Suggested Topics within your search.
Suggested Topics within your search.
- Computer programs 11
- Business 8
- BASIC (Computer program language) 2
- Computer simulation 2
- Data processing 2
- Design 2
- Design and construction 2
- Digital techniques 2
- Java (Computer program language) 2
- Web sites 2
- Agriculture 1
- Bioinformatics 1
- Business intelligence 1
- C++ (Computer program language) 1
- COBOL (Computer program language) 1
- COMPUTERS / Desktop Applications / Suites 1
- COMPUTERS / Internet / General 1
- Cascading style sheets 1
- Cloud computing 1
- Coding and Information Theory 1
- Coding theory 1
- Communication policy 1
- Computer programming 1
- Computer scheduling 1
- Computer-aided design 1
- Digitale Photographie 1
- Electric machinery 1
- Electric power systems 1
- Electronic spreadsheets 1
- General 1
-
2721
Performance of Spatial Distribution Quality by Ordinary Fuzzy Kriging for Soil Properties under Uncertainty
Published 2023-06-01“…In conclusion, the improvement does not rely on the statistical methods, but rather higher quality and large data of soil variables should be used to improve the prediction process. All programming computations are carried out in Matlab Language.…”
Get full text
Article -
2722
Digital Image Watermarking using Singular Value Decomposition
Published 2010-12-01“…All tests and experiments are carried out using MATLAB as computing environment and programming language.…”
Get full text
Article -
2723
Using Mask Technique and Center Detection for Congenital Dislocation of the Hip (CDH) Diagnosis
Published 2007-07-01“…We applied this system in computer using Matlab 7.0 programming Langue.…”
Get full text
Article -
2724
-
2725
Building Simple Protection for Wireless-Fidelity Network
Published 2009-03-01“…This module perform Challenge-Respond based on the hash part of MAC by using the hashing operation, this challenge will occur between the administrator, and the group of the customers through wireless network, and then generate and captured MAC address for all computers connect to wireless network detection unspecified MAC address, filtering it from the MAC address spooling according to protocol programmed by Visual Java#.Net. …”
Get full text
Article -
2726
-
2727
Software Defect Prediction Based On Deep Learning Algorithms : A Systematic Literature Review
Published 2025-06-01Get full text
Article -
2728
Integration of Multispectral Images Using Two-Dimensional Wavelet Transformation
Published 2010-12-01Get full text
Article -
2729
Smart Product Recommendations in Web E-Commerce: Leveraging Apriori Algorithm for Market Basket Analysis
Published 2024-07-01Get full text
Article -
2730
A Proposed Methodology for Software Engineering of Agent Systems
Published 2012-07-01“…In recent years, computer systems that make use of software agents are increased, due to the increased size and complexity of these systems, as well as, because the benefits provided by agents to facilitating the developing process and requirements representation for these systems. …”
Get full text
Article -
2731
A New Heuristic Procedure for Quadratic Assignment Problems
Published 2004-12-01Get full text
Article -
2732
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks. …”
Get full text
Article -
2733
Enhancing Reliability Engineering Through Weibull Distribution in R
Published 2024-06-01Get full text
Article -
2734
Reducing Execution Time of Pixel-Based Machine Learning Classification Algorithms Using Parallel Processing Concept
Published 2025-06-01“…Parallel processing is essential in machine learning to meet the computational requirements resulting from the complexity of algorithms and the size of the dataset, by taking advantage of the computational resources of parallel processing that can distribute computational operations across multiple processors. …”
Get full text
Article -
2735
The Evaluation of LSB Steganography on Image File Using 3DES and MD5 Key
Published 2024-03-01“…Testing of the robustness spec using two attack techniques, namely rotation, and robustness, shows that the message cannot be extracted from the image. Testers of the computation time, from testing 1-1000 characters, show the average time required for computation is about 0.798 seconds. …”
Get full text
Article -
2736
Fast Backpropagation Neural Network for VQ-Image Compression
Published 2004-05-01“…Artificial neural networks are becoming very attractive in image processing where high computational performance and parallel architectures are required.…”
Get full text
Article -
2737
Interleaving between Ant Colony Optimization and Tabu Search for Image Matching
Published 2007-12-01Get full text
Article -
2738
Direct Transmission of Products Designs in Distributed Manufacturing
Published 2013-03-01“…This research presents proposed system model called Approach for Designing Distributed Manufactured System (ADMS) deals with factories distributed systems which include data base, design tools, and distributed among computers network. The system serves a query for incoming enquiries execution about spare parts to the main computer (Server) from other connected computers (Servers) without any confliction by using network techniques and data base language capabilities. …”
Get full text
Article -
2739
-
2740
Classification of Software Engineering Documents Based on Artificial Immune Systems
Published 2013-09-01“…This system was built and programmed in Java language and was implemented under an operating system environment Microsoft Windows7.…”
Get full text
Article