Informatics and Computer Science
4,279 Followers
Recent papers in Informatics and Computer Science
Valoración de las competencias transversales (genéricas) en relación con los perfiles profesionales previamente definidos.
The original internet design principle was guided by the end-to-end principle in the early 1980s and formed the foundation for the existing internet architectural model. The priorities of the original internet designers do not match the... more
It is a healthy diet that creates conditions for human life, ensuring the optimal functioning of all processes in the body. Of course, a healthy diet cannot be a protection against the penetration of infection into the body, but it is the... more
An Intelliget Framework that use a MIS system for to Managmetn A distributed Power Genaration Plant
Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others.... more
Driven by the growing demand to provide high speed internet service to household subscribers, especially those in remote rural areas with difficult terrains, where fiber cable is expensive to lay and maintain, fixed wireless access (FWA)... more
Access controls are a key area for any security program. However, the recommended access controls cannot always be implemented across the entire organisations. This is the case within critical infrastructure organisations that have both... more
Banda Aceh merupakan salah satu kota wisata yang sebagian besar penduduknya bertumpu pada mode transportasi untuk keperluan sehari-hari dari mulai sepeda, sepeda motor, mobil dan angkutan umum. Pertumbuhan populasi penduduk kota Banda... more
This paper discusses an approach to generate test data for path coverage based testing using Genetic Algorithms, Differential Evolution and Artificial Bee Colony optimization algorithms. Control flow graph and cyclomatic complexity of the... more
Erlangga, 1984-Computers-107 pages 0 Reviews What people are saying-Write a review
Permainan perang-perangangan sudah tidak asing lagi bagi anak-anak sekarang ini, akan tetapi dengan perkembangan jaman sekarang komputer merupakan salah satu perangkat yang dapat memberi banyak manfaat kepada anak-anak dalam meningkatkan... more
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology... more
Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology... more
In this paper, aspects of the design of an intelligent medical system for diagnosis of Common disease that can be detected by patient data. A number of patient cases are selected as prototype and stored in a separate database. The... more
The original internet design principle was guided by the end-to-end principle in the early 1980s and formed the foundation for the existing internet architectural model. The priorities of the original internet designers do not match the... more
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
Support for various aspects of personalization and adaptation of the reviewed tools is not at the desired level of abstraction-very often depends on the specific way in which it is assumed that a learning object will be combined, to build... more
– Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch... more
Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the... more
Driven by the growing demand to provide high speed internet service to household subscribers, especially those in remote rural areas with difficult terrains, where fiber cable is expensive to lay and maintain, fixed wireless access (FWA)... more
Software testing is a process where you have the stated requirements, pre-requisite software that is to be installed and the configuration of the machine that need to be done as per the test data for the test case and for a specific... more
Business processes which are the set of logical tasks related to fulfil some greater purpose. These tasks must be performed in sequence according to the business rules. SOA reuses services to automate a business process using a standard... more
Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association... more
In this paper, aspects of the design of an intelligent medical system for diagnosis of Common disease that can be detected by patient data. A number of patient cases are selected as prototype and stored in a separate database. The... more
Classification of disease phenotypes using microarray gene expression data faces a critical challenge due to its high dimensionality and small sample size nature. Hence there is a need to develop efficient dimension reduction techniques... more
This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is... more
Nowadays the science and technology has enriched man’s life. In today’s world everything depends upon the technology. One of such technology is sensor technology. Now in every field sensor technology is used. The Wireless Sensor Network... more
Today, web servers, are the key repositories of the information & internet is the source of getting this information. There is a mammoth data on the Internet. It becomes a difficult job to search out the accordant data. Search Engine... more
The objective of this paper is to visualize and analyze video.Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see... more
Kebutuhan air bersih untuk masyarakat yang semakin hari terus meningkat harus diikuti dengan ketersediaan air yang mencukupi. Suplai air bersih di permukiman harus tersedia dengan kualitasmemenuhi standar kesehatan, jumlah... more
The large number of addresses that do not response make people confused to find their destination addresses with ease. So often someone getting lost or wrong destination in the search for addresses. Banda Aceh became one of the cities... more
Support for various aspects of personalization and adaptation of the reviewed tools is not at the desired level of abstraction - very often depends on the specific way in which it is assumed that a learning object will be combined, to... more