default search action
Search dblp for Publications
export results for "toc:db/journals/ijcomputing/ijcomputing19.bht:"
@article{DBLP:journals/ijcomputing/000120, author = {N. Jayapandian}, title = {Securing Cloud Data against Cyber-Attacks using Hybrid {AES} with {MHT} Algorithm}, journal = {Int. J. Comput.}, volume = {19}, pages = {561--568}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1989}, doi = {10.47839/IJC.19.4.1989}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/000120.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/AbadeerSS20, author = {Mina N. Abadeer and Rowayda A. Sadek and Gamal Ibrahim Selim}, title = {Real-Time Interactive Mechanism for Live Streaming on Peer-to-Peer Networks}, journal = {Int. J. Comput.}, volume = {19}, pages = {208--215}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1763}, doi = {10.47839/IJC.19.2.1763}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/AbadeerSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/AhmedSA20, author = {Mohammed Hussein Ahmed and Ahmed Kareem Shibeeb and Fadhil Hanoon Abbood}, title = {An Efficient Confusion-diffusion Structure for Image Encryption using Plain Image Related Henon Map}, journal = {Int. J. Comput.}, volume = {19}, pages = {464--473}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1895}, doi = {10.47839/IJC.19.3.1895}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/AhmedSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/AkhmetovGKY20, author = {Berik Akhmetov and Sergiy Gnatyuk and Vasyl Kinzeryavyy and Khalicha Yubuzova}, title = {Studies on Practical Cryptographic Security Analysis for Block Ciphers with Random Substitutions}, journal = {Int. J. Comput.}, volume = {19}, pages = {298--308}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1774}, doi = {10.47839/IJC.19.2.1774}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/AkhmetovGKY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/AlhegamiA20, author = {Ahmed Sultan Alhegami and Hussein Alkhader Alsaeedi}, title = {A Framework for Incremental Parallel Mining of Interesting Association Patterns for Big Data}, journal = {Int. J. Comput.}, volume = {19}, pages = {106--117}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1699}, doi = {10.47839/IJC.19.1.1699}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/AlhegamiA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/AnandH20, author = {Vijayalakshmi Anand and Chittaranjan Hota}, title = {Motivation of Participants in Crowdsourcing Platforms using Intelligent Agents}, journal = {Int. J. Comput.}, volume = {19}, pages = {78--87}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1696}, doi = {10.47839/IJC.19.1.1696}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/AnandH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/AnfiletsBGSKDKB20, author = {Sergei Anfilets and Sergei V. Bezobrazov and Vladimir A. Golovko and Anatoliy Sachenko and Myroslav Komar and Raman Dolny and Valery Kasyanik and Pavlo Bykovyy and Egor Mikhno and Oleksandr Osolinskyi}, title = {Deep multilayer Neural Network for Predicting the Winner of Football Matches}, journal = {Int. J. Comput.}, volume = {19}, pages = {70--77}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1695}, doi = {10.47839/IJC.19.1.1695}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/AnfiletsBGSKDKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/BaturaBC20, author = {Tatiana Batura and Aigerim Bakiyeva and Maria Charintseva}, title = {A method for Automatic Text Summarization based on Rhetorical Analysis and Topic Modeling}, journal = {Int. J. Comput.}, volume = {19}, pages = {118--127}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1700}, doi = {10.47839/IJC.19.1.1700}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/BaturaBC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/CherratAB20, author = {El mehdi Cherrat and Rachid Alaoui and Hassane Bouzahir}, title = {Score fusion of finger Vein and Face for Human Recognition based on Convolutional Neural Network Model}, journal = {Int. J. Comput.}, volume = {19}, pages = {11--19}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1688}, doi = {10.47839/IJC.19.1.1688}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/CherratAB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ChumachenkoSY20, author = {Dmytro Chumachenko and Oleksandr Sokolov and Sergiy Yakovlev}, title = {Fuzzy Recurrent mappings in Multiagent simulation of Population dynamics Systems}, journal = {Int. J. Comput.}, volume = {19}, pages = {290--297}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1773}, doi = {10.47839/IJC.19.2.1773}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ChumachenkoSY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/DalouAA20, author = {Jawad Dalou' and Basheer Al{-}Duwairi and Mohammad Al{-}Jarrah}, title = {Adaptive Entropy-based Detection and Mitigation of DDoS Attacks in Software Defined Networks}, journal = {Int. J. Comput.