Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Chartres Cathedral, also known as the Cathedral of Our Lady of Chartres (French: Cathédrale Notre-Dame de Chartres), is a Roman Catholic church in Chartres, France, about 80 km (50 miles) southwest of Paris and is the seat of the Bishop... more
    • by 
    •   20  
      Information SystemsComputer ScienceArchitectureMedieval History
    • by 
    •   3  
      Computer ScienceComputer Science and Information TechnologyComputer Science Information Technology
The field of using Data Mining (DM) techniques in educational environments is typically identified as Educational Data Mining (EDM). EDM is rapidly becoming an important field of research due to its ability to extract valuable knowledge... more
    • by 
    •   2  
      Computer ScienceComputer Science and Information Technology
    • by 
    •   4  
      Computer ScienceData MiningBig Data AnalyticsComputer Science and Information Technology
Worldwide Interoperability for Microwave Access (WiMAX) networks were expected to be the main Broadband Wireless Access (BWA) technology that provided several services such as data, voice, and video services including different classes of... more
    • by 
    •   20  
      Computer ScienceComputer Science EducationPhilosophy of Computer ScienceQuality of Healthcare Services
6th International Conference on Computer Science, Engineering and Information Technology (CSITY 2020) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer... more
    • by 
    •   19  
      Computer ScienceRobotics (Computer Science)Computer Science EducationOntology (Computer Science)
    • by 
    •   20  
      Computer ScienceInformation TechnologyInformation Communication TechnologyEncryption
This study examines the individuals’ participation intentions and behaviour on Social Networking Sites (SNSs). For this purpose, the Technology Acceptance Model (TAM) is utilized and extended in this study through the addition of... more
    • by 
    •   8  
      AdoptionSocial Networking Sites (SNS)Acceptance ModelsComputer science & Information Technology
    • by 
    •   13  
      Computer ScienceScienceVirtual MemoryPerformance Evaluation
In this paper, we are going to see about the rooting of android mobiles and how to install custom ROMs in android mobiles and the advantages and disadvantages of rooting the android mobiles.
    • by 
    •   2  
      Computer EngineeringComputer Science and Information Technology
With the rapid and the fast development of artificial intelligence technology, intelligent tutoring Systems (ITSs) are becoming one of the most important area of research and development. Intelligent tutoring Systems have very good impact... more
    • by 
    • Computer Science and Information Technology
In modern and crowded traffic life, it becomes mandatory to save the human life by reaching the hospital very sooner than possible. This paper explains about the advancement in tracking the ambulance presence amidst the traffic with the... more
    • by 
    •   7  
      Image ProcessingNational Security & Life SciencesGPS TRACKING SYSTEMComputer science & Information Technology
Due to the increasingly need for automatic traffic monitoring, vehicle license plate detection is of high interest to perform automatic toll collection, traffic law enforcement, parking lot access control, among others. In this paper, a... more
    • by 
    •   3  
      Computer science & Information TechnologyComputer Science and Information TechnologyInformation Technology and Computer Science
This article explains the results of a study that focuses on measuring Sustainable Development (SD) education for Information Technology Education (ITE) program review in UPSI. A Sustainable Development Education Model (SDEM) was... more
    • by 
    •   13  
      Information TechnologyInformation Communication TechnologySocial Study of Information & Communication TechnologyInformation Technology Law
This paper presents the results of an online survey which was conducted to analyse the use of social web in the context of daily news. Users' motivation and habit in the news consumption were focused. Moreover, users' news behaviour was... more
    • by 
    •   4  
      Computer science & Information TechnologyComputer Science and Information TechnologyInformation Technology/computer ScienceInformation Technology and Computer Science
Cancer is a disease that develops in the human body due to gene mutation. Because of various factors, cells can become cancerous and grow rapidly, destroying normal cells at the same time. Support vector machines allow for accurate... more
    • by 
    •   18  
      MathematicsComputer ScienceAlgorithmsMathematics Education
Neural computing is a very extensive, separate science. We apply its solid theory has made it possible to solve many kinds of problems one of which is offline handwriting character recognition. The goal of optical character recognition is... more
