Search

Showing total 161 results
161 results

Search Results

1. Blockchain Applications in Higher Education Based on the NIST Cybersecurity Framework

2. BP Neural Network-Enhanced System for Employment and Mental Health Support for College Students

3. Augmented Reality for Inclusive Growth in Education: The Challenges

4. Evaluating the Effectiveness of Blended Learning in Learning Business Courses in Low-Income Economies

5. An Assessment of the Integration of ICTs into Teaching Processes by Science Teachers: The Case of Albania

6. Exploring Patron Behavior in an Academic Library: A Wi-Fi-Connection Data Analysis

7. Inheritance of Intangible Culture Based on Wireless Communication Network in College Dance Teaching

8. Study on the Effectiveness of English Teaching in Universities Based on 5G Mobile Internet

9. Socio-Technically Just Pedagogies: A Framework for Curriculum-Making in Higher Education

10. Conducting Qualitative Interviews via VoIP Technologies: Reflections on Rapport, Technology, Digital Exclusion, and Ethics

11. Metaverse Miracles: Enhancing Healthcare Experiences through Virtual Reality

12. Research and implementation of network communication based on embedded monitoring system.

13. Communication costs in science: evidence from the National Science Foundation Network.

14. Enhancing Cybersecurity by relying on a Botnet Attack Tracking Model using Harris Hawks Optimization.

15. Malware traffic detection based on type II fuzzy recognition.

16. Detecting Brute Force Attacks on SSH and FTP Protocol Using Machine Learning: A Survey.

17. Analysis of packet switching in VoIP telephony at the command post of tactical level units.

18. Waiting Time Control Chart for M/G/1 Retrial Queue.

19. Z-K-R: A Novel Framework in Intrusion Detection system through enhanced techniques.

20. Random forest with differential privacy in federated learning framework for network attack detection and classification.

21. Dynamic Cyberattack Simulation: Integrating Improved Deep Reinforcement Learning with the MITRE-ATT&CK Framework.

22. Analysis of stationary fluid queue driven by state-dependent birth-death process subject to catastrophes.

23. Virtual Reality for Career Development and Exploration: The CareProfSys Profiler System Case.

24. CONSTRUCTION OF A NETWORK INTRUSION DETECTION SYSTEM BASED ON A CONVOLUTIONAL NEURAL NETWORK AND A BIDIRECTIONAL GATED RECURRENT UNIT WITH ATTENTION MECHANISM.

25. COMPUTER NETWORK VIRUS DEFENSE WITH DATA MINING-BASED ACTIVE PROTECTION.

26. Enhanced time-sensitive networking configuration detection using optimized BPNN with feature selection for industry 4.0.

27. Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach.

28. Structural and Spectral Properties of Chordal Ring, Multi-Ring, and Mixed Graphs.

29. An optimization scheme for vehicular edge computing based on Lyapunov function and deep reinforcement learning.

30. A new localization mechanism in IoT using grasshopper optimization algorithm and DVHOP algorithm.

31. A closer look at the incorporation of pedagogy aided with technology for Creating Conducive Learning Environment.

32. Messy Broadcasting in Grid.

33. A Low-Computational Burden Closed-Form Approximated Expression for MSE Applicable for PTP with gfGn Environment.

34. Network Security Enhanced with Deep Neural Network-Based Intrusion Detection System.

35. Advancements in intrusion detection: A lightweight hybrid RNN-RF model.

36. Enhancing Botnet Detection in Network Security Using Profile Hidden Markov Models.

37. Properties of Connectivity in Vague Fuzzy Graphs With Application in Building University.

38. APPROXIMATE AND EXACT RESULTS FOR THE HARMONIOUS CHROMATIC NUMBER.

39. A Hybrid Intrusion Detection Approach for Cyber Attacks.

40. OPTIMIZING INFORMATION SUPPORT TECHNOLOGY FOR NETWORK CONTROL: A PROBABILISTIC-TIME GRAPH APPROACH.

41. Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application.

42. Examining the Performance of Various Pretrained Convolutional Neural Network Models in Malware Detection.

43. Projection measure-driven optimization of q-rung orthopair fuzzy MAGDM for computer network security evaluation.

44. Enhancing PDF Malware Detection through Logistic Model Trees.

45. Real-Time Remote Monitoring and Overheating Early Warning of Thermodynamic State of Complex Equipment Systems Based on Computer Network Technology.

46. Document Communication: From the Act of Communication to the Birth of an Interdisciplinary Discipline.

47. Unleashing the power of SDN and GNN for network anomaly detection: State‐of‐the‐art, challenges, and future directions.

48. Will Artificial Intelligence Replace Knowledge Centers? Assessment of the Situation.

49. Probability-Based Strategy for a Football Multi-Agent Autonomous Robot System.

50. LVCMOS18, transmitter, driver, level up shifter, Schmitt trigger, level down shifter and ESD protection.