Search dblp for Publications

export results for "toc:db/journals/ijcomputing/ijcomputing19.bht:"

 download as .bib file

@article{DBLP:journals/ijcomputing/000120,
  author       = {N. Jayapandian},
  title        = {Securing Cloud Data against Cyber-Attacks using Hybrid {AES} with
                  {MHT} Algorithm},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {561--568},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1989},
  doi          = {10.47839/IJC.19.4.1989},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/000120.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/AbadeerSS20,
  author       = {Mina N. Abadeer and
                  Rowayda A. Sadek and
                  Gamal Ibrahim Selim},
  title        = {Real-Time Interactive Mechanism for Live Streaming on Peer-to-Peer
                  Networks},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {208--215},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1763},
  doi          = {10.47839/IJC.19.2.1763},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/AbadeerSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/AhmedSA20,
  author       = {Mohammed Hussein Ahmed and
                  Ahmed Kareem Shibeeb and
                  Fadhil Hanoon Abbood},
  title        = {An Efficient Confusion-diffusion Structure for Image Encryption using
                  Plain Image Related Henon Map},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {464--473},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1895},
  doi          = {10.47839/IJC.19.3.1895},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/AhmedSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/AkhmetovGKY20,
  author       = {Berik Akhmetov and
                  Sergiy Gnatyuk and
                  Vasyl Kinzeryavyy and
                  Khalicha Yubuzova},
  title        = {Studies on Practical Cryptographic Security Analysis for Block Ciphers
                  with Random Substitutions},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {298--308},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1774},
  doi          = {10.47839/IJC.19.2.1774},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/AkhmetovGKY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/AlhegamiA20,
  author       = {Ahmed Sultan Alhegami and
                  Hussein Alkhader Alsaeedi},
  title        = {A Framework for Incremental Parallel Mining of Interesting Association
                  Patterns for Big Data},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {106--117},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1699},
  doi          = {10.47839/IJC.19.1.1699},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/AlhegamiA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/AnandH20,
  author       = {Vijayalakshmi Anand and
                  Chittaranjan Hota},
  title        = {Motivation of Participants in Crowdsourcing Platforms using Intelligent
                  Agents},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {78--87},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1696},
  doi          = {10.47839/IJC.19.1.1696},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/AnandH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/AnfiletsBGSKDKB20,
  author       = {Sergei Anfilets and
                  Sergei V. Bezobrazov and
                  Vladimir A. Golovko and
                  Anatoliy Sachenko and
                  Myroslav Komar and
                  Raman Dolny and
                  Valery Kasyanik and
                  Pavlo Bykovyy and
                  Egor Mikhno and
                  Oleksandr Osolinskyi},
  title        = {Deep multilayer Neural Network for Predicting the Winner of Football
                  Matches},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {70--77},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1695},
  doi          = {10.47839/IJC.19.1.1695},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/AnfiletsBGSKDKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/BaturaBC20,
  author       = {Tatiana Batura and
                  Aigerim Bakiyeva and
                  Maria Charintseva},
  title        = {A method for Automatic Text Summarization based on Rhetorical Analysis
                  and Topic Modeling},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {118--127},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1700},
  doi          = {10.47839/IJC.19.1.1700},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/BaturaBC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/CherratAB20,
  author       = {El mehdi Cherrat and
                  Rachid Alaoui and
                  Hassane Bouzahir},
  title        = {Score fusion of finger Vein and Face for Human Recognition based on
                  Convolutional Neural Network Model},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {11--19},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1688},
  doi          = {10.47839/IJC.19.1.1688},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/CherratAB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ChumachenkoSY20,
  author       = {Dmytro Chumachenko and
                  Oleksandr Sokolov and
                  Sergiy Yakovlev},
  title        = {Fuzzy Recurrent mappings in Multiagent simulation of Population dynamics
                  Systems},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {290--297},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1773},
  doi          = {10.47839/IJC.19.2.1773},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ChumachenkoSY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/DalouAA20,
  author       = {Jawad Dalou' and
                  Basheer Al{-}Duwairi and
                  Mohammad Al{-}Jarrah},
  title        = {Adaptive Entropy-based Detection and Mitigation of DDoS Attacks in
                  Software Defined Networks},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {399--410},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1889},
  doi          = {10.47839/IJC.19.3.1889},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/DalouAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/EfimovK020,
  author       = {Vyacheslav Efimov and
                  Igor V. Kotenko and
                  Igor Saenko},
  title        = {Network Application-Layer Protocol Classification based on fuzzy Data
                  and Neural Network Processing},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {335--346},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1877},
  doi          = {10.47839/IJC.19.3.1877},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/EfimovK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/GirgisLA20,
