Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров - 004.9

Научные статьи

В разделе "Прикладные информационные (компьютерные) технологии. Методы основанные на применении компьютеров"
Adversarial Deep Learning in Anomaly based Intrusion Detection Systems for IoT Environments
Khalid Albulayhi, Qasem Abu Al-Haija
Interpretable Fuzzy System for Malicious Domain Classification Using Projection Neural Network
Rajan Prasad, Praveen Kumar Shukla
A New Framework of Honeypots Network Security Using Linear Regression Decision Algorithm
Avijit Mondal, Radha Tamal Goswami, Soumita Sen
Mitigation of Byzantine attack using LSP algorithm in CR Networks through Blockchain Technology
Amith K.S., Yerriswamy T.
Roadmap from 4G to 6G in Smart Cities Impact and Challenges
Dipti Chauhan, Siddhi Sharma, Vishal Singh
Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification
Priyanka Desai
Programming SDNs: A Compass for SDN Programmer
Suhail Ahmad, Ajaz Hussain Mir
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence
NW Chanaka Lasantha, Ruvan Abeysekara, MWP Maduranga
Towards Digital Forensics 4.0: A Multilevel Digital Forensics Framework for Internet of Things (IoT) Devices
Yaman Salem, Majdi Owda, Amani Yousef Owda
A Survey on the impact of Connection-Aware Congestion Identification in RLNC-Based Networks on Quality of Service
Syed Abid Husain, Baswaraj Gadgay, Shubhangi D.C.
Integrated Spatial and Temporal Features Based Network Intrusion Detection System Using SMOTE Sampling
Shrinivas A. Khedkar, Madhav Chandane, Rasika Gawande
Individual Updating Strategies-based Elephant Herding Optimization Algorithm for Effective Load Balancing in Cloud Environments
Syed Muqthadar Ali, N. Kumaran, G.N. Balaji
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
A Novel Approach of DDOS Attack Classification with Genetic Algorithm-optimized Spiking Neural Network
Anuradha Pawar, Nidhi Tiwari
A Hybrid Intrusion Detection System to Mitigate Biomedical Malicious Nodes
Mohammed Abdessamad Goumidi, Ehlem Zigh, Naima Hadj-Said, Adda Belkacem Ali-Pacha
Method for Constructing Neural Network Means for Recognizing Scenes of Political Extremism in Graphic Materials of Online Social Networks
Ihor Tereikovskyi, Rabah AlShboul, Shynar Mussiraliyeva, Liudmyla Tereikovska, Kalamkas Bagitova, Oleh Tereikovskyi, Zhengbing Hu
Encrypted Access Mapping in a Distinctly Routed Optimized Immune System to Prevent DoS Attack Variants in VANET Architecture
Rama Mercy. S., G. Padmavathi
Optimized Extreme Gradient Boosting with Remora Algorithm for Congestion Prediction in Transport Layer
Ajay Kumar, Naveen Hemrajani
Quality of Experience Improvement and Service Time Optimization through Dynamic Computation Offloading Algorithms in Multi-access Edge Computing Networks
Marouane Myyara, Oussama Lagnfdi, Anouar Darif, Abderrazak Farchane
BSHOA: Energy Efficient Task Scheduling in Cloud-fog Environment
Santhosh Kumar Medishetti, Ganesh Reddy Karri
Attack Modeling and Security Analysis Using Machine Learning Algorithms Enabled with Augmented Reality and Virtual Reality
Momina Mushtaq, Rakesh Kumar Jha, Manish C. Sabraj, Shubha Jain
An Enhanced Process Scheduler Using Multi-Access Edge Computing in An IoT Network
Padmini M.S., S. Kuzhalvaimozhi, Bhuvan K., Ramitha R., Tanisha Machaiah M.
Determination of Security Factors Affecting Internet of Medical Things by Artificial Intelligence Technique
Mohd. Nadeem, Prabhash Chandra Pathak, Mahfooz Ahmad, Masood Ahmad
Data Analysis and Success Prediction of Mobile Games before Publishing on Google Play Store
Muhammad Muhtasim, Md. Showrov Hossen
Enhancing Sentiment Analysis for the 2024 Indonesia Election Using SMOTE-Tomek Links and Binary Logistic Regression
Neny Sulistianingsih, I. Nyoman Switrayana
Monkey Pux Data: Visualization and Prediction of the Observed Number of Affected People in Nigeria
Okorodudu Franklin Ovuolelolo, Onyeacholem Ifeanyi Joshua, Gracious C. Omede
Application of Machine Learning and Predictive Models in Healthcare – A Review
Benjamin Eli Agbesi, Prince Clement Addo, Oliver Kufuor Boansi
Depression Detection: Unveiling Mental Health Insights with Twitter Data and BERT Models
Rohini Kancharapu, Sri Nagesh Ayyagari
A Proposed Concept of Digital Libraries in Metaverse to Facilitate Education for School Students
Namira Khorshed Khan, Kaniz Fatema Kanta, Tabammum Haque Pranty, Dip Nandi
A Real-time Light-weight Computer Vision Application for Driver’s Drowsiness Detection
Saikat Baul, Md. Ratan Rana, Farzana Bente Alam
Vehicle Object Tracking Based on Fusing of Deep learning and Re-Identification
Huynh Nhat Duy, Vo Hoai Viet
HKCHB: Meta-heuristic Algorithm for Task Scheduling and Load Balancing in Cloud-fog Computing
Mahmoud Moshref, Sherin Hijazi, Azzam Sleit, Ahmad Sharieh
Speaker Diarization Using Bi-LSTM and Spectral Clustering
Trisiladevi C. Nagavi, Samanvitha Sateesha, Shreya Sudhanva, Sukirth Shivakumar, Vibha Hullur
Comparative Exploration of the Contribution of Reinforcement Learning in Robotic Surgery
Cheima Bouden
An Automated System for Detecting Property Insurance Fraud Using Machine Learning
Kazi Md. Tawsif Rahman, Chowdhury Mahfuzul Hoq
Evaluating the impact of Test-Driven Development on Software Quality Enhancement
Md. Sydur Rahman, Aditya Kumar Saha, Uma Chakraborty, Humaira Tabassum Sujana, S.M. Abdullah Shafi
Exploring Feature Selection and Machine Learning Algorithms for Predicting Diabetes Disease
Eman I. Abd El-Latif, Islam A. Moneim
Detection of Diabetes using Combined ML Algorithm
Shifat Jahan Setu, Fahima Tabassum, Sarwar Jahan, Md. Imdadul Islam
AI-powered Predictive Model for Stroke and Diabetes Diagnostic
Ngoc-Bich Le, Thi-Thu-Hien Pham, Sy-Hoang Nguyen, Nhat-Minh Nguyen, Tan-Nhu Nguyen
Development of a Facenet Enhanced Secured Smart Office System
Odeyemi C.S., Olaniyan O.M.