Archives

2023

Published: 2023-03-30

Augmenting The Cloud Environment Security Through Blockchain Based Hash Algorithms

1-6

Open full text

Comparison of an effectiveness of artificial neural networks for various activation functions

7-12

Open full text

Performance analysis of user interface implementation methods in mobile applications

13-17

Open full text

Comparative analysis of web applications implemented in: PHP and Python

18-22

Open full text

Comparative analysis of social media accessibility

23-28

Open full text

Comparative analysis of transfer protocols asynchronous messages on systems queuing

29-32

Open full text

Usability analysis of advertising websites interfaces with the use of the universal design principles

33-41

Open full text

A comparative analysis of contemporary integrated java environments

42-47

Open full text

Choosing the optimal database system to create a CRM system

48-53

Open full text

Analysis of the usability and accessibility of public transport online timetables in selected cities in Poland

54-62

Open full text

Analysis of configuration distribution methods in service application environments

63-67

Open full text

A Researching users' knowledge in the Field of Instant Messengers Security

68-74

Open full text

Performance analysis of working with databases with Spring and Symfony

75-82

Open full text

The analysis of Blender open-source software cloth simulation capabilities

83-87

Open full text

Comparative analysis of selected programming frameworks dedicated to SPA applications

88-92

Open full text

Comparative analysis of code execution time by C and Python based on selected algorithms

93-99

Open full text