https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/issue/feedInternational Journal of Computer (IJC)2025-04-04T14:43:55+00:00Prof. Feras Fareseditor1@ijcjournal.orgOpen Journal Systems<p>The <a title="International Journal of Computer (IJC) home page" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double peer review process (within 4 weeks). For detailed information about the journal kindly check <a title="About the Journal" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/about">About the Journal</a> page. </p> <p>All <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p> </p>https://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2350Best Practices for Personal Data Protection in Scalable Enterprise Applications2025-02-28T08:21:12+00:00Serhii Onishchenkoserhiy.onishchenko@gmail.com<p>This article examines existing methods for protecting personal data in corporate applications, considering modern challenges in dynamic and distributed cloud environments. The study includes an extensive analysis of encryption techniques, such as proxy encryption, DNA encryption, dual encryption with fragmentation, and homomorphic encryption, as well as mechanisms for ensuring data integrity and access control. These mechanisms include cryptographic hash functions, digital signatures, message authentication codes (MAC), role-based and attribute-based access control, federated authentication, and multi-factor authentication. The research also reviews publicly available studies found on the Internet. Particular attention is given to the specifics of data protection in cloud infrastructures, where high intensity, data fragmentation, and the lack of physical security control necessitate architectural solutions such as Trusted Virtual Data Centre (TVDc) and Tera Architecture, along with the integration of security measures into the software development lifecycle (SDLC). The materials presented in this study are relevant to researchers, system architects, and corporate IT infrastructure practitioners seeking to synthesize theoretical and empirical approaches to achieve a high level of information security in the face of rapidly evolving threats.</p>2025-04-22T00:00:00+00:00Copyright (c) 2025 Serhii Onishchenkohttps://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2359Defensive Cybersecurity Preparedness Assessment Model for Universities2025-03-12T07:25:24+00:00William Kipkoech Toowtoo@egerton.ac.ke<p>Broadband and internet access has become readily available to citizens across the globe as a result the recent uptake of fiber connectivity. General Cyber Security threats like malware attacks, social engineering scams and financial frauds have increased. Though numerous security models have been advanced by NIST and ISO standards, but the frightening truth is that escalating cyber-attacks are still on the rise. This is because most existing security analysis tools focus mainly on detecting attacks. Despite the steady flow of security updates and patches, this scenario has led to a continued rise of attack surface in institutions of higher learning where students and staff sensitive information and valuable assets is of high stake. Therefore, the purpose of this study is to establish the factors for effective defensive cyber security in Universities. The study utilized a survey method to collect data from cyber security experts of the sampled universities. The study targeted 27 respondents (ICT experts) from 5 universities both public and private that were purposively sampled in Kenya. 23 questionnaires were returned translating to 85% response rate. This was very sufficient for the study. Correlation analysis was carried and the findings indicated a statistically significant relationship for human factors (87.7%), technology factors (83.5%), and policy factors (83.2%) on defensive cyber security preparedness. Multiple linear regression was also done to predict the extent of the effect of each independent variable on defensive cyber security preparedness. In conclusion, the study noted that, all the three cyber security factors were significant hence there was a need to enhance them so as to improve security against the advancing threat landscape across all sectors especially institutions of higher learning like universities.