Contents IJITS, No. 2 (Vol. 14), 2022

IJITS is a scientific journal included in Emerging Sources Citation Index (ESCI) of Web of Science (Clarivate Analytics). Additional information about indexing and referring can be found on cover 3 – see “2022-N3-Covers” and on page 2 of “2022-N2-00”. Recommendation for article citation:

Author’s name(s). Title of the paper. International Journal on Information Technologies and Security,
ISSN 1313-8251, vol. 14, No x, 2022, pp. xx-xx.
2022-N2-Covers

All Covers of the issue

2022-N2-00

Contents of the issue
International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 1-2.

2022-N2-01
Naveen Kumar, D. Annapurna.
Energy efficient data transmission model for Internet of Things application, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 3-14.
2022-N2-02
Hrushikesh Joshi, Uttam Patil, Anand Diggikar.
Energy minimization and task deadline aware workload scheduling (EMTDA-WS), International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 15-26.
2022-N2-03
Irakli Basheleishvili, Sergo Tsiramua, Avtandil Bardavelidze.
Algorithmization and realization of the software tool for the software code quality assessment, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 27-38.
2022-N2-04
O. Ja. Kravets, I. A. Aksenov, P. A. Rahman.
Algorithmization of analytical methods for finding motion vectors when processing image series, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 39-50.
2022-N2-05
Ahmed A. Alsheikhy.
Evaluation of power dissipation and energy in a robotic system, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 51-62.
2022-N2-06
Stefan Paskalovski, Mihail Digalovski.
Simulation models for induction machine protection analysis, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 63-74.
2022-N2-07
Radi Romansky.
Evaluation of experimental data from monitoring and simulation of network communication parameters. International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 75-86.
2022-N2-08
Ranjana Battur, Jagadisha N.
A performance aware contents based image retrieval (CBIR) techniques, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 87-98.
2022-N2-09
Yoana Ivanova.
Simulation modelling of artificial neural networks for the purpose of steganalysis, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 99-110.
2022-N2-10
Marwan Albahar, Mohammed Thanoon, Abdulaziz Albahr.
The use of fractal dimension (FD) analysis in detection of anomalies, sabotages, and malicious acts in a cyber-physical system using Higuchi’s algorithm, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 111-121.
2022-N2-99 – Information & Dissemination

International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 122-124.