Department Of Cybersecurity 2

51. The burden of bacterial antimicrobial resistance in the WHO Eastern Mediterranean Region 1990–2021: a cross-country systematic analysis with forecasts to 2050
52. Deep learning for magnetic resonance imaging brain tumor detection: evaluating ResNet, EfficientNet, and VGG-19
53. COMPARISON EVALUATION OF UNET-BASED MODELS WITH NOISE AUGMENTATION FOR BREAST CANCER SEGMENTATION ON ULTRASOUND IMAGES
54. Kinematic Analysis and Workspace Evaluation of a New Five-Axis 3D Printer Based on Hybrid Technologies
55. THE DEPENDENCE OF THE EFFECTIVENESS OF NEURAL NETWORKS FOR RECOGNIZING HUMAN VOICE ON LANGUAGE
56. Pretrained Convolutional Neural Network for Fruit Classification Analysis of Pineapple Plantation Images
57. DEVELOPMENT OF DATA-EFFICIENT TRAINING TECHNIQUES FOR DETECTION AND SEGMENTATION MODELS IN ATRIAL SEPTUM DEFECT ANALYSIS
58. Evaluation of Modern Generative Networks for EchoCG Image Generation
59. IDENTIFYING THE GRAPH-BASED TYPOLOGY FEATURES FOR MACHINE LEARNING MODELS IN FINANCIAL FRAUD DETECTION
60. A composite intelligence scoring framework for identifying high-potential individuals using multi-metric predictive models
61. An anti-corruption system for academic achievement verification in kazakhstani higher education using blockchain and artificial intelligence
62. Big data handling approach for unauthorized cloud computing access
63. Comprehensive analysis of Li-Fi technology: positioning algorithms, security vulnerabilities, and future IoT applications
64. Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology
65. Influence of COVID-19 epidemic on dark web contents
66. Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
67. Privacy preservation models for third-party auditor over cloud computing: A survey
68. Artificial Intelligence as a Tool to Prevent Autoaggressive Destructive Behavior Among Children and Adolescents: a Brief Overview
69. Behavioral Authentication Model for Smartphone Users Based on Gyroscope and Accelerometer Data for Mobile Educational Resources
70. Analysis and selection of investment objects and optimisation of investment volumes
71. DETERMINING THE POSSIBILITY OF HIGH-PRECISION DEFORMATION MEASUREMENT IN BUILDING STRUCTURES USING FIBER-OPTIC METHODS
72. Lightweight Group Signature Scheme Based on PUF for UAV Communication Security
73. Lightweight Group Signature Scheme Based on PUF for UAV Communication Security
74. Development of a Radio Data Transmission Channel Model to Ensure Train Safety
75. Fiber-Optic Gyroscopes: Architectures, Signal Processing, Error Compensation, and Emerging Trends
76. Modeling the process of magma rising in the bowels of the Earth and its eruption to the surface
77. Analysis of machine learning methods for detection of cataracts
78. ENHANCING HEALTHCARE DATA SECURITY: A TWO-STEP AUTHENTICATION SCHEME WITH CLOUD TECHNOLOGY AND BLOCKCHAIN
79. THE DEVELOPMENT OF AN EVALUATION MODEL FOR USER AUTHENTICATION METHODS WITH SECURITY, USABILITY, AND USAGE FREQUENCY
80. THE DEVELOPMENT OF AN EVALUATION MODEL FOR USER AUTHENTICATION METHODS WITH SECURITY, USABILITY, AND USAGE FREQUENCY
81. A Hybrid Approach Using Graph Neural Networks and LSTM for Attack Vector Reconstruction
82. A Hybrid Approach Using Graph Neural Networks and LSTM for Attack Vector Reconstruction
83. Neural Network Method of Analysing Sensor Data to Prevent Illegal Cyberattacks
84. Modeling Approaches for Digital Plant Phenotyping Under Dynamic Conditions of Natural, Climatic and Anthropogenic Factors
85. Development and Research of a Method for MultiLevel Protection of Transmitted Information in IP Networks Based on Asterisk IP PBX Using Various Codecs
86. A Statistical and Machine Learning Analysis of the Significant Features of PPPoE Sessions for Quality Monitoring
87. A Statistical and Machine Learning Analysis of the Significant Features of PPPoE Sessions for Quality Monitoring
1 2 2