Browse > Article List

논문
1 Stock News Dataset Quality Assessment by Evaluating the Data Distribution and the Sentiment Prediction
Alasmari, Eman;Hamdy, Mohamed;Alyoubi, Khaled H.;Alotaibi, Fahd Saleh; / International Journal of Computer Science & Network Security , v.22, no.2, pp.1-8,
2 Features of the Socio-Economic Development of the Countries of the World under the influence of the Digital Economy and COVID-19
Kryshtanovych, Svitlana;Prosovych, Olha;Panas, Yaroslav;Trushkina, Nataliia;Omelchenko, Vladyslav; / International Journal of Computer Science & Network Security , v.22, no.2, pp.9-14,
3 Web-based Personal Dose Management System for Data Recording on Dosimeter Usage: A Case of Tanzania Atomic Energy Commission
Mseke, Angela;Ngatunga, John Ben;Sam, Anael;Nyambo, Devotha G.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.15-22,
4 Experience in Using Peer-to-Peer Platforms and Immersive Technologies in the Training of Future Masters of Pharmacy in Medical Lyceum
Volodymyrovych, Tsekhmister Yaroslav;Tetiana, Konovalova;Yaroslavovych, Tsekhmister Bogdan; / International Journal of Computer Science & Network Security , v.22, no.2, pp.23-28,
5 Development FintechEcosystem: Evidence of European Countries for Ukraine
Fedyshyn, Maiia;Abramova, Alla;Morozova, Liudmyla;Lavrov, Ruslan;Kovalova, Olena;Malin, Oleksandr; / International Journal of Computer Science & Network Security , v.22, no.2, pp.29-38,
6 Modern Tendencies of Digitalization of the Financial Services Sphere
Krylov, Denys;Papaika, Oleksandr;Panchenko, Olena;Pylevych, Dmytro;Kozlianchenko, Olena;Konoplia, Nataliia; / International Journal of Computer Science & Network Security , v.22, no.2, pp.39-46,
7 Formation of the Strategy of Digital Marketing of the Enterprise in the Conditions of the Competitiveness Intensification in the International Market
Solntsev, Sergii;Smerichevskyi, Serhii;Skyba, Halyna;Zabashtanska, Tetiana;Bazaliyska, Natalia;Kolbushkin, Yuriy; / International Journal of Computer Science & Network Security , v.22, no.2, pp.47-56,
8 Less than Attractiveness of e-Sports Games for Female Audience - Journalism
Oleksandr, Petryk;Natalia, Sydorenko;Anastasia, Volobuieva; / International Journal of Computer Science & Network Security , v.22, no.2, pp.57-62,
9 Crimean Citizen Journalism: Genesis and Trends in Communication Network
Iuksel, Gaiana Z.;Sydorenko, Natalііa M.;Dosenko, Anzhelika K.;Sytnyk, Oleksii V.;Dubetska, Oksana O.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.63-74,
10 IP camera security: "Security Eyes"
Alshamrani, Sultan S; / International Journal of Computer Science & Network Security , v.22, no.2, pp.75-80,
11 A Novel Black Box Approach For Component Adaptation Technique
Jalender, B.;Govardhan, Dr. A.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.81-90,
12 Specialists' Views Concerning the Assessment, Evaluation, and Programming System (AEPS) in Associations for Children with Disabilities in Saudi Arabia
Munchi, Khiryah S.;Bagadood, Nizar H.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.91-100,
13 Agile Management (Management 3.0) as the Basis of the Management System in the Conditions of Globalization
Kopytko, Marta;Chуrva, Olha;Stavska, Yuliia;Karvatska, Nataliia;Chуrva, Hanna; / International Journal of Computer Science & Network Security , v.22, no.2, pp.101-106,
14 Organizational-Economic Mechanism of the Development of the Agro-Industrial Complex in Modern Conditions
Ivanko, Anatolii;Vasylenko, Nataliia;Bushovska, Lesia;Makedon, Halyna;Dvornyk, Inna; / International Journal of Computer Science & Network Security , v.22, no.2, pp.107-114,
15 A Novel Approach For Component Classifications And Adaptation Using JALTREE Algorithm
Jalender, B.;Govardhan, Dr. A; / International Journal of Computer Science & Network Security , v.22, no.2, pp.115-122,
16 A New Approach for Detection of Gear Defects using a Discrete Wavelet Transform and Fast Empirical Mode Decomposition
TAYACHI, Hana;GABZILI, Hanen;LACHIRI, Zied; / International Journal of Computer Science & Network Security , v.22, no.2, pp.123-130,
17 Innovative Solutions for Design and Fabrication of Deep Learning Based Soft Sensor
Khdhir, Radhia;Belghith, Aymen; / International Journal of Computer Science & Network Security , v.22, no.2, pp.131-138,
18 Future Smart Communication Networks: A Survey of Security issues in Developing a Smart City
AlEisa, Hussah N.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.139-144,
