Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
2761
A New Heuristic Procedure for Quadratic Assignment Problems
Published 2004-12-01Get full text
Article -
2762
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks. …”
Get full text
Article -
2763
Enhancing Reliability Engineering Through Weibull Distribution in R
Published 2024-06-01Get full text
Article -
2764
Reducing Execution Time of Pixel-Based Machine Learning Classification Algorithms Using Parallel Processing Concept
Published 2025-06-01“…Parallel processing is essential in machine learning to meet the computational requirements resulting from the complexity of algorithms and the size of the dataset, by taking advantage of the computational resources of parallel processing that can distribute computational operations across multiple processors. …”
Get full text
Article -
2765
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds. …”
Get full text
Article -
2766
Fast Backpropagation Neural Network for VQ-Image Compression
Published 2004-05-01“…Artificial neural networks are becoming very attractive in image processing where high computational performance and parallel architectures are required.…”
Get full text
Article -
2767
Interleaving between Ant Colony Optimization and Tabu Search for Image Matching
Published 2007-12-01Get full text
Article -
2768
Direct Transmission of Products Designs in Distributed Manufacturing
Published 2013-03-01“…This research presents proposed system model called Approach for Designing Distributed Manufactured System (ADMS) deals with factories distributed systems which include data base, design tools, and distributed among computers network. The system serves a query for incoming enquiries execution about spare parts to the main computer (Server) from other connected computers (Servers) without any confliction by using network techniques and data base language capabilities. …”
Get full text
Article -
2769
-
2770
Classification of Software Engineering Documents Based on Artificial Immune Systems
Published 2013-09-01“…This system was built and programmed in Java language and was implemented under an operating system environment Microsoft Windows7.…”
Get full text
Article -
2771
Leader election of dynamic wireless intelligent control machine in sensor network distributed processing
Published 2022-11-01Get full text
Article -
2772
-
2773
-
2774
Analysis of Entrance Test Results Effect on Student's Performance using Multiple Linear Regression
Published 2024-12-01“…Therefore, it is necessary to analyze the effect of the entrance test results on student performance. The Faculty of Computer Science at Brawijaya University has various types of tests that prospective students must take in order to be accepted into the Computer Science Master's Program. …”
Get full text
Article -
2775
LITERATURE REVIEW: ADVANTAGES AND DISADVANTAGES OF BLACK BOX AND WHITE BOX TESTING METHODS
Published 2025-01-01Get full text
Article -
2776
Attacks and countermeasures on federated learning via historical knowledge modeling
Published 2025-07-01Get full text
Article -
2777
Technology Acceptance Model (TAM) on distance learning in University of Brawijaya
Published 2025-01-01“…It involved the master's students in the computer science program at Brawijaya University as the participants. …”
Get full text
Article -
2778
Technology Acceptance Model (TAM) on distance learning in University of Brawijaya
Published 2025-01-01“…It involved the master's students in the computer science program at Brawijaya University as the participants. …”
Get full text
Article -
2779
Detecting proper nouns in indonesian-language translation of the quran using a guided method
Published 2020-06-01Get full text
Article -
2780
Unleashing the hidden powers of low-cost IoT boards: GPU-based edutainment case study
Published 2022-03-01“…This is mainly due to the complicated nature of GPU-based programming. In this paper, we are presenting a case study showing the effect of offloading the computationally intensive part of a latency-sensitive educational game to a low-cost Raspberry Pi’s GPU, thus enabling the board to seamlessly host the entire game operations. …”
Get full text
Article