Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Traffic Engineering with Specified Quality of Service Parameters in Software-defined Networks
Artem Volokyta, Alla Kogan, Oleksii Cherevatenko, Dmytro Korenko, Dmytro Oboznyi, Yurii Kulakov
Blocking Fraud, Advertising, or Campaign-Related Calls with a Blockchain-based Mobile App
Remzi Gürfidan, Şerafettin Atmaca
A Novel Model for Protecting the Privacy of Digital Images in Cloud Using Permutated Fragmentation and Encryption Algorithms
Ahmed Y. Mahmoud, Mohammed Ibraheem AL Kahlout
An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow
Tinku Adhikari, Ajoy Kumar Khan, Malay Kule, Subhajit Das
IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet
Umang Garg, Santosh Kumar, Manoj Kumar
Finding and Mitigating a Vulnerability of the Color Wheel PIN Protocol
Samir Chabbi, Djalel Chefrour, Nour El Madhoun
Brain Ischemic Stroke Detection through Deep Learning: A Systematic Review on CT vs MRI vs CTA Images
Rathin Halder, Nusrat Sharmin
Gender Classification Optimization with Thermal Images Using Advanced Neural Networks
Kethineni Keerthi, Gurram Harika, Kommineni Deva Harshini, Kakani Soumya
Low-Light Image Enhancement Technology Based on Image Categorization, Processing and Retinex Deep Network
Zhengbing Hu, Oksana Shkurat, Krzysztof Przystupa, Orest Kochan, Marharyta Ivakhnenko
Enhanced Surgical Mask Recognition Using EfficientNet Architecture
Galib Muhammad Shahriar Himel, Md. Masudul Islam
Enhancing Healthcare Information Systems in Ethiopian Hospitals: Exploring Challenges and Prospects of a Cloud-based Model for Smart and Sustainable Information Services
Aschalew Arega, Durga Prasad Sharma
A Machine Learning Approach for Sentiment Analysis Using Social Media Posts
Ritushree Narayan, Pintu Samanta
Enhancing Jakarta Faces Web App with AI Data-Driven Python Data Analysis and Visualization
Bala Dhandayuthapani V.
IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments
Santhosh Kumar Medishetti, Ganesh Reddy Karri, Rakesh Kumar Donthi
A Comparative Model for Blurred Text Detection in Wild Scene Using Independent Component Analysis (ICA) and Enhanced Genetic Algorithm (Using a Bird Approach) with Classifiers
Nwufoh C.V., Sakpere W.
Deep Learning for Robust Facial Expression Recognition: A Resilient Defense Against Adversarial Attacks
Tinuk Agustin, Moch. Hari Purwidiantoro, Mochammad Luthfi Rahmadi
Information Technology for Gender Voice Recognition Based on Machine Learning Methods
Victoria Vysotska, Denys Shavaiev, Michal Greguš, Yuriy Ushenko, Zhengbing Hu, Dmytro Uhryn
Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs
Timothy John Pattiasina
Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT
Suprith Kumar K.S., Eesha D., Pooja A.P., Monika Sharma D.
Development of a Phishing Website Detection Model Using Classification Algorithm
Olugbenga A. Madamidola, Ilobekemen. P. Oladoja, Peace B. Falola, Matthew W. Omojola
Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems
Dandugudum Mahesh, T. Sampath Kumar
Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution
Akhramovych Volodymyr, Lehominova Svitlana, Stefurak Oleh, Akhramovych Vadym, Chuprun Sergii
Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network
Satish S. Bhojannawar, Shrinivas R. Managalwede, Carlos F. Cruzado
Two-factor Mutual Authentication with Fingerprint and MAC Address Validation
J.S. Jolin, A. Theophilus, A. Kathirvel
GDAR: A Secure Authentication for Dapp Interoperability in Blockchain
Surekha Thota, Shantala Devi Patil, Gopal Krishna Shyam, Bhanu Prasad
An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks
Shridhar Sanshi, Ramesh Vatambeti, Revathi V., Syed Ziaur Rahman
Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization
Rajit Ram Yadava, Ranvijay Ranvijay
Application of Particle Swarm Optimization to Improve the Performance of the K-Nearest Neighbor in Stunting Classification in South Sumatra, Indonesia
Ferry Putrawansyah, Chika Rahayu, Fameira Dhiniati
Diabetic Retinopathy Severity Grading Using Transfer Learning Techniques
Samia Akhtar, Shabib Aftab, Munir Ahmad, Asma Akhtar
Transfer Learning with EfficientNetV2 for Diabetic Retinopathy Detection
Michael Chi Seng Tang, Huong Yong Ting, Abdulwahab Funsho Atanda, Kee Chuong Ting
Glaucoma Detection and Severity Diagnosis from Fundus Images Using Dual CNN Architectures
G. Latha, P. Aruna Priya
An Approach to Improve Fisher-Yates Shuffling Based Image Encryption Using Parallelization on CPU
Sangeeta Sharma, Aman Chauhan, Nihal Srivastava, Kritik Danyal, Mukesh Kumar Giluka
Analysis of Multichannel Neurophysiological Signal for Identifying Epileptic Cases Using Hybrid Deep-Nets
Shipra Swati, Mukesh Kumar
A Novel GAN with DNA Sequences and Hash-based Approach for Improving Medical Image Security
Anita Murmu, Piyush Kumar
Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure
Girish Wali, Chetan Bulla
An Overview of Operating Systems Based on Microkernel Technology and their Essential Components
Md. Ratan Rana, Saikat Baul
Ranking of Machine Learning Algorithms Used in Disease Prediction: A Review-based Approach
Shunmuga Priya Subramanian, Amuthaguka Duraipandian
AI’s Current Impact and Future Potential in Emergency Services: A Comprehensive Review and Analysis
Roxane Elias Mallouhy, Naoufal Sirri, Irum Nahvi, Christophe Guyeux
Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques
Subinoy Sikdar, Malay Kule
Deep Learning Based Traffic Management in Knowledge Defined Network
Tejas M. Modi, Kuna Venkateswararao, Pravati Swain