}, volume = {19}, pages = {399--410}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1889}, doi = {10.47839/IJC.19.3.1889}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/DalouAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/EfimovK020, author = {Vyacheslav Efimov and Igor V. Kotenko and Igor Saenko}, title = {Network Application-Layer Protocol Classification based on fuzzy Data and Neural Network Processing}, journal = {Int. J. Comput.}, volume = {19}, pages = {335--346}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1877}, doi = {10.47839/IJC.19.3.1877}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/EfimovK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/GirgisLA20, author = {Moheb R. Girgis and Bahgat A. Abdel Latef and Tahany Akl}, title = {A {GUI} Testing Strategy and Tool for Android Apps}, journal = {Int. J. Comput.}, volume = {19}, pages = {355--364}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1885}, doi = {10.47839/IJC.19.3.1885}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/GirgisLA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/GordieievK20, author = {Oleksandr Gordieiev and Vyacheslav Kharchenko}, title = {Profile-Oriented Assessment of Software Requirements Quality: Models, Metrics, Case Study}, journal = {Int. J. Comput.}, volume = {19}, pages = {656--665}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.2001}, doi = {10.47839/IJC.19.4.2001}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/GordieievK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/HamoliaMZS20, author = {Vladyslav Hamolia and Viktor Melnyk and Pavlo Zhezhnych and Anna Shilinh}, title = {Intrusion Detection in Computer Networks using Latent Space Representation and Machine Learning}, journal = {Int. J. Comput.}, volume = {19}, pages = {442--448}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1893}, doi = {10.47839/IJC.19.3.1893}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/HamoliaMZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/HariyantoS20, author = {Hariyanto Hariyanto and Suyanto Suyanto}, title = {Hum-to-Chord conversion using Chroma Features and Hidden Markov Model}, journal = {Int. J. Comput.}, volume = {19}, pages = {555--560}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1988}, doi = {10.47839/IJC.19.4.1988}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/HariyantoS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/HusseinGOH20, author = {Ahmed Mohammed Hussein and Hadeel Qasem Gheni and Wed Kadhim Oleiwi and Zahraa Yaseen Hasan}, title = {Prediction of credit Card Payment Next month through Tree Net Data Mining Techniques}, journal = {Int. J. Comput.}, volume = {19}, pages = {97--105}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1698}, doi = {10.47839/IJC.19.1.1698}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/HusseinGOH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KarnalimK20, author = {Oscar Karnalim and Gisela Kurniawati}, title = {Programming Style on Source Code Plagiarism and Collusion Detection}, journal = {Int. J. Comput.}, volume = {19}, pages = {27--38}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1690}, doi = {10.47839/IJC.19.1.1690}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KarnalimK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KarymsakovaDKK20, author = {Indira Karymsakova and Natalya Denissova and Saule Kumargazhanova and Iurii Krak}, title = {Robotic plasma Spraying System for implants of Complex Structure: 3D Model and motion Planning}, journal = {Int. J. Comput.}, volume = {19}, pages = {224--232}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1765}, doi = {10.47839/IJC.19.2.1765}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KarymsakovaDKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KhomytskaTBS20, author = {Iryna Khomytska and Vasyl Teslyuk and Iryna Bazylevych and Inna Shylinska}, title = {Approach for Minimization of phoneme Groups in Authorship Attribution}, journal = {Int. J. Comput.}, volume = {19}, pages = {55--62}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1693}, doi = {10.47839/IJC.19.1.1693}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KhomytskaTBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KolisnykKK20, author = {Maryna Kolisnyk and Dmytro Kochkar and Vyacheslav Kharchenko}, title = {Markov Model of Wireless Sensor Network Availability}, journal = {Int. J. Comput.