Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Using Unified Theory of Acceptance and Use of Technology Model to Predict Students' Behavioral Intention to Adopt and Use E-Counseling in Ghana
A Gaussian Filter based SVM Approach for Vehicle Class Identification
Performance Analysis of Schedulers to Handle Multi Jobs in Hadoop Cluster
Using Components of Corpus Linguistics and Annotation Tools in Sign Language Teaching
Rule Based Communication Protocol between Social Networks using Semantic Web Rule Language (SWRL)
Fuzzy Latent Semantic Query Expansion Model for Enhancing Information Retrieval
Acceptance of E-Learning among Undergraduates of Computing Degrees in Sri Lanka
E-Mail Spam Detection Using SVM and RBF
A Comparative Analysis of Cloud Simulators
Cloud Library Framework for Ethiopian Public Higher Learning Institutions
A Novel Approach for Data Cleaning by Selecting the Optimal Data to Fill the Missing Values for Maintaining Reliable Data Warehouse
Machine Learning Cross Layer Technique to Detect Sink Hole Attacks in MANET
Email Spam Detection Using Combination of Particle Swarm Optimization and Artificial Neural Network and Support Vector Machine
The Impact of Mobile Devices for Learning in Higher Education Institutions: Nigerian Universities Case Study
Random Pattern based sequential bit (RaP-SeB) Steganography with Cryptography for Video Embedding
Web Services Privacy Preserving Based on Negotiation and Certificate Authorities
A Supervised Approach for Automatic Web Documents Topic Extraction Using Well-Known Web Design Features
An Analytical Study of the Use of Social Networks for Collaborative Learning in Higher Education
Study on Challenges, Opportunities and Predictions in Cloud Computing
Two-Level Alloyed Branch Predictor based on Genetic Algorithm for Deep Pipelining Processors
SXP: Simplified Extreme Programing Process Model
IScrum: An Improved Scrum Process Model
Interconnect network on chip topology in multi-core processors: a comparative study
Secure video compression and integration technique for data transmission
A programmable and managed software defined network
Energy consumption in mobile phones
Distributed denial of service detection using multi layered feed forward artificial neural network
Achieving confidentiality in electronic health records using cloud systems
An implementation of software routing for building a private cloud
Performance analysis of classification techniques by using multi Agent based intrusion detection system
Optimization of different queries using optimization algorithm (DE)
Impact of IPv4, IPv6 and dual stack interface over wireless networks
A novel approach to thwart security attacks on mobile pattern authentication systems
Ethical network surveillance using packet sniffing tools: a comparative study
Assessing vulnerability of mobile messaging apps to man-in-the-middle (MitM) attack
Investigating and analyzing bitcoin blockchain protocol using wireshark
Internet of things for the prevention of black hole using fingerprint authentication and genetic algorithm optimization
Design and implementation of malware detection scheme
Mobility support and operation of information centric networking approach
Hybrid KP-ABE algorithm with time bounded access control for cloud data security