Journal: Int. J. Comput.

Volume 20, Issue 4

471 -- 486Oleksiy V. Kozlov. Information Technology for Designing Rule bases of Fuzzy Systems using Ant Colony Optimization
487 -- 493Maria Rene Ledezma, Franco Simini. Serious Game Design by Unified Block Interactions to Support Educational Transformations
494 -- 505Alexandr Alexandrovich Kuznetsov, Yurii Gorbenko, Anastasiia Kiian, Yuliia V. Ulianovska, Tetiana Kuznetsova. Elliptic Curve Pseudorandom Bit Generator with Maximum Period Sequences
506 -- 512Saadat M. Alhashmi, Mohammed Maree, Zaina Saadeddin. Using Latent Dirichlet Allocation and Text Mining Techniques for Understanding Medical Literature
513 -- 518Artem Tetskyi, Vyacheslav Kharchenko, Dmytro Uzun, Artem Nechausov. Architecture and Model of Neural Network Based Service for Choice of the Penetration Testing Tools
519 -- 527Mohammad Hossein Sargolzaei. Design-Space Exploration of Application-specific Instruction-set Processor Design
528 -- 534Petro Nevodovskyi, Oleksandr Ovsak, Anatoliy Vidmachenko, Orest Ivakhiv, Oleksandr Zbrutskyi, Mykhaylo Geraimchuk. Earth's Stratospheric Aerosol Parameters Reconstruction from Polarimetric Measurements of the Sky
535 -- 542Nader Abdel Karim, Hasan Kanaker, Shadi Almasadeh, Jamal Zarqou. A Robust User Authentication Technique in Online Examination
543 -- 550Nataliya Boyko, Andriy Pytel. Aspects of the Study of Genetic Algorithms and Mechanisms for their Optimization for the Travelling Salesman Problem
551 -- 559Ahmed Shihab Ahmed, Omer Nather Basheer, Hussein Ali Salah. Breast Tumors Diagnosis Using Fuzzy Inference System and Fuzzy C-Means Clustering
560 -- 566Vladimir Batsamut, Sviatoslav Manzura, Oleksandr Kosiak, Viacheslav Garmash, Dmytro Kukharets. Fast Algorithm for Calculating Transitive Closures of Binary Relations in the Structure of a Network Object
567 -- 574S. Suguna Devi, A. Bhuvaneswari. Trilateral Location based Maximum Weighted Directive Spanning Tree for Optimal Routing in IoV
575 -- 580Yuliia Tatarinova, Olha Sinelnikova. The Measurement of Popularity and Prevalence of Software Vulnerability
581 -- 586Volodymyr Samotyy, Ulyana Dzelendzyak, Andriy Pavelchak. The Parametric Optimization of Voltage Multiplier
587 -- 595Alebachew Chiche, Hiwot Kadi, Tibebu Bekele. A Hidden Markov Model-based Part of Speech Tagger for Shekki'noono Language