|
1 |
Stock News Dataset Quality Assessment by Evaluating the Data Distribution and the Sentiment Prediction
Alasmari, Eman;Hamdy, Mohamed;Alyoubi, Khaled H.;Alotaibi, Fahd Saleh;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.1-8,
|
|
2 |
Features of the Socio-Economic Development of the Countries of the World under the influence of the Digital Economy and COVID-19
Kryshtanovych, Svitlana;Prosovych, Olha;Panas, Yaroslav;Trushkina, Nataliia;Omelchenko, Vladyslav;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.9-14,
|
|
3 |
Web-based Personal Dose Management System for Data Recording on Dosimeter Usage: A Case of Tanzania Atomic Energy Commission
Mseke, Angela;Ngatunga, John Ben;Sam, Anael;Nyambo, Devotha G.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.15-22,
|
|
4 |
Experience in Using Peer-to-Peer Platforms and Immersive Technologies in the Training of Future Masters of Pharmacy in Medical Lyceum
Volodymyrovych, Tsekhmister Yaroslav;Tetiana, Konovalova;Yaroslavovych, Tsekhmister Bogdan;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.23-28,
|
|
5 |
Development FintechEcosystem: Evidence of European Countries for Ukraine
Fedyshyn, Maiia;Abramova, Alla;Morozova, Liudmyla;Lavrov, Ruslan;Kovalova, Olena;Malin, Oleksandr;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.29-38,
|
|
6 |
Modern Tendencies of Digitalization of the Financial Services Sphere
Krylov, Denys;Papaika, Oleksandr;Panchenko, Olena;Pylevych, Dmytro;Kozlianchenko, Olena;Konoplia, Nataliia;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.39-46,
|
|
7 |
Formation of the Strategy of Digital Marketing of the Enterprise in the Conditions of the Competitiveness Intensification in the International Market
Solntsev, Sergii;Smerichevskyi, Serhii;Skyba, Halyna;Zabashtanska, Tetiana;Bazaliyska, Natalia;Kolbushkin, Yuriy;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.47-56,
|
|
8 |
Less than Attractiveness of e-Sports Games for Female Audience - Journalism
Oleksandr, Petryk;Natalia, Sydorenko;Anastasia, Volobuieva;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.57-62,
|
|
9 |
Crimean Citizen Journalism: Genesis and Trends in Communication Network
Iuksel, Gaiana Z.;Sydorenko, Natalііa M.;Dosenko, Anzhelika K.;Sytnyk, Oleksii V.;Dubetska, Oksana O.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.63-74,
|
|
10 |
IP camera security: "Security Eyes"
Alshamrani, Sultan S;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.75-80,
|
|
11 |
A Novel Black Box Approach For Component Adaptation Technique
Jalender, B.;Govardhan, Dr. A.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.81-90,
|
|
12 |
Specialists' Views Concerning the Assessment, Evaluation, and Programming System (AEPS) in Associations for Children with Disabilities in Saudi Arabia
Munchi, Khiryah S.;Bagadood, Nizar H.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.91-100,
|
|
13 |
Agile Management (Management 3.0) as the Basis of the Management System in the Conditions of Globalization
Kopytko, Marta;Chуrva, Olha;Stavska, Yuliia;Karvatska, Nataliia;Chуrva, Hanna;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.101-106,
|
|
14 |
Organizational-Economic Mechanism of the Development of the Agro-Industrial Complex in Modern Conditions
Ivanko, Anatolii;Vasylenko, Nataliia;Bushovska, Lesia;Makedon, Halyna;Dvornyk, Inna;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.107-114,
|
|
15 |
A Novel Approach For Component Classifications And Adaptation Using JALTREE Algorithm
Jalender, B.;Govardhan, Dr. A;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.115-122,
|
|
16 |
A New Approach for Detection of Gear Defects using a Discrete Wavelet Transform and Fast Empirical Mode Decomposition
TAYACHI, Hana;GABZILI, Hanen;LACHIRI, Zied;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.123-130,
|
|
17 |
Innovative Solutions for Design and Fabrication of Deep Learning Based Soft Sensor
Khdhir, Radhia;Belghith, Aymen;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.131-138,
|
|
18 |
Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City