19 Predicting the Saudi Student Perception of Benefits of Online Classes during the Covid-19 Pandemic using Artificial Neural Network Modelling
Beyari, Hasan; / International Journal of Computer Science & Network Security , v.22, no.2, pp.145-152,
20 Vulnerabilities, Threats and Challenges on Cyber Security and the Artificial Intelligence based Internet of Things: A Comprehensive Study
Alanezi, Mohammed Ateeq; / International Journal of Computer Science & Network Security , v.22, no.2, pp.153-158,
21 Artificial Intelligence in Personalized ICT Learning
Volodymyrivna, Krasheninnik Iryna;Vitaliiivna, Chorna Alona;Leonidovych, Koniukhov Serhii;Ibrahimova, Liudmyla;Iryna, Serdiuk; / International Journal of Computer Science & Network Security , v.22, no.2, pp.159-166,
22 Performance Evaluation for a Unicast Vehicular Delay Tolerant Routing Protocol Networks
Abdalla, Ahmed Mohamed; / International Journal of Computer Science & Network Security , v.22, no.2, pp.167-174,
23 A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures
Omari, Ahmed H. Al;Alsariera, Yazan A.;Alhadawi, Hussam S.;Albawaleez, Mahmoud A.;Alkhliwi, Sultan S.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.175-184,
24 Stock Forecasting Using Prophet vs. LSTM Model Applying Time-Series Prediction
Alshara, Mohammed Ali; / International Journal of Computer Science & Network Security , v.22, no.2, pp.185-192,
25 Heterogeneous Parallel Architecture for Face Detection Enhancement
Albssami, Aishah;Sharaf, Sanaa; / International Journal of Computer Science & Network Security , v.22, no.2, pp.193-198,
26 Be Aware -Application for Measuring Crowds Through Crowdsourcing Technique in Makkah Al-Mukarramh
Mirza, Olfat M.;Alharbi, Israa;Khayyat, Sereen;Aleidarous, Rawa;Albishri, Doaa;Alzhrani, Wejdan; / International Journal of Computer Science & Network Security , v.22, no.2, pp.199-208,
27 Isonumber based Iso-Key Interchange Protocol for Network Communication
Dani, Mamta S.;Meshram, Akshaykumar;Pohane, Rupesh;Meshram, Rupali R.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.209-213,
28 Remote Sensing Image Classification for Land Cover Mapping in Developing Countries: A Novel Deep Learning Approach
Lynda, Nzurumike Obianuju;Nnanna, Nwojo Agwu;Boukar, Moussa Mahamat; / International Journal of Computer Science & Network Security , v.22, no.2, pp.214-222,
29 Pragmatic Strategies of Self (Other) Presentation in Literary Texts: A Computational Approach
Khafaga, Ayman Farid; / International Journal of Computer Science & Network Security , v.22, no.2, pp.223-231,
30 Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction
Ahamad, Shahanawaj; / International Journal of Computer Science & Network Security , v.22, no.2, pp.232-240,
31 The Level of ELMS Success in Satisfying Students at Al-Jouf University During the Corona Crisis
Azim, Zeinab M. Abdel;Shahin, Osama R.;Khalaf, Mohamed H. Ragab;Taloba, Ahmed I.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.241-249,
32 Usability Evaluation of Mobile Banking Applications in Digital Business as Emerging Economy
Hamid, Khalid;Iqbal, Muhammad Waseem;Muhammad, Hafiz Abdul Basit;Fuzail, Zubair;Ghafoor, Zahid Tabassum;Ahmad, Sana; / International Journal of Computer Science & Network Security , v.22, no.2, pp.250-260,
33 The Impact of Applying Technical Equipment on the Quality of e-Learning at Northern Border University
Alenezi, Dr. Ahmed Maajoon; / International Journal of Computer Science & Network Security , v.22, no.2, pp.261-271,
34 Accuracy of Phishing Websites Detection Algorithms by Using Three Ranking Techniques
Mohammed, Badiea Abdulkarem;Al-Mekhlafi, Zeyad Ghaleb; / International Journal of Computer Science & Network Security , v.22, no.2, pp.272-282,
35 Modern Technologies of Personnel Management in the Conditions of Digital Economy Development
Boikivska, Galyna;Mokhonko, Ganna;Andrushkiv, Roman;Lytvynova, Larysa;Guk, Olga; / International Journal of Computer Science & Network Security , v.22, no.2, pp.283-289,
36 Cloud Computing Platforms for Big Data Adoption and Analytics
Hussain, Mohammad Jabed;Alsadie, Deafallah; / International Journal of Computer Science & Network Security , v.22, no.2, pp.290-296,
37 Characteristics of the Problems of Socio-Economic Development in the Conditions of Digital Economy
Medynska, Tetyana;Sai, Lesia;Akimkin, Oleksandr;Kruchak, Liudmyla;Doroshenko, Tetiana; / International Journal of Computer Science & Network Security , v.22, no.2, pp.297-303,
38 The Views of Teachers and Parents of Special Education Schools in Saudi Arabia
