Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Forecasting of dry freight index data by using machine learning algorithms
Kemal Akyol
A cyclic attribution technique feature selection method for human activity recognition
Win Win Myo, Wiphada Wettayaprasit, Pattara Aiyarak
Multiobjective artificial bee colony based job scheduling for cloud computing environment
Neha Sethi, Surjit Singh, Gurvinder Singh
A systematic expository review of Schmidt-Samoa cryptosystem
Qasem Abu Al-Haija, Mohamad M.Asad, Ibrahim Marouf
Development of a secure SMS application using Advanced Encryption Standard (AES) on android platform
Muhammad Noman Riaz, Adeel Ikram
Signature-based malware detection using approximate boyer moore string matching algorithm
A. Ojugoa, A. O. Eboka
Generating code for simple dynamic web applications via routing configurations
Kazuaki Kajitori
Improved architecture of focused crawler on the basis of content and link analysis
Bhupinderjit Singh, Deepak Kumar Gupta, Raj Mohan Singh
Cloud computing: a paradigm shift in the way of computing
Mohit Agarwal, Gur Mauj Saran Srivastava
Ambiguity in question paper translation
Shweta Vikram, Sanjay K. Dwivedi
A proposed framework to analyze abusive tweets on the social networks
Priya Gupta, Aditi Kamra, Richa Thakral, Mayank Aggarwal, Sohail Bhatti, Vishal Jain
Specific queries optimization using Jaya approach
Sahil Saharan, J.S. Lather, R. Radhakrishnan
Efficient feature extraction in sentiment classification for contrastive sentences
Sonu Lal Gupta, Anurag Singh Baghel
Comparative analysis of stemming algorithms for web text mining
Muhammad Haroon
Intuitionistic fuzzy weighted sum and product method for electronic service quality selection problem
Gaurisha Sisodia, Kapil Sharma, Shashikant Gupta
Binary log design for one-way data replication with ZeroMQ
I. Gede John Arissaputra, I. Made Sukarsa, Putu Wira Buana, Ni Wayan Wisswani
Cross-domain recommendation model based on hybrid approach
Smriti Ayushi, V. R. Badri Prasad
Knowledge extraction and analysis to evaluate the financial performance of an organization using OLAM
Mahtab Ebrahimi
Energy saving VM placement in cloud
Shreenath Acharya, Demian Antony D’Mello
A sustainability theme for introductory programming courses
Jeffrey A. Stone
Performance enhancement of machine translation evaluation systems for English – Hindi language pair
Pooja Malik, Anurag Singh Baghel
Textual coherence improvement of extractive document summarization using greedy approach and word vectors
Mohamad Abdolahi, Morteza Zahedi
Combined appetency and upselling prediction scheme in telecommunication sector using support vector machines
Lian-Ying Zhou, Daniel M. Amoh, Louis K. Boateng, Andrews A. Okine
H2E: a privacy provisioning framework for collaborative filtering recommender system
Muhammad Usman Ashraf, Mubeen Naeem, Amara Javed, Iqra Ilyas
Development of a method for choosing cloud computing on the platform of PaaS for servicing the state agencies
Kapan Oralgazyolu Shakerkhan, Ermek Tolegenovich Abilmazhinov
Integration of cyber-physical systems in e-science environment: State-of-the-Art, problems and effective solutions
Tahmasib Kh. Fataliyev, Shakir A. Mehdiyev
Evaluation the performance of DMZ
Baha Rababah, Shikun Zhou, Mansour Bader
Energy aware supervised pattern attack recognition technique for mitigation of EDoS attacks in cloud platform
Preeti Daffu, Amanpreet Kaur
Previously-selected-server-first based scalable VM placement algorithm for mitigating side channel attacks in cloud computing
Adi Maheswara Reddy G., K. Venkata Rao, J.V.R. Murthy
MANET testbed using raspberry PIs
Salem Sati, Ahmed El-bareg
Design of effective security architecture for mobile cloud computing to prevent DDoS attacks
Kaushik Sekaran, G.Raja Vikram, B.V. Chowdary
Convergence of MANET in communication among smart devices in IoT
Tanweer Alam, Baha Rababah
Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana
Umar Sayibu, Frimpong Twum, Issah Baako
Performance Analysis of Network Applications on IPv6 Cloud Connected Virtual Machine
Zeeshan Ashraf, Adnan Sohail, Muhammad Yousaf
IT Risk Management Based on ISO 31000 and OWASP Framework using OSINT at the Information Gathering Stage (Case Study: X Company)
Anak Agung Bagus Arya Wiradarma, Gusti Made Arya Sasmita
Evaluation of Quality for Semi-Structured Database System
Rita Ganguly, Anirban Sarkar
A Risk-Assessment of Cyber Attacks and Defense Strategies in Industry 4.0 Ecosystem
Ahmet Ali Süzen
Push Management Platform Based on Wechat Small Program and Cloud Development
Yan Wu, Fang Wang, Yanying Zou, Huaijin Zhang, Bingsheng Chen, Mengshan Li
A Corpus Based Approach to Build Arabic Sentiment Lexicon
Afnan Atiah Alsolamy, Muazzam Ahmed Siddiqui, Imtiaz Hussain Khan
Feature Engineering based Approach for Prediction of Movie Ratings
Sathiya Devi S., Parthasarathy G.