    • by 
    •   6  
      Character RecognitionNeural NetworksSegmentation (Marketing)Segmentation
    • by 
    •   7  
      Information Technology LawCloud ComputingComputer Science and Information TechnologyComputer Science Information Technology
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as... more
    • by 
    •   14  
      BioinformaticsComputer ScienceInformation TechnologyImage Processing
E-governance is the latest trend in many countries in which the government system is being online to deliver the government services to the citizens. The services can be from Government to Citizen (G2C) and Government to Business (G2B) or... more
    • by 
    • Computer Science and Information Technology
O advento das tecnologias da informação ocasionou a demanda por documentos digitais, com isto, uma quantidade significativa de documentos com necessidades de preservação em longo prazo começou a ser produzida exclusivamente em meio... more
    • by  and +1
    •   92  
      Information SystemsInformation ScienceInformation TechnologyManagement Information Systems
Computer security is a branch of technology known as Information Security, as it is applied to computers and networks. The objective of computer security involves the protection of information and property from theft and corruption, or... more
    • by 
    •   12  
      Computer ScienceInformation TechnologyComputer EngineeringInformation Communication Technology
    • by 
    •   17  
      MathematicsComputer ScienceTheory Of ComputationArtificial Intelligence
Map Reduce has gained remarkable significance as a prominent parallel data processing tool in the research community, academia and industry with the spurt in volume of data that is to be analyzed. Map Reduce is used in different... more
    • by 
    •   9  
      HadoopMapreduceComputer science & Information TechnologyComputer Science and Information Technology
Character recognition is the process of detecting and processing a character or words and storing it in textual format. This project aims to build a character recognition system to digitize the ancient Tamil script and additionally... more
    • by 
    •   18  
      MathematicsComputer ScienceImage ProcessingComputer Engineering
There have been a lot of developments towards the Humans Computers Interaction (HCI). Many modules have been developed to help the physical world interact with the digital world. Here, the proposed paper serves to be a new approach for... more
    • by  and +2
    •   19  
      Computer ScienceHuman Computer InteractionInformation TechnologyComputer Vision
Bangladesh is a developing country with the literacy rate of 62.5%. Challenges in education sector are huge. There is no doubt that IT is going to bring about a tremendous change in education. The use of ICT in education was more... more
    • by 
    •   6  
      ICT in EducationComputer science & Information TechnologyComputer Science and Information TechnologyAdvancement
Business Process Management aligns organisational strategy and business operation. The dynamic environment within which organisations operate promotes changes in business processes, in a phenomenon known as business process variability.... more
    • by  and +1
    •   7  
      Computer science & Information TechnologyComputer Science and Information TechnologyInformation Technology/computer ScienceInformation Technology and Computer Science
Traditional approaches to extract useful Keyphrase from a sentence rely heavily on human effort. In this paper, to overcome this challenge, Automatic Keyphrase Extraction algorithm has been used to extract a Keyphrase efficiently that... more
    • by 
    •   17  
      MathematicsComputer ScienceAlgorithmsNatural Language Processing
Instant messaging (IM) becomes a vital part of our daily use in social media and internet network. The growing of communication needs reliable and fast technologies and tools. As a result, companies are implementing various IM... more
    • by  and +1
    •   3  
      Computer science & Information TechnologyComputer Science and Information TechnologyComputer Science and Technology
Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire... more
    • by  and +2
    •   16  
      Computer ScienceInformation TechnologyTechnologyFire and Emergency Services
Project management is quite important to execute projects effectively and efficiently. Project management is vital to projects success. The main challenge of project management is to achieve all project goals, taking into consideration... more
    • by 
    •   6  
      Project ManagementComputer science & Information TechnologyComputer Science and Information TechnologyCMMI
Of the four elementary operations, division is the most time consuming and expensive operation in modern day processors. This paper uses the tricks based on Ancient Indian Vedic Mathematics System to achieve a generalized algorithm for... more
    • by 
    •   9  