  author       = {Moheb R. Girgis and
                  Bahgat A. Abdel Latef and
                  Tahany Akl},
  title        = {A {GUI} Testing Strategy and Tool for Android Apps},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {355--364},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1885},
  doi          = {10.47839/IJC.19.3.1885},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/GirgisLA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/GordieievK20,
  author       = {Oleksandr Gordieiev and
                  Vyacheslav Kharchenko},
  title        = {Profile-Oriented Assessment of Software Requirements Quality: Models,
                  Metrics, Case Study},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {656--665},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.2001},
  doi          = {10.47839/IJC.19.4.2001},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/GordieievK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/HamoliaMZS20,
  author       = {Vladyslav Hamolia and
                  Viktor Melnyk and
                  Pavlo Zhezhnych and
                  Anna Shilinh},
  title        = {Intrusion Detection in Computer Networks using Latent Space Representation
                  and Machine Learning},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {442--448},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1893},
  doi          = {10.47839/IJC.19.3.1893},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/HamoliaMZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/HariyantoS20,
  author       = {Hariyanto Hariyanto and
                  Suyanto Suyanto},
  title        = {Hum-to-Chord conversion using Chroma Features and Hidden Markov Model},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {555--560},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1988},
  doi          = {10.47839/IJC.19.4.1988},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/HariyantoS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/HusseinGOH20,
  author       = {Ahmed Mohammed Hussein and
                  Hadeel Qasem Gheni and
                  Wed Kadhim Oleiwi and
                  Zahraa Yaseen Hasan},
  title        = {Prediction of credit Card Payment Next month through Tree Net Data
                  Mining Techniques},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {97--105},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1698},
  doi          = {10.47839/IJC.19.1.1698},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/HusseinGOH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KarnalimK20,
  author       = {Oscar Karnalim and
                  Gisela Kurniawati},
  title        = {Programming Style on Source Code Plagiarism and Collusion Detection},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {27--38},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1690},
  doi          = {10.47839/IJC.19.1.1690},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KarnalimK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KarymsakovaDKK20,
  author       = {Indira Karymsakova and
                  Natalya Denissova and
                  Saule Kumargazhanova and
                  Iurii Krak},
  title        = {Robotic plasma Spraying System for implants of Complex Structure:
                  3D Model and motion Planning},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {224--232},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1765},
  doi          = {10.47839/IJC.19.2.1765},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KarymsakovaDKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KhomytskaTBS20,
  author       = {Iryna Khomytska and
                  Vasyl Teslyuk and
                  Iryna Bazylevych and
                  Inna Shylinska},
  title        = {Approach for Minimization of phoneme Groups in Authorship Attribution},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {55--62},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1693},
  doi          = {10.47839/IJC.19.1.1693},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KhomytskaTBS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KolisnykKK20,
  author       = {Maryna Kolisnyk and
                  Dmytro Kochkar and
                  Vyacheslav Kharchenko},
  title        = {Markov Model of Wireless Sensor Network Availability},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {491--498},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1899},
  doi          = {10.47839/IJC.19.3.1899},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KolisnykKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KolisnykKP20,
  author       = {Maryna Kolisnyk and
                  Vyacheslav Kharchenko and
                  Iryna Piskachova},
  title        = {Research of the Attacks spread Model on the Smart Office's Router},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {629--637},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1998},
  doi          = {10.47839/IJC.19.4.1998},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KolisnykKP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KomarovGNB20,
  author       = {Oleksandr Komarov and
                  Oleg Galchonkov and
                  Alexander Nevrev and
                  Oksana Babilunga},
  title        = {The Use of a Genetic Algorithm for Music Harmonization of transitional
                  Fragments in Computer Games},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {365--376},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1886},
  doi          = {10.47839/IJC.19.3.1886},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KomarovGNB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KotsurT20,
  author       = {Dmytro Kotsur and
                  Vasyl Tereshchenko},
  title        = {An Optimized Algorithm for Computing the Voronoi Skeleton},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {542--554},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1987},
  doi          = {10.47839/IJC.19.4.1987},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KotsurT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KovalovaBOM20,
  author       = {Yuliia Kovalova and
                  Tetyana Babenko and
                  Oleksandr Oksiiuk and
                  Larysa Myrutenko},
  title        = {Optimization of Lifetime in Wireless Monitoring Networks},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {267--272},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1770},
  doi          = {10.47839/IJC.19.2.1770},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KovalovaBOM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KrasnobayevKMK020,
  author       = {Victor Krasnobayev and
                  Sergey Koshman and
