Специальные определители для вычислительной техники - 004.01/.08

Научные статьи

В разделе "Специальные определители для вычислительной техники"
Utilization of Data Mining Techniques for Prediction and Diagnosis of Tuberculosis Disease Survivability
K.R.Lakshmi, M.Veera Krishna, S.Prem Kumar
Novel Approach to Solve Resource Constrained Project Scheduling Problem (RCPSP)
Sultan A. Alhumrani, Rizwan J. Qureshi
The Obstacles in Big Data Process
Rasim M. Alguliyev, Rena T. Gasimova, Rahim N. Abbaslı
Analyzing the Performance of SVM for Polarity Detection with Different Datasets
Munir Ahmad, Shabib Aftab
An efficient indexing technique for AES lookup table to prevent side-channel cache timing attack
Refazul Islam Refat, Euna Islam, Md. Mosaddek Khan
A classification framework to detect DoS attacks
Ahmed Iqbal, Shabib Aftab, Israr Ullah, Muhammad Anwaar Saeed, Arif Husen
A study on malware and malware detection techniques
Rabia Tahir
Analysis and prediction of individual stock prices of financial sector companies in NIFTY50
Vikalp Ravi Jain, Manisha Gupta, Raj Mohan Singh
A survey on risk assessments of heart attack using data mining approaches
Yogita Solanki, Sanjiv Sharma
Plagiarism detection system for the kurdish language
Karzan Wakil, Muhammad Ghafoor, Mehyeddin Abdulrahman, Shvan Tariq
Towards data resilience: the analytical case of crypto ransomware data recovery techniques
Aaron Zimba, Zhaoshun Wang, Luckson Simukonda
A comparative analysis and proposing ‘ANN Fuzzy AHP model’ for requirements prioritization
Yash Veer Singh, Bijendra Kumar, Satish Chand, Jitendra Kumar
SASMEDU: security assessment method of software in engineering education
Güncel Sariman, Ecir Uğur Küçüksille
Efficient clustering algorithm with enhanced cohesive quality clusters
Anand Khandare, Abrar Alvi
Basis path based test suite minimization using genetic algorithm
Anbunathan R., Anirban Basu
Entailment and spectral clustering based single and multiple document summarization
Anand Gupta, Manpreet Kaur, Ahsaas Bajaj, Ansh Khanna
Deplyoing advance data analytics techniques with conversational analytics outputs for fraud detection
Sunil Kappal
Sorting using a combination of bubble sort, selection sort & counting sort
Sahil Kumar, Prerna Singla
The circumstances in which modular programming becomes the favor choice by novice programmers
Ilana Lavy, Rashkovits Rami
Visual Association Analytics Approach to Predictive Modelling of Students’ Academic Performance
Udoinyang G. Inyang, Imo J. Eyoh, Samuel A. Robinson, Edward N. Udo
Early Skin Cancer Detection Using Deep Convolutional Neural Networks on Mobile Smartphone
Justice O. Emuoyibofarhe, Daniel Ajisafe, Ronke S. Babatunde, Meinel Christoph
Implementation of Business Intelligence to Determine Evaluation of Activities (Case Study Indonesia Stock Exchange)
Ali Fajri, Ardiles Sinaga
FBSEM: A Novel Feature-Based Stacked Ensemble Method for Sentiment Analysis
Yasin Görmez, Yunus E. Işık, Mustafa Temiz, Zafer Aydın
Application of Artificial Neural Networks for Detecting Malicious Embedded Codes in Word Processing Documents
Sisay Tumsa
An Optimized Machine Learning Approach for Predicting Parkinson's Disease
Mousumy Kundu, Md Asif Nashiry, Atish Kumar Dipongkor, Shauli Sarmin Sumi, Md. Alam Hossain
Эффективность использования компьютерного тестирования в образовательной деятельности среднего профессионального образования
Витько Лилия Григорьевна
Comparative Analysis of Data mining Methods to Analyze Personal Loans Using Decision Tree and Naïve Bayes Classifier
Menuka Maharjan
Analysis of Threats and Cybersecurity in the Oil and Gas Sector within the Context of Critical Infrastructure
Shakir A. Mehdiyev, Mammad A. Hashimov
How do Machine Learning Algorithms Effectively Classify Toxic Comments? An Empirical Analysis
Md. Abdur Rahman, Abu Nayem, Mahfida Amjad, Md. Saeed Siddik
A Decision-Making Technique for Software Architecture Design
Jubayer Ahamed, Dip Nandi
Targeted Attacks Detection and Security Intruders Identification in the Cyber Space
Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Kaiyrbek Makulov
Application of Machine Learning and Predictive Models in Healthcare – A Review
Benjamin Eli Agbesi, Prince Clement Addo, Oliver Kufuor Boansi
Balancing Simplification and Detail Preservation in Low Poly Image Abstraction through Edge-Preserved Seed Point Generation
Philumon Joseph, Binsu C. Kovoor, Job Thomas
Impact of Cybersecurity Measures in the Healthcare Sector: A Comprehensive Review of Contemporary Approaches and Emerging Trends
Sapna Kumari, Priyadarshini Pattanaik, Mohammad Zubair Khan
Application of Particle Swarm Optimization to Improve the Performance of the K-Nearest Neighbor in Stunting Classification in South Sumatra, Indonesia
Ferry Putrawansyah, Chika Rahayu, Fameira Dhiniati
Cybersecurity as a Legal and Social Pillar for Protec ting Digital Rights and Enhancing Trust in the Digital Space
Mansouri T.
Информационное общество: ожидания и реальность
Васеев А.В.
Проблемы реализации информационных технологий в образовании
Сафонов В.И.
Стратегии защиты информации
Савченко А.Л.
Безопасность личных данных в социальных сетях
Горкина К.Н.