}, volume = {19}, pages = {491--498}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1899}, doi = {10.47839/IJC.19.3.1899}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KolisnykKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KolisnykKP20, author = {Maryna Kolisnyk and Vyacheslav Kharchenko and Iryna Piskachova}, title = {Research of the Attacks spread Model on the Smart Office's Router}, journal = {Int. J. Comput.}, volume = {19}, pages = {629--637}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1998}, doi = {10.47839/IJC.19.4.1998}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KolisnykKP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KomarovGNB20, author = {Oleksandr Komarov and Oleg Galchonkov and Alexander Nevrev and Oksana Babilunga}, title = {The Use of a Genetic Algorithm for Music Harmonization of transitional Fragments in Computer Games}, journal = {Int. J. Comput.}, volume = {19}, pages = {365--376}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1886}, doi = {10.47839/IJC.19.3.1886}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KomarovGNB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KotsurT20, author = {Dmytro Kotsur and Vasyl Tereshchenko}, title = {An Optimized Algorithm for Computing the Voronoi Skeleton}, journal = {Int. J. Comput.}, volume = {19}, pages = {542--554}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1987}, doi = {10.47839/IJC.19.4.1987}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KotsurT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KovalovaBOM20, author = {Yuliia Kovalova and Tetyana Babenko and Oleksandr Oksiiuk and Larysa Myrutenko}, title = {Optimization of Lifetime in Wireless Monitoring Networks}, journal = {Int. J. Comput.}, volume = {19}, pages = {267--272}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1770}, doi = {10.47839/IJC.19.2.1770}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KovalovaBOM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KrasnobayevKMK020, author = {Victor Krasnobayev and Sergey Koshman and Sergey Moroz and Vyacheslav Kalashnikov and Vitaly Kalashnikov}, title = {Data errors control in the Modular number System based on the Nullification procedure}, journal = {Int. J. Comput.}, volume = {19}, pages = {237--246}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1767}, doi = {10.47839/IJC.19.2.1767}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KrasnobayevKMK020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KrepychS20, author = {Svitlana Krepych and Iryna Spivak}, title = {Model of Human weight correction based on interval Data Analysis}, journal = {Int. J. Comput.}, volume = {19}, pages = {128--136}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1701}, doi = {10.47839/IJC.19.1.1701}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KrepychS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KuznetsovKBK20, author = {Alexandr Kuznetsov and Vyacheslav Kalashnikov and Robert Brumnik and Sergii Kavun}, title = {Editorial "Computational Aspects of Critical Infrastructures Security", "Security and Post-quantum Cryptography"}, journal = {Int. J. Comput.}, volume = {19}, pages = {233--236}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1766}, doi = {10.47839/IJC.19.2.1766}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KuznetsovKBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/KuznetsovPPSSM20, author = {Alexandr Kuznetsov and Oleksandr Potii and Nikolay Poluyanenko and Oleksii Smirnov and Igor Stelnyk and Danylo Mialkovskyi}, title = {Combining and filtering Functions in the Framework of nonlinear-feedback Shift Register}, journal = {Int. J. Comput.}, volume = {19}, pages = {247--256}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1768}, doi = {10.47839/IJC.19.2.1768}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/KuznetsovPPSSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/LawnikBK20, author = {Marcin Lawnik and Arkadiusz Banasik and Adrian Kapczynski}, title = {Generation of Values from discrete Probability distributions with the Use of Chaotic Maps}, journal = {Int. J. Comput.}, volume = {19}, pages = {49--54}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1692}, doi = {10.47839/IJC.19.1.1692}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/LawnikBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/LinanGM20, author = {Maureen Nettie Linan and Bobby D. Gerardo and Ruji Medina}, title = {Self-Organizing Map with Nguyen-Widrow Initialization Algorithm for groundwater Vulnerability Assessment}, journal = {Int. J. Comput.}, volume = {19}, pages = {63--69}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1694}, doi = {10.47839/IJC.19.1.1694}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/LinanGM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/LitvinovaDSK20, author = {Maryna Litvinova and Oleg Dudchenko and Oleksandr Shtanko and Svitlana Karpova}, title = {Using the Technical Experiment in the Computer simulation Training for prospecting Software Engineers}, journal = {Int. J. Comput.