Данные - 004.6

Научные статьи

В разделе "Данные"
Определение уникальности походки человека с использованием инерциальных датчиков портативного устройства
Столяров Александр Юрьевич
О реализации проекта просопографической информационной системы по приказным служащим Российского государства начала XVII века
Колесников Андрей Михайлович, Светлов Андрей Владимирович, Широкий Александр Александрович
Методологические подходы к исследованию эффективности процессов региональной информатизации
Калинина А.Э., Кущев М.В.
Экспертиза в обеспечении информационно-психологической безопасности
Сорокотягин И.Н.
Психологические особенности лиц, совершающих преступления в глобальных компьютерных сетях
Осипенко А.Л.
Semantic Management Information Modeling based on Theory of Concept Lattices
Hui Xu, Chunzhi Wang, Hongwei Chen, Zhiwei Ye
Density-Based LLE Algorithm for Network Forensics Data
Peng Tao, Chen Xiaosu, Liu Huiyu, Chen Kai
A Scheme for Evaluating XML Engine on RDBMS
Guannan Si, Zhengji Zhou, Nan Li, Jing Xu, Jufeng Yang
An Efficient Method of Steganography using Matrix Approach
Nirmalya Chowdhury, Puspita Manna
Efficient Optimization of Edge Server Selection Technique in Content Delivery Network
Debabrata Sarddar, Enakshmi Nandi
Speed up linear scan in high-dimensions by sorting one-dimensional projections
Jiangtao Cui, Bin Xiao, Gengdai Liu, Lian Jiang
Means of the Semantic Search Personification on base of Ontological Approach
Rogushina J.
The Application of Bayesian Classification Theories in Distance Education System
Ma Da, Wei Wei, Hu Hai-guang, Guan Jian-he
COCOMO Estimates Using Neural Networks
Anupama Kaushik, Ashish Chauhan, Deepak Mittal, Sachin Gupta
The Impact of Feature Selection on Web Spam Detection
Jaber Karimpour, Ali A. Noroozi, Adeleh Abadi
Sentiment Analysis: A Perspective on its Past, Present and Future
Akshi Kumar, Teeja Mary Sebastian
A link and Content Hybrid Approach for Arabic Web Spam Detection
Heider A. Wahsheh, Mohammed N. Al-Kabi, Izzat M. Alsmadi
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques
Sreenivasa Rao Basavala, Narendra Kumar, Alok Agarrwal
Using Description Logics to specify a Document Synthesis System
Souleymane KOUSSOUBE, Roger NOUSSI, Balira O. KONFE
A Rough Sets-based Agent Trust Management Framework
Sadra Abedinzadeh, Samira Sadaoui
Semantic Schema Matching Using DBpedia
Saira Gillani, Muhammad Naeem, Raja Habibullah, Amir Qayyum
A New Inaccuracy Measure for Fuzzy Sets and its Application in Multi-Criteria Decision Making
Rajkumar Verma, Bhu Dev Sharma
Hierarchical Clustering Algorithm based on Attribute Dependency for Attention Deficit Hyperactive Disorder
J Anuradha, B K Tripathy
Improvement of GVSRM with Addressing the Interoperability Issues in Global Village
Mohammad Reza Mollahoseini Ardakani, Seyyed Mohsen Hashemi
Comparison of New Multilevel Association Rule Algorithm with MAFIA
Arpna Shrivastava, R. C. Jain, Ajay Kumar Shrivastava
QoS Metrics for Cloud Computing Services Evaluation
Amid Khatibi Bardsiri, Seyyed Mohsen Hashemi
Contemporary Trends in Defect Prevention: A Survey Report
Muhammad Faizan, Muhammad Naeem Ahmed Khan, Sami Ulhaq
A Technique to Choose the Proper Vector Space Models of Semantics in Case of Automatic Text Categorization
Sukanya Ray, Nidhi Chandra
Deep Learning in Character Recognition Considering Pattern Invariance Constraints
Oyebade K. Oyedotun, Ebenezer O. Olaniyi, Adnan Khashman
Fuzzy Agent Oriented Software Effort Estimate with COCOMO
Mohammad Saber Iraji
An Efficient Algorithm for Mining Weighted Frequent Itemsets Using Adaptive Weights
Hung Long Nguyen
Mining Wikipedia to Rank Rock Guitarists
Muazzam A. Siddiqui
Keywords based Closed Domain Question Answering System for Indian Penal Code Sections and Indian Amendment Laws
Rohini P. Kamdi, Avinash J. Agrawal
A Model for Object-Oriented Software Maintainability Measurement
Morteza Asadi, Hassan Rashidi
A Review on Large Scale Graph Processing Using Big Data Based Parallel Programming Models
Anuraj Mohan, Remya G
Layered Design and Collaborative Development of Network System and Its Application in Real-time Information Cluster
Qiudong Sun, Wenxin Ma, Yongping Qiu, Wei Chen
CSRF Vulnerabilities and Defensive Techniques
Rupali D. Kombade, B.B. Meshram
Evaluation of IP Multimedia Subsystem based Mobile Mass Examination System
Ahmed Barnawi, Abdulrahman H. Altalhi, M. Rizwan Jameel Qureshi, Asif Irshad Khan
Mobile Governance based on WiMAX Connectivity for Rural Development in India
Kalpana Chaudhari, Upena D Dalal, Rakesh Jha
Computation of Pheromone Values in AntNet Algorithm
Anuj K. Gupta, Harsh Sadawarti, Anil K. Verma