                  Sergey Moroz and
                  Vyacheslav Kalashnikov and
                  Vitaly Kalashnikov},
  title        = {Data errors control in the Modular number System based on the Nullification
                  procedure},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {237--246},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1767},
  doi          = {10.47839/IJC.19.2.1767},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KrasnobayevKMK020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KrepychS20,
  author       = {Svitlana Krepych and
                  Iryna Spivak},
  title        = {Model of Human weight correction based on interval Data Analysis},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {128--136},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1701},
  doi          = {10.47839/IJC.19.1.1701},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KrepychS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KuznetsovKBK20,
  author       = {Alexandr Kuznetsov and
                  Vyacheslav Kalashnikov and
                  Robert Brumnik and
                  Sergii Kavun},
  title        = {Editorial "Computational Aspects of Critical Infrastructures Security",
                  "Security and Post-quantum Cryptography"},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {233--236},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1766},
  doi          = {10.47839/IJC.19.2.1766},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KuznetsovKBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/KuznetsovPPSSM20,
  author       = {Alexandr Kuznetsov and
                  Oleksandr Potii and
                  Nikolay Poluyanenko and
                  Oleksii Smirnov and
                  Igor Stelnyk and
                  Danylo Mialkovskyi},
  title        = {Combining and filtering Functions in the Framework of nonlinear-feedback
                  Shift Register},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {247--256},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1768},
  doi          = {10.47839/IJC.19.2.1768},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/KuznetsovPPSSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/LawnikBK20,
  author       = {Marcin Lawnik and
                  Arkadiusz Banasik and
                  Adrian Kapczynski},
  title        = {Generation of Values from discrete Probability distributions with
                  the Use of Chaotic Maps},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {49--54},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1692},
  doi          = {10.47839/IJC.19.1.1692},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/LawnikBK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/LinanGM20,
  author       = {Maureen Nettie Linan and
                  Bobby D. Gerardo and
                  Ruji Medina},
  title        = {Self-Organizing Map with Nguyen-Widrow Initialization Algorithm for
                  groundwater Vulnerability Assessment},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {63--69},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1694},
  doi          = {10.47839/IJC.19.1.1694},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/LinanGM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/LitvinovaDSK20,
  author       = {Maryna Litvinova and
                  Oleg Dudchenko and
                  Oleksandr Shtanko and
                  Svitlana Karpova},
  title        = {Using the Technical Experiment in the Computer simulation Training
                  for prospecting Software Engineers},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {216--223},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1764},
  doi          = {10.47839/IJC.19.2.1764},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/LitvinovaDSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/MarakhimovK20,
  author       = {Avazjon R. Marakhimov and
                  Kabul K. Khudaybergenov},
  title        = {Approach to the synthesis of Neural Network Structure during Classification},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {20--26},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1689},
  doi          = {10.47839/IJC.19.1.1689},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/MarakhimovK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/MareeE20,
  author       = {Mohammed Maree and
                  Mujahed Eleyat},
  title        = {Semantic Graph based Term Expansion for Sentence-Level Sentiment Analysis},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {647--655},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.2000},
  doi          = {10.47839/IJC.19.4.2000},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/MareeE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Mazumder020,
  author       = {Md Maksudur Rahman Mazumder and
                  Chris Phillips},
  title        = {Partitioning known Environments for Multi-robot Task Allocation using
                  Genetic Algorithms},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {480--490},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1897},
  doi          = {10.47839/IJC.19.3.1897},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Mazumder020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/MelnykTK20,
  author       = {Roman Melnyk and
                  Ruslan Tushnytskyy and
                  Roman Kvit},
  title        = {Cloudiness Images Multilevel Segmentation by piecewise linear Approximation
                  of Cumulative Histogram},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {199--207},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1762},
  doi          = {10.47839/IJC.19.2.1762},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/MelnykTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/MienyeSW20,
  author       = {Ibomoiye Domor Mienye and
                  Yanxia Sun and
                  Zenghui Wang},
  title        = {Improved predictive Sparse Decomposition method with Densenet for
                  Prediction of Lung cancer},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {533--541},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1986},
  doi          = {10.47839/IJC.19.4.1986},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/MienyeSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/MorozovKM20,
  author       = {Viktor V. Morozov and
                  Olena V. Kalnichenko and
                  Olga O. Mezentseva},
  title        = {The method of Interaction Modeling on Basis of Deep Learning the Neural
                  Networks in Complex IT-Projects},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {88--96},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1697},
