default search action
International Journal of Computing, Volume 19
Volume 19, 2020
- El mehdi Cherrat, Rachid Alaoui, Hassane Bouzahir:
Score fusion of finger Vein and Face for Human Recognition based on Convolutional Neural Network Model. 11-19 - Avazjon R. Marakhimov, Kabul K. Khudaybergenov:
Approach to the synthesis of Neural Network Structure during Classification. 20-26 - Oscar Karnalim, Gisela Kurniawati:
Programming Style on Source Code Plagiarism and Collusion Detection. 27-38 - Asya Stoyanova-Doycheva, Vanya Ivanova, Todorka Glushkova, Stanimir Stoyanov, Irina Radeva:
Dynamic Generation of Cultural Routes in a Tourist Guide. 39-48 - Marcin Lawnik, Arkadiusz Banasik, Adrian Kapczynski:
Generation of Values from discrete Probability distributions with the Use of Chaotic Maps. 49-54 - Iryna Khomytska, Vasyl Teslyuk, Iryna Bazylevych, Inna Shylinska:
Approach for Minimization of phoneme Groups in Authorship Attribution. 55-62 - Maureen Nettie Linan, Bobby D. Gerardo, Ruji Medina:
Self-Organizing Map with Nguyen-Widrow Initialization Algorithm for groundwater Vulnerability Assessment. 63-69 - Sergei Anfilets, Sergei V. Bezobrazov, Vladimir A. Golovko, Anatoliy Sachenko, Myroslav Komar, Raman Dolny, Valery Kasyanik, Pavlo Bykovyy, Egor Mikhno, Oleksandr Osolinskyi:
Deep multilayer Neural Network for Predicting the Winner of Football Matches. 70-77 - Vijayalakshmi Anand, Chittaranjan Hota:
Motivation of Participants in Crowdsourcing Platforms using Intelligent Agents. 78-87 - Viktor V. Morozov, Olena V. Kalnichenko, Olga O. Mezentseva:
The method of Interaction Modeling on Basis of Deep Learning the Neural Networks in Complex IT-Projects. 88-96 - Ahmed Mohammed Hussein, Hadeel Qasem Gheni, Wed Kadhim Oleiwi, Zahraa Yaseen Hasan:
Prediction of credit Card Payment Next month through Tree Net Data Mining Techniques. 97-105 - Ahmed Sultan Alhegami, Hussein Alkhader Alsaeedi:
A Framework for Incremental Parallel Mining of Interesting Association Patterns for Big Data. 106-117 - Tatiana Batura, Aigerim Bakiyeva, Maria Charintseva:
A method for Automatic Text Summarization based on Rhetorical Analysis and Topic Modeling. 118-127 - Svitlana Krepych, Iryna Spivak:
Model of Human weight correction based on interval Data Analysis. 128-136 - Rathish Radhakrishnan, Karpagavadivu Karuppusamy:
Cost Effective Energy Efficient Scheme for Mobile Adhoc Network. 137-146 - Giva Andriana Mutiara, Periyadi Periyadi, Andry Dupti Agnas, Velly Darma:
Smart Vest and Monitoring System for Airsoft Sport-Games using vibration Sensor. 173-180 - Markiyan Nakonechnyi, Orest Ivakhiv, Oleksandr Viter:
Synthesis of the regulator for robot's arm Serving by poles method Placement using. 181-189 - Oleg Savenko, Anatoliy Sachenko, Sergii Lysenko, George Markowsky, Nadiia Vasylkiv:
Botnet Detection Approach based on the Distributed Systems. 190-198 - Roman Melnyk, Ruslan Tushnytskyy, Roman Kvit:
Cloudiness Images Multilevel Segmentation by piecewise linear Approximation of Cumulative Histogram. 199-207 - Mina N. Abadeer, Rowayda A. Sadek, Gamal Ibrahim Selim:
Real-Time Interactive Mechanism for Live Streaming on Peer-to-Peer Networks. 208-215 - Maryna Litvinova, Oleg Dudchenko, Oleksandr Shtanko, Svitlana Karpova:
