Faculty Of Information Technology 1
1. Enhancing internet of things security against structured query language injection and brute force attacks through federated learning
2. Differential Analysis of a Cryptographic Hashing Algorithm HBC-256
3. Evaluation of the strength and performance of a new hashing algorithm based on a block cipher
4. Polynomial Commitment in a Verkle Tree Based on a Non-Positional Polynomial Notation
5. SOFTWARE ANALYSIS OF SCIENTIFIC TEXTS: COMPARATIVE STUDY OF DISTRIBUTED COMPUTING FRAMEWORKS
6. A Pilot Study on Thermal Comfort in Young Adults: Context-Aware Classification Using Machine Learning and Multimodal Sensors
7. A Review of Artificial Intelligence and Deep Learning Approaches for Resource Management in Smart Buildings
8. AI-Powered Building Ecosystems: A Narrative Mapping Review on the Integration of Digital Twins and LLMs for Proactive Comfort, IEQ, and Energy Management
9. About one lightweight encryption algorithm ensuring the security of data transmission and communication between internet of things devices
10. Research active posterior rhinomanometry tomography method for nasal breathing determining violations
11. Risk Assessment of Cryptojacking Attacks on Endpoint Systems: Threats to Sustainable Digital Agriculture
12. A Hybrid CNN–GRU–LSTM Algorithm with SHAP-Based Interpretability for EEG-Based ADHD Diagnosis
13. A Systematic Review of Machine Learning in Credit Card Fraud Detection Under Original Class Imbalance
14. FraudX AI: An Interpretable Machine Learning Framework for Credit Card Fraud Detection on Imbalanced Datasets
15. Application of a Hybrid Model for Data Analysis in Hydroponic Systems
16. Numerical modelling of the process of thermal treatment of oil slime
17. Synthesis of an adaptive control system for unstable and deterministic chaotic processes with m-inputs and n-outputs
18. Synthesis of an adaptive control system for unstable and deterministic chaotic processes with m-inputs and n-outputs
19. Immunological Markers of Cardiovascular Pathology in Older Patients
20. A maximum power point tracking control for wind energy conversion systems using regularized data-enabled predictive control
21. Assessing wind energy exploitation potential in several regions of Viet Nam using Kernel density estimation model
22. RETRACTED ARTICLE:An Intelligent Algorithm Optimum for Building Design of Fuzzy Structures (Iranian Journal of Science and Technology, Transactions of Civil Engineering, (2020), 44, 2, (523-531), 10.1007/s40996-019-00251-5)
23. Report on optimisation for efficient dynamic task distribution in drone swarms using QRDPSO algorithm
24. Global, regional, and national burden of low back pain, 1990–2020, its attributable risk factors, and projections to 2050: a systematic analysis of the Global Burden of Disease Study 2021
25. An Integrated Model of Emotional Intelligence, Leadership, and Game Playability in Enhancing Team Effectiveness in MMOGs
26. Linear Layer Architecture Based on Cyclic Shift and XOR
27. Application of Fuzzy Neural Networks in Combustion Process Diagnostics
28. Neural Network-Based Analysis of Flame States in Pulverised Coal and Biomass Co-Combustion
29. Survey on Online Learning at Universities of Slovakia, Czech Republic and Kazakhstan during the COVID-19 Pandemic
30. Application of Stork Optimization Algorithm for Solving Sustainable Lot Size Optimization
31. Magnificent Frigatebird Optimization: A New Bio-Inspired Metaheuristic Approach for Solving Optimization Problems
32. Sculptor Optimization Algorithm: A New Human-Inspired Metaheuristic Algorithm for Solving Optimization Problems
33. Research of Machine Learning Algorithms for the Development of Intrusion Detection Systems in 5G Mobile Networks and Beyond
34. Greedy Texts Similarity Mapping
35. Development and Study of an Encryption Algorithm
36. Secret Sharing Scheme with Share Verification Capability
37. Statistical analysis of the key scheduling of the new lightweight block cipher
38. The influence of building height on microclimate and human activities in urban open spaces
39. The ECTLC-Horcrux Protocol for Decentralized Biometric-Based Self-Sovereign Identity with Time-Lapse Encryption
40. Predicting Industrial Copper Hydrometallurgy Output with Deep Learning Approach Using Data Augmentation
41. A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature
42. Dual-scale adaptive attention-based Vision transformer with iterative refinement for clarity and consistency in multi-focus image fusion
43. Hybrid Neural Architectures Combining Convolutional and Recurrent Networks for the Early Detection of Retinal Pathologies
44. Optical and Electronic Expert System for Diagnosing Eye Pathology in Glaucoma
45. Ontology-Driven Semantic Analysis of Tabular Data: An Iterative Approach with Advanced Entity Recognition
46. Smart technologies of the risk-management and decision-making systems in a fuzzy data environment
47. Application of mathematical methods in pharmacology
48. AI-driven framework for automated competency formalization: from professional standards to adaptive learning outcomes
49. Correction: AI-driven framework for automated competency formalization: from professional standards to adaptive learning outcomes (Frontiers in Computer Science, (2025), 7, (1710358), 10.3389/fcomp.2025.1710358)
50. Numerical Study of the Dynamics of Medical Data Security in Information Systems
1 2