Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Data Privacy System Using Steganography and Cryptography
Deep Classifier for Conjunctivitis – A Three-Fold Binary Approach
Definition Synthesis of Agility in Software Development: Comprehensive Review of Theory to Practice
Enhanced Deep Hierarchal GRU & BILSTM using Data Augmentation and Spatial Features for Tamil Emotional Speech Recognition
Analysis and Detection of various DDoS attacks on Internet of Things Network
Routing in Hybrid Software Defined Networking using Hop-Count Approach
Real-Time Animal Location Estimation Using Wearable Sensors and Cellular Mobile Networks
Risk Forecasting of Data Confidentiality Breach Using Linear Regression Algorithm
A Multiclass Approach to Estimating Software Vulnerability Severity Rating with Statistical and Word Embedding Methods
An Efficient Image Steganography Scheme Using Bit-plane Slicing with Elliptic Curve Cryptography and Wavelet Transform
Secured Wireless Sensor Network Protocol using Rabin-assisted Multifactor Authentication
Role of Human Aspects on the process of Software Requirement Elicitation
Comparison and Analysis of Software Vulnerability Databases
Enhancing Security of Medical Image Data in the Cloud Using Machine Learning Technique
An Improved Popular Items Extraction for Covering Reduction Collaborative Filtering
Eigen and HOG Features based Algorithm for Human Face Tracking in Different Background Challenging Video Sequences
Sales Management Application at Widya Collection Store Web-based
Development Information System for Rubber Sap Processing in East Borneo
Local Cloud Computing Service Adoption in Nigeria: Challenges and Solutions
Smartphone-based Biometric Authentication Scheme for Access Control Management in Client-server Environment
Incorporating Preference Changes through Users' Input in Collaborative Filtering Movie Recommender System
Using Rough Set Theory for Reasoning on Vague Ontologies
Mathematical Model for Adaptive Technology in E-learning Systems
Building Predictive Model by Using Data Mining and Feature Selection Techniques on Academic Dataset
Hybridization of Buffalo and Truncative Cyclic Gene Deep Neural Network-based Test Suite Optimization for Software Testing
Deep Learning Network and Renyi-entropy Based Fusion Model for Emotion Recognition Using Multimodal Signals
Cyber-resilient Routing for Internet of Vehicles Networks During Black Hole Attack
A Performance Perspective of Live Migration of Virtual Machine in Cloud Data Center with Future Directions
Sensitive Data Identification and Security Assurance in Cloud and IoT based Networks
Sentiment Analysis CSAM Model to Discover Pertinent Conversations in Twitter Microblogs
Detection of Unknown Insider Attack on Components of Big Data System: A Smart System Application for Big Data Cluster
Dynamic Editing Distance-based Extracting Relevant Information Approach from Social Networks
Extended DragonDeBrujin Topology Synthesis Method
Modified ECC for Secure Data Transfer in Multi-Tenant Cloud Computing
Detection of DDoS Attacks Using Machine Learning Classification Algorithms
Synthesis of the Structure of a Computer System Functioning in Residual Classes
Revamped Dual-key Stealth Address Protocol for IoT Using Encryption and Decentralized Storage
Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime
A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing
Software Reliability Growth Models with Exponentiated-gompertz Testing Effort and Release Time Determination
← Предыдущая
Следующая страница →
1
|
...
|
71
|
72
|
73
|
74
|
75
|
76
|
77
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.