Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
2601
-
2602
Optimization of a Hybrid Off-Grid Solar PV—Hydro Power Systems for Rural Electrification in Cameroon
Published 2024-01-01Get full text
Article -
2603
-
2604
-
2605
-
2606
BioKGrapher: Initial evaluation of automated knowledge graph construction from biomedical literature
Published 2024-12-01Get full text
Article -
2607
-
2608
AdvFaceGAN: a face dual-identity impersonation attack method based on generative adversarial networks
Published 2025-06-01Get full text
Article -
2609
An analysis of the I/O semantic gaps of HPC storage stacks
Published 2025-08-01“…Modern high-performance computing (HPC) Input/Output (I/O) systems consist of stacked hard- and software layers that provide interfaces for data access. …”
Get full text
Article -
2610
-
2611
Editorial
Published 2024-11-01“…Dear Readers,First of all, I am very happy to announce that the funding round of the KOALA initiative initiated by the TIB was successful and that our journal will be part of the computer science and mathematics cluster for the next three years. …”
Get full text
Article -
2612
Validation of automated paper screening for esophagectomy systematic review using large language models
Published 2025-04-01Get full text
Article -
2613
Predicting student achievement through peer network analysis for timely personalization via generative AI
Published 2025-06-01“…Methods: Bi-weekly surveys were conducted throughout the academic year with 45 students enrolled in a computer science program, where students nominated up to five peers they collaborated with the most. …”
Get full text
Article -
2614
-
2615
Comparison of Edge Detection Methods in Gray Images
Published 2006-12-01“…The aim of this research is to evaluate the performance of edge detection by choosing five methods known as (Canny, Laplacian of Gaussian,Prewitt, Scobel, Roberts) and the application of each method on images with grayscale to find out the performance of each of them and writing down computer programs for each. Also, a subjective evaluation to compare the performance of these five methods using Partt Figure of Merit, calculating the increase percent in the detected edges, decrease percent in the edge points and the correct position of the edge in each method.…”
Get full text
Article -
2616
Protection Against Internal Intruding using Host Identifier Authentication
Published 2009-03-01Get full text
Article -
2617
-
2618
Design and Implementation of Distributed Real-time Security System via Mobile Technology
Published 2013-07-01“…Also, there is a monitoring camera to capture an image when registering a case of breach. The program in the computer receives signals from the three ports and uses a fixed real time algorithm for scheduling signals and gives them priorities according to the importance of ports, then sends signals to the second part of the system. …”
Get full text
Article -
2619
Data Mining Between Classical and Modern Applications: A Review
Published 2021-12-01“…Overall, DM (to a great extent called information or data revelation) is the route toward analysing data according to substitute perspectives and summarizing it into significant information - information that can be used to assemble pay, diminishes costs, or both. DM writing computer programs is one of different logical gadgets for separating data. …”
Get full text
Article -
2620
Learning the fine-grained code representation for log-level prediction
Published 2025-05-01Get full text
Article