|
1 |
Design of an IOT System based on Face Recognition Technology using ESP32-CAM
Mahmoud, Ines;Saidi, Imen;bouzazi, Chadi;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.1-6,
|
|
2 |
The Difference of Invariance, Reliability of The Student Engagement Scale (ESE) In Distance-Learning During Covid-19 Pandemic in Light of Some Students' Characteristics
Almaleki, Deyab A.;Alzahrani, Abdulrahman J.;Alkhairi, Mohammed A.;Albalawi, Farhan A.;Albogami, Hosin A.;Alhajory, Easa S.;Readi, Wadea A.;Idrees, Mohammed A.;Alshamrani, Saleh M.;Alwusaidi, Osama A.;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.7-14,
|
|
3 |
Digital Barrier-Free and Psychosocial Support for Students with Disabilities in Distance Learning Environments
Kravchenko, Oksana;Koliada, Natalia;Berezivska, Larysa;Dikhtyarenko, Svitlana;Baida, Svitlana;Danylevych, Larysa;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.15-24,
|
|
4 |
Latest Information Technologies in the UK Adults Education System
Tverezovska, Nina;Bilyk, Ruslana;Rozman, Iryna;Semerenko, Zhanna;Orlova, Nataliya;Vytrykhovska, Oksana;Oros, Ildiko;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.25-34,
|
|
5 |
Internet Service Evaluation System: A Design Science Research
Babunji, Lujen;Alzahrani, Shahad;Almarghalani, Shada;Babour, Amal;Bitar, Hind;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.35-44,
|
|
6 |
Robust Multi-Objective Job Shop Scheduling Under Uncertainty
Al-Ashhab, Mohamed S.;Alzahrani, Jaber S.;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.45-54,
|
|
7 |
Applications of Machine Learning for Online Learning Systems towards Children with Speech Disorders
Jadi, Amr;Alzahrani, Ali;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.55-60,
|
|
8 |
The Use of Digital Distance Technologies in Higher Education Institutions in the Context of the Development of a System for Assessing the Quality of Education
Sadova, Iryna;Klochek, Lilia;Grodz, Natalia;Baranovska, Valentyna;Voroshchuk, Oksana;Lemko, Halyna;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.61-66,
|
|
9 |
Human Right Requirements in the Metaverse Era
Alkhiri, Talal Agil Attas;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.67-74,
|
|
10 |
The Role of Communication and Dialogue During Studies in Higher Education
Gavrysh, Iryna;Khltobina, Oleksandra;Chernenko, Oleksandr;Roienko, Svitlana;Balanutsa, Oleksandr;Ivashchenko, Bohdan;Romankova, Kateryna;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.75-80,
|
|
11 |
The Use of Digital Technologies for the Economic Development of the Region in the System Of Digitalization of Public Administration
Hennadii, Ferdman;Kryshtanovych, Myroslav;Kurnosenko, Larysa;Lisovskyi, Ihor;Koval, Oleg;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.81-86,
|
|
12 |
A Computer-Aided Text Analysis to Explore Recruitment and Intellectual Polarization Strategies in ISIS Media
Khafaga, Ayman Farid;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.87-96,
|
|
13 |
Formation of New Approaches to the Use of Information Technology and Search For Innovative Methods of Training Specialists within the Pan-European Educational Space
Stratan-Artyshkova, Tetiana;Kozak, Khrystyna;Syrotina, Olena;Lisnevska, Nataliya;Sichkar, Svitlana;Pertsov, Oleksandr;Kuchai, Oleksandr;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.97-104,
|
|
14 |
The Role of Innovative Activities in Training Students Using Computer Technologies
Minenok, Antonina;Donets, Ihor;Telychko, Tetiana;Hud, Hanna;Smoliak, Pavlo;Kurchatova, Angelika;Kuchai, Tetiana;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.105-112,
|
|
15 |
A New Cryptographic Algorithm for Safe Route Transversal of Data in Smart Cities using Rubik Cube
Chhabra, Arpit;Singhal, Niraj;Bansal, Manav;Rizvi, Syed Vilayat;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.113-122,
|
|
16 |
Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component
Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.123-128,
|
|
17 |
An Application of The Islamic Methodology in The Enactment of Commercial Laws and Policy Formulation
