International Journal of Computing, Volume 21 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 21, Number 1, 2022

Yevgeniy V. Bodyanskiy, Anastasiia O. Deineko, Viktoria Skorik, Filip Brodetskyi
:
Deep Neural Network with Adaptive Parametric Rectified Linear Units and its Fast Learning. 11-18

Arthur Lerke, Hermann Heßling
:
On Strange Memory Effects in Long-term Forecasts using Regularised Recurrent Neural Networks. 19-24

Sawsan Alshattnawi, Lubna Afifi, Amani M. Shatnawi, Malek M. Barhoush
:
Utilizing Genetic Algorithm and Artificial Bee Colony Algorithm to Extend the WSN Lifetime. 25-31

Yuriy Danyk, Serhii Vdovenko
, Serhii Voloshko:
Prevent and Reduce the Risk of Implementing the Main Cybersecurity Threats. 32-41

Moechammad Sarosa, Mokhamad Hadi Wijaya, Herman Tolle
, Amalia Eka Rakhmania
:
Implementation of Chatbot in Online Classes using Google Classroom. 42-51

Oleksii V. Sholokhov
:
Stretch-Contract Operator in the Ellipsoidal Approximation of the Minkowski Sum of Convex Sets. 52-60

Dian Candra Rini Novitasari, Putri Wulandari, Dina Zatusiva Haq:
Cervical Cancer Diagnosis System using Convolutional Neural Network ResidualNet. 61-68

Surapong Auwatanamongkol:
A Real-Value Parameter Function Optimization Algorithm using Repeated Adaptive Local Search. 69-75

Zana Azeez Kakarash
, Hawkar Saeed Ezat, Shokhan Ali Omar, Nawroz Fadhil Ahmed:
Time Series Forecasting Based on Support Vector Machine Using Particle Swarm Optimization. 76-88

Vyacheslav Kharchenko, Nikolaos G. Bardis, Andrzej Rucinski:
Editorial "Green Computing, Monitoring and Assessing of Smart IoT Systems and Components". 89-91

Bohdan Chernetskyi, Vyacheslav Kharchenko, Alexander Orehov:
Wireless Sensor Network based Forest Fire Early Detection Systems: Development and Implementation. 92-99

Yuriy S. Manzhos, Yevheniia V. Sokolova
:
A Method of IoT Information Compression. 100-110

Oleksandr Gordieiev, Vyacheslav Kharchenko, Daria Gordieieva:
Software Requirements Profile Quality Model. 111-119

Mariia V. Talakh, Serhii V. Holub, Pavlo O. Luchshev
, Ihor B. Turkin:
Intelligent Monitoring of Air Temperature by the DATA of Satellites and Meteorological Stations. 120-127
Volume 21, Number 2, 2022

Li Sun, Yanxia Sun
:
Photovoltaic Power Forecasting based on Artificial Neural Network and Ultraviolet Index. 153-158

Lahbib Khrissi
, Nabil El Akkad
, Hassan Satori
, Khalid Satori
:
A Performant Clustering Approach Based on An Improved Sine Cosine Algorithm. 159-168

Olena Sharovara, Mariia Dorosh
, Olena Trunova, Mariia Voitsekhovska, Olena Verenych:
Model for Assessing the Level of Knowledge Convergence in Multinational Projects. 169-176

Michael Scholz, Sebastian König, Julia Klein, Judith Gieringer:
KINETARIUM: Interactive Multiplayer Games for Fulldome Projections. 177-187

Manju Duhan, Pradeep Kumar Bhatia
:
Software Reusability Estimation based on Dynamic Metrics using Soft Computing Techniques. 188-194

Igor V. Kononenko, Maximilien Kpodjedo:
Applying the Project Portfolio Management Maturity Level Selection Method to an Organization. 195-204

Ahmed Al-Ashoor, Shubair Abdulla:
Examining Techniques to Solving Imbalanced Datasets in Educational Data Mining Systems. 205-213

Ahmad Sedky Adly, Islam Hegazy
, Taha ElArif, M. S. Abdelwahab:
Development of an Effective Bootleg Videos Retrieval System as a Part of Content-Based Video Search Engine. 214-227

Vladimir Pevnev, Aleksandr Frolov, Mikhail Tsuranov
, Heorhii Zemlianko
:
Ensuring the Data Integrity in Infocommunication Systems. 228-233

Kusum Mehta, Supriya P. Panda:
Sentiment Analysis on E-Commerce Apparels using Convolutional Neural Network. 234-241

