|
1 |
Neural Network Self-Organizing Maps Model for Partitioning PV Solar Power
Munshi, Amr;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.1-4,
|
|
2 |
Fuzzy Partitioning of Photovoltaic Solar Power Patterns
Munshi, Amr;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.5-10,
|
|
3 |
State Management of the Development of National Cybersecurity Systems
Kryshtanovych, Myroslav;Storozhev, Roman;Malyshev, Kostiantyn;Munko, Anna;Khokhba, Olena;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.11-16,
|
|
4 |
A Survey of Advances in Hierarchical Clustering Algorithms and Applications
Munshi, Amr;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.17-24,
|
|
5 |
Impact of Military Actions on the EU Labor Market
Kopytko, Marta;Franchuk, Vasyl;Panchenko, Vladimir;Viunyk, Olha;Myshchyshyn, Olha;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.25-30,
|
|
6 |
Using ICT in the HEIs in the Study of the Philological Sciences
Iryna, Kominiarska;Roman, Dubrovskyi;Inna, Volianiuk;Natalya, Yanus;Oleksandr, Hryshchenko;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.31-38,
|
|
7 |
European Experience in Implementing Innovative Educational Technologies in the Field of Culture and the Arts: Current Problems and Vectors of Development
Kdyrova, I.O.;Grynyshyna, M.O.;Yur, M.V.;Osadcha, O.A.;Varyvonchyk, A.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.39-48,
|
|
8 |
Differential Item Functioning (DIF) of the Arabic Version of the SONTUS
Alhaythami, Hassan M.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.49-54,
|
|
9 |
Means of Visualization in Teaching Ukrainian as a Foreign Language to Modern Students with Clip Way of Thinking
Kushnir, Iryna;Zozulia, Iryna;Hrytsenko, Olha;Uvarova, Tetiana;Kosenko, Iuliia;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.55-60,
|
|
10 |
The Role of Didactic Games and Exercises in the Sensory Development of Preschoolers
Zdanevych, Larysa;Chagovets, Alla;Gontar, Zoriana;Onyschuk, Iryna;Lanetska, Yulia;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.61-66,
|
|
11 |
Clustering of PV Load Patterns Based on Any Colony Centroid Model
Munshi, Amr;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.67-72,
|
|
12 |
Application of Deep Learning: A Review for Firefighting
Shaikh, Muhammad Khalid;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.73-78,
|
|
13 |
Pedagogical Conditions for Formation of Design Competence of Qualified Workers with the Use of Information Technologies
Slipchyshyn, Lidiia;Honcharuk, Oksana;Anikina, Inessa;Yakymenko, Polina;Breslavska, Hanna;Yakymenko, Svitlana;Opria, Ihor;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.79-88,
|
|
14 |
Access Control Models for XML Databases in the Cloud
Alfaqir, Shumukh;Hendaoui, Saloua;Alhablani, Fatimah;Alenzi, Wesam;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.89-96,
|
|
15 |
Intrusion Detection using Attribute Subset Selector Bagging (ASUB) to Handle Imbalance and Noise
Priya, A.Sagaya;Kumar, S.Britto Ramesh;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.97-102,
|
|
16 |
IoT Security and Machine Learning
Almalki, Sarah;Alsuwat, Hatim;Alsuwat, Emad;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.103-114,
|
|
17 |
Virtual Assets as the Newest Object of Property Rights
Davydova, Iryna;Zhurylo, Serhii;Tserkovna, Olena;Herasymchuk, Lidiia;Tokareva, Vira;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.115-120,
|
|
18 |
A Survey on the Performance Comparison of Map Reduce Technologies and the Architectural Improvement of Spark
Raghavendra, GS;Manasa, Bezwada;Vasavi, M.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.121-126,
|
|
19 |
Effective Methods for Heart Disease Detection via ECG Analyses
Yavorsky, Andrii;Panchenko, Taras;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.127-134,
|
|
20 |
Comparing Results of Classification Techniques Regarding Heart Disease Diagnosing
AL badr, Benan Abdullah;AL ghezzi, Raghad Suliman;AL moqhem, ALjohara Suliman;Eljack, Sarah;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.135-142,
|
|
21 |
Enhanced CNN Model for Brain Tumor Classification
Kasukurthi, Aravinda;Paleti, Lakshmikanth;Brahmaiah, Madamanchi;Sree, Ch.Sudha;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.143-148,
|
|
22 |
The Effect of Using the Interactive Electronic Models in Teaching Mathematical Concepts on Students Achievement in the University Level
Alzahrani, Yahya Mizher;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.149-153,
|
|
23 |
Digital Marketing Tools for Managing the Development of Park and Recreation Complexes
Chaikovska, Maryna;Mashika, Hanna;Mankovska, Ruslana;Liulchak, Zoreslava;Haida, Pavlo;Diakova, Yana;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.154-162,
|
|
24 |
Linguistic and Stylistic Markers of Influence in the Essayistic Text: A Linguophilosophic Aspect
Kolkutina, Viktoriia;Orekhova, Larysa;Gremaliuk, Tetiana;Borysenko, Natalia;Fedorova, Inna;Cheban, Oksana;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.163-167,
|
|
25 |
Theoretical Foundations of Management of the Education System: Optimization of the Complex of Organizational and Pedagogical Conditions for Effective Management
Yuryk, Olha;Sitsinskiy, Nazariy;Zaika, Liudmyla;Рshenychna, Lіubov;Boiko, Svitlana;Filipovych, Myroslava;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.168-174,
|
|
26 |
COVID-19 Diagnosis from CXR images through pre-trained Deep Visual Embeddings
Khalid, Shahzaib;Syed, Muhammad Shehram Shah;Saba, Erum;Pirzada, Nasrullah;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.175-181,
|
|
27 |
Information Seeking Behaviour of Distance Learners: What has Changed During the Covid-19?
