Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Sensing as a Service: Vision, Practices and Architecture
Maha Arooj, Muhammad Asif
Retrieval of Complex Named Entities on the Web: Proposals for Similarity Computation
Armel Fotsoh, Christian Sallaberry, Annig Le Parc Lacayrelle
ComPer: A Comprehensive Performance Evaluation Method for Recommender Systems
Alaa Alslaity, Thomas Tran
Cyber Bullying Detection and Classification using Multinomial Naïve Bayes and Fuzzy Logic
Arnisha Akhter, Uzzal K. Acharjee, Md Masbaul A. Polash
Analysis of Indonesia Politics Polarization before 2019 President Election Using Sentiment Analysis and Social Network Analysis
Mohammad Nur Habibi, Sunjana
Design and Implementation of IR System for Tigrigna Textual Documents
Teklay Birhane, Birhanu Hailu
A Framework for Software Defect Prediction Using Feature Selection and Ensemble Learning Techniques
Faseeha Matloob, Shabib Aftab, Ahmed Iqbal
Analysis of Large Set of Images Using MapReduce Framework
Sawsan M. Mahmoud, Rokaia Shalal Habeeb
Design of a Virtual Area Network for National Open University Sokoto Study Center
Zaharaddeen M. Bello, Bello A. Buhari, Sirajo Shehu
Privacy Protection in Smart Cities by a Personal Data Management Protocol in Blockchain
Hossein Mohammadinejad, Fateme Mohammadhoseini
Analyzing the IPv6 Deployment Process in Palestine
Yazan W. Abdalaziz, Ala Hamarsheh
Method for Effective Use of Cloudlet Network Resources
Rashid G. Alakbarov
Malware Classification with Improved Convolutional Neural Network Model
Sumit S. Lad, Amol C. Adamuthe
A Proficient Mechanism for Cloud Security Supervision in Distributive Computing Environment
Kamta Nath Mishra
Challenges of Mobile Devices' Resources and in Communication Channels and their Solutions
Rashid G. Alakbarov
A Study of Power Management Techniques in Green Computing
Sadia Anayat
The Multimedia Sentiment Model Based on Online Homestay Reviews
Wenguang Song, Hanyu Li, Qian Yu, Wan Li, Bingxin Zhang, Qiujuan Zhang
A Fingerprint Template Protection Scheme Using Arnold Transform and Bio-hashing
Olufade F. W. Onifade, Kabirat B. Olayemi, Folasade O. Isinkaye
Generation Analysis of Blockchain Technology: Bitcoin and Ethereum
Sidra Anwar, Sadia Anayat, Sheeza Butt, Saher Butt, Muhammad Saad
Analysis of Blokchain Technology Recommendations to be Applied to Medical Record Data Storage Applications in Indonesia
Senny Hapiffah, Ardiles Sinaga
Client Server iOS in Player versus Player (PVP) of “Borneo Snap”
Reza Andrea, Tommy Bustomi, Muhammad Muhsan
Web Application Performance Analysis of E-Commerce Sites in Bangladesh: An Empirical Study
Mahfida Amjad, Md. Tutul Hossain, Rakib Hassan, Md. Abdur Rahman
Load Balancing Optimization Based On Deep Learning Approach in Cloud Environment
Amanpreet Kaur, Bikrampal Kaur, Parminder Singh, Mandeep Singh Devgan, Harpreet Kaur Toor
Web Vulnerability Finder (WVF): Automated Black- Box Web Vulnerability Scanner
Muhammad Noman Khalid, Muhammad Iqbal, Kamran Rasheed, Malik Muneeb Abid
FBSEM: A Novel Feature-Based Stacked Ensemble Method for Sentiment Analysis
Yasin Görmez, Yunus E. Işık, Mustafa Temiz, Zafer Aydın
Investigation of Different Machine Learning Algorithms to Determine Human Sentiment Using Twitter Data
Golam Mostafa, Ikhtiar Ahmed, Masum Shah Junayed
A Genesis of a Meticulous Fusion based Color Descriptor to Analyze the Supremacy between Machine Learning and Deep learning
Shikha Bhardwaj, Gitanjali Pandove, Pawan Kumar Dahiya
Arabic Opinion Mining Using Combined CNN - LSTM Models
Hossam Elzayady, Khaled M. Badran, Gouda I. Salama
Evaluation of Websites by Many Criteria Using the Algorithm for Pairwise Comparison of Alternatives
Rasim M. Alguliyev, Gulnara Ch. Nabibayova, Saadat R. Abdullayeva
Genetic-based Summarization for Local Outlier Detection in Data Stream
Mohamed Sakr, Walid Atwa, Arabi Keshk
Hybrid Cryptography: Performance Analysis of Various Cryptographic Combinations for Secure Communication
Zuhi Subedar, Ashwini Araballi
OCR for Printed Bangla Characters Using Neural Network
Asif Isthiaq, Najoa Asreen Saif
Data Security in Mobile Cloud Computing: A State of the Art Review
Rida Qayyum, Hina Ejaz
A Comprehensive Study on Excessive Mobile Phone Use and Preventive Measures
Arifur Rahaman, Sabrina Tasnim, Md Sohag Hossain Majumdar, Emam Hossen, Md Rafiqul Islam (Rafiq)
Mitigating Technical Challenges via Redesigning Campus Network for Greater Efficiency, Scalability and Robustness: A Logical View
A.A. Ojugo, A.O. Eboka
A Bayesian Belief Network Model For Detecting Multi-stage Attacks With Malicious IP Addresses
Alile S.O., Egwali A.O.
A Novel IoT Based Approach to Notify Motion Detection in User’s Absence through Handheld Devices
K. Murali Krishna, H. Jayashree
Cloud Forensics: Challenges and Blockchain Based Solutions
Omi Akter, Arnisha Akther, Md Ashraf Uddin, Md Manowarul Islam
Supporting Audio Privacy-aware Services in Emerging IoT Environment
Naushin Nower
An improved IOT Authentication Process based on Distributed OTP and Blake2
Hind EL Makhtoum, Youssef Bentaleb