Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Outlier Detection Technique for Wireless Sensor Network Using GAN with Autoencoder to Increase the Network Lifetime
Biswaranjan Sarangi, Biswajit Tripathy
A Secure and Efficient Cryptography System Based on Chaotic Maps for Securing Data Image in Fog Computing
Samaa Y. Tarabay, Abeer Twakol, Ahmed S. Samrah, Ibrahim Yasser
Software Reliability Growth Models with Exponentiated-gompertz Testing Effort and Release Time Determination
Ahmad Raad Raheem, Shaheda Akthar
Intelligent Detection Technique for Malicious Websites Based on Deep Neural Network Classifier
Mustapha A. Mohammed, Seth Alornyo, Michael Asante, Bernard O. Essah
Intelligent Model for Smartphone Addiction Assessment in University Students using Android Application and Smartphone Addiction Scale
Anshika Arora, Pinaki Chakraborty, M.P.S. Bhatia, Aditya Puri
Deep Convolution Neural Networks for Cross-Dataset Facial Expression Recognition System
Rohan Appasaheb Borgalli, Sunil Surve
An Innovative Leukemia Detection System using Blood Samples via a Microscopic Accessory
Azza M. Bin Aof, Ethar A. Awad, Sarah R. Omer, Banazier A. Ibraheem, Zeinab A. Mustafa
Evaluation of GAN-based Models for Phishing URL Classifiers
Thi Thanh Thuy Pham, Tuan Dung Pham, Viet Cuong Ta
Two-Layer Security of Images Using Elliptic Curve Cryptography with Discrete Wavelet Transform
Ganavi M., Prabhudeva S.
Detecting Remote Access Network Attacks Using Supervised Machine Learning Methods
Samuel Ndichu, Sylvester McOyowo, Henry Okoyo, Cyrus Wekesa
LCDT-M: Log-Cluster DDoS Tree Mitigation Framework Using SDN in the Cloud Environment
Jeba Praba. J., R. Sridaran
Predicting Intrusion in a Network Traffic Using Variance of Neighboring Object’s Distance
Krishna Gopal Sharma, Yashpal Singh
Ensemble Learning Approach for Classification of Network Intrusion Detection in IoT Environment
Priya R. Maidamwar, Prasad P. Lokulwar, Kailash Kumar
A lightweight Data Exchange Format for Mobile Transactions
M.C. Mohammed Shameer, P.P. Abdul Haleem, Yazik K. Puthenpediyakkal
Energy Management and Network Traffic Avoidance Using GAODM and E-AODV Protocols in Mobile Ad-Hoc Network
Ramesh Vatambeti, Nrusingha Charan Pradhan, E. Sandhya, Surendra Reddy Vinta, V. Anbarasu, K. Venkateswara Rao
Distributed Denial of Service Attack Detection Using Hyper Calls Analysis in Cloud
K. Umamaheswari, Nalini Subramanian, Manikandan Subramaniyan
Secure Mobile Agent Migration Using Lagrange Interpolation and Fast Fourier Transformation
Pradeep Kumar, Niraj Singhal, Dhiraj Pandey, Avimanyou Vatsa
Deep Learning-based Resource Prediction and Mutated Leader Algorithm Enabled Load Balancing in Fog Computing
Shruthi G., Monica R. Mundada, S. Supreeth, Bryan Gardiner
Integer Programming Models for Task Scheduling and Resource Allocation in Mobile Cloud Computing
Rasim M. Alguliyev, Rashid G. Alakbarov
Detection of DDOS Attacks on Cloud Computing Environment Using Altered Convolutional Deep Belief Networks
S. Sureshkumar, G.K.D. Prasanna Venkatesan, R. Santhosh
Ford Fulkerson and Newey West Regression Based Dynamic Load Balancing in Cloud Computing for Data Communication
Prabhakara B.K., Chandrakant Naikodi, Suresh L.
Cyber-physical Systems: Security Problems and Issues of Personnel Information Security Culture
Rasmiyya Sh. Mahmudova
Security-aware Mobile Application Development Lifecycle (sMADLC)
Anthony Wambua Wambua, Gabriel Ndungu Kamau
Exploratory Analysis of Access Control Mechanisms for Cloud-Based Iot
Keerti Naregal, Vijay Kalmani
Determining the interests of Social Network Users
Irada Y. Alakbarova
Best Practices for Facing the Security Challenges of Internet of Things Devices Focusing on Software Development Life Cycle
Ratun Rahman, Md. Rafid Islam
Emerging Trends in Database and its Applications in MNC’s
Anushri Gupta, Ritu Shrivastava, Jay Kumar Jain
A Hybrid Weight based Feature Selection Algorithm for Predicting Students’ Academic Advancement by Employing Data Science Approaches
Ujwal U.J., Saleem Malik
Introducing Arabic-SQuADv2.0 for Effective Arabic Machine Reading Comprehension
Zeyad Ahmed, Mariam Zeyada, Youssef Amin, Donia Gamal, Hanan Hindy
A Bibliometric Analysis on Chatbot Application in Education
Lily Edinam Bensah, Fati Tahiru, Carlos Ankora, Noble Arden Kuadey
Desktop Virtualization: Benefits, Challenges, and Future Trends
Surjeet Kushwaha, Arun Kumar Yadav, H.N. Verma
An Overview of Remote Patient Monitoring For Improved Patient Care and Cost Reduction: The Iot Revolutionizing Health Care
Ravikumar Ch., P. Sudheer, P. Dharmendra Kumar
Machine Learning Applications in Algorithmic Trading: A Comprehensive Systematic Review
Arash Salehpour, Karim Samadzamini
Interpolation Method for Identification of Brain Tumor from Magnetic Resonance Images
Sugandha Singh, Vipin Saxena
Software Evolution of Next.js and Angular
Anika Tabassum, Ishrat Jahan Emu, Abdus Satter
Transfer Learning based Breast Cancer Classification via Deep Convolutional Neural Network
Markos Wondim Walle, Kula Kakeba Tune, Natnael Tilahun Sinshaw, Sudhir Kumar Mohapatra
An Efficient Approach for Text-to-Speech Conversion Using Machine Learning and Image Processing Technique
Smt. Swaroopa Shastri, Shashank Vishwakarma
Design Remote Monitoring System for Patients at Real-Time based on Internet of Things (IoT)
Satar Habib Mnaathr
An Integrated Pipeline with Internal Image Processing for Efficient Image to Text to Speech Conversion
Shreyas Reddy, Rashmi Ranjan Das, Anjali Mohapatra
IOT Based Burglar Detection and Alarming System Using Raspberry Pi
Sahana V., Shashidhar R., Bindushree R., Chandana A.N.