Almarashi, Majdi Saeed;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.129-134,
|
|
18 |
Modification of Religion in the Future under the Influence of IT
Chornomordenko, Ivan;Dobrodum, Olga;Khrypko, Svitlana;Gold, Olga;Osadcha, Olena;Chornomordenko, Dmytro;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.135-144,
|
|
19 |
Developing EFL Students' Vocabulary and Reading Comprehension Skills within an Interactive Learning Environment
Alsamadani, Hashem A.;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.145-152,
|
|
20 |
Innovative Technology of Teaching Moodle in Higher Pedagogical Education: from Theory to Pactice
Iryna, Rodionova;Serhii, Petrenko;Nataliia, Hoha;Kushevska, Natalia;Tetiana, Siroshtan;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.153-162,
|
|
21 |
Ensuring Information Security in the System of Public Management of Sustainable Development of the Region: EU Experience
Zahorskyi, Volodymyr;Bobrovskyi, Oleksii;Bondarenko, Dmytro;Karpa, Marta;Akimov, Oleksandr;Akimova, Liudmyla;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.163-168,
|
|
22 |
An Application of The Islamic Methodology in The Enactment of Criminal Laws and Policy Formulation
Almarashi, Majdi Saeed;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.169-174,
|
|
23 |
Development of the Recommender System of Arabic Books Based on the Content Similarity
Alotaibi, Shaykhah Hajed;Khan, Muhammad Badruddin;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.175-186,
|
|
24 |
The role of The Ministry of Commerce and The Capital Market Authority (CMA) in Protecting Shareholders and Holding Directors accountable in Saudi's Corporations
Alzhrani, Abdulrahman AA;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.187-196,
|
|
25 |
Ukrainian Students' Analysis of Abuse Treatment by Parents: Retrospective and Perspective in Virtual and Real Environments
Stoliarchuk, Olesia;Kokhanova, Olena;Prorok, Nataliia;Khrypko, Svitlana;Shevtsova, Olena;Tkachyshyna, Oksana;Lobanchuk, Olena;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.197-207,
|
|
26 |
A Qualitative Study of Saudi Female Programming Lecturers' Attitudes towards Mobile Learning and Teaching Approaches
Alanazi, Afrah;Li, Alice;Soh, Ben;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.208-216,
|
|
27 |
Pedagogical Conditions And Technology Of Formation Of Management Competencies Of Future Specialists Of The System Of Higher Education Institutions
Rebryna, Anatolii;Kukin, Igor;Soltyk, Oleksandr;Tashmatov, Viacheslav;Bilanych, Halyna;Kramarenko, Iryna;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.217-221,
|
|
28 |
Breaking the Silence: Revealing the limits of Preschool Teachers' Cultural and Linguistic Competence (CLC) in Saudi Arabia
Allehyani, Sabha Hakim;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.222-234,
|
|
29 |
The Impact of Digital Technologies on Environmental Management in the Public Administration System of the Regions
Rudenko, Olha;Koltun, Victoriia;Shcherbak, Nataliya;Kononenko, Inna;Konoplia, Yaroslav;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.235-241,
|
|
30 |
Modern Methods of Text Analysis as an Effective Way to Combat Plagiarism
Myronenko, Serhii;Myronenko, Yelyzaveta;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.242-248,
|
|
31 |
Implementation of DevOps based Hybrid Model for Project Management and Deployment using Jenkins Automation Tool with Plugins
Narang, Poonam;Mittal, Pooja;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.249-259,
|
|
32 |
Professional Mobility as a Factor of Professional Success of a Modern Specialist in the Conditions of Distance Learning
Semchuk, Bohdan;Havryliuk, Svitlana;Karnaukh, Lesia;Balakirieva, Viktoriia;Palshkova, Iryna;Leonova, Veronika;Bida, Olena;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.260-268,
|
|
33 |
Anti-Crisis Management In The System Of Economic Security Of International Business
Blakyta, H.V.;Zubko, T.L.;Zhuk, O.S.;Kasianova, A.O.;Guliaieva, N.M.;Vavdiichyk, I.M.;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.269-274,
|
|
34 |
URL Filtering by Using Machine Learning