      Computer Science and Information TechnologyInformation Technology and Computer ScienceVedic MathematicsComputer Science Information Technology
These days, with the increasing demands and responsibilities of life, parents becoming busy most of the time which makes taking care of an infant incredibly difficult task as infants need the attention and supervision of caregivers all... more
    • by 
    •   20  
      Computer ScienceInformation TechnologyTechnologyEducational Technology
Image enhancement is the process of improving the quality of image by using various techniques. There are so many techniques for image enhancement and every technique produces different result for different images. Contrast enhancement is... more
    • by 
    • Computer Science and Information Technology
The problem of scheduling a timetable is a complex job that is considered as an NP-hard problem, i.e., not verifiable in polynomial time. This is a typical scheduling problem that appears to be a strenuous job in every academic institute.... more
    • by 
    •   18  
      MathematicsComputer ScienceInformation TechnologyTechnology
Lane detection and tracking is one of the key features of advanced driver assistance system. Lane detection is finding the white markings on a dark road. Lane tracking use the previously detected lane markers and adjusts itself according... more
    • by 
    •   6  
      Driver Assistance SystemsComputer science & Information TechnologyDriver Assistance SystemComputer Science and Information Technology
This text explains how to use mathematical models and methods to analyze problems that arise in computer science. Proofs play a central role in this work because the authors share a belief with most mathematicians that proofs are... more
    • by 
    •   20  
      BusinessBusiness AdministrationComputer ScienceProgramming Languages
Information Technology in Industry (ITII) is an open access electronic journal, established by a group of academic members at La Trobe University, Australia for the purpose of publishing and sharing knowledge and research results in all... more
    • by 
    •   17  
      Information SystemsIT in healthcareIT in Civil and Environment EngineeringHealth Information Technology
    • by 
    •   20  
      Computer ScienceInformation TechnologyInformation Communication TechnologyEncryption
Thyroid is the major disorder occurs due to the lack of thyroid hormone among women than man. The test report of thyroid includes number of attributes such as TSH, T3, TT4, T4U and more. Manually determining the disorder for number of... more
    • by 
    •   5  
      ThyroidClassificationRandom ForestsComputer Science and Information Technology
Fire is as destructive as it is useful. Without a proper pro-active approach to preventing fire outbreaks, the results could be extremely disastrous when they occur. Thus, there is a need for a fast and convenient way of reporting fire... more
    • by  and +1
    •   20  
      Computer ScienceInformation TechnologyTechnologyFire and Emergency Services
The Internet of Things (IoT) has the power to change our world. Agriculture is the backbone of the India. Development of IoT application is a must, for solving problems that are faced by farmers in the field of agriculture. Lack of proper... more
    • by 
    •   13  
      Computer ScienceInformation TechnologyComputer EngineeringInformation Communication Technology
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as... more
    • by 
    •   16  
      Computer ScienceRobotics (Computer Science)Computer Science EducationOntology (Computer Science)
Cancer is a disease that develops in the human body due to gene mutation. Because of various factors, cells can become cancerous and grow rapidly, destroying normal cells at the same time. Support vector machines allow for accurate... more
    • by 
    •   18  
      MathematicsComputer ScienceAlgorithmsMathematics Education
Implementation of smart cities is going on all over India. The key focus in smart city is to automate the tasks required to monitor the management activities and effective usage of resources. One important task in the city management is... more
    • by 
    •   9  
      Computer ScienceInformation TechnologyTechnologyScience Computer
International Journal on Foundations of Computer Science & Technology (IJFCST) is a Bi-monthly peer-reviewed and refereed open access journal that publishes articles which contribute new results in all areas of the Foundations of Computer... more
    • by 
    •   20  
      AlgorithmsSoftware EngineeringProgramming LanguagesArtificial Intelligence
Project monitoring and control process is an important process in developing any computer information system. Monitoring and Control provides an understanding of the project’s progress so that when the project deviates significantly from... more
    • by 
    •   9  
      ControlPerformance MeasuresMonitoringComputer science & Information Technology