Showing 2,601 - 2,620 results of 7,651 for search 'programs computational', query time: 0.11s Refine Results
  1. 2601
  2. 2602
  3. 2603
  4. 2604
  5. 2605
  6. 2606
  7. 2607
  8. 2608
  9. 2609

    An analysis of the I/O semantic gaps of HPC storage stacks by Sebastian Oeste, Patrick Höhn, Michael Kluge, Julian Kunkel

    Published 2025-08-01
    “…Modern high-performance computing (HPC) Input/Output (I/O) systems consist of stacked hard- and software layers that provide interfaces for data access. …”
    Get full text
    Article
  10. 2610
  11. 2611

    Editorial by Christian Gütl

    Published 2024-11-01
    “…Dear Readers,First of all, I am very happy to announce that the funding round of the KOALA initiative initiated by the TIB was successful and that our journal will be part of the computer science and mathematics cluster for the next three years. …”
    Get full text
    Article
  12. 2612
  13. 2613

    Predicting student achievement through peer network analysis for timely personalization via generative AI by Ivica Pesovski, Petar Jolakoski, Vladimir Trajkovik, Zuzana Kubincova, Michael A. Herzog

    Published 2025-06-01
    “…Methods: Bi-weekly surveys were conducted throughout the academic year with 45 students enrolled in a computer science program, where students nominated up to five peers they collaborated with the most. …”
    Get full text
    Article
  14. 2614
  15. 2615

    Comparison of Edge Detection Methods in Gray Images by Sobhi Hamdoun, Afzal Hassan

    Published 2006-12-01
    “…The aim of this research is to evaluate the performance of edge detection by choosing five methods known as (Canny, Laplacian of Gaussian,Prewitt, Scobel, Roberts) and the application of each method on images with grayscale to find out the performance of each of them and writing down computer programs for each. Also, a subjective evaluation to compare the performance of these five methods using Partt Figure of Merit, calculating the increase percent in the detected edges, decrease percent in the edge points and the correct position of the edge in each method.…”
    Get full text
    Article
  16. 2616
  17. 2617
  18. 2618

    Design and Implementation of Distributed Real-time Security System via Mobile Technology by Dhuha Abdullah, Wael Mahmood

    Published 2013-07-01
    “…Also, there is a monitoring camera to capture an image when registering a case of breach. The program in the computer receives signals from the three ports and uses a fixed real time algorithm for scheduling signals and gives them priorities according to the importance of ports, then sends signals to the second part of the system. …”
    Get full text
    Article
  19. 2619

    Data Mining Between Classical and Modern Applications: A Review by Ammar Yaseen Abd Alazeez

    Published 2021-12-01
    “…Overall, DM (to a great extent called information or data revelation) is the route toward analysing data according to substitute perspectives and summarizing it into significant information - information that can be used to assemble pay, diminishes costs, or both. DM writing computer programs is one of different logical gadgets for separating data. …”
    Get full text
    Article
  20. 2620