Department Of Computer Science 2

51. MGNN-IDS: a multi-graph neural network approach for robust intrusion detection in the internet of things
52. A multichannel deep learning framework for cyberbullying detection on social media
53. On the issue of the formation of the national identity of students (on the case of universities in Kazakhstan)
54. Empowering cloud providers: optimised locust-inspired algorithm for SLA violation mitigation in green cloud computing
55. Effect of truncated M-fractional derivative on the new exact solitons to the Shynaray-IIA equation and stability analysis
56. Numerical simulation and GPU computing for the 2D wave equation with variable coefficient
57. Numerical simulation and GPU computing for the 2D wave equation with variable coefficient
58. Numerical Simulation and Parallel Computing of Acoustic Wave Equation in Isotropic-Heterogeneous Media
59. Parallel numerical simulation of the 2D acoustic wave equation
60. Parallel numerical simulation of the 2D acoustic wave equation
61. The global burden of adolescent and young adult cancer in 2019: a systematic analysis for the Global Burden of Disease Study 2019
62. The global burden of adolescent and young adult cancer in 2019: a systematic analysis for the Global Burden of Disease Study 2019
63. Dynamic power and frequency domain allocation for dedicated sensing signals in downlink ISAC
64. ISAC based seamless handover solution for SAGIN in high mobility environments
65. A Real-Time Dynamic Gesture Variability Recognition Method Based on Convolutional Neural Networks
66. Continuous Sign Language Recognition and Its Translation into Intonation-Colored Speech
67. Unsupervised Clustering and Ensemble Learning for Classifying Lip Articulation in Fingerspelling
68. Interactions of Apigenin and Safranal with the 5HT1A and 5HT2A Receptors and Behavioral Effects in Depression and Anxiety: A Molecular Docking, Lipid-Mediated Molecular Dynamics, and In Vivo Analysis
69. Cloud-based learning and cognitive development among lower-secondary students (Grades 8–9): evidence from schools in Kazakhstan
70. Application of neural networks ensemble method for the Kazakh sign language recognition
71. Development and experimental study of an intelligent water quality monitoring system based on the internet of things
72. Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security
73. Fine-Tuning Artificial Neural Networks to Predict Pest Numbers in Grain Crops: A Case Study in Kazakhstan
74. Fine-Tuning Artificial Neural Networks to Predict Pest Numbers in Grain Crops: A Case Study in Kazakhstan
75. Fine-Tuning Artificial Neural Networks to Predict Pest Numbers in Grain Crops: A Case Study in Kazakhstan
76. E-GlauNet: A CNN-Based Ensemble Deep Learning Model for Glaucoma Detection and Staging Using Retinal Fundus Images
77. E-GlauNet: A CNN-Based Ensemble Deep Learning Model for Glaucoma Detection and Staging Using Retinal Fundus Images
78. Handover decision techniques for vehicle-to-vehicle communication in 6 G networks: exploring applications, challenges, future trends ahead
79. Driving drowsiness detection using spectral signatures of EEG-based neurophysiology
80. Next-generation BCI spellers: a comparative study of ERP responses and fatigue in mixed, virtual, and desktop realities
81. The future of mixed reality: impact of holographic stimulus positioning on user experience and performance in mixed reality
82. MM-FOOD: a high-dimensional index structure for efficiently querying content and concept of multimedia data
83. Determining the structure of functionalized graphene for tailored thermomechanical properties using ML techniques
84. HyGraph: a subgraph isomorphism algorithm for efficiently querying big graph databases
85. Privacy Preserving Federated Anomaly Detection in IoT Edge Computing Using Bayesian Game Reinforcement Learning
86. Evaluation of pseudo-random number generation on GPU cards
87. Assessing water security in Central Asia through a Delphi method and a clustering analysis
88. Optimizing the implementation of the Saber post-quantum cryptography scheme with a hybrid architecture
89. Improving Psychological and Educational Support of University Students with Disabilities in Kazakhstan
90. Targeted Attacks Detection and Security Intruders Identification in the Cyber Space
91. Targeted Attacks Detection and Security Intruders Identification in the Cyber Space
92. Defining Semantically Close Words of Kazakh Language with Distributed System Apache Spark
93. Optimal Allocation of Storage Capacity in Distribution Network for Renewable Energy Expansion
94. Implementation of Secure and Verifiable Access Control Procedures using the NTRU Cryptosystem to Store Big Data in the Cloud Environment
95. A Hybrid CNN–GRU–LSTM Algorithm with SHAP-Based Interpretability for EEG-Based ADHD Diagnosis
96. Mathematical Modeling of the Water Saturation Algorithm of the Mountain Slope on the Example of the Catastrophic Landslide of the Northern Tien Shan Ak Kain
97. Enhancing ML-based anomaly detection in data management for security through integration of IoT, cloud, and edge computing
98. Information Diffusion Modeling in Social Networks: A Comparative Analysis of Delay Mechanisms Using Population Dynamics
99. Advanced Cybersecurity Framework for LEO Aerospace: Integrating Quantum Cryptography, Artificial Intelligence Anomaly Detection, and Blockchain Technology
100. Application of Quantum Key Distribution to Enhance Data Security in Agrotechnical Monitoring Systems Using UAVs
1 2 3 4 10