  doi          = {10.47839/IJC.19.1.1697},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/MorozovKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/MutiaraPAD20,
  author       = {Giva Andriana Mutiara and
                  Periyadi Periyadi and
                  Andry Dupti Agnas and
                  Velly Darma},
  title        = {Smart Vest and Monitoring System for Airsoft Sport-Games using vibration
                  Sensor},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {173--180},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1759},
  doi          = {10.47839/IJC.19.2.1759},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/MutiaraPAD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/NakonechnyiIV20,
  author       = {Markiyan Nakonechnyi and
                  Orest Ivakhiv and
                  Oleksandr Viter},
  title        = {Synthesis of the regulator for robot's arm Serving by poles method
                  Placement using},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {181--189},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1760},
  doi          = {10.47839/IJC.19.2.1760},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/NakonechnyiIV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Nyemkova20,
  author       = {Elena Nyemkova},
  title        = {Authentication of Personal Computers with unstable Internal noise},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {569--574},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1990},
  doi          = {10.47839/IJC.19.4.1990},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Nyemkova20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ObadanW20,
  author       = {Samuel Obadan and
                  Zenghui Wang},
  title        = {A Multi-Agent Approach to POMDPs using off-Policy Reinforcement Learning
                  and Genetic Algorithms},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {377--386},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1887},
  doi          = {10.47839/IJC.19.3.1887},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ObadanW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/OliinykFDSKK20,
  author       = {Andrii Oliinyk and
                  Ievgen Fedorchenko and
                  Vasyl Donenko and
                  Alexandr Stepanenko and
                  Serhii Korniienko and
                  Anastasia Kharchenko},
  title        = {Development of an Evolutionary Optimization method for Financial indicators
                  of pharmacies},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {449--463},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1894},
  doi          = {10.47839/IJC.19.3.1894},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/OliinykFDSKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/OukhatarOB20,
  author       = {Ayoub Oukhatar and
                  Driss El Ouadghiri and
                  Mohamed Bakhouya},
  title        = {New adaptive Rebroadcasting using Neighbour Learning for Wireless
                  Nanosensor Networks},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {638--646},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1999},
  doi          = {10.47839/IJC.19.4.1999},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/OukhatarOB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ParraSQ20,
  author       = {Nelson Enrique Vera Parra and
                  Danilo Alfonso L{\'{o}}pez Sarmiento and
                  Cristian Alejandro Rojas Quintero},
  title        = {Heterogeneous Computing to Accelerate the Search of super k-MERS based
                  on Minimizers},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {525--532},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1985},
  doi          = {10.47839/IJC.19.4.1985},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ParraSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Pavlyshenko20,
  author       = {Bohdan M. Pavlyshenko},
  title        = {Sales Time Series Analytics using Deep Q-Learning},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {434--441},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1892},
  doi          = {10.47839/IJC.19.3.1892},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Pavlyshenko20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Popereshnyak20,
  author       = {Svitlana Popereshnyak},
  title        = {Technique of the Testing of Pseudorandom sequences},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {387--398},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1888},
  doi          = {10.47839/IJC.19.3.1888},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Popereshnyak20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ProdeusD20,
  author       = {Arkadiy Prodeus and
                  Maryna Didkovska},
  title        = {Audio signals clipping Detection using kurtosis and its transforms},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {411--417},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1890},
  doi          = {10.47839/IJC.19.3.1890},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ProdeusD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/QarabashQ20,
  author       = {Noor Ahmed Qarabash and
                  Haneen Qarabash},
  title        = {Twitter Location-based Data: Evaluating the Methods of Data Collection
                  Provided by Twitter {API}},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {583--589},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1992},
  doi          = {10.47839/IJC.19.4.1992},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/QarabashQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/RadhakrishnanK20,
  author       = {Rathish Radhakrishnan and
                  Karpagavadivu Karuppusamy},
  title        = {Cost Effective Energy Efficient Scheme for Mobile Adhoc Network},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {137--146},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1702},
  doi          = {10.47839/IJC.19.1.1702},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/RadhakrishnanK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Resmi020,
  author       = {K. R. Resmi and
                  G. Raju},
  title        = {An Empirical Study and Evaluation on Automatic Ear Detection},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {575--582},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1991},
  doi          = {10.47839/IJC.19.4.1991},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Resmi020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/RodinkoOY20,
  author       = {Mariia Rodinko and
                  Roman Oliynykov and
