Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Genetic-based Summarization for Local Outlier Detection in Data Stream
Mohamed Sakr, Walid Atwa, Arabi Keshk
Collaborative E-Learning Process Discovery in Multi-tenant Cloud
Sameh. Azouzi, Jalel Eddine. Hajlaoui, Zaki. Brahmi, Sonia. Ayachi Ghannouchi
MTC: Minimizing Time and Cost of Cloud Task Scheduling based on Customers and Providers Needs using Genetic Algorithm
Nasim Soltani Soulegan, Behrang Barekatain, Behzad Soleimani Neysiani
Implementation of Transfer Learning Using VGG16 on Fruit Ripeness Detection
Jasman Pardede, Benhard Sitohang, Saiful Akbar, Masayu Leylia Khodra
Simulation of CPU Scheduling Algorithms using Poisson Distribution
Amit Mishra, Abdullahi Ofujeh Ahmed
Determination Method of Some Operational Characteristics of Information Search System in Directive Document Database
Fahrad H. Pashayev, Sevinj E. Pashayeva, Jahangir M. Jafarov, Pashayev I. Farhad
A Flow-Based Technique to Detect Network Intrusions Using Support Vector Regression (SVR) over Some Distinguished Graph Features
Yaser Ghaderipour, Hamed Dinari
Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication
Zuhi Subedar, Ashwini Araballi
A New Similarity Measure of Picture Fuzzy Sets and Application in the Fault Diagnosis of Steam Turbine
Ngoc Minh Chau, Nguyen Thi Lan, Nguyen Xuan Thao
Action Recognition Based on the Modified Twostream CNN
Dan Zheng, Hang Li, Shoulin Yin
A Robotic Path Planning by Using Crow Swarm Optimization Algorithm
Mohammed Yousif, Ahmad Salim, Wisam K. Jummar
A System to Predict Emotion from Bengali Speech
Prashengit Dhar, Sunanda Guha
Real-time Corresponding and Safety System to Monitor Home Appliances based on the Internet of Things Technology
Nalinsak Gnotthivongsa, Huangdongjun, Khamla Non Alinsavath
Integration Colour and Texture Features for Content-based Image Retrieval
Hanan A. Al-Jubouri
Data Security in Mobile Cloud Computing: A State of the Art Review
Rida Qayyum, Hina Ejaz
Vector Image Retrieval Methods Based on Fuzzy Patterns
Yevgeniya Sulema, Etienne Kerre, Oksana Shkurat
A Modernized Voting System Using Fuzzy Logic and Blockchain Technology
Mousumi Mitra, Aviroop Chowdhury
Proposal of a Digital Ecosystem Based on Big Data and Artificial Intelligence to Support Educational and Vocational Guidance
Essaid El Haji, Abdellah Azmani
Mean-Field Theory in Hopfield Neural Network for Doing 2 Satisfiability Logic Programming
Saratha Sathasivam, Shehab Abdulhabib Alzaeemi, Muraly Velavan
DPS-AA: Intranet Migration Strategy Model for Clouds
Abebe Alambo Tona, Durga Prasad Sharma
A Lightweight Face Recognition Model Using Convolutional Neural Network for Monitoring Students in E-Learning
Duong Thang Long
Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View
A.A. Ojugo, A.O. Eboka
Implementation of Multi-attribute Rating Technique Simple in Selection of Acceptance Scholarship of PMDK (Case Study: STMIK Widya Cipta Dharma)
Vilianty Rafida, Wiwik Widiyatni, Bartolomius Harpad, Ekawati Yulsilviana
Analyzing the Impact of Search Engine Optimization Techniques on Web Development Using Experiential and Collaborative Learning Techniques
Dipti Yogesh Pawade
Procedure for Processing Biometric Parameters Based on Wavelet Transformations
Zhengbing Hu, Ihor Tereikovskyi, Denys Chernyshev, Liudmyla Tereikovska, Oleh Tereikovskyi, Dong Wang
Gamification Approach in Teaching Web Programming Courses in PHP: Use of KAHOOT Application
Ibrahim Ouahbi, Hassane Darhmaoui, Fatiha Kaddari
A Bayesian Belief Network Model For Detecting Multi-stage Attacks With Malicious IP Addresses
Alile S.O., Egwali A.O.
A Deep Analysis of Applications and Challenges of Wireless Sensor Network
Sadia Anayat, Sheeza Butt, Isma Zulfiqar, Saher Butt
PRoPHET Using Optimal Path Hops
Salem Sati, Tareg Abulifa, Salah Shanab
Sagacious Communication Link Selection Mechanism for Underwater Wireless Sensors Network
Shahzad Ashraf, Sehrish Saleem, Tauqeer Ahmed
Cloud Forensics: Challenges and Blockchain Based Solutions
Omi Akter, Arnisha Akther, Md Ashraf Uddin, Md Manowarul Islam
Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents
Sisay Tumsa
A Critical Survey on Privacy Prevailing in Mobile Cloud Computing: Challenges, State of the Art Methods and Future Directions
Rida Qayyum
An Ontology based Approach for Context-Aware Security in the Internet of Things (IoT)
Asifa Nazir, Sahil Sholla, Adil Bashir
SQL Injection Detection Tools Advantages and Drawbacks
Hazem M. Harb, Derar Eleyan, Amna Eleyan
Supporting Audio Privacy-aware Services in Emerging IoT Environment
Naushin Nower
Pattern-based and Time-Synchronised Passwords
Mian Saeed Akbar, Asif Khan, Sara
Resource Efficient Security Mechanism for Cloud of Things
Adil Bashir, Sahil Sholla
An improved IOT Authentication Process based on Distributed OTP and Blake2
Hind EL Makhtoum, Youssef Bentaleb
Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach
Nagesh Shenoy H., K. R. Anil Kumar, Suchitra N. Shenoy, Abhishek S. Rao, Rajgopal K.T.