Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow
IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet
Finding and Mitigating a Vulnerability of the Color Wheel PIN Protocol
Brain Ischemic Stroke Detection through Deep Learning: A Systematic Review on CT vs MRI vs CTA Images
Gender Classification Optimization with Thermal Images Using Advanced Neural Networks
Low-Light Image Enhancement Technology Based on Image Categorization, Processing and Retinex Deep Network
Enhanced Surgical Mask Recognition Using EfficientNet Architecture
Enhancing Healthcare Information Systems in Ethiopian Hospitals: Exploring Challenges and Prospects of a Cloud-based Model for Smart and Sustainable Information Services
A Machine Learning Approach for Sentiment Analysis Using Social Media Posts
Enhancing Jakarta Faces Web App with AI Data-Driven Python Data Analysis and Visualization
IBOA: Cost-aware Task Scheduling Model for Integrated Cloud-fog Environments
A Comparative Model for Blurred Text Detection in Wild Scene Using Independent Component Analysis (ICA) and Enhanced Genetic Algorithm (Using a Bird Approach) with Classifiers
Deep Learning for Robust Facial Expression Recognition: A Resilient Defense Against Adversarial Attacks
Information Technology for Gender Voice Recognition Based on Machine Learning Methods
Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs
Heuristic – Driven Disjoint Alternate Path Switching – Based Fault Resilient Multi- Constraints Routing Protocol for SDN-mIOT
Development of a Phishing Website Detection Model Using Classification Algorithm
Machine Learning Algorithms for Detecting DDoS Attacks in Intrusion Detection Systems
Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution
Delay-sensitive Quality of Service Routing with Integrated Admission Control for Wireless Mesh Network
Two-factor Mutual Authentication with Fingerprint and MAC Address Validation
GDAR: A Secure Authentication for Dapp Interoperability in Blockchain
An Efficient Optimized Neural Network System for Intrusion Detection in Wireless Sensor Networks
Green Optimization with Load balancing in Wireless Sensor Network using Elephant Herding Optimization
Application of Particle Swarm Optimization to Improve the Performance of the K-Nearest Neighbor in Stunting Classification in South Sumatra, Indonesia
Diabetic Retinopathy Severity Grading Using Transfer Learning Techniques
Transfer Learning with EfficientNetV2 for Diabetic Retinopathy Detection
Glaucoma Detection and Severity Diagnosis from Fundus Images Using Dual CNN Architectures
An Approach to Improve Fisher-Yates Shuffling Based Image Encryption Using Parallelization on CPU
Analysis of Multichannel Neurophysiological Signal for Identifying Epileptic Cases Using Hybrid Deep-Nets
A Novel GAN with DNA Sequences and Hash-based Approach for Improving Medical Image Security
Suspicious Activity Detection Model in Bank Transactions Using Deep Learning with Fog Computing Infrastructure
An Overview of Operating Systems Based on Microkernel Technology and their Essential Components
Ranking of Machine Learning Algorithms Used in Disease Prediction: A Review-based Approach
AI’s Current Impact and Future Potential in Emergency Services: A Comprehensive Review and Analysis
Intelligent Identification of Cryptographic Ciphers using Machine Learning Techniques
Deep Learning Based Traffic Management in Knowledge Defined Network
Hive-Based Data Encryption for Securing Sensitive Data in HDFS
Authentication in VANETs with Conditional Privacy-Preserving Property Using Certificateless Aggregate Signature Schemes
Analyzing Sentiments on Twitter Using Deep Learning Techniques