Связь компьютеров. Сети ЭВМ. Вычислительные сети - 004.7

Научные статьи

В разделе "Связь компьютеров. Сети ЭВМ. Вычислительные сети"
Implementation of Python Interoperability in Java through TCP Socket Communication
Bala Dhandayuthapani V.
Streamlining Stock Price Analysis: Hadoop Ecosystem for Machine Learning Models and Big Data Analytics
Jesslyn Noverlita, Herison Surbakti
Artificial Intelligence Based Domotics Using Multimodal Security
Khandaker Mohammad Mohi Uddin, Naimur Rahman, Md. Mahbubur Rahman, Samrat Kumar Dey
MediBERT: A Medical Chatbot Built Using KeyBERT, BioBERT and GPT-2
Sabbir Hossain, Rahman Sharar, Md. Ibrahim Bahadur, Abu Sufian, Rashidul Hasan Nabil
A Hybrid Unsupervised Density-based Approach with Mutual Information for Text Outlier Detection
Ayman H. Tanira, Wesam M. Ashour
Blockchain: A Comparative Study of Consensus Algorithms PoW, PoS, PoA, PoV
Shahriar Fahim, SM Katibur Rahman, Sharfuddin Mahmood
MiMaLo: Advanced Normalization Method for Mobile Malware Detection
Sriyanto, Sahib B. Sahrin, Abdullah Mohd. Faizal, Nanna Suryana, Adang Suhendra
Impact of Telecommunication Service Quality in Bangladesh on Online Education during Covid-19
Md. Biplob Hosen
Enhancing Emotion Detection with Adversarial Transfer Learning in Text Classification
Ashritha R. Murthy, Anil Kumar K.M., Abdulbasit A. Darem
Dynamic Load Balancing in Cloud Computing: A Convergence of PSO, GSA, and Fuzzy Logic within a Hybridized Metaheuristic Framework
Rajgopal K.T., Abhishek S. Rao, Ramaprasad Poojary, Deepak D.
Information Technology for Generating Lyrics for Song Extensions Based on Transformers
Oleksandr Mediakov, Victoria Vysotska, Dmytro Uhryn, Yuriy Ushenko, Cennuo Hu
Load Balancing Mechanism for Edge-Cloud-Based Priorities Containers
Wael Hadeed, Dhuha Basheer Abdullah
Trust Modelling and Management for IoT Healthcare
Abdul Rauf, Riaz Ahmed Shaikh, Asadullah Shah
Performance Analysis of HWMP Protocol in Wireless Mesh Network
Jyoti Mishra, Awadhesh Kumar, Akash Raghuvanshi
IPv6 Migration Strategy Using Carrier Grade Network Address Translation
Dipti Chauhan
A New Framework of Honeypots Network Security Using Linear Regression Decision Algorithm
Avijit Mondal, Radha Tamal Goswami, Soumita Sen
An Analytical Study of Cloud Security Enhancements
Imran Khan, Tanya Garg
Enhancing Cybersecurity through Bayesian Node Profiling and Attack Classification
Priyanka Desai
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence
NW Chanaka Lasantha, Ruvan Abeysekara, MWP Maduranga
AI-Driven Network Security: Innovations in Dynamic Threat Adaptation and Time Series Analysis for Proactive Cyber Defense
Mansoor Farooq, Mubashir Hassan Khan
An Evaluation of Systems for Detection and Prevention of DoS Attacks in SDN Networks
Maurizio D’Arienzo
Improved Route Discovery Scheme under Blackhole Attack in MANET
Priyanka Pandey, Raghuraj Singh
Vulnerability Detection in Intelligent Environments Authenticated by the OAuth 2.0 Protocol over HTTP/HTTPS
Gilson da Silva Francisco, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Eduardo Takeo Ueda, Adilson Eduardo Guelfi, Jose Jesus Perez Alcazar
Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT
Dilip Kumar, Manoj Kumar
Optimized Intrusion Detection System in Fog Computing Environment Using Automatic Termination-based Whale Optimization with ELM
Dipti Prava Sahu, Biswajit Tripathy, Leena Samantaray
Secure Data Storage and Retrieval over the Encrypted Cloud Computing
Jaydip Kumar, Hemant Kumar, Karam Veer Singh, Vipin Saxena
Data Analysis and Success Prediction of Mobile Games before Publishing on Google Play Store
Muhammad Muhtasim, Md. Showrov Hossen
HKCHB: Meta-heuristic Algorithm for Task Scheduling and Load Balancing in Cloud-fog Computing
Mahmoud Moshref, Sherin Hijazi, Azzam Sleit, Ahmad Sharieh
Web Application Penetration Testing on Udayana University's OASE E-learning Platform Using Information System Security Assessment Framework (ISSAF) and Open Source Security Testing Methodology Manual (OSSTMM)
I. Gusti Agung Surya Pramana Wijaya, Gusti Made Arya Sasmita, I. Putu Agus Eka Pratama
Securing the Internet of Things: Evaluating Machine Learning Algorithms for Detecting IoT Cyberattacks Using CIC-IoT2023 Dataset
Akinul Islam Jony, Arjun Kumar Bose Arnob
Security Analysis in Online Transaction Systems: A Proposed Framework
Rakin S. Aftab, Md. Kais K. Emon, Sanjana F. Anny, Durjoy Sarker, Md. Mazid-Ul-Haque
Enhancing Mobile Software Developer Selection through Integrated F-AHP and F-TOPSIS Methods
Murnawan, Vaya Viora Novitasari
Fingerprint Image Fusion: A Cutting-edge Perspective on Gender Classification via Rotational Invariant Features
Shivanand Gornale, Abhijit Patil, Khang Wen Goh, Sathish Kumar, Kruthi R.
A Novel Model for Protecting the Privacy of Digital Images in Cloud Using Permutated Fragmentation and Encryption Algorithms
Ahmed Y. Mahmoud, Mohammed Ibraheem AL Kahlout
An Efficient Approach for Detection of Compromised SDN Switches and Restoration of Network Flow
Tinku Adhikari, Ajoy Kumar Khan, Malay Kule, Subhajit Das
IHBOT: An Intelligent and Hybrid Model for Investigation and Classification of IoT Botnet
Umang Garg, Santosh Kumar, Manoj Kumar
Enhancing Jakarta Faces Web App with AI Data-Driven Python Data Analysis and Visualization
Bala Dhandayuthapani V.
Information Technology for Gender Voice Recognition Based on Machine Learning Methods
Victoria Vysotska, Denys Shavaiev, Michal Greguš, Yuriy Ushenko, Zhengbing Hu, Dmytro Uhryn
Securing Musical Streams: Leveraging ElGamal Encryption in REST API Frameworks for PWAs
Timothy John Pattiasina
Methodology for Searching for the Dependence Between Data Defensiveness and Volume of Social Network Evolution
Akhramovych Volodymyr, Lehominova Svitlana, Stefurak Oleh, Akhramovych Vadym, Chuprun Sergii