Showing 161 - 180 of 14,127

162

Personal Finance Tracker Using Python That Helps Users To Manage And Track Their Expenses And Set Budgets.
Abhilasha, Akkala ; seekoli, Avinash
International Journal of Environmental Sciences (2229-7359); 2025 Special Issue, Vol. 11, p5653-5663, 11p

PERSONAL finance BUDGET management SURPLUS (Economics) DATA analytics FINANCIAL planning INVESTMENT management
Academic journal
Save to List
163

A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs
Lee, Kiho ; Kim, Jungkon ; Kim, Doowon ; et al.

Cryptography and Securit... Artificial Intelligence
Report
Save to List
164

Fire detection and anti-fire system to enhance food security: A concept of smart agriculture systems-based IoT and embedded systems with machine-to-machine protocol
Morchid, Abdennabi ; Alblushi, Ishaq G.Muhammad ; Khalid, Haris M. ; et al.
In Scientific African March 2025 27

Academic journal
Save to List
165

Digitalization As a Socio-Economic Challenge: Modeling the Impact On the Level of Cybercrime Considering Socio-Economic, Technological and Institutional Factors.
Yarovenko, Hanna ; Horbachova, Olha ; Bylbas, Roman ; et al.
SocioEconomic Challenges (SEC); 2025, Vol. 9 Issue 2, p282-315, 34p

DIGITAL technology PYTHON programming langu... RANDOM effects model CORE competencies DATA security failures
Academic journal
Save to List
166

REAL-TIME FIREWALL EVENT ALERT SYSTEM FOR NETWORK PROTECTION.
S., KAVIYA ; S., POOJA ; M., SHRUTHIKA
International Scientific Journal of Engineering & Management; Apr2025, Vol. 4 Issue 4, p1-5, 5p

COMPUTER network securit... PYTHONS INTERNET security POSTURE STORAGE
Academic journal
Save to List
167

Assessing Web Security in E-Learning Systems.
MIHALACHE, Denisa-Nicoleta
International Conference on Cybersecurity & Cybercrime; 2024, Vol. 11, p135-141, 7p

ONLINE education TROJAN horses (Computer... INTERNET security MALWARE CYBERTERRORISM INTERNET servers
Conference
Save to List
168

Research on the quantum photonic convolutional neural network for artificial intelligence-based healthcare system security.
Sita Kumari, K. ; Shivaprakash, G. ; Arslan, Farrukh ; et al.
Optical & Quantum Electronics; Feb2024, Vol. 56 Issue 2, p1-18, 18p

CONVOLUTIONAL neural net... ARTIFICIAL intelligence SECURITY systems QUANTUM computing PYTHON programming langu... PRINCIPAL components ana...
Academic journal
Save to List
169

Real-time object detection, tracking, and monitoring framework for security surveillance systems
Abba, Sani ; Bizi, Ali Mohammed ; Lee, Jeong-A ; et al.
In Heliyon 15 August 2024 10(15)

Academic journal
Save to List
171

Dynamic network security leveraging efficient CoviNet with granger causality-inspired graph neural networks for data compression in cloud IoT Devices
Begum, M. Baritha ; A, Yogeshwaran ; Nagarajan, N.R. ; et al.
In Knowledge-Based Systems 30 January 2025 309

Academic journal
Save to List
172

Energy and Security-Aware Data Transmission in IoT: An Optimal Cluster Head Selection Approach with Spiral Chip Dynamics Optimizer (SCDO).
Senthil Murugan, T.
Wireless Personal Communications; Mar2024, Vol. 135 Issue 1, p23-45, 23p

DATA transmission system... METAHEURISTIC algorithms OPTIMIZATION algorithms INTERNET of things MULTICASTING (Computer n... PYTHON programming langu...
Academic journal
Save to List
173

Foolbox: A Python toolbox to benchmark the robustness of machine learning models
Rauber, Jonas ; Brendel, Wieland ; Bethge, Matthias

Computer Science - Learn... Computer Science - Crypt... Computer Science - Compu... Statistics - Machine Lea...
Report
Save to List
175

Analysis and development of a predictive outlook model for Negara Bank of Indonesia stock using machine learning data training (Python).
Abdelhamid, Gherbali ; Djamal, Dekkiche ; Maachoumustefa
Beam Journal of Economic Studies. 2025, Vol. 9 Issue 1, p503-514. 12p.

STOCK price forecasting STOCK prices PRICES of securities BANK stocks MACHINE learning
Academic journal
Save to List
176

Comparison of Argon2id and Bcrypt with Default Parameters in Performance and Security Aspect for Secure Authentication
Hartono, Jeffrey Ferdinand ; Suharjo, Immanuel Christian ; Sidharta, Sidharta
In Procedia Computer Science 2025 269:411-420

Academic journal
Save to List
177

Comparative Analysis of Linear Congruential Random Generator Algorithms Using Python and Java Languages
Durrani, Omar Khan ; Ali, Mohammed Saif ; Makandar, Davalmalik Sayadali ; et al.
Mathematics and Computer Science: Research Updates Vol.Mathematics and Computer Science: Research Updates Vol. 4. 4:115-133

[NLIN]Nonlinear Sciences...
Book
Save to List
178

Towards food security with the Grain Shield web application for stored grain pest identification
Santhanambika, Muthukrishnan Sakthivel ; Maheswari, Gopal
In Journal of Stored Products Research May 2025 111

Academic journal
Save to List
179

Advancing Secure Python Code Sharing and Protection: The Alpha Beta Network's Suite of Tools
Izosimov, Pavel ; orcid:0009-0004-7126-

Python security code protection software licensing code obfuscation encryption cross-platform compatibi...
Report
Save to List

Filter