Journal: Int. J. Comput.

Volume 20, Issue 1

11 -- 21Miki Sirola, John Einar Hulsund. Machine-Learning Methods in Prognosis of Ageing Phenomena in Nuclear Power Plant Components
22 -- 30Igor V. Kotenko, Igor B. Parashchuk. Specification of Quality Indicators for Security Event and Incident Management in the Supply Chain
31 -- 38I Made Sunia Raharja, Ahmad Ashari. Enhancing Security System of Short Message Service for Banking Transaction
39 -- 45Sandeep A. Thorat, Komal P. Jadhav. Improving Conversation Modelling using Attention Based Variational Hierarchical RNN
46 -- 54Tasnim Zohud, Samer Zein. Cross-Platform Mobile App Development in Industry: A Multiple Case-Study
55 -- 62Viktor Mihaylenko, Tetyana Honcharenko, Khrystyna Chupryna, Tamara Liazschenko. Integrated Processing of Spatial Information based on Multidimensional Data Models for General Planning Tasks
63 -- 71Yousef Abuzir, Mohamed Dwieb. Hotel Recommender System based on Knowledge Graph and Collaborative Approach
72 -- 77Vladimir Kulikov, Valentina Kulikova, Gulnur Yerkebulan. Google/Yandex Translation Detection in the Patterns Identifying System of Multilingual Texts
78 -- 84Ashwaq T. Hashim. Secure Verifiable Scheme for Biometric System based on Secret Sharing and CSK
85 -- 91Shally Vats, Sanjay Kumar Sharma, Sunil Kumar 0008. A Switch Based Resource Management Method for Energy Optimization in Cloud Data Center
92 -- 100Hesham A. Alabbasi, Ahmed Salih Mehdi, Alaa Hussain Altimimy. Farmer Dissemination of Seeds (FDS) Deployment Method Applied to Simulated Leach Protocol
101 -- 108Valentyn Faychuk, Dariusz Mrozek, Bohdan Strykhaliuk, Orest Lavriv, Olga Shpur. Efficient and Reliable Method of Time Distributed Media Access Control for IoT Devices
109 -- 118Aymen Mohammed Khodayer Al-Dulaimi, Mohammed Khodayer Hassan Al-Dulaimi. Analysis for Modulation and Coding Scheme with Data Rate Traffic Over IEEE 802.11AC and 802.11N in Wireless Multimedia
119 -- 128Oleg Ivanchenko, Eugene Brezhniev, Ihor Kliushnikov, Boris Moroz. Cloud Simulation and Virtualization for Testing of Critical Energy Infrastructure Components
129 -- 136Omar Younis Abdulhammed. Improving Encryption Digital Watermark by Using Blue Monkey Algorithm