Stéphane C. K. Tékouabou, Walid Cherif, Hamza Toulni, Elarbi A. Abdelaoui, Hassan Silkan
:
Using Class Membership based Approach to Improve Predictive Classification in Customer Relationship Management Systems. 242-250

Viktor Kozel
, Oleksii Ivanchuk
, Ievgeniia Drozdova
, Olena Prykhodko:
Automation of the Protocol Selection Process for IoT Systems. 251-257

Khrystyna Lipianina-Honcharenko
, Ruslan Savchyshyn, Anatoliy Sachenko, Anastasiia Chaban, Ivan Kit, Taras Lendiuk:
Concept of the Intelligent Guide with AR Support. 271-277
Volume 21, Number 3, 2022

Hayder G. A. Altameemi
, Ahmed A. Alani
, Ahmed Abdul Azeez Asmael
, Mudhar A. Al-Obaidi
:
A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification. 303-310

Dmytro Polishchyk, Vitaliy Lysenko, Serhii Osadchiy, Nataliia Zaiets:
Intellectual Scenario-synergetic Control of the Humidity and Temperature Regime of the Greenhouse Facilities. 311-317

Shohreh Jaafari, Mohammad Nassiri, Reza Mohammadi:
Traffic-aware Routing with Software-defined Networks Using Reinforcement Learning and Fuzzy Logic. 318-324

Hamid Ali Abed Al-Asadi, Huda A. Ahmed
, Abdul-Hadi Al-Hassani, N. A M. Ahmad Hambali:
A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks. 325-332

Chetana Belavadi, Vandana Sudhakar Sardar, Shilpa Shashikant Chaudhari:
Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining. 333-341

Arkadiy Prodeus, Maryna Didkovska, Kateryna Kukharicheva:
Impact of University Classroom Size on the Relationship between Speech Quality and Intelligibility. 342-352

R. Sanjeetha, Anita Kanavalli, Anshul Gupta, Ashutosh Pattanaik, Sashank Agarwal:
Real-time DDoS Detection and Mitigation in Software Defined Networks using Machine Learning Techniques. 353-359

Dmitro Karlov, Ivan Tupitsya
, Maxim Parkhomenko, Oleksandr Musienko, Albert Lekakh:
Compression Coding Method Using Internal Restructuring of Information Space. 360-368

Sergio Laureano Gutiérrez, Yasiel Pérez Vera
:
A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions. 369-376

Serhii Voitenko
, Volodymyr Druzhynin
, Hanna Martyniuk
, Tetiana Meleshko:
Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network. 377-382

Ajay Kumar Gottem, Arunmetha Sundaramoorthy
, Aravindhan Alagarsamy
:
High Speed Approximate Carry Speculative Adder in Error Tolerance Applications. 383-390
Volume 21, Number 4, 2022

Samson Ademola Adegoke
, Yanxia Sun
:
Optimum Reactive Power Dispatch Solution using Hybrid Particle Swarm Optimization and Pathfinder Algorithm. 403-410

Vladik Kreinovich, Oscar Galindo, Olga Kosheleva:
Many Known Quantum Algorithms Are Optimal: Symmetry-Based Proofs. 411-423

Ikenna Rene Chiadighikaobi
, Norliza Katuk
, Baharudin Osman:
DMUAS-IoT: A Decentralised Multi-Factor User Authentication Scheme for IoT Systems. 424-434

Rucha C. Samant, Suhas Patil:
An Enhanced Online Boosting Ensemble Classification Technique to Deal with Data Drift. 435-442

Nikolay A. Ignatev, Erkin R. Navruzov
:
Estimates of the Complexity of Detecting Types of DDOS Attacks. 443-449

Mino George, Anita Hadadi Bhimasena:
Entropy Based Segmentation Model for Kidney Stone and Cyst on Ultrasound Image. 450-455

S. Balaji, S. Sankara Narayanan
:
Hybrid Deep-GAN Model for Intrusion Detection in IoT Through Enhanced Whale Optimization. 456-467

R. Sivakani, M. Syed Masood:
Analysis of COVID-19 and its Impact on Alzheimer's Patient using Machine Learning Techniques. 468-474

Juan Arcila-Diaz, Carlos Valdivia:
A Microservice-based Software Architecture for Improving the Availability of Dental Health Records. 475-481

Borys Pleskach:
Energy Consumption Monitoring with Evaluation of Hidden Energy Losses. 482-488

Layla A. Al Hak
:
Diabetes Prediction Using Binary Grey Wolf Optimization and Decision Tree. 489-494

Yurii Iliash
:
A Generalized Method of Decreasing Data Redundancy. 495-501

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:







