Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Comparative analysis of stemming algorithms for web text mining
Muhammad Haroon
The power of anonymization and sensitive knowledge hiding using sanitization approach
T.Satyanarayana Murthy, N.P.Gopalan, Datta Sai Krishna Alla
Binary log design for one-way data replication with ZeroMQ
I. Gede John Arissaputra, I. Made Sukarsa, Putu Wira Buana, Ni Wayan Wisswani
Requirement elicitation methods for cloud providers in IT industry
Muhammad Imran Manzoor, Momina Shaheen, Hudaibia Khalid, Aimen Anum, Nisar Hussain, M. Rehan Faheem
A novel optimization based algorithm to hide sensitive item-sets through sanitization approach
T.Satyanarayana Murthy, N.P.Gopalan, Sasidhar Gunturu
A hybrid approach to generating adjective polarity lexicon and its application to Turkish sentiment analysis
Rahim Dehkharghani
An online collaborative discussion platform for bridging a technological reliance gap in higher learning institutions in Tanzania
Linus John, Anael E. Sam
Cross-domain recommendation model based on hybrid approach
Smriti Ayushi, V. R. Badri Prasad
An evolutionary model for selecting relevant textual features
Taher Zaki, Mohamed Salim EL Bazzi, Driss Mammass
Knowledge extraction and analysis to evaluate the financial performance of an organization using OLAM
Mahtab Ebrahimi
Energy saving VM placement in cloud
Shreenath Acharya, Demian Antony D’Mello
Efficient authentication and privacy mechanism to protect legitimate vehicles in IEEE 802.11p standard
Deepak Verma, Parminder Singh
Web-based application tool for recommendation of open source software for higher learning institution in Tanzania
Ambokile Okey, Anael E. Sam
LINE messenger as a transport layer to distribute messages to partner instant messaging
Kadek Darmaastawan, I. Made Sukarsa, Putu Wira Buana
High rate outlier detection in wireless sensor networks: a comparative study
Hussein H. Shia, Mohammed Ali Tawfeeq, Sawsan M. Mahmoud
Developing ontology approach using software tool to improve data visualization (case study: computer network)
Mahmoud Moshref, Rizik Al-Sayyad
A web based approach for teaching and learning programming concepts at middle school level
Sania Bhatti, Amirita Dewani, Sehrish Maqbool, Mohsin Ali Memon
Multimodal biometric system based face-iris feature level fusion
Muthana H. Hamd, Marwa Y. Mohammed
Lean agile integration for the development of large size projects
Rizwan J. Qureshi, Madini O. Alassafi, Hafiz M. Shahzad
Investigating the redundancy effect in the learning of C++ computer programming using screencasting
Chin Soon Cheah, Lai-Mei Leong
An environment aware learning-based self-adaptation technique with reusable components
Kishan Kumar Ganguly, Md. Saeed Siddik, Rayhanul Islam, Kazi Sakib
Educational performance analytics of undergraduate business students
Md Rifatul Islam Rifat, Abdullah Al Imran, A. S. M. Badrudduza
Evaluating and comparing the performance of using multiple controllers in software defined networks
Mahmood Z. Abdullah, Nasir A. Al-awad, Fatima W. Hussein
Development of a method for choosing cloud computing on the platform of PaaS for servicing the state agencies
Kapan Oralgazyolu Shakerkhan, Ermek Tolegenovich Abilmazhinov
Integration of cyber-physical systems in e-science environment: State-of-the-Art, problems and effective solutions
Tahmasib Kh. Fataliyev, Shakir A. Mehdiyev
A feature selection based ensemble classification framework for software defect prediction
Ahmed Iqbal, Shabib Aftab, Israr Ullah, Muhammad Salman Bashir, Muhammad Anwaar Saeed
Determining proficient time quantum to improve the performance of round robin scheduling algorithm
Dipto Biswas, Md. Samsuddoha
Recent and frequent informative pages from web logs by weighted association rule mining
SP. Malarvizhi
Evaluation the performance of DMZ
Baha Rababah, Shikun Zhou, Mansour Bader
Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform
Preeti Daffu, Amanpreet Kaur
Previously-selected-server-first based scalable VM placement algorithm for mitigating side channel attacks in cloud computing
Adi Maheswara Reddy G., K. Venkata Rao, J.V.R. Murthy
MANET testbed using raspberry PIs
Salem Sati, Ahmed El-bareg
Investigation of application layer DDoS attacks using clustering techniques
T. Raja Sree, S. Mary Saira Bhanu
A stable routing protocol based on DSR protocol for mobile ad hoc networks
Golsum Najafi, Sajjad Jahanbakhsh Gudakahriz
Clustering algorithms of wireless sensor networks: a survey
Muhammad Noman Riaz
Preserving privacy in cloud identity management systems using DCM (Dual Certificate Management)
Kamyab Khajehei
Predictive analysis of RFID supply chain path using long short term memory (LSTM): recurrent neural networks
Meghna Sharma, Manjeet Singh Tomer
PPLS: personnel presence locator system – an amalgam of RF ranging & Zigbee in WSN
Syed Rameem Zahra, Mir Shahnawaz Ahmad
A proof of work: securing majority-attack in blockchain using machine learning and algorithmic game theory
Somdip Dey
Cybercrime as a matter of the art in Palestine and its effect on individuals
Belal Amro