Published: 2023-11-09
Articles
Data Warehouse Metadata Management: Ensuring Data Quality and Governance
Pages No. 25884-25888
Abstract 309 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4767Interpretable Machine Learning Models: Bridging the Gap between Accuracy and Transparency
Pages No. 25889-25893
Abstract 371 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4768Securing Digital Communication: A Deep Dive into Network Security and Cryptography
Pages No. 25908-25914
Abstract 420 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4769Computer Vision and AI: Bridging the Gap between Perception and Understanding in Machines
Pages No. 25900-25907
Abstract 381 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4770Mobile CPU Architecture Evolution: From Early Designs to Modern Power-Efficient Processors
Pages No. 25889-25893
Abstract 457 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4771The Security Implications of Blockchain Technology
Pages No. 25930-25936
Abstract 354 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4772Quantum Computing in Portfolio Optimization and Risk Management
Pages No. 25922-25929
Abstract 289 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4773Artificial Intelligence in the 21st Century: Unveiling the Strengths and Weaknesses
Pages No. 25915-25921
Abstract 557 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4774Automated Trading Strategies Using Artificial Intelligence
Pages No. 25937-25941
Abstract 359 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4775AI-Based Cybersecurity Solutions in Threat Detection and Incident Response
Pages No. 25942-25947
Abstract 318 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4776Cybersecurity Best Practices: Strategies for Protecting Organizations from Cyber Threats
Pages No. 25948-25953
Abstract 317 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4777Impact of Artificial Intelligence in Provision of New Job Opportunities
Pages No. 25954-25964
Abstract 300 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4778Cybersecurity Threats in Internet of Things (IoT) Networks: Vulnerabilities and Defense Mechanisms
Pages No. 25965-25981
Abstract 175 | PDF DOI https://doi.org/10.18535/ijecs/v12i11.4779