International Journal of Computer (IJC) https://ijcjournal.org/index.php/InternationalJournalOfComputer <p>The <a title="International Journal of Computer (IJC) home page" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener"><strong>International Journal of Computer (IJC)</strong></a> is an open access International Journal for scientists and researchers to publish their scientific papers in Computer Science related fields. <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> plays its role as a refereed international journal to publish research results conducted by researchers.</p> <p>This journal accepts scientific papers for publication after passing the journal's double peer review process (within 4 weeks). For detailed information about the journal kindly check <a title="About the Journal" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/about">About the Journal</a> page. </p> <p>All <a title="International Journal of Computer (IJC)" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/index" target="_blank" rel="noopener">IJC</a> published papers in Computer Science will be available for scientific readers for free; no fees are required to download published papers in this international journal.</p> <p> </p> en-US <p style="text-align: justify;">Authors who submit papers with this journal agree to the <a title="Copyright Notice" href="https://ijcjournal.org/index.php/InternationalJournalOfComputer/Copyright_Notice" target="_blank" rel="noopener">following terms</a>.&nbsp;</p> editor1@ijcjournal.org (Prof. Feras Fares) support@gssrr.org (Technical Support) Sat, 17 May 2025 21:11:24 +0000 OJS 3.3.0.9 http://blogs.law.harvard.edu/tech/rss 60 Leadership and Mentorship Models in Software Quality Management https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2382 <p>This paper explores the synergy between leadership and mentorship models in driving improvements in software quality. Through a literature review, the study identifies that transformational and situational leadership—when combined with proactive mentorship practices—significantly enhance the effectiveness of quality assurance systems in IT projects. The structured Six Sigma methodology supports this process by reducing defects, optimizing development workflows, and enabling continuous improvement. The findings underscore that integrating managerial practices with the DMAIC framework serves as an effective means of cultivating a corporate culture centered on innovation and quality. Such integration is particularly vital for boosting competitiveness in the software development industry. The article offers valuable insights for both academic researchers and IT management professionals, as well as software quality experts aiming to embed modern leadership and mentorship theories into strategic management models to improve development and quality control outcomes. The paper’s analytical approach not only contrasts different leadership frameworks but also identifies optimal paths for implementing mentorship practices, thereby contributing to the advancement of management processes in the context of digital transformation.</p> Ivanchenko Yevhenii Copyright (c) 2025 Ivanchenko Yevhenii https://creativecommons.org/licenses/by-nc-nd/4.0 https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2382 Fri, 23 May 2025 00:00:00 +0000 Analyzing the Performance of ECLAT Algorithm for Large Datasets by Comparing K-means and Gaussian Mixture Model https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2341 <p>Frequent Itemset Mining (FIM) is a technique that transforms historical data into useful information by identifying beneficial patterns. The ECLAT method uses depth-first search to intersect the transaction ID sets with the corresponding k<sup>th </sup>item sets in order to calculate the support items. While searching for the best-selling products, ECLAT uses a lot of memory and processing time due to the enormous number of transaction ID sets. To overcome these problems, the clustering method combines with the ECLAT algorithm to retrieve the support items. Description elements 100,000 to 400,000 were used to retrieve the support items of the most popular selling goods. For the K-means clustering approach, the optimal value of k is 8 clusters according to the 0.59 silhouette value. For the Gaussian Mixture Model, the ideal value of k is 14 clusters based on a 0.59 silhouette score value between 100,000 and 400,000 data items. After clustering the same product items, the ECLAT algorithm retrieves the support items by applying a minimum support value of 0.00001 in this investigation. According to the experimental results, the Gaussian Mixture Model not only offers more flexibility for clustering the same items but also reduces the memory usage and execution times. The outcomes of this investigation indicate that the Gaussian Mixture Model provides more efficient enhancement of the performance of the ECLAT algorithm than the K-means algorithm.</p> Nandar Lin, Thanda Win Copyright (c) 2025 Nandar Lin, Thanda Win https://creativecommons.org/licenses/by-nc-nd/4.0 https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2341 Tue, 06 May 2025 00:00:00 +0000 Modern Approaches to Automating QA Processes in the Context of Digital Transformation https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2383 <p>The article examines approaches to automating quality assurance (QA) processes within the framework of digital transformation. Based on an extensive analysis of publicly available literature, the work describes how the transition from traditional manual methods to flexible automated solutions contributes to reducing the time required for developing test scripts, enhancing the accuracy of defect detection, and improving the overall efficiency of QA processes. The author’s hypothesis is that the integration of AI methods into QA processes not only shortens the time needed for test script development but also increases defect detection accuracy by optimizing test scenarios and employing flexible analysis algorithms. The scientific novelty of the article lies in the development of a new perspective on the use of automation methods in QA processes, made possible by the literature review. The material will be useful for other researchers as well as for professionals working in the fields of information technology, digital transformation management, and process automation who aim to integrate advanced testing methods into the infrastructure of modern IT systems. It is particularly valuable for academic teams, strategic analysts, and top managers seeking scientifically substantiated solutions for the optimization and sustainable development of QA processes in the dynamically evolving digital economy.</p> Anna Deviatko Copyright (c) 2025 Anna Deviatko https://creativecommons.org/licenses/by-nc-nd/4.0 https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2383 Tue, 10 Jun 2025 00:00:00 +0000 A Method for Identifying and Assessing Phishing Attacks in Communication Messages https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2374 <p>Phishing attacks have become a significant threat in online communication platforms. These attacks exploit human vulnerabilities by using deceptive messages to steal sensitive information or distribute malicious content. This paper presents a comprehensive phishing detection system, leveraging machine learning and multi-layered analysis of URLs, files, and message content. The proposed system integrates URL analysis, file analysis, and text analysis services to identify potential threats effectively. Experimental results demonstrate the efficacy of the approach, achieving high accuracy in detecting phishing attempts. This research contributes to the field of cybersecurity by providing a robust framework for identifying and mitigating phishing risks in real-time communication.</p> Modestas Krištaponis, Jevgenijus Toldinas Copyright (c) 2025 Modestas Krištaponis, Jevgenijus Toldinas https://creativecommons.org/licenses/by-nc-nd/4.0 https://ijcjournal.org/index.php/InternationalJournalOfComputer/article/view/2374 Tue, 20 May 2025 00:00:00 +0000