Bagadood, Nizar H.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.304-310,
39 Systematic Approach to Involving the Tools of Digital Marketing as a Guarantee of the International Business Development
Chernenko, Oksana;Kovalchuk, Svitlana;Perevozova, Iryna;Fayvishenko, Diana;Zaburmekha, Yevgena; / International Journal of Computer Science & Network Security , v.22, no.2, pp.311-317,
40 Parameterization of the Company's Business Model for Machine Learning-Based Marketing Stress Testing
Menkova, Krystyna;Zozulov, Oleksandr; / International Journal of Computer Science & Network Security , v.22, no.2, pp.318-326,
41 Capacity Analysis of Internet Protocol Television (IPTV) over IEEE 802.11ac Wireless Local Area Networks (WLANs)
Virdi, Chander Kant;Shah, Zawar;Levula, Andrew;Ullah, Imdad; / International Journal of Computer Science & Network Security , v.22, no.2, pp.327-333,
42 The Introduction of Modern Technologies in Public Administration in the Context of Globalization
Dragomyretska, Natalia;Palagnyuk, Yuliana;Andriyash, Viktoria;Matvieienko, Iryna;Samofalov, Dmytro; / International Journal of Computer Science & Network Security , v.22, no.2, pp.334-340,
43 Comparison of Home Automation System Using IPV-4 and IPV-6 Based On Mitigate Reconnaissance Attacks
Ali, Muhammad Shujat;Siddiq, Imran;Faisal, Abdullah;Awan, Muhammad Zubair; / International Journal of Computer Science & Network Security , v.22, no.2, pp.341-347,
44 Organizational-Economic Mechanism of Providing Sustainability of the Region's Development Based on the Impact of the Potential-Forming Space in the Conditions of the Creative Economy Formation
Khanin, Semen;Derhaliuk, Marta;Arefieva, Olena;Murashko, Mykola;Nusinova, Olena; / International Journal of Computer Science & Network Security , v.22, no.2, pp.348-356,
45 Health Care Optimization by Maximizing the Air-Ambulance Operation Time
Melhim, Loai Kayed B.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.357-361,
46 Modern Technologies for Ensuring Economic Security in the Context of Achieving High Efficiency of Public Administration
Kryshtanovych, Myroslav;Akimova, Liudmyla;Gavkalova, Nataliia;Akimov, Oleksandr;Shulga, Anastasia; / International Journal of Computer Science & Network Security , v.22, no.2, pp.362-368,
47 Problems of Gender Parity in the State Administration System: Conceptual and Empirical Aspects
Kireieva, Zoia;Sardaryan, Karinna;Voytsekhovska, Yuliya;Britchenko, Igor;Samoilenko, Viktoria;Popova, Yuliia; / International Journal of Computer Science & Network Security , v.22, no.2, pp.369-375,
48 Organizational-Economic Mechanism of Attracting Investment Resources in the Innovative Development of Regions in Teams of Sustainable Development
Krasnonosova, Olena;Perepeliukova, Olena;Papp, Vasyl;Doronina, Maya;Romaniuk, Mykhailo; / International Journal of Computer Science & Network Security , v.22, no.2, pp.376-384,
49 The Mechanism of Labor Motivation as a Determinant of Economic Security of Enterprises in Competitive Conditions
Lagodiienko, Volodymyr;Samoilenko, Viktoria;Pasko, Maryna;Ovod, Larysa;Matsulevych, Yevgeniy; / International Journal of Computer Science & Network Security , v.22, no.2, pp.385-393,
50 Methodological Principles of Didactics Ddevelopment in Educational Activity of Higher Eeducation Institutions
Bortniuk, Tetiana;Smyrnova, Tetiana;Tkachenko, Tetiana;Yakymenko, Svitlana;Pushkar, Larysa;Desiatnyk, Kateryna; / International Journal of Computer Science & Network Security , v.22, no.2, pp.394-398,
51 PR Technology As A Modern Function Of Educational Management
Kovalenko, Yelena;Kovalchuk, Olena;Hotsalyuk, Аlla;Karikov, Sergiy;Havrylo, Olena;Kotlyar, Svitlana; / International Journal of Computer Science & Network Security , v.22, no.2, pp.399-405,
52 Hazelcast Vs. Ignite: Opportunities for Java Programmers
Maxim, Bartkov;Tetiana, Katkova;S., Kruglyk Vladyslav;G., Murtaziev Ernest;V., Kotova Olha; / International Journal of Computer Science & Network Security , v.22, no.2, pp.406-412,
53 Modelling Data Flow in Smart Claim Processing Using Time Invariant Petri Net with Fixed Input Data
Amponsah, Anokye Acheampong;Adekoya, Adebayo Felix;Weyori, Benjamin Asubam; / International Journal of Computer Science & Network Security , v.22, no.2, pp.413-423,
54 Website and Digital Content between Material Property and Intellectual Ownership Rights within the Legal Regulation of Internet
Azab, Rania S.; / International Journal of Computer Science & Network Security , v.22, no.2, pp.424-435,