}, volume = {19}, pages = {216--223}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1764}, doi = {10.47839/IJC.19.2.1764}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/LitvinovaDSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/MarakhimovK20, author = {Avazjon R. Marakhimov and Kabul K. Khudaybergenov}, title = {Approach to the synthesis of Neural Network Structure during Classification}, journal = {Int. J. Comput.}, volume = {19}, pages = {20--26}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1689}, doi = {10.47839/IJC.19.1.1689}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/MarakhimovK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/MareeE20, author = {Mohammed Maree and Mujahed Eleyat}, title = {Semantic Graph based Term Expansion for Sentence-Level Sentiment Analysis}, journal = {Int. J. Comput.}, volume = {19}, pages = {647--655}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.2000}, doi = {10.47839/IJC.19.4.2000}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/MareeE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Mazumder020, author = {Md Maksudur Rahman Mazumder and Chris Phillips}, title = {Partitioning known Environments for Multi-robot Task Allocation using Genetic Algorithms}, journal = {Int. J. Comput.}, volume = {19}, pages = {480--490}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1897}, doi = {10.47839/IJC.19.3.1897}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Mazumder020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/MelnykTK20, author = {Roman Melnyk and Ruslan Tushnytskyy and Roman Kvit}, title = {Cloudiness Images Multilevel Segmentation by piecewise linear Approximation of Cumulative Histogram}, journal = {Int. J. Comput.}, volume = {19}, pages = {199--207}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1762}, doi = {10.47839/IJC.19.2.1762}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/MelnykTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/MienyeSW20, author = {Ibomoiye Domor Mienye and Yanxia Sun and Zenghui Wang}, title = {Improved predictive Sparse Decomposition method with Densenet for Prediction of Lung cancer}, journal = {Int. J. Comput.}, volume = {19}, pages = {533--541}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1986}, doi = {10.47839/IJC.19.4.1986}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/MienyeSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/MorozovKM20, author = {Viktor V. Morozov and Olena V. Kalnichenko and Olga O. Mezentseva}, title = {The method of Interaction Modeling on Basis of Deep Learning the Neural Networks in Complex IT-Projects}, journal = {Int. J. Comput.}, volume = {19}, pages = {88--96}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1697}, doi = {10.47839/IJC.19.1.1697}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/MorozovKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/MutiaraPAD20, author = {Giva Andriana Mutiara and Periyadi Periyadi and Andry Dupti Agnas and Velly Darma}, title = {Smart Vest and Monitoring System for Airsoft Sport-Games using vibration Sensor}, journal = {Int. J. Comput.}, volume = {19}, pages = {173--180}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1759}, doi = {10.47839/IJC.19.2.1759}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/MutiaraPAD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/NakonechnyiIV20, author = {Markiyan Nakonechnyi and Orest Ivakhiv and Oleksandr Viter}, title = {Synthesis of the regulator for robot's arm Serving by poles method Placement using}, journal = {Int. J. Comput.}, volume = {19}, pages = {181--189}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1760}, doi = {10.47839/IJC.19.2.1760}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/NakonechnyiIV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Nyemkova20, author = {Elena Nyemkova}, title = {Authentication of Personal Computers with unstable Internal noise}, journal = {Int. J. Comput.}, volume = {19}, pages = {569--574}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1990}, doi = {10.47839/IJC.19.4.1990}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Nyemkova20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ObadanW20, author = {Samuel O. Obadan and Zenghui Wang}, title = {A Multi-Agent Approach to POMDPs using off-Policy Reinforcement Learning and Genetic Algorithms}, journal = {Int. J. Comput.