AlEisa, Hussah N.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.139-144,
|
|
19 |
Predicting the Saudi Student Perception of Benefits of Online Classes during the Covid-19 Pandemic using Artificial Neural Network Modelling
Beyari, Hasan;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.145-152,
|
|
20 |
Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study
Alanezi, Mohammed Ateeq;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.153-158,
|
|
21 |
Artificial Intelligence in Personalized ICT Learning
Volodymyrivna, Krasheninnik Iryna;Vitaliiivna, Chorna Alona;Leonidovych, Koniukhov Serhii;Ibrahimova, Liudmyla;Iryna, Serdiuk;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.159-166,
|
|
22 |
Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks
Abdalla, Ahmed Mohamed;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.167-174,
|
|
23 |
A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures
Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.175-184,
|
|
24 |
Stock Forecasting Using Prophet vs. LSTM Model Applying Time-Series Prediction
Alshara, Mohammed Ali;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.185-192,
|
|
25 |
Heterogeneous Parallel Architecture for Face Detection Enhancement
Albssami, Aishah;Sharaf, Sanaa;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.193-198,
|
|
26 |
Be Aware -Application for Measuring Crowds Through Crowdsourcing Technique in Makkah Al-Mukarramh
Mirza, Olfat M.;Alharbi, Israa;Khayyat, Sereen;Aleidarous, Rawa;Albishri, Doaa;Alzhrani, Wejdan;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.199-208,
|
|
27 |
Isonumber based Iso-Key Interchange Protocol for Network Communication
Dani, Mamta S.;Meshram, Akshaykumar;Pohane, Rupesh;Meshram, Rupali R.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.209-213,
|
|
28 |
Remote Sensing Image Classification for Land Cover Mapping in Developing Countries: A Novel Deep Learning Approach
Lynda, Nzurumike Obianuju;Nnanna, Nwojo Agwu;Boukar, Moussa Mahamat;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.214-222,
|
|
29 |
Pragmatic Strategies of Self (Other) Presentation in Literary Texts: A Computational Approach
Khafaga, Ayman Farid;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.223-231,
|
|
30 |
Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction
Ahamad, Shahanawaj;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.232-240,
|
|
31 |
The Level of ELMS Success in Satisfying Students at Al-Jouf University During the Corona Crisis
Azim, Zeinab M. Abdel;Shahin, Osama R.;Khalaf, Mohamed H. Ragab;Taloba, Ahmed I.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.241-249,
|
|
32 |
Usability Evaluation of Mobile Banking Applications in Digital Business as Emerging Economy
Hamid, Khalid;Iqbal, Muhammad Waseem;Muhammad, Hafiz Abdul Basit;Fuzail, Zubair;Ghafoor, Zahid Tabassum;Ahmad, Sana;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.250-260,
|
|
33 |
The Impact of Applying Technical Equipment on the Quality of e-Learning at Northern Border University
Alenezi, Dr. Ahmed Maajoon;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.261-271,
|
|
34 |
Accuracy of Phishing Websites Detection Algorithms by Using Three Ranking Techniques
Mohammed, Badiea Abdulkarem;Al-Mekhlafi, Zeyad Ghaleb;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.272-282,
|
|
35 |
Modern Technologies of Personnel Management in the Conditions of Digital Economy Development
Boikivska, Galyna;Mokhonko, Ganna;Andrushkiv, Roman;Lytvynova, Larysa;Guk, Olga;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.283-289,
|
|
36 |
Cloud Computing Platforms for Big Data Adoption and Analytics
Hussain, Mohammad Jabed;Alsadie, Deafallah;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.290-296,
|
|
37 |
Characteristics of the Problems of Socio-Economic Development in the Conditions of Digital Economy
Medynska, Tetyana;Sai, Lesia;Akimkin, Oleksandr;Kruchak, Liudmyla;Doroshenko, Tetiana;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.297-303,
|
|
38 |
The Views of Teachers and Parents of Special Education Schools in Saudi Arabia
