Программные средства - 004.4

Научные статьи

В разделе "Программные средства"
Data Deduplication-based Efficient Cloud Optimisation Technique: Optimizing Cloud Storage through Data Deduplication
Ranga Kavitha, Mahaboob Sharief Shaik, Narala Swarnalatha, M. Pujitha, Syed Asadullah Hussaini, Samiullah Khan, Shamsher Ali
Classifying IoT Device’s Traffic Traces Using Network Traffic Characteristics
Rajarshi Roy Chowdhury, Debashish Roy, Emeroylariffion Abas
Optimizing Credit Risk Assessment in Banking Human Resource Management: A Enhanced Humboldt Squid based Probabilistic Spiking Neural Networks with Shunted Self-Attention
R. Sangeetha, S. Sathish Kumar, B. Sharmila, P. Dency Mary
Sustainable Approach to Data Security: Multi-Key Biometric Encryption and Cloud Storage for SDG-Focused Businesses
Mukesh Kumar, Vivek Bhardwaj, Karan Bajaj, Nandini Modi, Ahmed Qtaishat
Enhancing E-commerce Sentiment Analysis with Advanced BERT Techniques
Nusrat Jahan, Jubayer Ahamed, Dip Nandi
DSNFyS: Deep Stacked Neuro Fuzzy System for Attack Detection and Mitigation in RPL based IoT
Prashant Maurya, Vandana Kushwaha
Agile Method: Challenges and Adaptations for Complex Project Environments
Abdulmajeed Aljehani, M. Rizwan J. Qureshi
Enhancing Student Performance Prediction in E-Learning Environments: Advanced Ensemble Techniques and Robust Feature Selection
N.S. Koti Mani Kumar Tirumanadham, Thaiyalnayaki S.
Unlocking Educational Excellence: Leveraging Federated Learning for Enhanced Instructor Evaluation and Student Success
Ariful Islam, Debajyoti Karmaker, Abhijit Bhowmik, Md Masum Billah, Md Iftekharul Mobin, Noorhuzaimi Mohd Noor
Assessing Student Academic Performance with Fuzzy Expert System
Bhupendra Kumar Pathak
Toxicity Detection Using TextBlob Sentiment Analysis for Location-Centered Tweets
Varun Mishra, Tejaswita Garg
Optimization of Balanced Academic Curriculum Problem in Educational Institutions Using Teaching Learning Based Optimization Algorithm
Mohd Fadzil Faisae Ab Rashid, Wasif Ullah
AI vs. Human Writing: Developing a Novel Method for Text Authenticity Detection in Education
Vijay H. Kalmani, Amol C. Adamuthe, Arati Premnath Gondil, Vaishnavi Prashant Patil, Riya Amar Kore, Vaishnavi Mahadev Metkari
Information Security of Educational Portal Based on Face Anti-Spoofing Method: Effectiveness of Tiny Neural Network Machine Learning Model
Meruert Serik, Danara Tleumagambetova, Alaminov Muratbay
Performance Evaluation of Various Machine Learning Algorithms for User Story Clustering
Bhawnesh Kumar, Umesh Kumar Tiwari, Dinesh C. Dobhal
Performance Analysis of Shallow and Deep Learning Classifiers Leveraging the CICIDS 2017 Dataset
Edosa Osa, Emmanuel J. Edifon, Solomon Igori
Robust, Interactive, and Intelligent Captcha Model Based on Image Processing
Remzi Gurfidan, Oguzhan KiLiM, Tuncay YigiT
Energy and Deadline Aware Scheduling in Multi Cloud Environment Using Water Wave Optimization Algorithm
Santhosh Kumar Medishetti, Rameshwaraiah Kurupati, Rakesh Kumar Donthi, Ganesh Reddy Karri
Intelligent Application for Predicting Diabetes Spread Risk in the World Based on Machine Learning
Dmytro Uhryn, Victoria Vysotska, Daryna Zadorozhna, Mariia Spodaryk, Kateryna Hazdiuk, Zhengbing Hu
∆DHT-Zip: A Delta-difference Hybrid Tree Coding Scheme for End-to-end Packet Compression Framework in Network-on-Chips
T. Pullaiah, K. Manjunathachari, B.L. Malleswari
GMM-based Imbalanced Fractional Whale Particle Filter for Multiple Object Tracking in Surveillance Videos
Avinash Ratre
An Efficient IoT Based Intrusion Detection System Using Optimization Kernel Extreme Learning Machine
Laiby Thomas, Anoop B.K.
