Department Of Information Systems 6
251. APPLICATIONS OF QUANTUM COMPUTING IN BIOMETRIC INFORMATION SECURITY
252. Application of informative textural Laws masks methods for processing space images
253. Application of informative textural Laws masks methods for processing space images
254. Features of growth of agricultural crops and factors negatively affecting their growth
255. Features of growth of agricultural crops and factors negatively affecting their growth
256. IDENTIFICATION OF FACTORS THAT NEGATIVELY AFFECT THE GROWTH OF AGRICULTURAL CROPS BY METHODS OF ORTHOGONAL TRANSFORMATIONS
257. IDENTIFICATION OF FACTORS THAT NEGATIVELY AFFECT THE GROWTH OF AGRICULTURAL CROPS BY METHODS OF ORTHOGONAL TRANSFORMATIONS
258. THE APPLICABILITY OF INFORMATIVE TEXTURAL FEATURES FOR THE DETECTION OF FACTORS NEGATIVELY INFLUENCING THE GROWTH OF WHEAT ON AERIAL IMAGES
259. The effectiveness of methods and algorithms for detecting and isolating factors that negatively affect the growth of crops
260. The effectiveness of methods and algorithms for detecting and isolating factors that negatively affect the growth of crops
261. Use of Remote Sensing Data for Environmental Monitoring of Desertification
262. Use of Remote Sensing Data for Environmental Monitoring of Desertification
263. Investigating long short-term memory approach for extremist messages detection in Kazakh language
264. Deep Learning-Based Continuous Sign Language Recognition
265. Deep Learning-Based Continuous Sign Language Recognition
266. Design of QazSL Sign Language Recognition System for Physically Impaired Individuals
267. An Edge-Computing-Based Integrated Framework for Network Traffic Analysis and Intrusion Detection to Enhance Cyber–Physical System Security in Industrial IoT
268. Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
269. Digital Transformation in Higher Education: Toward a National Model of Digital University in Kazakhstan Through Global and Local Comparison
270. Real-Time Detection and Response to Wormhole and Sinkhole Attacks in Wireless Sensor Networks
271. Towards robust security in WSN: a comprehensive analytical review and future research directions
272. Wireless Sensor Network Modeling and Analysis for Attack Detection
273. Multi-Objective Enhanced Cheetah Optimizer for Joint Optimization of Computation Offloading and Task Scheduling in Fog Computing
274. Leveraging AI in 5G Networks for Estimating Signal-to-Interference-and-Noise Ratio
275. The Impact of Education Management Digitalisation on the Quality of Student Learning
276. DEVISING AN APPROACH TO ANALYZE THE PARAMETERS FOR DETERMINING POTENTIAL PREMODIFIED FIRMWARE OF USB DEVICES
1 4 5 6 6