Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Multi Duty Cycle Scheduled Routing in Wireless Sensor Network-lifetime Maximization
Методический подход к написанию курсовых проектов по специальности 09.02.02 "Компьютерные сети"
Применение информационно-компьютерных технологий в процессе дипломного проектирования
Формирование и повышение цифровой компетентности студентов с учетом особенностей профессиональной подготовки
Использование информационно-коммуникационных технологий для повышения эффективности изучения спецдисциплин
Влияние информационных технологий на социализацию личности
Организация обратной связи при проведении воспитательных мероприятий в образовательных организациях среднего профессионального образования в период дистанционного обучения
A Biometric Asymmetric Cryptosystem Software Module Based on Convolutional Neural Networks
A Comprehensive Review of Intrusion Detection and Prevention Systems against Single Flood Attacks in SIP-Based Systems
Fire and Motion Early Warning Device: Its Design and Development
A Survey of Data Mining Techniques for Indoor Localization
Image Recognition Using Machine Learning with the Aid of MLR
Face Recognition System based on Convolution Neural Networks
An Improved Framework of Healthcare Supports System for the Treatment of Dementia Cases
Linked Data: A Framework for Publishing Five-Star Open Government Data
Impact of Internet of Things (IoT) as Persuasive Technology
Myers-briggs Personality Prediction and Sentiment Analysis of Twitter using Machine Learning Classifiers and BERT
Heuristic-based Approach for Dynamic Consolidation of Software Licenses in Cloud Data Centers
A Novel Ant Colony Based DBN Framework to Analyze the Drug Reviews
ILSHR Rumor Spreading Model by Combining SIHR and ILSR Models in Complex Networks
Peculiarities of Manifestation of Student Youth' Roles and Positions in the Cyberbullying Process
Comparative Analysis of Performance Run Length (RLE) Data Compression Design by VHDL and Design by Microcontroller
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective
Boosted Lara Translation and Assessment Utilizing Fuzzy Grounded Impression in Wireless Communication
Android Based Inventory Management with NFC Enabled for Faster Tracking Items at a Steel Company: A Case Study
D-TS: A Secure and Trusted Authentication Framework for Domain Name Server
Feature Engineering for Cyber-attack detection in Internet of Things
A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks
System Monitoring Addon Analysis in System Load Simulation
Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks
Ensem_SLDR: Classification of Cybercrime using Ensemble Learning Technique
Improved Deep Learning Model for Static PE Files Malware Detection and Classification
A Cross-Layer Design and Fuzzy Logic based Stability Oriented Routing Protocol
Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption
Security Analysis of Government & Financial Websites of Bangladesh
Design and Implementation of Web-based Smart Class Routine Management System for Educational Institutes
Towards Ambient Assisted Living (AAL): Design of an IoT-based Elderly Activity Monitoring System
Guiding Aid for Visually Impaired
Image Watermarking in Frequency Domain using Hu's Invariant Moments and Firefly Algorithm
Non-invasive Detection of Parkinson's Disease Using Deep Learning
← Предыдущая
Следующая страница →
1
|
...
|
69
|
70
|
71
|
72
|
73
|
74
|
75
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.