</p>2025-04-07T00:00:00+00:00Copyright (c) 2025 William Kipkoech Toohttps://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2354Innovative Solutions for Enhancing System Performance on the .net Platform2025-03-07T15:32:11+00:00Mykhailo Karpenkohi@mkrp.dev<p>This study examines architectural solutions and scaling approaches on the .NET platform in the development of distributed web applications. The impact of microservices and ASP.NET Core MVC on response speed, system resilience, and resource efficiency is analyzed. Methods of automation aimed at monitoring metrics and dynamically managing computing power are discussed. A review of research detailing codebase organization, testing, and cloud service deployment is presented. Special attention is given to DevOps practices that facilitate seamless functionality updates and reduce the risk of overloads during peak traffic periods. It is noted that collaboration among specialists from different fields accelerates product releases and simplifies task management of varying complexity. Additionally, conclusions are drawn on containerization strategies that streamline component integration and optimize communication in scalable projects. Approaches to service orchestration and automated quality control are also explored, extending CI/CD capabilities and increasing process transparency in software development. The systematization of collected data contributes to a deeper understanding of the principles behind building high-load solutions on the .NET platform. Future research perspectives are also considered. This study will be valuable for web development specialists, DevOps engineers, and IT team leaders.</p>2025-04-07T00:00:00+00:00Copyright (c) 2025 hi@mkrp.devhttps://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2365Analyse of Weather Forecasting Models Using LSTM with Noise Removal Methods2025-03-28T04:00:34+00:00Ngedawnge0722@gmail.comNyein Nyein Oonyeinnyeinoo2024@gmail.com<p>Weather forecasting is one of the most important fields for all sectors such as transportation (air traffic, marine), industry, agriculture, forestry and even public health sector. The aim of this study is to analyse the weather forecasting models using filtering techniques which can remove the noise involved in the time series weather data. We utilize ten years weather data (2013 to 2022) in Hmawbi region, Yangon, Myanmar. The weather dataset includes maximum and minimum temperatures, humidity, wind speed, cloud amount and weather type. It is taken from the Department of Meteorology and Hydrology, Myanmar. The original data includes noise data. Thus, two noise removal methods, Simple Moving Average and Weighted Moving Average, are used for data cleaning. In this paper, three prediction models are developed by using Long Short-Term Memory (LSTM) with different datasets: one with the original data (without noise removal), one with data cleaned using the Simple Moving Average method, and another with data cleaned using the Weighted Moving Average method. The research goal is to compare and evaluate the performance of these three weather prediction models to determine which one gives the better results. To evaluate these models, Root Mean Square Error (RMSE) and Mean Square Error (MSE) are calculated for each model. LSTM achieves RMSE of 5.398 and MSE of 29.020, SMA achieves RMSE of 3.767 and MSE of 14.841, WMA achieves RMSE of 0.798 and MSE of 0.534. According to the experimental results, it is found that model with data cleaned using the Weighted Moving Average method is lower error rates than other two models and gives the better predicting results than other two models.</p>2025-04-22T00:00:00+00:00Copyright (c) 2025 Nge, Nyein Nyein Oohttps://www.ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2355The Evolution of Test Automation: From Selenium to Playwright. A Comparison of Automation Tools: Selenium vs. Playwright vs. Cypress2025-03-07T15:32:56+00:00Anatolii Tymoshchukanatolii.tymoshchuk17@gmail.com<p>This study examines the evolution of web application test automation tools, focusing on a comparative analysis of Selenium, Playwright, and Cypress. The research justifies the relevance of transitioning from the traditional Selenium-based approach to modern frameworks that offer higher performance and stability in the rapidly evolving landscape of web applications. The study follows a methodology that involves sequential execution of test scenarios of varying complexity, including a simple static site test, end-to-end testing in a production environment, and a comprehensive test suite evaluation. Key performance metrics such as average execution time, standard deviation, and coefficient of variation are assessed. The findings indicate that Playwright demonstrates the best performance for testing dynamic web applications, while Cypress, despite an initial slowdown in simple scenarios, becomes competitive when executing local test suites. The article provides practical recommendations for selecting an automation tool based on the characteristics of the tested applications and outlines future development prospects, including the integration of artificial intelligence technologies and the optimization of CI/CD processes. This research addresses an existing gap in the field and offers practical solutions to enhance the quality and efficiency of modern web application testing. The findings will be of interest to researchers in software engineering, quality assurance professionals, test system architects, and academic professionals seeking to integrate advanced methodologies into software development and testing processes.</p>2025-04-22T00:00:00+00:00Copyright (c) 2025 Anatolii Tymoshchuk