Using the Technical Experiment in the Computer simulation Training for prospecting Software Engineers. 216-223 - Indira Karymsakova, Natalya Denissova, Saule Kumargazhanova, Iurii Krak:
Robotic plasma Spraying System for implants of Complex Structure: 3D Model and motion Planning. 224-232 - Alexandr Kuznetsov, Vyacheslav Kalashnikov, Robert Brumnik, Sergii Kavun:
Editorial "Computational Aspects of Critical Infrastructures Security", "Security and Post-quantum Cryptography". 233-236 - Victor Krasnobayev, Sergey Koshman, Sergey Moroz, Vyacheslav Kalashnikov, Vitaly Kalashnikov:
Data errors control in the Modular number System based on the Nullification procedure. 237-246 - Alexandr Kuznetsov, Oleksandr Potii, Nikolay Poluyanenko, Oleksii Smirnov, Igor Stelnyk, Danylo Mialkovskyi:
Combining and filtering Functions in the Framework of nonlinear-feedback Shift Register. 247-256 - Alexander Zamula, Vladyslav Morozov, Nataliya I. Kalashnykova, Robert Brumnik:
Properties and formation of OFDM and derived signals. 257-266 - Yuliia Kovalova, Tetyana Babenko, Oleksandr Oksiiuk, Larysa Myrutenko:
Optimization of Lifetime in Wireless Monitoring Networks. 267-272 - Mariia Rodinko, Roman Oliynykov, Khalicha Yubuzova:
Differential Cryptanalysis of the Lightweight Block Cipher Cypress-256. 273-281 - Kostiantyn Zashcholkin, Oleksandr Drozd, Yulian Sulima, Olena Ivanova, Ihor Perebeinos:
Detection method of the Probable Integrity Violation areas in FPGA-based Safety-Critical Systems. 282-289 - Dmytro Chumachenko, Oleksandr Sokolov, Sergiy Yakovlev:
Fuzzy Recurrent mappings in Multiagent simulation of Population dynamics Systems. 290-297 - Berik Akhmetov, Sergiy Gnatyuk, Vasyl Kinzeryavyy, Khalicha Yubuzova:
Studies on Practical Cryptographic Security Analysis for Block Ciphers with Random Substitutions. 298-308 - Vyacheslav Efimov, Igor V. Kotenko, Igor Saenko:
Network Application-Layer Protocol Classification based on fuzzy Data and Neural Network Processing. 335-346 - Kateryna Ugryumova, Ievgen Meniailov, Iryna Trofymova, Mykhaylo Ugryumov, Andriy Myenyaylov:
Synthesis of robust Optimal control Program for axial Flow Compressor turning Guide vanes. 347-354 - Moheb R. Girgis, Bahgat A. Abdel Latef, Tahany Akl:
A GUI Testing Strategy and Tool for Android Apps. 355-364 - Oleksandr Komarov, Oleg Galchonkov, Alexander Nevrev, Oksana Babilunga:
The Use of a Genetic Algorithm for Music Harmonization of transitional Fragments in Computer Games. 365-376 - Samuel O. Obadan, Zenghui Wang:
A Multi-Agent Approach to POMDPs using off-Policy Reinforcement Learning and Genetic Algorithms. 377-386 - Svitlana Popereshnyak:
Technique of the Testing of Pseudorandom sequences. 387-398 - Jawad Dalou', Basheer Al-Duwairi, Mohammad Al-Jarrah:
Adaptive Entropy-based Detection and Mitigation of DDoS Attacks in Software Defined Networks. 399-410 - Arkadiy Prodeus, Maryna Didkovska:
Audio signals clipping Detection using kurtosis and its transforms. 411-417 - Chikomborero Shambare, Yanxia Sun, OdunAyo Imoru:
A Genetic Algorithm-based Approach for three-phase Fault Evaluation in a Distribution Network. 418-433 - Bohdan M. Pavlyshenko:
Sales Time Series Analytics using Deep Q-Learning. 434-441 - Vladyslav Hamolia, Viktor Melnyk, Pavlo Zhezhnych, Anna Shilinh:
Intrusion Detection in Computer Networks using Latent Space Representation and Machine Learning. 442-448 - Andrii Oliinyk, Ievgen Fedorchenko, Vasyl Donenko, Alexandr Stepanenko, Serhii Korniienko, Anastasia Kharchenko:
Development of an Evolutionary Optimization method for Financial indicators of pharmacies. 449-463 - Mohammed Hussein Ahmed, Ahmed Kareem Shibeeb, Fadhil Hanoon Abbood:
An Efficient Confusion-diffusion Structure for Image Encryption using Plain Image Related Henon Map. 464-473 - Aleksei Vambol:
Polynomial-Time Plaintext-Recovery Attack on the Matrix-based Knapsack Cipher. 474-479 - Md Maksudur Rahman Mazumder, Chris Phillips:
Partitioning known Environments for Multi-robot Task Allocation using Genetic Algorithms. 480-490 - Maryna Kolisnyk, Dmytro Kochkar, Vyacheslav Kharchenko:
Markov Model of Wireless Sensor Network Availability. 491-498 - Nelson Enrique Vera Parra, Danilo Alfonso López Sarmiento, Cristian Alejandro Rojas Quintero:
Heterogeneous Computing to Accelerate the Search of super k-MERS based on Minimizers. 525-532 - Ibomoiye Domor Mienye, Yanxia Sun, Zenghui Wang:
Improved predictive Sparse Decomposition method with Densenet for Prediction of Lung cancer. 533-541 - Dmytro Kotsur, Vasyl Tereshchenko:
An Optimized Algorithm for Computing the Voronoi Skeleton. 542-554 - Hariyanto Hariyanto, Suyanto Suyanto:
Hum-to-Chord conversion using Chroma Features and Hidden Markov Model. 555-560 - N. Jayapandian:
Securing Cloud Data against Cyber-Attacks using Hybrid AES with MHT Algorithm. 561-568 - Elena Nyemkova:
Authentication of Personal Computers with unstable Internal noise. 569-574 - K. R. Resmi, G. Raju:
An Empirical Study and Evaluation on Automatic Ear Detection. 575-582 - Noor Ahmed Qarabash, Haneen Qarabash:
Twitter Location-based Data: Evaluating the Methods of Data Collection Provided by Twitter API. 583-589 - Olha Sherstiuk, Oleksii Kolesnikov, Viktor Gogunskii, Kateryna Kolesnikova:
Developing the adaptive Knowledge Management in Context of Engineering Company Project Activities. 590-598 - Hajar Touzani, Ibtissem Wali, Fatima Errahimi, Anass Mansouri, Nouri Masmoudi, Ali Ahaitouf:
A New Optimized Implementation of a Fast intra Prediction mode Decision Algorithm for HEVC Standard. 599-609 - Vladimir V. Sklyar, Vyacheslav Kharchenko:
Assurance Case for Safety and Security Implementation: a Survey of Applications. 610-619 - Derwin Suhartono, Aryo Pradipta Gema, Suhendro Winton, Theodorus David, Mohamad Ivan Fanany, Aniati Murni Arymurthy:
Sequence-to-sequence Learning for motion-Aware Claim Generation. 620-628 - Maryna Kolisnyk, Vyacheslav Kharchenko, Iryna Piskachova:
Research of the Attacks spread Model on the Smart Office's Router. 629-637 - Ayoub Oukhatar, Driss El Ouadghiri, Mohamed Bakhouya:
New adaptive Rebroadcasting using Neighbour Learning for Wireless Nanosensor Networks. 638-646 - Mohammed Maree, Mujahed Eleyat:
Semantic Graph based Term Expansion for Sentence-Level Sentiment Analysis. 647-655 - Oleksandr Gordieiev, Vyacheslav Kharchenko:
Profile-Oriented Assessment of Software Requirements Quality: Models, Metrics, Case Study. 656-665
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.