Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
The skyline operator for selection of virtual machines in mobile computing
A speaker recognition system using gaussian mixture model, EM algorithm and K-Means clustering
Cross-domain recommendation model based on hybrid approach
Knowledge extraction and analysis to evaluate the financial performance of an organization using OLAM
A rule based extractive text summarization technique for Bangla news documents
Text classification using SVM enhanced by multithreading and CUDA
Twitter benchmark dataset for arabic sentiment analysis
Analyzing the performance of various clustering algorithms
Performance enhancement of machine translation evaluation systems for English – Hindi language pair
Improvement of chatbots semantics using wit.ai and word sequence kernel: education chatbot as a case study
Hidden Markov model for identification of different marks on human body in forensic perspective
Textual coherence improvement of extractive document summarization using greedy approach and word vectors
Developing ontology approach using software tool to improve data visualization (case study: computer network)
Multimodal biometric system based face-iris feature level fusion
Detection of botnet using flow analysis and clustering algorithm
Accuracy assessment of similarity measures in collaborative recommendations using CF4J framework
Development of a decision support system with the use of OLAP-technologies in the national terminological information environment
Review on predicting students’ graduation time using machine learning algorithms
Data analysis and visualization of continental cancer situation by twitter scraping
Sentiment analysis on mobile phone reviews using supervised learning techniques
Teaching artificial intelligence and robotics to undergraduate systems engineering students
A review on student attrition in higher education using big data analytics and data mining techniques
H2E: a privacy provisioning framework for collaborative filtering recommender system
Integration of cyber-physical systems in e-science environment: State-of-the-Art, problems and effective solutions
Mining the dark web: a novel approach for placing a dark website under investigation
Determining proficient time quantum to improve the performance of round robin scheduling algorithm
Recent and frequent informative pages from web logs by weighted association rule mining
Evaluation the performance of DMZ
Extension of refinement algorithm for manually built Bayesian networks created by domain experts
Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform
A power-based method for improving the ODMRP protocol performance in mobile ad-hoc networks
Investigation of application layer DDoS attacks using clustering techniques
Predictive analysis of RFID supply chain path using long short term memory (LSTM): recurrent neural networks
DDoS attack detection using C5.0 machine learning algorithm
Convergence of MANET in communication among smart devices in IoT
Smart locker: IOT based intelligent locker with password protection and face detection approach
Interoperability in connected vehicles – a review
Active Defense Strategy against Jamming Attack in Wireless Sensor Networks
An Efficient (n, n) Visual Secret Image Sharing using Random Grids with XOR Recovery
Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography