Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
The effect of evolutionary algorithm in gene subset selection for cancer classification
M.N.F. Fajila, M.A.C. Akmal Jahan
A novel approach to predict high blood pressure using ABF function
Satyanarayana Nimmala, Ramadevi Y., Ramalingaswamy Cheruku
The power of anonymization and sensitive knowledge hiding using sanitization approach
T.Satyanarayana Murthy, N.P.Gopalan, Datta Sai Krishna Alla
Personalized recommendation systems (PRES): a comprehensive study and research issues
Raghavendra C. K., Srikantaiah K.C., Venugopal K. R.
Framework for software code reviews and inspections in a classroom environment
Fernando Almeida
The skyline operator for selection of virtual machines in mobile computing
Rasim M. Alguliyev, Ramiz M. Aliguliyev, Rashid G. Alakbarov, Oqtay R. Alakbarov
A speaker recognition system using gaussian mixture model, EM algorithm and K-Means clustering
Ajinkya N. Jadhav, Nagaraj V. Dharwadkar
Cross-domain recommendation model based on hybrid approach
Smriti Ayushi, V. R. Badri Prasad
Knowledge extraction and analysis to evaluate the financial performance of an organization using OLAM
Mahtab Ebrahimi
A rule based extractive text summarization technique for Bangla news documents
Partha Protim Ghosh, Rezvi Shahariar, Muhammad Asif Hossain Khan
Text classification using SVM enhanced by multithreading and CUDA
Soumick Chatterjee, Pramod George Jose, Debabrata Datta
Twitter benchmark dataset for arabic sentiment analysis
Donia Gamal, Marco Alfonse, El-Sayed M. El-Horbaty, Abdel-Badeeh M.Salem
Analyzing the performance of various clustering algorithms
Bhupesh Rawat, Sanjay Kumar Dwivedi
Performance enhancement of machine translation evaluation systems for English – Hindi language pair
Pooja Malik, Anurag Singh Baghel
Improvement of chatbots semantics using wit.ai and word sequence kernel: education chatbot as a case study
Alaa A. Qaffas
Hidden Markov model for identification of different marks on human body in forensic perspective
Dayanand G. Savakar, Anil Kannur
Textual coherence improvement of extractive document summarization using greedy approach and word vectors
Mohamad Abdolahi, Morteza Zahedi
Developing ontology approach using software tool to improve data visualization (case study: computer network)
Mahmoud Moshref, Rizik Al-Sayyad
Multimodal biometric system based face-iris feature level fusion
Muthana H. Hamd, Marwa Y. Mohammed
Detection of botnet using flow analysis and clustering algorithm
Prachi, Sherya, Shruti, Vanshika
Accuracy assessment of similarity measures in collaborative recommendations using CF4J framework
Vijay Verma, Rajesh Kumar Aggarwal
Development of a decision support system with the use of OLAP-technologies in the national terminological information environment
Rasim M. Alguliyev, Gulnara Ch. Nabibayova, Afruz M. Gurbanova
Review on predicting students’ graduation time using machine learning algorithms
Nurafifah Mohammad Suhaimi, Shuzlina Abdul-Rahman, Sofianita Mutalib, Nurzeatul Hamimah Abdul Hamid, Ariff Md Ab Malik
Data analysis and visualization of continental cancer situation by twitter scraping
Md. Hosne Al Walid, D. M. Anisuzzaman, A. F. M. Saifuddin Saif
Sentiment analysis on mobile phone reviews using supervised learning techniques
Momina Shaheen, Shahid M. Awan, Nisar Hussain, Zaheer A. Gondal
Teaching artificial intelligence and robotics to undergraduate systems engineering students
Luis Emilio Alvarez-Dionisi, Mitali Mittra, Rosbelia Balza
A review on student attrition in higher education using big data analytics and data mining techniques
Syaidatus Syahira Ahmad Tarmizi, Sofianita Mutalib, Nurzeatul Hamimah Abdul Hamid, Shuzlina Abdul Rahman
H2E: a privacy provisioning framework for collaborative filtering recommender system
Muhammad Usman Ashraf, Mubeen Naeem, Amara Javed, Iqra Ilyas
Integration of cyber-physical systems in e-science environment: State-of-the-Art, problems and effective solutions
Tahmasib Kh. Fataliyev, Shakir A. Mehdiyev
Mining the dark web: a novel approach for placing a dark website under investigation
Bassel Alkhatib, Randa S. Basheer
Determining proficient time quantum to improve the performance of round robin scheduling algorithm
Dipto Biswas, Md. Samsuddoha
Recent and frequent informative pages from web logs by weighted association rule mining
SP. Malarvizhi
Evaluation the performance of DMZ
Baha Rababah, Shikun Zhou, Mansour Bader
Extension of refinement algorithm for manually built Bayesian networks created by domain experts
Naveen kumar bhimagavni, P.V. Kumar
Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform
Preeti Daffu, Amanpreet Kaur
A power-based method for improving the ODMRP protocol performance in mobile ad-hoc networks
Arash.Ghafouri, Ahmad Ghasemi, Mohammad Reza. Hasani Ahangar
Investigation of application layer DDoS attacks using clustering techniques
T. Raja Sree, S. Mary Saira Bhanu
Predictive analysis of RFID supply chain path using long short term memory (LSTM): recurrent neural networks
Meghna Sharma, Manjeet Singh Tomer
DDoS attack detection using C5.0 machine learning algorithm
Hariharan. M., Abhishek H. K., B. G. Prasad
Convergence of MANET in communication among smart devices in IoT
Tanweer Alam, Baha Rababah