Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
International Journal of Computing
Home
Current
Special Issues
Archives
Announcements
About
About the Journal
Submissions
Editorial Team
Privacy Statement
Contact
Search
Search
Register
Login
Search
Search
Home
/
Archives
/
2025, Volume 24, Issue 3
2025, Volume 24, Issue 3
Published:
2025-09-30
Articles
Double-Layer Encryption using Chemical Periodic Table and a Pseudo-random Number Generator
Jose Paredes-Malaga, Roxana Flores-Quispe, Yuber Velazco-Paredes
443-451
PDF
Mathematical Model of a Social Network User Profile Based on Interval Data Analysis
Mykola Dyvak, Tyande Pan, Oleksandr Kindzerskyi
452-459
PDF
MASC: A Dataset for the Development and Classification of Mobile Applications Screens
Moheb R. Girgis, Alaa M. Zaki, Enas Elgeldawi, Mohamed M. Abdallah, Ali A. Ahmed
460-473
PDF
A Novel Isogeny-Based Digital Signature Scheme with Enhanced Efficiency and Security
Mohammed El Baraka, Siham Ezzouak
474-479
PDF
A Metaheuristic Machine Learning Approach for Darknet Traffic Classification
Ahmed Hassan Hassan
480-492
PDF
A Novel Decentralized Federated Incremental Learning Framework for ECG and EEG Signal Analysis
Rostom Mennour, Sofiane Blikaze, Samy Benaissa
493-504
PDF
Association Rule Mining in SQL to Improve Demand Forecasting using LSTM
Pandega Abyan Zumarsyah, Fariza Eka Aulia
505-512
PDF
Multi-Coalition Multi-Agent Decision Making System Synthesis
Victor Ababii, Viorica Sudacevschi, Silvia Munteanu, Viorel Carbune, Olesea Borozan
513-519
PDF
Evaluating the Quality of Class Diagrams Generated by GPT-4 Model
Keletso J. Letsholo
520-535
PDF
Performance Comparison of Classification Algorithms for Face Anti-Spoofing using Codebook Features
Swapnil R. Shinde, Sudeep D. Thepade, Anupkumar M. Bongale
536-544
PDF
The Sound and Sight of Confidence: An Audiovisual ML Approach
Jyothsna AN, Pamela Vinitha Eric, M.S. Smitha Rao
545-551
PDF
Information Technologies for Digital Control of Transporters of Book Blocks Conveyor Dryers Drive
Bohdana Fedyna, Olga Fedevych, Yurii Lysyi, Nataliia Lysa, Liubomyr Sikora
552-558
PDF
Neural Cryptography Based on Tree Parity Machine to Generate OTP
Vera Wati, Nur Fitrianingsih Hasan
559-569
PDF
The Video Images Coding Method for Special-Purpose Info Communication Systems
Ivan Tupitsya, Volodymyr Kryvonos, Sergii Kibitkin, Albert Lekakh
570-577
PDF
Improved Computing Performance for Floyd-Warshall Algorithm in the MapReduce architectures
Nguyen Dinh Lau, Le Thanh Tuan
578-584
PDF
Analysis of the Impact of Encryption on the Traffic Volumes of IoT Protocols
Viktor Kozel, Oleksii Ivanchuk, Ievgeniia Drozdova, Olena Prykhodko
585-592
PDF
Transforming IIoT Security Leveraging Deep Learning and Feature Selection for Superior Intrusion Detection
Lahcen Idouglid, Said Tkatek, Khalid El Fayq
593-602
From Security Informed Safety to Safety Informed Security: Methodology and Case for PLC-based I&C Assessment
Oleksandr Ivasiuk, Vyacheslav Kharchenko, Heorhii Zemlianko
603-610
PDF
Paper template (PDF)
Paper template (MS Word)
Paper template (MS Word) *.docx
Paper template (LaTeX)
Information
For Readers
For Authors
For Librarians