Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors
D. P. Gaikwad
Evaluation of Routing Performance using OSPF and Multi-Controller Based Network Architecture
Nicholas. J. Omumbo, Titus. M. Muhambe, Cyprian M. Ratemo
A Comprehensive Analysis of QoS in Wired and Wireless SDN Based on Mobile IP
Nazrul Islam, Md. Habibur Rahman, Mostofa Kamal Nasir
Multi Duty Cycle Scheduled Routing in Wireless Sensor Network-lifetime Maximization
Patil Yogita Dattatraya, Jayashree Agarkhed, Siddarama Patil
Методический подход к написанию курсовых проектов по специальности 09.02.02 "Компьютерные сети"
Кобцева Юлия Викторовна
Применение информационно-компьютерных технологий в процессе дипломного проектирования
Лукащук Анна Витальевна
Формирование и повышение цифровой компетентности студентов с учетом особенностей профессиональной подготовки
Басова Галина Николаевна
Использование информационно-коммуникационных технологий для повышения эффективности изучения спецдисциплин
Горбенко Ольга Николаевна
Влияние информационных технологий на социализацию личности
Хамайдула Ирина Викторовна
Организация обратной связи при проведении воспитательных мероприятий в образовательных организациях среднего профессионального образования в период дистанционного обучения
Хохлова Ольга Анатольевна
A Biometric Asymmetric Cryptosystem Software Module Based on Convolutional Neural Networks
Ilyenko Anna, Ilyenko Sergii, Herasymenko Marharyta
A Comprehensive Review of Intrusion Detection and Prevention Systems against Single Flood Attacks in SIP-Based Systems
Sheeba Armoogum, Nawaz Mohamudally
Fire and Motion Early Warning Device: Its Design and Development
Ronnie Camilo F. Robles, Ruth G. Luciano, Rolaida L. Sonza, Arnold P. Dela Cruz, Mariel Cabrillas
A Survey of Data Mining Techniques for Indoor Localization
Usman S. Toro, Nasir A. Yakub, Aliyu B. Dala, Murtala A. Baba, Kabiru I. Jahun, Usman I. Bature, Abbas M. Hassan
Image Recognition Using Machine Learning with the Aid of MLR
Meherunnesa Tania, Diba Afroze, Jesmin Akhter, Abu Sayed Md. Mostafizur Rahaman, Md. Imdadul Islam
Face Recognition System based on Convolution Neural Networks
Htwe Pa Pa Win, Phyo Thu Thu Khine, Khin Nwe Ni Tun
An Improved Framework of Healthcare Supports System for the Treatment of Dementia Cases
Akaninyene Udo Ntuen, John Edet Efiong, Eme Ogwo, Edward O. Uche-Nwachi
Linked Data: A Framework for Publishing Five-Star Open Government Data
Bassel Al-khatib, Ali Ahmad Ali
Impact of Internet of Things (IoT) as Persuasive Technology
Shagufta Faryad, Hira Batool, Muhammad Asif, Affan Yasin
Myers-briggs Personality Prediction and Sentiment Analysis of Twitter using Machine Learning Classifiers and BERT
Prajwal Kaushal, Nithin Bharadwaj B P, Pranav M S, Koushik S, Anjan K Koundinya
Heuristic-based Approach for Dynamic Consolidation of Software Licenses in Cloud Data Centers
Leila Helali, Mohamed Nazih Omri
A Novel Ant Colony Based DBN Framework to Analyze the Drug Reviews
Nazia Tazeen, K. Sandhya Rani
ILSHR Rumor Spreading Model by Combining SIHR and ILSR Models in Complex Networks
Adel Angali, Musa Mojarad, Hassan Arfaeinia
Peculiarities of Manifestation of Student Youth' Roles and Positions in the Cyberbullying Process
Liubov Pomytkina, Yuliia Podkopaieva, Kateryna Hordiienko
Comparative Analysis of Performance Run Length (RLE) Data Compression Design by VHDL and Design by Microcontroller
Marvin Chandra Wijaya
Quantitative Analysis of Software Security through Fuzzy PROMETHEE-II Methodology: A Design Perspective
Suhel Ahmad Khan, Mohd Nadeem, Alka Agrawal, Raees Ahmad Khan, Rajeev Kumar
Boosted Lara Translation and Assessment Utilizing Fuzzy Grounded Impression in Wireless Communication
Ayesha Taranum, Reshma Banu, G. F Ali Ahammed
Android Based Inventory Management with NFC Enabled for Faster Tracking Items at a Steel Company: A Case Study
Suci Laksono
D-TS: A Secure and Trusted Authentication Framework for Domain Name Server
Usman Aijaz N, Syed Mustafa, Mohammed Misbahuddin
Feature Engineering for Cyber-attack detection in Internet of Things
Maheshi B. Dissanayake
A Bayesian Attack-Network Modeling Approach to Mitigating Malware-Based Banking Cyberattacks
Aaron Zimba
System Monitoring Addon Analysis in System Load Simulation
Filip Gjorgjevikj, Kire Jakimoski
Mitigation of DDOS and MiTM Attacks using Belief Based Secure Correlation Approach in SDN-Based IoT Networks
Mimi M. Cherian, Satishkumar L. Varma
Ensem_SLDR: Classification of Cybercrime using Ensemble Learning Technique
Hemakshi Pandey, Riya Goyal, Deepali Virmani, Charu Gupta
Improved Deep Learning Model for Static PE Files Malware Detection and Classification
Sumit S. Lad., Amol C. Adamuthe
A Cross-Layer Design and Fuzzy Logic based Stability Oriented Routing Protocol
Surabhi Patel, Heman Pathak
Robust 4-D Hyperchaotic DNA Framework for Medical Image Encryption
Shaymaa Fahmee Alqazzaz, Gaber A. Elsharawy, Heba F. Eid
Security Analysis of Government & Financial Websites of Bangladesh
Md. Asaduzzaman Masum, Md. Rishad Istiak Sachcha, Abu Nayem
Design and Implementation of Web-based Smart Class Routine Management System for Educational Institutes
Sujit Roy, Md. Humaun Kabir, Md. Tofail Ahmed
Towards Ambient Assisted Living (AAL): Design of an IoT-based Elderly Activity Monitoring System
I.D.M.S. Rupasinghe, M.W.P. Maduranga