Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Requirement elicitation methods for cloud providers in IT industry
A novel optimization based algorithm to hide sensitive item-sets through sanitization approach
A hybrid approach to generating adjective polarity lexicon and its application to Turkish sentiment analysis
An online collaborative discussion platform for bridging a technological reliance gap in higher learning institutions in Tanzania
Cross-domain recommendation model based on hybrid approach
An evolutionary model for selecting relevant textual features
Knowledge extraction and analysis to evaluate the financial performance of an organization using OLAM
Energy saving VM placement in cloud
Efficient authentication and privacy mechanism to protect legitimate vehicles in IEEE 802.11p standard
Web-based application tool for recommendation of open source software for higher learning institution in Tanzania
LINE messenger as a transport layer to distribute messages to partner instant messaging
High rate outlier detection in wireless sensor networks: a comparative study
Developing ontology approach using software tool to improve data visualization (case study: computer network)
A web based approach for teaching and learning programming concepts at middle school level
Multimodal biometric system based face-iris feature level fusion
Lean agile integration for the development of large size projects
Investigating the redundancy effect in the learning of C++ computer programming using screencasting
An environment aware learning-based self-adaptation technique with reusable components
Educational performance analytics of undergraduate business students
Evaluating and comparing the performance of using multiple controllers in software defined networks
Development of a method for choosing cloud computing on the platform of PaaS for servicing the state agencies
Integration of cyber-physical systems in e-science environment: State-of-the-Art, problems and effective solutions
A feature selection based ensemble classification framework for software defect prediction
Determining proficient time quantum to improve the performance of round robin scheduling algorithm
Recent and frequent informative pages from web logs by weighted association rule mining
Evaluation the performance of DMZ
Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform
Previously-selected-server-first based scalable VM placement algorithm for mitigating side channel attacks in cloud computing
MANET testbed using raspberry PIs
Investigation of application layer DDoS attacks using clustering techniques
A stable routing protocol based on DSR protocol for mobile ad hoc networks
Clustering algorithms of wireless sensor networks: a survey
Preserving privacy in cloud identity management systems using DCM (Dual Certificate Management)
Predictive analysis of RFID supply chain path using long short term memory (LSTM): recurrent neural networks
PPLS: personnel presence locator system – an amalgam of RF ranging & Zigbee in WSN
A proof of work: securing majority-attack in blockchain using machine learning and algorithmic game theory
Cybercrime as a matter of the art in Palestine and its effect on individuals
Proposed WiMAX hybrid scheduler with split FTP traffic and its performance evaluation
Classification of attacks on wireless sensor networks: a survey
Prevention of session hijacking attack in VANETs using intrusion detection system