                  Khalicha Yubuzova},
  title        = {Differential Cryptanalysis of the Lightweight Block Cipher Cypress-256},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {273--281},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1771},
  doi          = {10.47839/IJC.19.2.1771},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/RodinkoOY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/SavenkoSLMV20,
  author       = {Oleg Savenko and
                  Anatoliy Sachenko and
                  Sergii Lysenko and
                  George Markowsky and
                  Nadiia Vasylkiv},
  title        = {Botnet Detection Approach based on the Distributed Systems},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {190--198},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1761},
  doi          = {10.47839/IJC.19.2.1761},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/SavenkoSLMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ShambareSI20,
  author       = {Chikomborero Shambare and
                  Yanxia Sun and
                  OdunAyo Imoru},
  title        = {A Genetic Algorithm-based Approach for three-phase Fault Evaluation
                  in a Distribution Network},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {418--433},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1891},
  doi          = {10.47839/IJC.19.3.1891},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ShambareSI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/SherstiukKGK20,
  author       = {Olha Sherstiuk and
                  Oleksii Kolesnikov and
                  Viktor Gogunskii and
                  Kateryna Kolesnikova},
  title        = {Developing the adaptive Knowledge Management in Context of Engineering
                  Company Project Activities},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {590--598},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1993},
  doi          = {10.47839/IJC.19.4.1993},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/SherstiukKGK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/SklyarK20,
  author       = {Vladimir V. Sklyar and
                  Vyacheslav Kharchenko},
  title        = {Assurance Case for Safety and Security Implementation: a Survey of
                  Applications},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {610--619},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1995},
  doi          = {10.47839/IJC.19.4.1995},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/SklyarK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Stoyanova-Doycheva20,
  author       = {Asya Stoyanova{-}Doycheva and
                  Vanya Ivanova and
                  Todorka Glushkova and
                  Stanimir Stoyanov and
                  Irina Radeva},
  title        = {Dynamic Generation of Cultural Routes in a Tourist Guide},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {39--48},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.1.1691},
  doi          = {10.47839/IJC.19.1.1691},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Stoyanova-Doycheva20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/SuhartonoGWDFA20,
  author       = {Derwin Suhartono and
                  Aryo Pradipta Gema and
                  Suhendro Winton and
                  Theodorus David and
                  Mohamad Ivan Fanany and
                  Aniati Murni Arymurthy},
  title        = {Sequence-to-sequence Learning for motion-Aware Claim Generation},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {620--628},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1997},
  doi          = {10.47839/IJC.19.4.1997},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/SuhartonoGWDFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/TouzaniWEMMA20,
  author       = {Hajar Touzani and
                  Ibtissem Wali and
                  Fatima Errahimi and
                  Anass Mansouri and
                  Nouri Masmoudi and
                  Ali Ahaitouf},
  title        = {A New Optimized Implementation of a Fast intra Prediction mode Decision
                  Algorithm for {HEVC} Standard},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {599--609},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.4.1994},
  doi          = {10.47839/IJC.19.4.1994},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/TouzaniWEMMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/UgryumovaMTUM20,
  author       = {Kateryna Ugryumova and
                  Ievgen Meniailov and
                  Iryna Trofymova and
                  Mykhaylo Ugryumov and
                  Andriy Myenyaylov},
  title        = {Synthesis of robust Optimal control Program for axial Flow Compressor
                  turning Guide vanes},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {347--354},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1882},
  doi          = {10.47839/IJC.19.3.1882},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/UgryumovaMTUM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/Vambol20,
  author       = {Aleksei Vambol},
  title        = {Polynomial-Time Plaintext-Recovery Attack on the Matrix-based Knapsack
                  Cipher},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {474--479},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.3.1896},
  doi          = {10.47839/IJC.19.3.1896},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/Vambol20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ZamulaMKB20,
  author       = {Alexander Zamula and
                  Vladyslav Morozov and
                  Nataliya I. Kalashnykova and
                  Robert Brumnik},
  title        = {Properties and formation of {OFDM} and derived signals},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {257--266},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1769},
  doi          = {10.47839/IJC.19.2.1769},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ZamulaMKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomputing/ZashcholkinDSIP20,
  author       = {Kostiantyn Zashcholkin and
                  Oleksandr Drozd and
                  Yulian Sulima and
                  Olena Ivanova and
                  Ihor Perebeinos},
  title        = {Detection method of the Probable Integrity Violation areas in FPGA-based
                  Safety-Critical Systems},
  journal      = {Int. J. Comput.},
  volume       = {19},
  pages        = {282--289},
  year         = {2020},
  url          = {https://doi.org/10.47839/ijc.19.2.1772},
  doi          = {10.47839/IJC.19.2.1772},
  timestamp    = {Tue, 16 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomputing/ZashcholkinDSIP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics