Skip to main content
O advento das tecnologias da informação ocasionou a demanda por documentos digitais, com isto, uma quantidade significativa de documentos com necessidades de preservação em longo prazo começou a ser produzida exclusivamente em meio... more
    • by  and +1
    •   91  
      Information SystemsInformation ScienceInformation TechnologyManagement Information Systems
    • by 
    •   103  
      Information SystemsCommunication EngineeringInformation Theory (Mathematics)Computer Science
Valoración de las competencias transversales (genéricas) en relación con los perfiles profesionales previamente definidos.
    • by 
    •   4  
      Languages and LinguisticsTourismTurismo, Indígenas y ConservaciónInformatics and Computer Science
Driven by the growing demand to provide high speed internet service to household subscribers, especially those in remote rural areas with difficult terrains, where fiber cable is expensive to lay and maintain, fixed wireless access (FWA)... more
    • by  and +1
    •   5  
      Computer ScienceWireless CommunicationsInformatics and Computer ScienceMathematics and Computer Science
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
    • by  and +1
    •   8  
      Computer ScienceInformation TechnologyComputer EngineeringComputer Networks
The original internet design principle was guided by the end-to-end principle in the early 1980s and formed the foundation for the existing internet architectural model. The priorities of the original internet designers do not match the... more
    • by 
    •   9  
      Computer ScienceInformation TechnologyTechnologyNigeria
Resumo: O constante aumento de documentos digitais vem impulsionando as práticas de preservação em longo prazo. No entanto, a literatura técnica concentra-se em preservar a autenticidade dos registros, e por vezes, há pouco aprofundamento... more
    • by  and +1
    •   90  
      Information SystemsInformation ScienceInformation TechnologyManagement Information Systems
It is a healthy diet that creates conditions for human life, ensuring the optimal functioning of all processes in the body. Of course, a healthy diet cannot be a protection against the penetration of infection into the body, but it is the... more
    • by 
    •   3  
      Computer ScienceInformatics and Computer ScienceComputer Informatics
El objetivo de esta investigación fue identificar y contrastar referentes internacionales en busca de estándares de calidad para la definición de los principales componentes de una carrera de formación superior en Computación. La... more
    • by  and +1
    •   9  
      Curriculum DesignHigher EducationCurriculumInformatics and Computer Science
An Intelliget Framework that use a MIS system for to Managmetn A distributed Power Genaration Plant
    • by 
    •   2  
      Energy efficiencyInformatics and Computer Science
Steganography is the practice of concealing the truth that communication is taking place. Intruders can easily attack information within a system if it is readily available. It can be read, modified, misused, and revealed to others.... more
    • by 
    •   6  
      Computer ScienceCryptographySteganographyImage Processing and steganography
Driven by the growing demand to provide high speed internet service to household subscribers, especially those in remote rural areas with difficult terrains, where fiber cable is expensive to lay and maintain, fixed wireless access (FWA)... more
    • by 
    •   5  
      Computer ScienceWireless CommunicationsInformatics and Computer ScienceMathematics and Computer Science
Access controls are a key area for any security program. However, the recommended access controls cannot always be implemented across the entire organisations. This is the case within critical infrastructure organisations that have both... more
    • by 
    •   12  
      Safety EngineeringComputer ScienceInformation TechnologyInformatics
    • by 
    •   80  
      Information SystemsCommunication EngineeringInformation ScienceInformation Retrieval
Banda Aceh merupakan salah satu kota wisata yang sebagian besar penduduknya  bertumpu pada mode transportasi untuk keperluan sehari-hari dari mulai sepeda, sepeda motor, mobil dan angkutan umum. Pertumbuhan  populasi penduduk kota Banda... more
    • by 
    •   2  
      Computer ScienceInformatics and Computer Science
This paper discusses an approach to generate test data for path coverage based testing using Genetic Algorithms, Differential Evolution and Artificial Bee Colony optimization algorithms. Control flow graph and cyclomatic complexity of the... more
    • by 
    • Informatics and Computer Science
    • by 
    • Informatics and Computer Science
Erlangga, 1984-Computers-107 pages 0 Reviews What people are saying-Write a review
    • by 
    •   5  
      Aerospace EngineeringComputational Fluid DynamicsStructural DynamicsInformatics and Computer Science
Permainan perang-perangangan sudah tidak asing lagi bagi anak-anak sekarang ini, akan tetapi dengan perkembangan jaman sekarang komputer merupakan salah satu perangkat yang dapat memberi banyak manfaat kepada anak-anak dalam meningkatkan... more
    • by 
    • Informatics and Computer Science
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyComputer EngineeringComputer Networks
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyComputer EngineeringComputer Networks
Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology... more
    • by 
    •   2  
      EngineeringInformatics and Computer Science
Throughout the age of 5G technology, the majority of contactless banking is made via software that is enabled by a wide range of financial platforms. Several alternative financing channels provide access to a variety of services. The... more
    • by  and +2
    •   3  
      BusinessInformatics and Computer ScienceBlockchain
Network security is of primary concerned now days for large organizations. Various types of Intrusion Detection Systems (IDS) are available in the market like Host based, Network based or Hybrid depending upon the detection technology... more
    • by 
    • Informatics and Computer Science
A evolução da tecnologia da informação é determinante para o advento de suas ferramentas na sociedade contemporânea, introduzindo sistematicamente ferramentas de gestão eletrônica de documentos na Arquivologia. Ocorrendo assim, mudanças... more
    • by  and +1
    •   87  
      Information SystemsComputer ScienceInformation ScienceInformation Technology
Computer Applications and Quantitative Methods Applied to Archaeology, 2016: Exploring oceans of data. Oslo, 29 March-2 April.