}, volume = {19}, pages = {377--386}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1887}, doi = {10.47839/IJC.19.3.1887}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ObadanW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/OliinykFDSKK20, author = {Andrii Oliinyk and Ievgen Fedorchenko and Vasyl Donenko and Alexandr Stepanenko and Serhii Korniienko and Anastasia Kharchenko}, title = {Development of an Evolutionary Optimization method for Financial indicators of pharmacies}, journal = {Int. J. Comput.}, volume = {19}, pages = {449--463}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1894}, doi = {10.47839/IJC.19.3.1894}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/OliinykFDSKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/OukhatarOB20, author = {Ayoub Oukhatar and Driss El Ouadghiri and Mohamed Bakhouya}, title = {New adaptive Rebroadcasting using Neighbour Learning for Wireless Nanosensor Networks}, journal = {Int. J. Comput.}, volume = {19}, pages = {638--646}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1999}, doi = {10.47839/IJC.19.4.1999}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/OukhatarOB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ParraSQ20, author = {Nelson Enrique Vera Parra and Danilo Alfonso L{\'{o}}pez Sarmiento and Cristian Alejandro Rojas Quintero}, title = {Heterogeneous Computing to Accelerate the Search of super k-MERS based on Minimizers}, journal = {Int. J. Comput.}, volume = {19}, pages = {525--532}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1985}, doi = {10.47839/IJC.19.4.1985}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ParraSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Pavlyshenko20, author = {Bohdan M. Pavlyshenko}, title = {Sales Time Series Analytics using Deep Q-Learning}, journal = {Int. J. Comput.}, volume = {19}, pages = {434--441}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1892}, doi = {10.47839/IJC.19.3.1892}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Pavlyshenko20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Popereshnyak20, author = {Svitlana Popereshnyak}, title = {Technique of the Testing of Pseudorandom sequences}, journal = {Int. J. Comput.}, volume = {19}, pages = {387--398}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1888}, doi = {10.47839/IJC.19.3.1888}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Popereshnyak20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ProdeusD20, author = {Arkadiy Prodeus and Maryna Didkovska}, title = {Audio signals clipping Detection using kurtosis and its transforms}, journal = {Int. J. Comput.}, volume = {19}, pages = {411--417}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1890}, doi = {10.47839/IJC.19.3.1890}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ProdeusD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/QarabashQ20, author = {Noor Ahmed Qarabash and Haneen Qarabash}, title = {Twitter Location-based Data: Evaluating the Methods of Data Collection Provided by Twitter {API}}, journal = {Int. J. Comput.}, volume = {19}, pages = {583--589}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1992}, doi = {10.47839/IJC.19.4.1992}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/QarabashQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/RadhakrishnanK20, author = {Rathish Radhakrishnan and Karpagavadivu Karuppusamy}, title = {Cost Effective Energy Efficient Scheme for Mobile Adhoc Network}, journal = {Int. J. Comput.}, volume = {19}, pages = {137--146}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1702}, doi = {10.47839/IJC.19.1.1702}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/RadhakrishnanK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Resmi020, author = {K. R. Resmi and G. Raju}, title = {An Empirical Study and Evaluation on Automatic Ear Detection}, journal = {Int. J. Comput.}, volume = {19}, pages = {575--582}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1991}, doi = {10.47839/IJC.19.4.1991}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Resmi020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/RodinkoOY20, author = {Mariia Rodinko and Roman Oliynykov and Khalicha Yubuzova}, title = {Differential Cryptanalysis of the Lightweight Block Cipher Cypress-256}, journal = {Int. J. Comput.}, volume = {19}, pages = {273--281}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1771}, doi = {10.47839/IJC.19.2.1771}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/RodinkoOY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/SavenkoSLMV20, author = {Oleg Savenko and Anatoliy Sachenko and Sergii Lysenko and George Markowsky and Nadiia Vasylkiv}, title = {Botnet Detection Approach based on the Distributed Systems}, journal = {Int. J. Comput.}, volume = {19}, pages = {190--198}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1761}, doi = {10.47839/IJC.19.2.1761}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/SavenkoSLMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ShambareSI20, author = {Chikomborero Shambare and Yanxia Sun and OdunAyo Imoru}, title = {A Genetic Algorithm-based Approach for three-phase Fault Evaluation in a Distribution Network}, journal = {Int. J. Comput.