Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
2741
Home Automation Management with WLAN (802.11g) and RF Remote Control
Published 2009-03-01“…The devices have been distributed in two rooms, each room has own board, these boards are connected to the desktop personal computer (PC) through one serial port RS-232 via microcontroller. …”
Get full text
Article -
2742
Proposed Algorithm For Using GLCM Properties To Distinguishing Geometric Shapes
Published 2019-06-01“…<br /> The algorithm was programmed using MATLAB R2010a for Windows 7 operating system on the computer that has the following specifications: (Processor Intel (R) Core (TM) i5, CPU 640 M & 2.53 GHZ, RAM 6GB).…”
Get full text
Article -
2743
-
2744
Neural Network Using for Extracting Hidden Information in Images
Published 2013-09-01Get full text
Article -
2745
Employment the Object Oriented Idea with Relational Database using by Ado.Net
Published 2011-07-01“…With the development of technology and appearing of computers that simplified many of computer and logical applications, so the developed with all capabilities to take and give the benefit in the same time, it is necessary because the updating and extending in bank operation space by using the computer which became the spinal cord in managing these operation. …”
Get full text
Article -
2746
Service function tree mapping of microservices on resource-constrained fog networks
Published 2025-06-01“…This paper presents a Service Function Tree (SFT) mapping technique that optimizes microservice deployment within fog computing environments for IIoT applications. We employ a mixed-integer linear programming (MILP) formulation to optimize microservice placement by focusing on reducing latency and improving the efficiency of resource usage. …”
Get full text
Article -
2747
Provide Simple Protection for Bluetooth Connection in Wireless Personal Area Network
Published 2009-03-01“…This paper presents security system for indoor location between two devices the mobile device and computer based (Laptop Computer) on Bluetooth technology. …”
Get full text
Article -
2748
Exact Algorithms for the Satellite Image Selection Problem
Published 2025-06-01Get full text
Article -
2749
-
2750
De-speckling 2D-Discrete Wavelet Transform with Hard Threshold Stage
Published 2012-07-01Get full text
Article -
2751
Performance of Spatial Distribution Quality by Ordinary Fuzzy Kriging for Soil Properties under Uncertainty
Published 2023-06-01“…In conclusion, the improvement does not rely on the statistical methods, but rather higher quality and large data of soil variables should be used to improve the prediction process. All programming computations are carried out in Matlab Language.…”
Get full text
Article -
2752
Digital Image Watermarking using Singular Value Decomposition
Published 2010-12-01“…All tests and experiments are carried out using MATLAB as computing environment and programming language.…”
Get full text
Article -
2753
Using Mask Technique and Center Detection for Congenital Dislocation of the Hip (CDH) Diagnosis
Published 2007-07-01“…We applied this system in computer using Matlab 7.0 programming Langue.…”
Get full text
Article -
2754
-
2755
Building Simple Protection for Wireless-Fidelity Network
Published 2009-03-01“…This module perform Challenge-Respond based on the hash part of MAC by using the hashing operation, this challenge will occur between the administrator, and the group of the customers through wireless network, and then generate and captured MAC address for all computers connect to wireless network detection unspecified MAC address, filtering it from the MAC address spooling according to protocol programmed by Visual Java#.Net. …”
Get full text
Article -
2756
-
2757
Software Defect Prediction Based On Deep Learning Algorithms : A Systematic Literature Review
Published 2025-06-01Get full text
Article -
2758
Integration of Multispectral Images Using Two-Dimensional Wavelet Transformation
Published 2010-12-01Get full text
Article -
2759
Smart Product Recommendations in Web E-Commerce: Leveraging Apriori Algorithm for Market Basket Analysis
Published 2024-07-01Get full text
Article -
2760
A Proposed Methodology for Software Engineering of Agent Systems
Published 2012-07-01“…In recent years, computer systems that make use of software agents are increased, due to the increased size and complexity of these systems, as well as, because the benefits provided by agents to facilitating the developing process and requirements representation for these systems. …”
Get full text
Article