Efficient Cloud Computing Security Using Hybrid Optimized AES-IQCP-ABE Cryptography Algorithm
Jayaprakash Jayachandran, Dahlia Sam, Kanya Nataraj
Preliminary Study of Step-Count Authentication using Wearable Device
Sirapat Boonkrong, Wata Kanjanapruthipong
Sturdy Blockchain Combined with E-apps Repositories Based on Reliable Camouflaging and Integrating Mechanisms
Rasha Hallem Razzaq, Duaa Hammoud Tahayur, Wid Alaa Jebbar, Mishall Al-Zubaidie
GraphConvDeep: A Deep Learning Approach for Enhancing Binary Code Similarity Detection using Graph Embeddings
Nandish M., Jalesh Kumar, Mohan H.G., Manjunath Sargur Krishnamurthy
Multi-modal Cyberbullying Detection with Severity Analysis Using Deep-Tensor Fusion Framework
Neha Minder Singh, Sanjay Kumar Sharma
Unveiling Autism: Machine Learning-based Autism Spectrum Disorder Detection through MRI Analysis
Chitta Hrudaya Neeharika, Yeklur Mohammed Riyazuddin
Priorities for the Strategic Development of Ukraine's Cybersecurity Based on the Analysis of Expert Sampling Patterns
Oleksandr Korystin, Serhii Demediuk, Yaroslav Likhovitskyy, Yuriy Kardashevskyy, Olena Mitina
RSKD Ensemble Classifier with Stable Ensemble Feature Selection for High Dimensional Low Sample Size Cancer Datasets
Archana Suhas Vaidya, Dipak V. Patil
An Extended Symbolic-Arithmetic Model for Teaching Double-Black Removal with Rotation in Red-Black Trees
Kennedy E Ehimwenma, Hongyu Zhou, Junfeng Wang, Ze Zheng
BiLSTM-Powered Emotion Recognition from ECG and GSR Signals
Vanapalli Satya Sumanth, Vanapalli Sashi Vardhan, Peruri Bhuvan Satwik, Neelamsetty Glory, Vallala Lohitha Prakaashini, Saragadam Charishma, Adiraju Shasank
Android Mobile Security and File Protection Using Face Recognition
Marah Radi Hawa, Amani Yousef Owda, Majdi Owda
Novel Machine Learning Approaches for Identifying Attacks in IoT-based Smart Home Environment
Oyelakin A.M., Sanni S.A., Adegbola I.A., Salau-Ibrahim T.T., Bakare-Busari Z.M., Saka B.A.
Evaluation of Machine Learning Algorithms for Malware Detection: A Comprehensive Review
Sadia Haq Tamanna, Muhammad Muhtasim, Aroni Saha Prapty, Amrin Nahar, Md. Tanvir Ahmed Tagim, Fahmida Rahman Moumi, Shadia Afrin
Detection and Prevention of Phishing Short URLs Using Machine Learning and Blacklist Approaches
Najla Odeh, Sherin Hijazi
Detection of Anomalies Based on User Behavioral Information: A Survey
L. Lanuwabang, P. Sarasu
Robustness Assessment of Data Loss Prevention (DLP) Software for Data Leakage against Different Data Types and Sources
Ahmet Ali Suzen, Osman Ceylan
Query Auto-Completion Using Relational Graph Convolutional Network in Heterogeneous Graphs
Vidya Dandagi, Nandini Sidnal, Jayashree Kulkarni
Identifying Dark Web Hidden Services with Novel Image Classes Using CNN and Quantum Transfer Learning
Ashwini Dalvi, Soham Bhoir, Akansha Singh, Irfan Siddavatam, Sunil Bhirud