Войти
Регистрация
Журналы
Издательства
Подписки
Войти
Регистрация
Научные статьи
\
Общие вопросы науки и культуры
\
Информационные технологии. Вычислительная техника. Обработка данных
Программные средства - 004.4
Научные статьи
В разделе "Программные средства"
Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses
Enhancing E-commerce Sentiment Analysis with Advanced BERT Techniques
DSNFyS: Deep Stacked Neuro Fuzzy System for Attack Detection and Mitigation in RPL based IoT
Agile Method: Challenges and Adaptations for Complex Project Environments
Enhancing Student Performance Prediction in E-Learning Environments: Advanced Ensemble Techniques and Robust Feature Selection
Unlocking Educational Excellence: Leveraging Federated Learning for Enhanced Instructor Evaluation and Student Success
Assessing Student Academic Performance with Fuzzy Expert System
Toxicity Detection Using TextBlob Sentiment Analysis for Location-Centered Tweets
Optimization of Balanced Academic Curriculum Problem in Educational Institutions Using Teaching Learning Based Optimization Algorithm
AI vs. Human Writing: Developing a Novel Method for Text Authenticity Detection in Education
Information Security of Educational Portal Based on Face Anti-Spoofing Method: Effectiveness of Tiny Neural Network Machine Learning Model
Performance Evaluation of Various Machine Learning Algorithms for User Story Clustering
Performance Analysis of Shallow and Deep Learning Classifiers Leveraging the CICIDS 2017 Dataset
Robust, Interactive, and Intelligent Captcha Model Based on Image Processing
Energy and Deadline Aware Scheduling in Multi Cloud Environment Using Water Wave Optimization Algorithm
Intelligent Application for Predicting Diabetes Spread Risk in the World Based on Machine Learning
∆DHT-Zip: A Delta-difference Hybrid Tree Coding Scheme for End-to-end Packet Compression Framework in Network-on-Chips
GMM-based Imbalanced Fractional Whale Particle Filter for Multiple Object Tracking in Surveillance Videos
An Efficient IoT Based Intrusion Detection System Using Optimization Kernel Extreme Learning Machine
Efficient Cloud Computing Security Using Hybrid Optimized AES-IQCP-ABE Cryptography Algorithm
Preliminary Study of Step-Count Authentication using Wearable Device
Sturdy Blockchain Combined with E-apps Repositories Based on Reliable Camouflaging and Integrating Mechanisms
GraphConvDeep: A Deep Learning Approach for Enhancing Binary Code Similarity Detection using Graph Embeddings
Multi-modal Cyberbullying Detection with Severity Analysis Using Deep-Tensor Fusion Framework
Unveiling Autism: Machine Learning-based Autism Spectrum Disorder Detection through MRI Analysis
Priorities for the Strategic Development of Ukraine's Cybersecurity Based on the Analysis of Expert Sampling Patterns
RSKD Ensemble Classifier with Stable Ensemble Feature Selection for High Dimensional Low Sample Size Cancer Datasets
An Extended Symbolic-Arithmetic Model for Teaching Double-Black Removal with Rotation in Red-Black Trees
BiLSTM-Powered Emotion Recognition from ECG and GSR Signals
Android Mobile Security and File Protection Using Face Recognition
Novel Machine Learning Approaches for Identifying Attacks in IoT-based Smart Home Environment
Evaluation of Machine Learning Algorithms for Malware Detection: A Comprehensive Review
Detection and Prevention of Phishing Short URLs Using Machine Learning and Blacklist Approaches
Detection of Anomalies Based on User Behavioral Information: A Survey
Robustness Assessment of Data Loss Prevention (DLP) Software for Data Leakage against Different Data Types and Sources
Query Auto-Completion Using Relational Graph Convolutional Network in Heterogeneous Graphs
Identifying Dark Web Hidden Services with Novel Image Classes Using CNN and Quantum Transfer Learning
A Metrics-Driven Approach to Agile Success in Complex and Distributed Software Projects
Enhanced Write Performance and Power Efficiency in Approximate Match CAM Using SAPON Low Power and Transmission Gate Logic
Development of a Mobile Application for Employment Opportunities Matching in Nigeria Using the SVM Model
← Предыдущая
Следующая страница →
1
|
...
|
80
|
81
|
82
|
83
|
84
|
85
|
86
|
...
|
В конец
Нет соединения с интернетом.
Проверьте соединение и повторите попытку.