Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Proposed WiMAX hybrid scheduler with split FTP traffic and its performance evaluation
Anju Lata Yadav, P. D. Vyavahare, P. P. Bansod
Classification of attacks on wireless sensor networks: a survey
Muhammad Noman Riaz, Attaullah Buriro, Athar Mahboob
Prevention of session hijacking attack in VANETs using intrusion detection system
Jeevitha.R., N.Sudha Bhuvaneswari
A hybrid cryptosystem to enhance security in IoT health care system
Kavitha.S., P.J.A.Alphonse
Design of effective security architecture for mobile cloud computing to prevent DDoS attacks
Kaushik Sekaran, G.Raja Vikram, B.V. Chowdary
Convergence of MANET in communication among smart devices in IoT
Tanweer Alam, Baha Rababah
ZBLE: zone based leader selection protocol
Rani Sahu, Sanjay Sharma, M. A. Rizvi
Enhancement of Capacity, Detectability and Distortion of BMP, GIF and JPEG images with Distributed Steganography
Istteffanny I. Araujo, Hassan Kazemian
Message Based Key Distribution Technique for Establishing a Secure Communication Channel in IoT Networks
G.V.Hindumathi, D. Lalitha Bhaskari
A Domains Approach to Remote Access Logical Vulnerabilities Classification
Samuel Ndichu, Sylvester McOyowo, Henry Okoyo, Cyrus Wekesa
Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Umar Sayibu, Frimpong Twum, Issah Baako
Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf
IT Risk Management Based on ISO 31000 and OWASP Framework using OSINT at the Information Gathering Stage (Case Study: X Company)
Anak Agung Bagus Arya Wiradarma, Gusti Made Arya Sasmita
Evaluation of Quality for Semi-Structured Database System
Rita Ganguly, Anirban Sarkar
An Improved Machine Learning-Based Short Message Service Spam Detection System
Odukoya Oluwatoyin, Akinyemi Bodunde, Gooding Titus, Aderounmu Ganiyu
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem
Ahmet Ali Süzen
A Novel Android Security Framework to Prevent Privilege Escalation Attacks
Ahamed K. H. Hussain, Mohsen Kakavand, Mira Silval, Lingges Arulsamy
GeoNaija: Enhancing the Teaching and Learning of Geography through Mobile Applications
ChukwuNonso Nwokoye, Ikechukwu Umeh, Njideka Mbeledogu
Running Google Colaboratory as a server – transferring dynamic data in and out of colabs
Samarth V. Halyal
An Image Impulsive Noise Denoising Method Based on Salp Swarm Algorithm
Wei Liu, Ran Wang, Jun Su
Multiple Master Communication in AHB IP using Arbiter
Hitanshu Saluja, Naresh Grover
Real-Time Face Recognition with Eigenface Method
Ni Kadek Ayu Wirdiani, Tita Lattifia, I. Kadek Supadma, Boy Jehezekiel Kemanang Mahar, Dewa Ayu Nadia Taradhita, Adi Fahmi
Effects of Filter Numbers and Sampling Frequencies on the Performance of MFCC and PLP based Bangla Isolated Word Recognition System
Oli Lowna Baroi, Md. Shaikh Abrar Kabir, Azhar Niaz, Md. Jahidul Islam, Md. Jakaria Rahimi
Study for License Plate Detection
Mie Mie Aung, Phyu Phyu Khaing, Myint San
Analysis of the Error Pattern of HMM based Bangla ASR
Shourin R. Aura, Md. J. Rahimi, Oli L. Baroi
Island Loss for Improving the Classification of Facial Attributes with Transfer Learning on Deep Convolutional Neural Network
Shuvendu Roy
Sensing as a Service: Vision, Practices and Architecture
Maha Arooj, Muhammad Asif
A Review of Electronic Voting Systems: Strategy for a Novel
Adewale Olumide S., Boyinbode Olutayo K., Salako E. Adekunle
Multi Genre Music Classification and Conversion System
Irfan Siddavatam, Ashwini Dalvi, Dipen Gupta, Zaid Farooqui, Mihir Chouhan
Retrieval of Complex Named Entities on the Web: Proposals for Similarity Computation
Armel Fotsoh, Christian Sallaberry, Annig Le Parc Lacayrelle
A Novel Image Encryption Scheme Based on Reversible Cellular Automata and Chaos
Zeinab Mehrnahad, AliMohammad Latif
Stakeholders’ Attitude on the Use of ICT Tools for Sustainable Propagation of Indigenous Knowledge in Tanzania: A Case of Traditional Medical Knowledge of Medicinal Plants
Irene Evarist Beebwa, Janeth Marwa, Musa Chacha, Mussa Ally Dida
Performance Analysis of Resampling Techniques on Class Imbalance Issue in Software Defect Prediction
Ahmed Iqbal, Shabib Aftab, Faseeha Matloob
A Comparative Analysis of Tools for Testing the Security Protocols
Reham Abdellatif Abouhogail
An Efficient Framework for Hand Gesture Recognition based on Histogram of Oriented Gradients and Support Vector Machine
Ahmed Abdal Shafi Rasel, Mohammad Abu Yousuf
A New Approach to Develop Collaborative Ontology based BPMN Case Study: Generation of Fiscal Code
Meryam El Mrini, El Hassan Megder, Mostafa El Yassa
Analysis of Cyberbullying Incidence among Filipina Victims: A Pattern Recognition using Association Rule Extraction
Frederick F. Patacsil
Analysis of Indonesia Politics Polarization before 2019 President Election Using Sentiment Analysis and Social Network Analysis
Mohammad Nur Habibi, Sunjana
Design and Implementation of IR System for Tigrigna Textual Documents
Teklay Birhane, Birhanu Hailu
Analysis of Large Set of Images Using MapReduce Framework
Sawsan M. Mahmoud, Rokaia Shalal Habeeb