Session 6. Computer tools for depicting shape and details in 3D Archaeological models.
    • by  and +3
    •   14  
      ArchaeologyInformaticsRemote SensingPhotogrammetry
In this paper, aspects of the design of an intelligent medical system for diagnosis of Common disease that can be detected by patient data. A number of patient cases are selected as prototype and stored in a separate database. The... more
    • by 
    • Informatics and Computer Science
The original internet design principle was guided by the end-to-end principle in the early 1980s and formed the foundation for the existing internet architectural model. The priorities of the original internet designers do not match the... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyTechnologyNigeria
The paper presents a methodology and an application framework (PUAnalyzeThis) that makes use of MeaningCloud API to automatically extract entities, concepts, relations, etc. and calculate scores and grades based on their relevance to a... more
    • by 
    •   8  
      Computer ScienceInformation TechnologyComputer EngineeringComputer Networks
Support for various aspects of personalization and adaptation of the reviewed tools is not at the desired level of abstraction-very often depends on the specific way in which it is assumed that a learning object will be combined, to build... more
    • by 
    •   5  
      Computer ScienceInformaticsE-learningInformatics and Computer Science
– Multiprotocol Label Switching (MPLS) fasten the speed of packet forwarding by forwarding the packets based on labels and reduces the use of routing table look up from all routers to label edge routers(LER) , where as the label switch... more
    • by 
    •   54  
      Computer ScienceRobotics (Computer Science)Human Computer InteractionComputer Vision
Steganography is the art and science of invisible communication. This is accomplished through hiding information in other information, thus hiding the existence of the communicated information. The word steganography is derived from the... more
    • by 
    •   6  
      Computer ScienceCryptographySteganographyImage Processing and steganography
Driven by the growing demand to provide high speed internet service to household subscribers, especially those in remote rural areas with difficult terrains, where fiber cable is expensive to lay and maintain, fixed wireless access (FWA)... more
    • by 
    •   5  
      Computer ScienceWireless CommunicationsInformatics and Computer ScienceMathematics and Computer Science
Software testing is a process where you have the stated requirements, pre-requisite software that is to be installed and the configuration of the machine that need to be done as per the test data for the test case and for a specific... more
    • by 
    • Informatics and Computer Science
Business processes which are the set of logical tasks related to fulfil some greater purpose. These tasks must be performed in sequence according to the business rules. SOA reuses services to automate a business process using a standard... more
    • by 
    • Informatics and Computer Science
Data mining on large databases has been a major concern in research community due to the difficulty of analyzing huge volume of data. This paper focuses on the large set area i.e. on fuzzy sets and knowledge discovery of data. Association... more
    • by 
    • Informatics and Computer Science
In this paper, aspects of the design of an intelligent medical system for diagnosis of Common disease that can be detected by patient data. A number of patient cases are selected as prototype and stored in a separate database. The... more
    • by 
    • Informatics and Computer Science
Classification of disease phenotypes using microarray gene expression data faces a critical challenge due to its high dimensionality and small sample size nature. Hence there is a need to develop efficient dimension reduction techniques... more
    • by 
    • Informatics and Computer Science
This paper deals with the study of Independent Component Analysis. Independent Component Analysis is basically a method which is used to implement the concept of Blind Source Separation. Blind Source Separation is a technique which is... more
    • by 
    • Informatics and Computer Science
Nowadays the science and technology has enriched man’s life. In today’s world everything depends upon the technology. One of such technology is sensor technology. Now in every field sensor technology is used. The Wireless Sensor Network... more
    • by 
    •   2  
      Computer ScienceInformatics and Computer Science
Today, web servers, are the key repositories of the information & internet is the source of getting this information. There is a mammoth data on the Internet. It becomes a difficult job to search out the accordant data. Search Engine... more
    • by 
    • Informatics and Computer Science
The objective of this paper is to visualize and analyze video.Videos are sequence of image frames. In this work, algorithm will be developed to analyze a frame and the same will be applied to all frames in a video. It is expected see... more
    • by 
    •   7  
      Computer ScienceImage ProcessingVideoImage
Kebutuhan air bersih untuk masyarakat yang semakin hari terus meningkat harus diikuti dengan ketersediaan  air  yang  mencukupi.  Suplai  air  bersih  di  permukiman  harus  tersedia  dengan  kualitasmemenuhi standar kesehatan, jumlah... more
    • by 
    • Informatics and Computer Science
The large number of addresses that do not response make people confused to find their destination addresses with ease. So often someone getting lost or wrong destination in the search for addresses. Banda Aceh became one of the cities... more
    • by 
    • Informatics and Computer Science
Support for various aspects of personalization and adaptation of the reviewed tools is not at the desired level of abstraction - very often depends on the specific way in which it is assumed that a learning object will be combined, to... more
    • by 
    •   5  
      Computer ScienceInformaticsInformatics and Computer ScienceComputer Informatics