Suggested Topics within your search.
Suggested Topics within your search.
- Computer science 3
- Application software 1
- Automata 1
- Automatic speech recognition 1
- Coding and Information Theory 1
- Coding theory 1
- Computer access points 1
- Development 1
- Digital techniques 1
- Enterprise application integration (Computer systems) 1
- Government policy 1
- Graphical user interfaces (Computer systems) 1
- Human-computer interaction 1
- Human-machine systems 1
- Information theory 1
- Interactive computer systems 1
- Java (Computer program language) 1
- Management information systems 1
- Mathematics 1
- Moral and ethical aspects 1
- Natural language processing (Computer science) 1
- Object-oriented programming (Computer science) 1
- Prevention 1
- Programming Languages, Compilers, Interpreters 1
- Programming languages (Electronic computers) 1
- Psychological aspects 1
- Psychology 1
- Scripting languages (Computer science) 1
- Semantic integration (Computer systems) 1
- Service-oriented architecture (Computer science) 1
-
541
Why School Olympiad Winners Are Excluded from Highly Selective Universities
Published 2024-12-01“…The study is carried out using a qualitative methodology, based on interviews with the organizers of the Olympiad movement and students of the Department of Mathematics and the Department of Computer Science. The individual and institutional reasons for the expulsion of students-winners of the Olympiads are singled out and the recommendations are proposed to reduce the dropout rate.…”
Get full text
Article -
542
Bibliometric analysis of ICT research in South Africa
Published 2024-12-01“…It gives students a thorough grasp of computer science, emphasizing modern software development techniques used in the IT sector. …”
Get full text
Article -
543
-
544
On a Class of Discrete Max-Type Difference Equation Model of Order Four
Published 2022-01-01“…As a type of discrete model, the difference equation model has been widely employed in domains such as algorithm analysis, signal processing, biology, economics, and computer science. The global dynamical behavior of a class of discrete models known as the max-type difference equation model is the subject of the research. …”
Get full text
Article -
545
Assessment and Classification of Service Learning: A Case Study of CS/EE Students
Published 2014-01-01“…This study investigates the undergraduate students in computer science/electric engineering (CS/EE) in Taiwan to measure their perceived benefits from the experiences in service learning coursework. …”
Get full text
Article -
546
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01“…Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.…”
Get full text
Article -
547
ARTigo: Data from Social Tagging with Art-historical Images
Published 2024-12-01“…The ARTigo dataset, generated from over 10 million annotations, is a product of a citizen science project developed by the Institute of Art History and the Institute of Computer Science at LMU Munich. The project leverages Games with a Purpose (GWAPs) to foster a playful environment for tagging artworks. …”
Get full text
Article -
548
Modification of Nonlinear Conjugate Gradient Method with Weak Wolfe-Powell Line Search
Published 2017-01-01“…Based on its simple algorithm, low memory requirement, and the speed of obtaining the solution, this method is widely used in many fields, such as engineering, computer science, and medical science. In this paper, we modified CG method to achieve the global convergence with various line searches. …”
Get full text
Article -
549
A Comparative Study of Cross-Device Finger Vein Recognition Using Classical and Deep Learning Approaches
Published 2024-01-01Get full text
Article -
550
-
551
-
552
Non-Invasive Cancer Detection Using Blood Test and Predictive Modeling Approach
Published 2025-01-01“…Ahmad S Tarawneh,1 Ahmad K Al Omari,2,3 Enas M Al-khlifeh,4 Fatimah S Tarawneh,5 Mansoor Alghamdi,6 Majed Abdullah Alrowaily,7 Ibrahim S Alkhazi,8 Ahmad B Hassanat1 1Department of Information Technology, Mutah University, Al-Karak, Jordan; 2Department of Nursing, Jordanian Royal Medical Services, Amman, Jordan; 3Department of Nursing, The University of Jordan, Amman, Jordan; 4Department of Applied Biology, Al-Balqa Applied University, Salt, Jordan; 5Department of Nursing, Princess Muna College of Nursing, Mutah University, Al-Karak, Jordan; 6Department of Computer Science, Applied College, University of Tabuk, Tabuk, Saudi Arabia; 7Department of Computer Science, College of Computer and Information Sciences, Jouf University, Sakaka, Saudi Arabia; 8Department of Computer Science, College of Computers and Information Technology, University of Tabuk, Tabuk, Saudi ArabiaCorrespondence: Enas M Al-khlifeh, Department of Applied Biology, Al-Balqa Applied University, Salt, Jordan, Tel +962792007289, Email Al-khlifeh.en@bau.edu.joPurpose: The incidence of cancer, which is a serious public health concern, is increasing. …”
Get full text
Article -
553
Fake Detect: A Deep Learning Ensemble Model for Fake News Detection
Published 2021-01-01Get full text
Article -
554
-
555
-
556
-
557
Improving Sleep Disorder Diagnosis Through Optimized Machine Learning Approaches
Published 2025-01-01Get full text
Article -
558
Structural Bioinformatics: exciting times in a rapidly evolving field
Published 2025-02-01“…Structural Bioinformatics is a multidisciplinary field at the intersection of chemistry, physics, biology, and computer science. Its methods and approaches have been crucial in advancing scientific knowledge and breaking new ground. …”
Get full text
Article -
559
Greedy algorithms: a review and open problems
Published 2025-02-01“…Abstract Greedy algorithms are a fundamental class of mathematics and computer science algorithms, defined by their iterative approach of making locally optimal decisions to approximate global optima. …”
Get full text
Article -
560
Linguistes de terrain en quête d’éthique : de l’archivage numérique insouciant à la réflexivité permanente
Published 2024-12-01“…The time frame coincides with two decades of spectacular progress in computer science, and in particular in natural language processing. …”
Get full text
Article