2022-N2-Covers
All Covers of the issue
|
 |
2022-N2-00
Contents of the issue International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 1-2.
|
 |
2022-N2-01
Naveen Kumar, D. Annapurna. Energy efficient data transmission model for Internet of Things application, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 3-14.
|
 |
2022-N2-02
Hrushikesh Joshi, Uttam Patil, Anand Diggikar. Energy minimization and task deadline aware workload scheduling (EMTDA-WS), International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 15-26.
|
 |
2022-N2-03
Irakli Basheleishvili, Sergo Tsiramua, Avtandil Bardavelidze. Algorithmization and realization of the software tool for the software code quality assessment, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 27-38.
|
 |
2022-N2-04
O. Ja. Kravets, I. A. Aksenov, P. A. Rahman. Algorithmization of analytical methods for finding motion vectors when processing image series, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 39-50.
|
 |
2022-N2-05
Ahmed A. Alsheikhy. Evaluation of power dissipation and energy in a robotic system, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 51-62.
|
 |
2022-N2-06
Stefan Paskalovski, Mihail Digalovski. Simulation models for induction machine protection analysis, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 63-74.
|
 |
2022-N2-07
Radi Romansky. Evaluation of experimental data from monitoring and simulation of network communication parameters. International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 75-86.
|
 |
2022-N2-08
Ranjana Battur, Jagadisha N. A performance aware contents based image retrieval (CBIR) techniques, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 87-98.
|
 |
2022-N2-09
Yoana Ivanova. Simulation modelling of artificial neural networks for the purpose of steganalysis, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 99-110.
|
 |
2022-N2-10
Marwan Albahar, Mohammed Thanoon, Abdulaziz Albahr. The use of fractal dimension (FD) analysis in detection of anomalies, sabotages, and malicious acts in a cyber-physical system using Higuchi’s algorithm, International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 111-121.
|
 |
2022-N2-99 – Information & Dissemination
International Journal on Information Technologies and Security, No. 2 (vol. 14), 2022, pp. 122-124.
|
 |