Journal: Int. J. Comput.

Volume 21, Issue 3

303 -- 310Hayder G. A. Altameemi, Ahmed A. Alani, Ahmed Abdul Azeez Asmael, Mudhar A. Al-Obaidi. A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification
311 -- 317Dmytro Polishchyk, Vitaliy Lysenko, Serhii Osadchiy, Nataliia Zaiets. Intellectual Scenario-synergetic Control of the Humidity and Temperature Regime of the Greenhouse Facilities
318 -- 324Shohreh Jaafari, Mohammad Nassiri, Reza Mohammadi. Traffic-aware Routing with Software-defined Networks Using Reinforcement Learning and Fuzzy Logic
325 -- 332Hamid Ali Abed Al-Asadi, Huda A. Ahmed, Abdul-Hadi Al-Hassani, N. A M. Ahmad Hambali. A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks
333 -- 341Chetana Belavadi, Vandana Sudhakar Sardar, Shilpa Shashikant Chaudhari. Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining
342 -- 352Arkadiy Prodeus, Maryna Didkovska, Kateryna Kukharicheva. Impact of University Classroom Size on the Relationship between Speech Quality and Intelligibility
353 -- 359R. Sanjeetha, Anita Kanavalli, Anshul Gupta, Ashutosh Pattanaik, Sashank Agarwal. Real-time DDoS Detection and Mitigation in Software Defined Networks using Machine Learning Techniques
360 -- 368Dmitro Karlov, Ivan Tupitsya, Maxim Parkhomenko, Oleksandr Musienko, Albert Lekakh. Compression Coding Method Using Internal Restructuring of Information Space
369 -- 376Sergio Laureano Gutiérrez, Yasiel Pérez Vera. A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions
377 -- 382Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko. Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network
383 -- 390Ajay Kumar Gottem, Arunmetha Sundaramoorthy, Aravindhan Alagarsamy. High Speed Approximate Carry Speculative Adder in Error Tolerance Applications