Analysis for Block Ciphers with Random Substitutions. 298-308 - Vyacheslav Efimov, Igor V. Kotenko, Igor Saenko:

Network Application-Layer Protocol Classification based on fuzzy Data and Neural Network Processing. 335-346 - Kateryna Ugryumova, Ievgen Meniailov, Iryna Trofymova, Mykhaylo Ugryumov, Andriy Myenyaylov:

Synthesis of robust Optimal control Program for axial Flow Compressor turning Guide vanes. 347-354 - Moheb R. Girgis, Bahgat A. Abdel Latef, Tahany Akl:

A GUI Testing Strategy and Tool for Android Apps. 355-364 - Oleksandr Komarov, Oleg Galchonkov

, Alexander Nevrev, Oksana Babilunga:
The Use of a Genetic Algorithm for Music Harmonization of transitional Fragments in Computer Games. 365-376 - Samuel O. Obadan, Zenghui Wang:

A Multi-Agent Approach to POMDPs using off-Policy Reinforcement Learning and Genetic Algorithms. 377-386 - Svitlana Popereshnyak

:
Technique of the Testing of Pseudorandom sequences. 387-398 - Jawad Dalou', Basheer Al-Duwairi, Mohammad Al-Jarrah

:
Adaptive Entropy-based Detection and Mitigation of DDoS Attacks in Software Defined Networks. 399-410 - Arkadiy Prodeus

, Maryna Didkovska:
Audio signals clipping Detection using kurtosis and its transforms. 411-417 - Chikomborero Shambare, Yanxia Sun

, OdunAyo Imoru:
A Genetic Algorithm-based Approach for three-phase Fault Evaluation in a Distribution Network. 418-433 - Bohdan M. Pavlyshenko:

Sales Time Series Analytics using Deep Q-Learning. 434-441 - Vladyslav Hamolia

, Viktor Melnyk, Pavlo Zhezhnych
, Anna Shilinh:
Intrusion Detection in Computer Networks using Latent Space Representation and Machine Learning. 442-448 - Andrii Oliinyk

, Ievgen Fedorchenko, Vasyl Donenko
, Alexandr Stepanenko
, Serhii Korniienko, Anastasia Kharchenko
:
Development of an Evolutionary Optimization method for Financial indicators of pharmacies. 449-463 - Mohammed Hussein Ahmed, Ahmed Kareem Shibeeb, Fadhil Hanoon Abbood:

An Efficient Confusion-diffusion Structure for Image Encryption using Plain Image Related Henon Map. 464-473 - Aleksei Vambol

:
Polynomial-Time Plaintext-Recovery Attack on the Matrix-based Knapsack Cipher. 474-479 - Md Maksudur Rahman Mazumder, Chris Phillips:

Partitioning known Environments for Multi-robot Task Allocation using Genetic Algorithms. 480-490 - Maryna Kolisnyk, Dmytro Kochkar, Vyacheslav Kharchenko:

Markov Model of Wireless Sensor Network Availability. 491-498 - Nelson Enrique Vera Parra, Danilo Alfonso López Sarmiento, Cristian Alejandro Rojas Quintero:

Heterogeneous Computing to Accelerate the Search of super k-MERS based on Minimizers. 525-532 - Ibomoiye Domor Mienye

, Yanxia Sun
, Zenghui Wang:
Improved predictive Sparse Decomposition method with Densenet for Prediction of Lung cancer. 533-541 - Dmytro Kotsur, Vasyl Tereshchenko

:
An Optimized Algorithm for Computing the Voronoi Skeleton. 542-554 - Hariyanto Hariyanto, Suyanto Suyanto

:
Hum-to-Chord conversion using Chroma Features and Hidden Markov Model. 555-560 - N. Jayapandian

:
Securing Cloud Data against Cyber-Attacks using Hybrid AES with MHT Algorithm. 561-568 - Elena Nyemkova:

Authentication of Personal Computers with unstable Internal noise. 569-574 - K. R. Resmi

, G. Raju:
An Empirical Study and Evaluation on Automatic Ear Detection. 575-582 - Noor Ahmed Qarabash, Haneen Qarabash:

Twitter Location-based Data: Evaluating the Methods of Data Collection Provided by Twitter API. 583-589 - Olha Sherstiuk, Oleksii Kolesnikov, Viktor Gogunskii

, Kateryna Kolesnikova:
Developing the adaptive Knowledge Management in Context of Engineering Company Project Activities. 590-598 - Hajar Touzani, Ibtissem Wali, Fatima Errahimi

, Anass Mansouri, Nouri Masmoudi, Ali Ahaitouf
:
A New Optimized Implementation of a Fast intra Prediction mode Decision Algorithm for HEVC Standard. 599-609 - Vladimir V. Sklyar, Vyacheslav Kharchenko:

Assurance Case for Safety and Security Implementation: a Survey of Applications. 610-619 - Derwin Suhartono

, Aryo Pradipta Gema
, Suhendro Winton, Theodorus David, Mohamad Ivan Fanany, Aniati Murni Arymurthy:
Sequence-to-sequence Learning for motion-Aware Claim Generation. 620-628 - Maryna Kolisnyk, Vyacheslav Kharchenko, Iryna Piskachova:

Research of the Attacks spread Model on the Smart Office's Router. 629-637 - Ayoub Oukhatar

, Driss El Ouadghiri, Mohamed Bakhouya:
New adaptive Rebroadcasting using Neighbour Learning for Wireless Nanosensor Networks. 638-646 - Mohammed Maree, Mujahed Eleyat

:
Semantic Graph based Term Expansion for Sentence-Level Sentiment Analysis. 647-655 - Oleksandr Gordieiev

, Vyacheslav Kharchenko:
Profile-Oriented Assessment of Software Requirements Quality: Models, Metrics, Case Study. 656-665

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














