2018-N2-01
Mohammad Mehdi Hassani, Reza Berangi. An Analytical Model to Calculate Blocking Probability of Secondary User in Cognitive Radio Sensor Networks. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 3-12
|
 |
2018-N2-02
Blerta Haxhijaha, Jaumin Ajdari, Bujar Raufi, Xhemal Zenuni, Florie Ismaili. Query Optimization in Microsoft SQL Server. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 13-22
|
 |
2018-N2-03
Rositsa Doneva, Silvia Gaftandzhieva, George Totkov. Frame Representations in E-learning – Applications and New Developments. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 23-32
|
 |
2018-N2-04
Adish Gholami, Mohsen Mohammadi. A Framework for Designing Pharmaceutical Management Information System. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 33-46
|
 |
2018-N2-05
Igli Hakrama, Neki Frasheri. Agent-Based Modelling and Simulation of an Artificial Economy with Repast. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 47-56
|
 |
2018-N2-06
Aaron Zimba, Mwenge Mulenga. A Dive into the Deep: Demystifying WannaCry Crypto Ransomware Network Attacks Via Digital Forensics. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 57-68
|
 |
2018-N2-07
Shakhnaz Akhmedova, Vladimir Stanovov, Eugene Semenkin. Fuzzy Controlled Cooperative Bio-Inspired Algorithm for Binary Optimization. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 69-78
|
 |
2018-N2-08
Vladimir Stanovov, Shakhnaz Akhmedova, Eugene Semenkin. Designing the Fuzzy Rule Base by Solving a Large-Scale Single-Objective Optimization Problem with Differential Evolution. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 79-88
|
 |
2018-N2-09
Liliya Demidova, Maxim Egin, Roman Tishkin. Novel Modifications of the Multi-Objective Genetic Algorithm for SVM Classifier. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 89-100
|
 |
2018-N2-10
Christina Brester, Ivan Ryzhikov, Olga Semenkina. Generic Scheme of a Restart Meta-Heuristic Operation for Multi-Objective Genetic Algorithms. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 101-110
|
 |
2018-N2-12
Maria Semenkina. A Self-Configuring Genetic Algorithm for the Automated Design of Semi-Supervised Artificial Neural Networks. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 111-118
|
 |
2018-N2-12
Aleksandr Zaloga, Igor Yakimov, Petr Dubinin. Multi-Population Genetic Algorithm for Crystal Structures Solution from X-Ray Powder Diffraction Data. International Journal on Information Technologies and Security, No. 2 (vol. 10), 2018, pp. 119-128
|
 |