Данные - 004.6

Научные статьи

В разделе "Данные"
An Improved Popular Items Extraction for Covering Reduction Collaborative Filtering
Abubakar Roko, Umar Muhammad Bello, Abba Almu
Sentiment Analysis CSAM Model to Discover Pertinent Conversations in Twitter Microblogs
Imen Fadhli, Lobna Hlaoua, Mohamed Nazih Omri
Dynamic Editing Distance-based Extracting Relevant Information Approach from Social Networks
Mohamed Nazih Omri, Fethi Fkih
Orphan Adoption Management System using Machine Learning Approach
R. Kaladevi, Jeevitha B., Jeevitha V., Madhumitha P., Shanmugasundaram Hariharan, Andraju Bhanu Prasad
Detection of DDOS Attacks on Cloud Computing Environment Using Altered Convolutional Deep Belief Networks
S. Sureshkumar, G.K.D. Prasanna Venkatesan, R. Santhosh
Emerging Trends in Database and its Applications in MNC’s
Anushri Gupta, Ritu Shrivastava, Jay Kumar Jain
Denoising Self-Distillation Masked Autoencoder for Self-Supervised Learning
Jiashu Xu, Sergii Stirenko
Face Recognition Using Modified Histogram of Oriented Gradients and Convolutional Neural Networks
Raveendra K., Ravi J., Khalid Nazim Abdul Sattar
An E-mail Spam Detection using Stacking and Voting Classification Methodologies
Aasha Singh, Awadhesh Kumar, Ajay Kumar Bharti, Vaishali Singh
Secure Access of Folders and Files after Removal of Duplicacy over the Cloud
A. Archana, N. Kumar, Mohammad Zubair Khan
Assessing Similarity between Software Requirements: A Semantic Approach
Farooq Ahmad, Mohammad Faisal
Ontology-driven Intelligent IT Incident Management Model
Bisrat Betru, Fekade Getahun
A Survey on Security Threats to Machine Learning Systems at Different Stages of its Pipeline
Akshay Dilip Lahe, Guddi Singh
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach
Najla Odeh, Sherin Hijazi
Artificial Intelligence Based Domotics Using Multimodal Security
Khandaker Mohammad Mohi Uddin, Naimur Rahman, Md. Mahbubur Rahman, Samrat Kumar Dey
An Enhanced Approach to Recommend Data Structures and Algorithms Problems Using Content-based Filtering
Aayush Juyal, Nandini Sharma, Pisati Rithya, Sandeep Kumar
A Decision-Making Technique for Software Architecture Design
Jubayer Ahamed, Dip Nandi
A Systematic Review of 3D Metaphoric Information Visualization
A.S.K. Wijayawardena, Ruvan Abeysekera, M.W.P. Maduranga
Intelligent Analysis of Ukrainian-language Tweets for Public Opinion Research based on NLP Methods and Machine Learning Technology
Oleh Prokipchuk, Victoria Vysotska, Petro Pukach, Vasyl Lytvyn, Dmytro Uhryn, Yuriy Ushenko, Zhengbing Hu
Dynamic Load Balancing in Cloud Computing: A Convergence of PSO, GSA, and Fuzzy Logic within a Hybridized Metaheuristic Framework
Rajgopal K.T., Abhishek S. Rao, Ramaprasad Poojary, Deepak D.
Explainable Fake News Detection Based on BERT and SHAP Applied to COVID-19
Xiuping Men, Vladimir Y. Mariano
Load Balancing Mechanism for Edge-Cloud-Based Priorities Containers
Wael Hadeed, Dhuha Basheer Abdullah
Pure-Octet Extraction based Technique for Identifying Malicious URLs based on IP Address Attributes
Aasha Singh, Awadhesh Kumar, Ajay Kumar Bharti, Vaishali Singh
Evaluating Linear and Non-linear Dimensionality Reduction Approaches for Deep Learning-based Network Intrusion Detection Systems
Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere
Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network
Rajan Prasad, Praveen Kumar Shukla
An Analytical Study of Cloud Security Enhancements
Imran Khan, Tanya Garg
Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification
Priyanka Desai
AI-Driven Network Security: Innovations in Dynamic Threat Adaptation and Time Series Analysis for Proactive Cyber Defense
Mansoor Farooq, Mubashir Hassan Khan
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Gilson da Silva Francisco, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Eduardo Takeo Ueda, Adilson Eduardo Guelfi, Jose Jesus Perez Alcazar
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
Method for Constructing Neural Network Means for Recognizing Scenes of Political Extremism in Graphic Materials of Online Social Networks
Ihor Tereikovskyi, Rabah AlShboul, Shynar Mussiraliyeva, Liudmyla Tereikovska, Kalamkas Bagitova, Oleh Tereikovskyi, Zhengbing Hu
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Santhosh Kumar Medishetti, Ganesh Reddy Karri
Depression Detection: Unveiling Mental Health Insights with Twitter Data and BERT Models
Rohini Kancharapu, Sri Nagesh Ayyagari
Python Data Analysis and Visualization in Java GUI Applications Through TCP Socket Programming
Bala Dhandayuthapani V.
A Progressive Key Administration for Block-Chain Technology with Lagrange Interpolation
Pradeep Kumar, Ajay Kumar, Mukesh Raj, Priyank Sirohi
Brain Ischemic Stroke Detection through Deep Learning: A Systematic Review on CT vs MRI vs CTA Images
Rathin Halder, Nusrat Sharmin
Enhancing Healthcare Information Systems in Ethiopian Hospitals: Exploring Challenges and Prospects of a Cloud-based Model for Smart and Sustainable Information Services
Aschalew Arega, Durga Prasad Sharma
Comparative Analysis of LSTM Variants for Stock Price Forecasting on NSE India: GRU's Dominance and Enhancements
Milind Kolambe, Sandhya Arora
An Automated Solution for Secure Password Management
Prageeth Fernando, Navinda Dissanayake, Venusha Dushmantha, Chamara Liyanage, Chamila Karunatilake
Hive-Based Data Encryption for Securing Sensitive Data in HDFS
Shivani Awasthi, Narendra Kohli