Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Development of a Mobile-Based Hostel Location and Recommendation Chatbot System
Folasade Olubusola Isinkaye, Imran Gbolahan AbiodunBabs, Michael Tobi Paul
Ontologies as Building Blocks of Cloud Security
Naila Samad Shaikh, Affan Yasin, Rubia Fatima
A Fuzzy Approach to Fault Tolerant in Cloud using the Checkpoint Migration Technique
Noshin Hagshenas, Musa Mojarad, Hassan Arfaeinia
Data Privacy System Using Steganography and Cryptography
Olawale Surajudeen Adebayo, Shefiu Olusegun Ganiyu, Fransic Bukie Osang, Salawu Sule Ajiboye, Kasim Mustapha Olamilekan, Lateefah Abdulazeez
Deep Classifier for Conjunctivitis – A Three-Fold Binary Approach
Subhash Mondal, Suharta Banerjee, Subinoy Mukherjee, Ankur Ganguly, Diganta Sengupta
Definition Synthesis of Agility in Software Development: Comprehensive Review of Theory to Practice
Necmettin Ozkan, Mehmet Sahin Gok
Enhanced Deep Hierarchal GRU & BILSTM using Data Augmentation and Spatial Features for Tamil Emotional Speech Recognition
J. Bennilo Fernandes, Kasiprasad Mannepalli
Analysis and Detection of various DDoS attacks on Internet of Things Network
Atika Bansal, Divya Kapil, Anupriya, Sagar Agarwal, Vishan Kumar Gupta
Routing in Hybrid Software Defined Networking using Hop-Count Approach
Rohitaksha K., A.B. Rajendra, J. Mohan
Real-Time Animal Location Estimation Using Wearable Sensors and Cellular Mobile Networks
M.W.P. Maduranga, J.P.D.M. Sithara
Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm
Оleksandr Korystin, Svyrydiuk Nataliia, Olena Mitina
A Multiclass Approach to Estimating Software Vulnerability Severity Rating with Statistical and Word Embedding Methods
Hakan Kekül, Burhan Ergen, Halil Arslan
An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform
Ganavi M., Prabhudeva S., Hemanth Kumar N.P.
Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication
Javeria Ambareen, Prabhakar M.
Role of Human Aspects on the process of Software Requirement Elicitation
Syed Danish Rizvi, Ahsan Ali, Waqas Mahmood
Comparison and Analysis of Software Vulnerability Databases
Hakan Kekül, Burhan Ergen, Halil Arslan
Enhancing Security of Medical Image Data in the Cloud Using Machine Learning Technique
Chandra Shekhar Tiwari, Vijay Kumar Jha
An Improved Popular Items Extraction for Covering Reduction Collaborative Filtering
Abubakar Roko, Umar Muhammad Bello, Abba Almu
Eigen and HOG Features based Algorithm for Human Face Tracking in Different Background Challenging Video Sequences
Ranganatha S., Y. P. Gowramma
Sales Management Application at Widya Collection Store Web-based
Vilianty Rafida, Ita Arfyanti, Irfan Hidayat
Development Information System for Rubber Sap Processing in East Borneo
Haerudin, Alvian F. Abdulfattah, Ghaly P. Agusva, Adhie C. Sari Firdani
Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions
Emoghene Ogidiaka, Francisca Nonyelum Ogwueleka, Martins Ekata Irhebhude, Ugochi Orji
Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment
Sajaad Ahmed Lone, A.H. Mir
Incorporating Preference Changes through Users' Input in Collaborative Filtering Movie Recommender System
Abba Almu, Aliyu Ahmad, Abubakar Roko, Mansur Aliyu
Using Rough Set Theory for Reasoning on Vague Ontologies
Mustapha Bourahla
Mathematical Model for Adaptive Technology in E-learning Systems
Nataliia Barchenko, Volodymyr Tolbatov, Tetiana Lavryk, Viktor Obodiak, Igor Shelehov, Andrii Tolbatov, Sergiy Gnatyuk, Olena Tolbatova
Building Predictive Model by Using Data Mining and Feature Selection Techniques on Academic Dataset
Mukesh Kumar, Nidhi, Bhisham Sharma, Disha Handa
Hybridization of Buffalo and Truncative Cyclic Gene Deep Neural Network-based Test Suite Optimization for Software Testing
T. Ramasundaram, V. Sangeetha
Deep Learning Network and Renyi-entropy Based Fusion Model for Emotion Recognition Using Multimodal Signals
Jaykumar M. Vala, Udesang K. Jaliya
Cyber-resilient Routing for Internet of Vehicles Networks During Black Hole Attack
Mehnaz Tabassum, Aurenice Oliveira
A Performance Perspective of Live Migration of Virtual Machine in Cloud Data Center with Future Directions
Divya Kapil, Saurabh Kumar Mishra, Vishan Kumar Gupta
Sensitive Data Identification and Security Assurance in Cloud and IoT based Networks
Soumya Ray, Kamta Nath Mishra, Sandip Dutta
Sentiment Analysis CSAM Model to Discover Pertinent Conversations in Twitter Microblogs
Imen Fadhli, Lobna Hlaoua, Mohamed Nazih Omri
Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster
Swagata Paul, Sajal Saha, Radha Tamal Goswami
Dynamic Editing Distance-based Extracting Relevant Information Approach from Social Networks
Mohamed Nazih Omri, Fethi Fkih
Extended DragonDeBrujin Topology Synthesis Method
Artem Volokyta, Heorhii Loutskii, Pavlo Rehida, Artem Kaplunov, Bohdan Ivanishchev, Oleksandr Honcharenko, Dmytro Korenko
Modified ECC for Secure Data Transfer in Multi-Tenant Cloud Computing
S. Udhaya Chandrika, T. Pramananda Perumal
Detection of DDoS Attacks Using Machine Learning Classification Algorithms
Kishore Babu Dasari, Nagaraju Devarakonda
Synthesis of the Structure of a Computer System Functioning in Residual Classes
Victor Krasnobayev, Alexandr Kuznetsov, Kateryna Kuznetsova
Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage
Justice Odoom, Huang Xiaofang, Samuel Akwasi Danso, Richlove Samuel Soglo, Benedicta Nana Esi Nyarko