Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Implementation of Transfer Learning Using VGG16 on Fruit Ripeness Detection
Simulation of CPU Scheduling Algorithms using Poisson Distribution
Determination Method of Some Operational Characteristics of Information Search System in Directive Document Database
A Flow-Based Technique to Detect Network Intrusions Using Support Vector Regression (SVR) over Some Distinguished Graph Features
Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication
A New Similarity Measure of Picture Fuzzy Sets and Application in the Fault Diagnosis of Steam Turbine
Action Recognition Based on the Modified Twostream CNN
A Robotic Path Planning by Using Crow Swarm Optimization Algorithm
A System to Predict Emotion from Bengali Speech
Real-time Corresponding and Safety System to Monitor Home Appliances based on the Internet of Things Technology
Integration Colour and Texture Features for Content-based Image Retrieval
Data Security in Mobile Cloud Computing: A State of the Art Review
Vector Image Retrieval Methods Based on Fuzzy Patterns
A Modernized Voting System Using Fuzzy Logic and Blockchain Technology
Proposal of a Digital Ecosystem Based on Big Data and Artificial Intelligence to Support Educational and Vocational Guidance
Mean-Field Theory in Hopfield Neural Network for Doing 2 Satisfiability Logic Programming
DPS-AA: Intranet Migration Strategy Model for Clouds
A Lightweight Face Recognition Model Using Convolutional Neural Network for Monitoring Students in E-Learning
Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View
Implementation of Multi-attribute Rating Technique Simple in Selection of Acceptance Scholarship of PMDK (Case Study: STMIK Widya Cipta Dharma)
Analyzing the Impact of Search Engine Optimization Techniques on Web Development Using Experiential and Collaborative Learning Techniques
Procedure for Processing Biometric Parameters Based on Wavelet Transformations
Gamification Approach in Teaching Web Programming Courses in PHP: Use of KAHOOT Application
A Bayesian Belief Network Model For Detecting Multi-stage Attacks With Malicious IP Addresses
A Deep Analysis of Applications and Challenges of Wireless Sensor Network
PRoPHET Using Optimal Path Hops
Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network
Cloud Forensics: Challenges and Blockchain Based Solutions
Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges, State of the Art Methods and Future Directions
An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT)
SQL Injection Detection Tools Advantages and Drawbacks
Supporting Audio Privacy-aware Services in Emerging IoT Environment
Pattern-based and Time-Synchronised Passwords
Resource Efficient Security Mechanism for Cloud of Things
An improved IOT Authentication Process based on Distributed OTP and Blake2
Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach
A Methodology for Reliable Code Plagiarism Detection Using Complete and Language Agnostic Code Clone Classification
Categorization in Unsupervised Generative Self-learning Systems
Teaching Cyber Security Course in the Classrooms of NMIMS University