}, volume = {19}, pages = {418--433}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1891}, doi = {10.47839/IJC.19.3.1891}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ShambareSI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/SherstiukKGK20, author = {Olha Sherstiuk and Oleksii Kolesnikov and Viktor Gogunskii and Kateryna Kolesnikova}, title = {Developing the adaptive Knowledge Management in Context of Engineering Company Project Activities}, journal = {Int. J. Comput.}, volume = {19}, pages = {590--598}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1993}, doi = {10.47839/IJC.19.4.1993}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/SherstiukKGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/SklyarK20, author = {Vladimir V. Sklyar and Vyacheslav Kharchenko}, title = {Assurance Case for Safety and Security Implementation: a Survey of Applications}, journal = {Int. J. Comput.}, volume = {19}, pages = {610--619}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1995}, doi = {10.47839/IJC.19.4.1995}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/SklyarK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Stoyanova-Doycheva20, author = {Asya Stoyanova{-}Doycheva and Vanya Ivanova and Todorka Glushkova and Stanimir Stoyanov and Irina Radeva}, title = {Dynamic Generation of Cultural Routes in a Tourist Guide}, journal = {Int. J. Comput.}, volume = {19}, pages = {39--48}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.1.1691}, doi = {10.47839/IJC.19.1.1691}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Stoyanova-Doycheva20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/SuhartonoGWDFA20, author = {Derwin Suhartono and Aryo Pradipta Gema and Suhendro Winton and Theodorus David and Mohamad Ivan Fanany and Aniati Murni Arymurthy}, title = {Sequence-to-sequence Learning for motion-Aware Claim Generation}, journal = {Int. J. Comput.}, volume = {19}, pages = {620--628}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1997}, doi = {10.47839/IJC.19.4.1997}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/SuhartonoGWDFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/TouzaniWEMMA20, author = {Hajar Touzani and Ibtissem Wali and Fatima Errahimi and Anass Mansouri and Nouri Masmoudi and Ali Ahaitouf}, title = {A New Optimized Implementation of a Fast intra Prediction mode Decision Algorithm for {HEVC} Standard}, journal = {Int. J. Comput.}, volume = {19}, pages = {599--609}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.4.1994}, doi = {10.47839/IJC.19.4.1994}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/TouzaniWEMMA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/UgryumovaMTUM20, author = {Kateryna Ugryumova and Ievgen Meniailov and Iryna Trofymova and Mykhaylo Ugryumov and Andriy Myenyaylov}, title = {Synthesis of robust Optimal control Program for axial Flow Compressor turning Guide vanes}, journal = {Int. J. Comput.}, volume = {19}, pages = {347--354}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1882}, doi = {10.47839/IJC.19.3.1882}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/UgryumovaMTUM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/Vambol20, author = {Aleksei Vambol}, title = {Polynomial-Time Plaintext-Recovery Attack on the Matrix-based Knapsack Cipher}, journal = {Int. J. Comput.}, volume = {19}, pages = {474--479}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.3.1896}, doi = {10.47839/IJC.19.3.1896}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/Vambol20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ZamulaMKB20, author = {Alexander Zamula and Vladyslav Morozov and Nataliya I. Kalashnykova and Robert Brumnik}, title = {Properties and formation of {OFDM} and derived signals}, journal = {Int. J. Comput.}, volume = {19}, pages = {257--266}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1769}, doi = {10.47839/IJC.19.2.1769}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ZamulaMKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomputing/ZashcholkinDSIP20, author = {Kostiantyn Zashcholkin and Oleksandr Drozd and Yulian Sulima and Olena Ivanova and Ihor Perebeinos}, title = {Detection method of the Probable Integrity Violation areas in FPGA-based Safety-Critical Systems}, journal = {Int. J. Comput.}, volume = {19}, pages = {282--289}, year = {2020}, url = {https://doi.org/10.47839/ijc.19.2.1772}, doi = {10.47839/IJC.19.2.1772}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomputing/ZashcholkinDSIP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.