Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Данные - 004.6
Научные статьи
В разделе "Данные"
An Improved Popular Items Extraction for Covering Reduction Collaborative Filtering
Sentiment Analysis CSAM Model to Discover Pertinent Conversations in Twitter Microblogs
Dynamic Editing Distance-based Extracting Relevant Information Approach from Social Networks
Orphan Adoption Management System using Machine Learning Approach
Detection of DDOS Attacks on Cloud Computing Environment Using Altered Convolutional Deep Belief Networks
Emerging Trends in Database and its Applications in MNC’s
Denoising Self-Distillation Masked Autoencoder for Self-Supervised Learning
Face Recognition Using Modified Histogram of Oriented Gradients and Convolutional Neural Networks
An E-mail Spam Detection using Stacking and Voting Classification Methodologies
Secure Access of Folders and Files after Removal of Duplicacy over the Cloud
Assessing Similarity between Software Requirements: A Semantic Approach
Ontology-driven Intelligent IT Incident Management Model
A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach
Artificial Intelligence Based Domotics Using Multimodal Security
An Enhanced Approach to Recommend Data Structures and Algorithms Problems Using Content-based Filtering
A Decision-Making Technique for Software Architecture Design
A Systematic Review of 3D Metaphoric Information Visualization
Intelligent Analysis of Ukrainian-language Tweets for Public Opinion Research based on NLP Methods and Machine Learning Technology
Dynamic Load Balancing in Cloud Computing: A Convergence of PSO, GSA, and Fuzzy Logic within a Hybridized Metaheuristic Framework
Explainable Fake News Detection Based on BERT and SHAP Applied to COVID-19
Load Balancing Mechanism for Edge-Cloud-Based Priorities Containers
Pure-Octet Extraction based Technique for Identifying Malicious URLs based on IP Address Attributes
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network
An Analytical Study of Cloud Security Enhancements
Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification
AI-Driven Network Security: Innovations in Dynamic Threat Adaptation and Time Series Analysis for Proactive Cyber Defense
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Method for Constructing Neural Network Means for Recognizing Scenes of Political Extremism in Graphic Materials of Online Social Networks
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Depression Detection: Unveiling Mental Health Insights with Twitter Data and BERT Models
Python Data Analysis and Visualization in Java GUI Applications Through TCP Socket Programming
A Progressive Key Administration for Block-Chain Technology with Lagrange Interpolation
Brain Ischemic Stroke Detection through Deep Learning: A Systematic Review on CT vs MRI vs CTA Images
Enhancing Healthcare Information Systems in Ethiopian Hospitals: Exploring Challenges and Prospects of a Cloud-based Model for Smart and Sustainable Information Services
Comparative Analysis of LSTM Variants for Stock Price Forecasting on NSE India: GRU's Dominance and Enhancements
An Automated Solution for Secure Password Management
Hive-Based Data Encryption for Securing Sensitive Data in HDFS
← Предыдущая
Следующая страница →
1
|
...
|
9
|
10
|
11
|
12
|
13
|
14
|
15
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.