• No results found

[PDF] Top 20 Journal of Computer Sciences and Applications

Has 10000 "Journal of Computer Sciences and Applications" found on our website. Below are the top 20 most common "Journal of Computer Sciences and Applications".

Journal of Computer Sciences and Applications

Journal of Computer Sciences and Applications

... The classification metrics of six classification algorithms: Decision Tree, Extra Trees, Gradient Boosting, XGBoost, Light Gradient Boosting Machine, and Random Forest are presented f[r] ... See full document

10

et al , International Journal of Computer Science and Mobile Applications,

et al , International Journal of Computer Science and Mobile Applications,

... Himanshu Gupta et al, International Journal of Computer Science and Mobile Applications, Vol.2 Issue.. EXPERIMENTAL SETUP.[r] ... See full document

7

International Journal of Computer Science and Mobile Applications

International Journal of Computer Science and Mobile Applications

... Ibrahim Abdullah et al , International Journal of Computer Science and Mobile Applications, Vol.4 Issue.. 4-13 ISSN: 2321-8363.[r] ... See full document

10

Journal of Computer Sciences and Applications

Journal of Computer Sciences and Applications

... A computer web based system called “Veterinary Duties Scheduler” was developed to this effect using PHP as the programming language, MySQL as the database and Unified Modelling Language (UML) as system design ... See full document

10

Journal of Computer Sciences and Applications

Journal of Computer Sciences and Applications

... Abstract Monitoring of students who are undergoing the Students’ Industrial Work Experience Scheme (SIWES) program by school-based supervisors is a difficult task because the current[r] ... See full document

6

Journal of Computer Sciences and Applications

Journal of Computer Sciences and Applications

...  This is where the Association Rankings were Based on a particular Event in which a particular Entity (POI) is Associated. Out of this Criterion, they were further subdivided into[r] ... See full document

6

Journal of Computer Sciences and Applications

Journal of Computer Sciences and Applications

... Over the years, network intrusion detection systems have attracted the attention of many researchers. This is due to the fact that computer networks are widely applied in many spheres of life endeavours which ... See full document

9

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 03 57

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 03 57

... innovative applications, and high-performance ...service applications, Grid computing has extended its territory from traditional computing Grid to public and provides Grid ... See full document

7

International Journal of Computer Science and Mobile Applications

International Journal of Computer Science and Mobile Applications

... Abstract: Mobile computing is changing into progressively necessary because of the increase within the variety of moveable computers and also the want to possess continuous network property to the web regardless of the ... See full document

6

International Journal of Computer Science and Mobile Applications

International Journal of Computer Science and Mobile Applications

... There is a potential for making faster advancements in scientific discipline for analyzing the large amount of data .The technical challenges are most common across the large variety of application domains, therefore ... See full document

7

et al , International Journal of Computer Science and Mobile Applications,

et al , International Journal of Computer Science and Mobile Applications,

... BZIP2 compress Heavy Files in Blocks.Block size affects the compression ratio and the amount of memory for compression and decompression.At Compression Time Block size stored in[r] ... See full document

8

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 06 69

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 06 69

... A traffic control system that solves these problems by continuously sensing and monitoring traffic conditions and adjusting the timing of traffic lights according to [r] ... See full document

5

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 03 39

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 03 39

... The voting system is used in the pre-poll voting centers, which are open for 3 weeks before polling day, and in a limited number of polling places on polling day. In polling places that do not have electronic voting, ... See full document

9

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 54

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 05 54

... The neighbors of this node are also scored with high value and if high scored nodes are selected as subgoals, the bottleneck neighbors are also identified as subgoal states.. To overc[r] ... See full document

9

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 06 50

International Journal of Electrical & Computer Sciences IJECS-IJENS Vol: 11 No: 06 50

... Certain applications may have stringent delay requirements (delay-intolerant) but relaxed packet loss requirements (loss- ...other applications, it may be desirable to wait for a while (delay-tolerant) ... See full document

8

International Journal of Computer Science and Mobile Applications

International Journal of Computer Science and Mobile Applications

... solely from the unsafe waste generation purpose of read however additionally from power consumption and warmth generation perspective, computers provide a good threat to the society. Data centers are the large amount ... See full document

6

International Journal of Computer Science and Mobile Applications

International Journal of Computer Science and Mobile Applications

... The spread spectrum technique is based on Shannon Information Theory. This technique spreads the signal over a wide bandwidth in order to give safety against such attacks (Pintukumar & Usha, 2015). Spread spectrum ... See full document

8

International Journal of Computer Science and Mobile Applications

International Journal of Computer Science and Mobile Applications

... This scheme is a pioneer construction for public key based encryption. However it exists some problems. First, the construction is oriented to mail system, so the sender can be multi-users, but it should only assign a ... See full document

7

Journal of Mathematical Sciences and Applications

Journal of Mathematical Sciences and Applications

... They assumed that the insurer’s surplus process followed a jump- diffusion process where the insurer could purchase proportional reinsurance from the reinsurer via the variance pr[r] ... See full document

7

Journal of Mathematical Sciences and Applications

Journal of Mathematical Sciences and Applications

... The result of Lemma 3.1 has been shown by Mothebe and Phuc [3] to be closely related to the problem of determining the density of the prime numbers and twin primes in the sequence[r] ... See full document

5

Show all 10000 documents...