Saqib, Malik Najmus;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.275-279,
|
|
35 |
Potential Risks Associated with eSportsmen Activities: an Empirical Study
Bonkalo, Tatyana I.;Stepanova, Olga N.;Latushkina, Elena N.;Kozlyatnikov, Oleg A.;Kumancova, Elizaveta S.;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.280-284,
|
|
36 |
A Lens on Idealism and Pragmatism Philosophies and their Learning Influences in EFL: Synthesis Literature Review
Alharthi, Noha Abdullah;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.285-291,
|
|
37 |
Effectiveness of using Cognitive Virtual Tours based on Marzano Model to Develop the Achievement and Historical Research Skills for Secondary School Students
Abdalla, Atef Mohamed Saied;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.292-298,
|
|
38 |
Russian and Foreign Experience in Implementing Departmental Control and Prosecutor's Supervision when Verifying Crime Reports
Ivanov, Dmitriy Aleksandrovich;Moskovtseva, Kristina Andreevna;Bui, Thien Thuong;Sheveleva, Kseniya Vladimirovna;Vetskaya, Svetlana Anatolyevna;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.299-303,
|
|
39 |
A Case Study Exploring the Roles of Mawhiba in Supporting and Saudi Verbal Gifted in the English Language
Alharthi, Noha Abdullah;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.304-322,
|
|
40 |
Reasons for Adopting Weak Opinions in Islamic Jurisprudence
Alharthy, Meshal Qabbas;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.323-327,
|
|
41 |
Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices
Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.328-342,
|
|
42 |
Tumor Segmentation in Multimodal Brain MRI Using Deep Learning Approaches
Al Shehri, Waleed;Jannah, Najlaa;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.343-351,
|
|
43 |
The Concept of Siāsa Shar'iyyah As a Basis of Applying Sharia Law
Almarashi, Majdi Saeed;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.352-356,
|
|
44 |
Historical Review of Who Has Control Over Public Policy Formulation in Islamic Law
Almarashi, Majdi Saeed;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.357-361,
|
|
45 |
Vibration Measurements in the Mining Industry Applying the Software Install Application to the Kosovo Energy Corporation
Luzha, Ibush;Baftiu, Naim;Maloku, Betim;Qarkaxhija, Jusuf;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.362-370,
|
|
46 |
Environment and Development of the Weather Monitoring Application in Kosovo
Shabani, Milazim;Baftiu, Naim;Baftiu, Egzon;Maloku, Betim;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.371-379,
|
|
47 |
Consumer Protection in E-commerce: Synthesis Review of Related Articles and Websites.
Alharthi, Saud Hamoud;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.380-384,
|
|
48 |
Study on Digitalisation of the Tourism Industry in the Regions of the Russian Federation
Ivanova, Raisa;Skrobotova, Olga;Polyakova, Irina;Karaseva, Galina;Strelnikova, Marina;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.385-391,
|
|
49 |
The Historical Development of Consumer Protection
Alharthi, Saud Hamoud;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.392-398,
|
|
50 |
A Comparative Study of Word Embedding Models for Arabic Text Processing
Assiri, Fatmah;Alghamdi, Nuha;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.399-403,
|
|
51 |
Comparative Analysis of IoT Enabled Multi Scanning Parking Model for Prediction of Available Parking Space with Existing Models
Anchal, Anchal;Mittal, Pooja;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.404-412,
|
|
52 |
Consumer Protection in E-commerce: Synthesis Review of Related Books
Alharthi, Saud Hamoud;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.413-419,
|
|
53 |
History of The Legal Developments of Corporations in Saudi Arabia
Alzhrani, Abdulrahman AA;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.420-424,
|
|
54 |
The Concept of Corporations In Saudi Law and Its Relationship With Islamic Law
Alzhrani, Abdulrahman AA;
/
International Journal of Computer Science & Network Security
, v.22, no.8, pp.425-431,
|
|