Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Non-singular Transformation Based Encryption Scheme
Sunil Kumar, Sandeep Kumar, Gaurav Mittal, Dharminder Dharminder, Shiv Narain
An Optimization of Feature Selection for Classification using Modified Bat Algorithm
V. Yasaswini, Santhi Baskaran
Data Mining for Cyberbullying and Harassment Detection in Arabic Texts
Eman Bashir, Mohamed Bouguessa
An Enhanced List Based Packet Classifier for Performance Isolation in Internet Protocol Storage Area Networks
Joseph Kithinji, Makau S. Mutua, Gitonga D. Mwathi
Access Digital Divide in the Kingdom of Saudi Arabia (KSA): Current State and Measures for Improvement
Altahir Saad, Ahmed Fahim
Web Performance Analysis: An Empirical Analysis of E-Commerce Sites in Bangladesh
Md. Tutul Hossain, Rakib Hassan, Mahfida Amjad, Md. Abdur Rahman
Extended Proxy Mobile IPv6 Scheme Using Global Local Mobility Anchor
Eshraga Hussien Elfadil, TajElsir Hassan Suliman, Ahmed Hamza Osman
Boosting Afaan Oromo Named Entity Recognition with Multiple Methods
Abdo Ababor Abafogi
WiFi Based Indoor Navigation System for Closed Buildings Using Smart Phones
Gayatri Hushe, Rakesh Suryawanshi
Tree-classification Algorithm to Ease User Detection of Predatory Hijacked Journals: Empirical Analysis of Journal Metrics Rankings
Arnold Adimabua Ojugo, Obinna Nwankwo
Conducing the Cashless Revolution in Pakistan Using Enterprise Integration
Sania Zafar, Sidra Riaz, Waqas Mahmood
Evaluation of Machine Learning Techniques for Email Spam Classification
Mahmoud Jazzar, Rasheed F. Yousef, Derar Eleyan
Role of Coronavirus Outbreak on Adoption of Electronic Education in New Bussa, Niger State, Nigeria
Joseph O. Adigun, Eric A. Irunokhai, Oluwafemi A. Adeniji, Yetunde M. Areo, John O. Onihunwa, Yusuf A. Sada, Caleb A. Jeje
Design, Analysis, and Implementation of a Two-factor Authentication Scheme using Graphical Password
Khaja Mizbahuddin Quadry, A. Govardhan, Mohammed Misbahuddin
Method of Parallel Information Object Search in Unified Information Spaces
Alexander Dodonov, Vadym Mukhin, Valerii Zavgorodnii, Yaroslav Kornaga, Anna Zavgorodnya, Oleg Mukhin
Intrusion Detection System Using Ensemble of Rule Learners and First Search Algorithm as Feature Selectors
D. P. Gaikwad
A Comprehensive Analysis of QoS in Wired and Wireless SDN Based on Mobile IP
Nazrul Islam, Md. Habibur Rahman, Mostofa Kamal Nasir
Социально-психологические характеристики подростков, склонных к компьютерной зависимости
Базилевич Анастасия Юрьевна, Сущенко Ольга Григорьевна
An Optimized K-means with Density and Distance-Based Clustering Algorithm for Multidimensional Spatial Databases
K. Laskhmaiah, S. Murali Krishna, B. Eswara Reddy
Fire and Motion Early Warning Device: Its Design and Development
Ronnie Camilo F. Robles, Ruth G. Luciano, Rolaida L. Sonza, Arnold P. Dela Cruz, Mariel Cabrillas
Image Recognition Using Machine Learning with the Aid of MLR
Meherunnesa Tania, Diba Afroze, Jesmin Akhter, Abu Sayed Md. Mostafizur Rahaman, Md. Imdadul Islam
An Improved Framework of Healthcare Supports System for the Treatment of Dementia Cases
Akaninyene Udo Ntuen, John Edet Efiong, Eme Ogwo, Edward O. Uche-Nwachi
Myers-briggs Personality Prediction and Sentiment Analysis of Twitter using Machine Learning Classifiers and BERT
Prajwal Kaushal, Nithin Bharadwaj B P, Pranav M S, Koushik S, Anjan K Koundinya
Heuristic-based Approach for Dynamic Consolidation of Software Licenses in Cloud Data Centers
Leila Helali, Mohamed Nazih Omri
A Novel Ant Colony Based DBN Framework to Analyze the Drug Reviews
Nazia Tazeen, K. Sandhya Rani
Normalized Statistical Algorithm for Afaan Oromo Word Sense Disambiguation
Abdo Ababor Abafogi
D-TS: A Secure and Trusted Authentication Framework for Domain Name Server
Usman Aijaz N, Syed Mustafa, Mohammed Misbahuddin
Feature Engineering for Cyber-attack detection in Internet of Things
Maheshi B. Dissanayake
System Monitoring Addon Analysis in System Load Simulation
Filip Gjorgjevikj, Kire Jakimoski
Improved Deep Learning Model for Static PE Files Malware Detection and Classification
Sumit S. Lad., Amol C. Adamuthe
Security Analysis of Government & Financial Websites of Bangladesh
Md. Asaduzzaman Masum, Md. Rishad Istiak Sachcha, Abu Nayem
Review on: Analysis of an IoT Based Blockchain Technology
Angotu Saida, R. K. Yadav
Object Tracking: An Experimental and Comprehensive Study on Vehicle Object in Video
Vo Hoai Viet, Huynh Nhat Duy
Investigation of Machine Learning Algorithms for Network Intrusion Detection
Shadman Latif, Faria Farzana Dola, MD. Mahir Afsar, Ishrat Jahan Esha, Dip Nandi
Hindrance to Requirements Engineering During Software Development with Globally Distributed Teams
Waqas Mahmood, Syed Shaharyar Rizvi, Siraj Munir
Dual Layer Encryption for IoT based Vehicle Systems over 5G Communication
Sajid Bin-Faisal, Dip Nandi, Mashiour Rahman
Implementation of Improved Cryptography Algorithm
Rohit Verma, Jyoti Dhiman
A Multi-channel Character Relationship Classification Model Based on Attention Mechanism
Yuhao Zhao, Hang Li, Shoulin Yin
A Cloud Based Learning Framework for Eradicating the Learning Challenges of Ethiopian Working Professionals, Disables and Women
Durga Prasad Sharm, Duol Kuey Deng, Getahun Tigistu, Amin Tuni Gure, Bikila Alemu, Getachew Tewachew
Multimedia Traffic Transmission using MAODV and M-MAODV Routing Protocols over Mobile Ad-hoc Networks
Lavanya. Poluboyina, Mallikarjuna Prasad. A., Sivakumar Reddy. V., S. V. Maruthi Rao