Alturki, Ryan;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.182-192,
|
|
28 |
Adversarial Machine Learning: A Survey on the Influence Axis
Alzahrani, Shahad;Almalki, Taghreed;Alsuwat, Hatim;Alsuwat, Emad;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.193-203,
|
|
29 |
Self-sufficiencies in Cyber Technologies: A requirement study on Saudi Arabia
Alhalafi, Nawaf;Veeraraghavan, Prakash;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.204-214,
|
|
30 |
Bankruptcy Protection Law in US With Focus on The Bankruptcy Abuse Prevention And Consumer Act Of 2005
Alharthi, Saud Hamoud;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.215-219,
|
|
31 |
The Effect of a Web Quests Instructional Program on Developing Saudi EFL Learning Habits
Alsamadani, Hashem A.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.220-224,
|
|
32 |
A Client-Side App Model for Classifying and Storing Documents
Elhussein, Bahaeldein;Karrar, Abdelrahman Elsharif;Khalifa, Mahmoud;Alsharani, Mohammed Mujib;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.225-233,
|
|
33 |
Investigation of the Effect of Blockchain-based Cryptocurrencies on Tourism Industry
Rashideh, Waleed;Alkhathami, Mohammed;Obidallah, Waeal J.;Alduraywish, Yousef;Alshammari, Abdulaziz;Alsahli, Abdulaziz;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.234-244,
|
|
34 |
Gifted Students' Viewpoints on Using Educational Technology in their Schools in the Saudi Context
Alammari, Abdullah;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.245-249,
|
|
35 |
Obstructions of Using Educational Technology in Gifted Students' Schools In Jeddah: Learners' Voices
Alammari, Abdullah;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.250-254,
|
|
36 |
An Updated Evidence-based Practice Review on Teaching Mathematics to Students with Intellectual Disabilities
Alhwaiti, Mohammed M.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.255-265,
|
|
37 |
Effects of Gamification-Based Learning on Learners' Achievement Motivation at First-Grade Intermediate Level
Al-Sulami, Sami Ben Shamlan Bakhit;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.266-276,
|
|
38 |
Phishing Email Detection Using Machine Learning Techniques
Alammar, Meaad;Badawi, Maria Altaib;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.277-283,
|
|
39 |
Criminal And Legal Protection Of Information Relations
Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.284-288,
|
|
40 |
Formation Of Tolerance Of Higher Education Seekers As The Main Feature Of A Modern Specialist
Fabian, Myroslava;Kuzmenko, Nadiia;Zamrozevych-Shadrina, Svitlana;Perevozniuk, Viktoriia;Tolcheyeva, Tetiana;Kramarenko, Iryna;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.289-293,
|
|
41 |
An Ensemble Approach to Detect Fake News Spreaders on Twitter
Sarwar, Muhammad Nabeel;UlAmin, Riaz;Jabeen, Sidra;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.294-302,
|
|
42 |
The Bill of Exchange's Regulations and the Implications of its Abolition on the Commercial Community
Alharthi, Saud Hamoud;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.303-311,
|
|
43 |
Peculiarities of Pedagogical Technologies in Distance Education
Biliavska, Tetiana;Lianna, Olha;Shuliakov, Igor;Babicheva, Hanna;Vashchuk, Liudmyla;Savchenko, Nataliia;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.312-316,
|
|
44 |
The Effect of the Sentence Location on Arabic Sentiment Analysis
Alotaibi, Saud S.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.317-319,
|
|
45 |
Human Rights in The Context of Digitalization. International-Legal Analysis
Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.320-326,
|
|
46 |
Micro-Learning Concepts and Principles
Almalki, Mohammad Eidah Messfer;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.327-329,
|
|
47 |
Comparative Analysis of Machine Learning Models for Crop's yield Prediction
Babar, Zaheer Ud Din;UlAmin, Riaz;Sarwar, Muhammad Nabeel;Jabeen, Sidra;Abdullah, Muhammad;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.330-334,
|
|
48 |
Formation of the Digital Generation in a Distance Learning Environment
Nataliіa, Levchenko;Nataliia, Sukhostavets;Lesia, Zelman;Alla, Kulichenko;Kseniia, Balabanova;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.335-341,
|
|
49 |
Data Security on Cloud by Cryptographic Methods Using Machine Learning Techniques
Gadde, Swetha;Amutharaj, J.;Usha, S.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.342-347,
|
|
50 |
A Hybrid Soft Computing Technique for Software Fault Prediction based on Optimal Feature Extraction and Classification
Balaram, A.;Vasundra, S.;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.348-358,
|
|
51 |
Development Web-based Arabic Assessments for Deaf and Hard-of-Hearing Students
Atwan, Jaffar;Wedyan, Mohammad;Abbas, Abdallah;Gazzawe, Foziah;Alturki, Ryan;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.359-367,
|
|
52 |
Hakeem: An Arabic Application Aimed to Teaching Children First Aid using Augmented Reality
Al-ajlan, Monirah;Altukhays, Wujud;Alyousef, Deema;Almansour, Aljawharah;Alsukayt, Layan;Alajlan, Halah;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.368-374,
|
|
53 |
Virtual and Augmented Reality Technologies in the Organization of Modern Library Media Space
Horban, Yurii;Gaisynuik, Nataliya;Dolbenko, Tetiana;Karakoz, Olena;Kobyzhcha, Nataliia;Kulish, Yuliia;
/
International Journal of Computer Science & Network Security
, v.22, no.5, pp.375-380,
|
|