Skip to main content
Skip to main navigation menu
Skip to site footer
Open Menu
International Journal of Computer (IJC)
About
About the Journal
Editorial Team
Submissions
Contact
Current
Archives
Call for Papers 2026: January
Announcements
Search
Register
Login
Home
/
Archives
/
Vol. 57 No. 1 (2026)
Vol. 57 No. 1 (2026)
Published:
2026-01-28
Articles
Data Integrity Validation Methodologies for High-Volume Healthcare ETL Pipelines: Automated Testing Strategies and Quality Assurance Frameworks
Mehulkumar Joshi
255-264
pdf
SSE Event-Contract Design for Frontend Communication with Intelligent Agents: An Analytical Architectural Perspective
Tounzal Elias
245-254
pdf
A Hybrid Cryptography and Steganography Approach Using RSA and LSB for Secure Message Transmission
Ida Ayu Gde Suwiprabayanti Putra, Gst. Ayu Vida Mastrika Giri, Ngakan Putu Bagus Ananta Wijaya, Desak Putu Tia Rusilia Wati
229-244
pdf
Event Correlation and Request Tracing in Asynchronous Microservice Architectures
Gleb D. Shkriabin
219-228
pdf
The Role of Cloud Technologies in the Development of the Connected Car Ecosystem and the Internet of Things
Madugula Abhiram
211-218
pdf
Algorithmic Approaches to Trust and Safety in Real-Time Social Discovery
Venkata Karunakara Reddy Revunuru
200-210
pdf
Engineering Autonomous Multi-Agent Software Systems: Implementing Hybrid Architectures, Interaction Protocols, and Execution Loops
Mykhailo Nykoliuk
275-289
pdf
Bridging the Paradigm Gap: A Framework for Interoperability between Classical IoT and Quantum Computing Networks
Abu Elhassan M. Elamin
265-274
pdf
Personnel Strategies for the Formation of Engineering Teams for High-Load Projects
Shatukha Ivan
1-10
pdf
Comparative Analysis of Leader Election Algorithms In Distributed Systems
Yevhen Piotrovskyi
11-26
PDF
Strategies for Handling Barge-in Interruptions in Conversational AI Interfaces
Dhaval Hemant Shah
27-37
pdf
An Econometric Framework for Estimating the Joint Elasticity of Advertising and Promotions on Retail Sales
Shruti Dash
38-49
pdf
Reducing “Unknown Certificate” Risk at Scale: A Comparative Evaluation of TLS Certificate Discovery Architectures
Vasilii Turuntaev
50-64
pdf
Implementation of Zero-Trust Architecture in Mobile Applications of the Financial Sector
Pankiv Oleg
65-74
pdf
Evolution of Cloud LMS Architecture: From Local Spreadsheet Workflows to a Distributed White-Label System
Burmistrov Aleksandr
75-86
pdf
Conceptual Approaches to Organizing Feature Stores in High-Load Machine Learning Systems
Artem Korkhov
87-96
pdf
Vehicle Feature VQA: Visual Question Answering for Vehicle Feature
Pa Pa Tun, Khin Mar Soe
97-105
pdf
Powering the Future of AI – Leveraging Mukkudam SHP's Clean Energy for Sustainable Computational Intelligence
Unni Siva Sankar
106-118
pdf
AI-Driven Predictive Maintenance in Retail IT Systems Using DevOps: A Review
Suresh Gangula, Satyanarayana Gudimetla
119-130
pdf
Applying Machine Learning for Network Security Monitoring in Kubernetes Environments
Matvii Horskyi
131-151
pdf
Development of Quality Assurance Standards for the Industrialization of Software Applications Prototyped Using Intelligent Assistants
Andrii Shaliev
152-162
pdf
Distributed Caching and Real-Time Sync in Active-Active Environments for Critical Cloud Native Systems
Rahul Ganta, Rajkumar shevagani, Suchitra Masiragani
163-181
pdf
Using Machine Learning to Identify Strategic Brand Growth Points
Daria Malykina
182-189
pdf
Methodological Aspects of Integrating Security Processes into Continuous Development Pipelines (CI/CD Security)
Praveen Ravula
190-199
pdf
Developed By
Open Journal Systems
Make a Submission
Make a Submission
Information
For Readers
For Authors
For Librarians
Browse
Categories
Latest publications