Bagadood, Nizar H.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.304-310,
|
|
39 |
Systematic Approach to Involving the Tools of Digital Marketing as a Guarantee of the International Business Development
Chernenko, Oksana;Kovalchuk, Svitlana;Perevozova, Iryna;Fayvishenko, Diana;Zaburmekha, Yevgena;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.311-317,
|
|
40 |
Parameterization of the Company's Business Model for Machine Learning-Based Marketing Stress Testing
Menkova, Krystyna;Zozulov, Oleksandr;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.318-326,
|
|
41 |
Capacity Analysis of Internet Protocol Television (IPTV) over IEEE 802.11ac Wireless Local Area Networks (WLANs)
Virdi, Chander Kant;Shah, Zawar;Levula, Andrew;Ullah, Imdad;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.327-333,
|
|
42 |
The Introduction of Modern Technologies in Public Administration in the Context of Globalization
Dragomyretska, Natalia;Palagnyuk, Yuliana;Andriyash, Viktoria;Matvieienko, Iryna;Samofalov, Dmytro;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.334-340,
|
|
43 |
Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks
Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.341-347,
|
|
44 |
Organizational-Economic Mechanism of Providing Sustainability of the Region's Development Based on the Impact of the Potential-Forming Space in the Conditions of the Creative Economy Formation
Khanin, Semen;Derhaliuk, Marta;Arefieva, Olena;Murashko, Mykola;Nusinova, Olena;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.348-356,
|
|
45 |
Health Care Optimization by Maximizing the Air-Ambulance Operation Time
Melhim, Loai Kayed B.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.357-361,
|
|
46 |
Modern Technologies for Ensuring Economic Security in the Context of Achieving High Efficiency of Public Administration
Kryshtanovych, Myroslav;Akimova, Liudmyla;Gavkalova, Nataliia;Akimov, Oleksandr;Shulga, Anastasia;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.362-368,
|
|
47 |
Problems of Gender Parity in the State Administration System: Conceptual and Empirical Aspects
Kireieva, Zoia;Sardaryan, Karinna;Voytsekhovska, Yuliya;Britchenko, Igor;Samoilenko, Viktoria;Popova, Yuliia;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.369-375,
|
|
48 |
Organizational-Economic Mechanism of Attracting Investment Resources in the Innovative Development of Regions in Teams of Sustainable Development
Krasnonosova, Olena;Perepeliukova, Olena;Papp, Vasyl;Doronina, Maya;Romaniuk, Mykhailo;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.376-384,
|
|
49 |
The Mechanism of Labor Motivation as a Determinant of Economic Security of Enterprises in Competitive Conditions
Lagodiienko, Volodymyr;Samoilenko, Viktoria;Pasko, Maryna;Ovod, Larysa;Matsulevych, Yevgeniy;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.385-393,
|
|
50 |
Methodological Principles of Didactics Ddevelopment in Educational Activity of Higher Eeducation Institutions
Bortniuk, Tetiana;Smyrnova, Tetiana;Tkachenko, Tetiana;Yakymenko, Svitlana;Pushkar, Larysa;Desiatnyk, Kateryna;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.394-398,
|
|
51 |
PR Technology As A Modern Function Of Educational Management
Kovalenko, Yelena;Kovalchuk, Olena;Hotsalyuk, Аlla;Karikov, Sergiy;Havrylo, Olena;Kotlyar, Svitlana;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.399-405,
|
|
52 |
Hazelcast Vs. Ignite: Opportunities for Java Programmers
Maxim, Bartkov;Tetiana, Katkova;S., Kruglyk Vladyslav;G., Murtaziev Ernest;V., Kotova Olha;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.406-412,
|
|
53 |
Modelling Data Flow in Smart Claim Processing Using Time Invariant Petri Net with Fixed Input Data
Amponsah, Anokye Acheampong;Adekoya, Adebayo Felix;Weyori, Benjamin Asubam;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.413-423,
|
|
54 |
Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet
Azab, Rania S.;
/
International Journal of Computer Science & Network Security
, v.22, no.2, pp.424-435,
|
|