Skip to main content
Root rot and wilt disease complex detected in several fig (Ficus carica), grapevine (Vitis vinifera) and pomegranate (Punica granatum) transplants nurseries and new orchards at El-Kharga, Baris, Balate, El-Dakhla and El-Farafrah... more
  • Download
    • by 
    •   4  
      Cultural Studies, Computer Science, Information Technology, Accounting
Visual analytics facilitates the creation of knowledge to interpret trends and relationships for better decision making. However, it has not being used widely for the understanding of software systems and the change process that takes... more
  • Download
    • by 
    •   2  
      Computer Science, ICTs
A wireless sensor network (WSN) consists of multiple sensor nodes and base stations that collect information from widely deployed sensors. However, the disadvantage is that WSNs are randomly distributed in an open environment, which makes... more
  • Download
    • by 
    •   19  
      Computer Science, Information Technology, Fuzzy Logic, Genetic Algorithms
The purpose of this paper is to outline the creation of a computational model making use of an underlying processing element in the form of an artificial neural network (ANN). Within the study, the ANN models multiple conservation tasks... more
  • Download
    • by 
    •   3  
      Computer Science, Artificial Intelligence, Science Education
In this short paper, I provide an explanation of what criteria I would consider in making a decision for acquiring BI software, including purchasing, leasing, in-house development, and outsourcing development. I also provide an... more
  • Download
    • by 
    •   14  
      Business, Business Administration, Computer Science, Information Technology
Systemy informatyczne jako narzędzia wykorzystywane do sprawnego zarządzania na wszystkich szczeblach hierarchii stanowią w nowoczesnej firmie rozwiązanie standardowe. Brak stosowania informatycznego wspomagania procesu zarządzania... more
  • Download
    • by 
    •   4  
      Management, Computer Science, Artificial Intelligence, Competitive advantage
Far-right, identitarian movement ideology, and online connection including with the dark web, and Islamic State material. 28 March 2019.
  • Download
    • by 
    •   9  
      Psychology, Computer Science, Psychiatry, Ethics
This paper analyses the impact of a regulatory change ('shock') on a public service organization. Depending on the nature of the organization, various steps are under taken to investigate the shock. Since health care organizations are... more
  • Download
    • by 
    • Computer Science
  • Download
    • by 
    •   20  
      Control Systems Engineering, Computer Science, Artificial Intelligence, Computer Science Education
Electronic Governance (e-Governance) is all about providing effective and efficient internet service to the citizens in a cheap and best way. Civil service and the public service delivery is being essential since its establishment in the... more
  • Download
    • by 
    •   9  
      Information Systems, Computer Science, Information Technology, Technology
Over the years, healthcare sector has been identified as the most vulnerable sector which is information rich but due to lack of appropriate retrieval methods avail, hidden data pattern cannot be achieved properly. A lot of research... more
  • Download
    • by 
    •   12  
      Information Systems, Mathematics, Computer Science, Information Technology
In this paper, we propose a data mining approach to predict the success of telemarketing. We are applying the algorithms for the first time on the dataset. The dataset obtained from UCI, which contain the most common machine learning... more
  • Download
    • by 
    •   15  
      Information Systems, Mathematics, Computer Science, Algorithms
In emerging knowledge economies such as Kenya, organizations rely heavily on their human capital to build value. Consequently, performance management at the individual employee level is essential and the business case for implementing a... more
  • Download
    • by 
    •   7  
      Information Systems, Computer Science, Information Technology, Computer Engineering
Largest CAS ever treated with full-correlation: CAS(54,54) for FeMoco.
  • Download
    • by 
    •   20  
      Computer Science, High Performance Computing, Quantum Computing, Theoretical Physics
Technically, quantum computing can provide the advantages of massively parallel processing and as a complex probabilistic Turing machine has been projected to offer greater processing efficiency and problem solving ability than digital... more
  • Download
    • by 
    •   9  
      Computer Science, Quantum Computing, Artificial Intelligence, Logic
This paper (39.39) cuts through the ethics-predicament that is now raging in the Artificial Intelligence industry. Historically, ethics consulting has pointed to “ethical principles” as underlying ethical decision-making. The conundrum... more
  • Download
    • by 
    •   10  
      Business Ethics, Computer Science, Artificial Intelligence, Ethics
Abstract H. 264/AVC outperforms the previous coding standards thanks to variable block size motion compensation (VBSMC) ranging from 4× 4 to 16× 16 in interframe coding. However, this new feature causes extremely high computation... more
    • by 
    •   7  
      Computer Science, Computational Complexity, Video Coding, Image Quality
A free, open-source toolkit to help researchers deal with data management overload has been devised by the John Innes Centre Informatics team. [43] A new computer program that spots when information in a quantum computer is escaping to... more
    • by 
    •    1 comment
    •    6 participants
    •    
The main outcomes of the research to define new stander as guidelines for disability usage for LMS in higher and further education institutions, this results enable website designer and programmer to support system disability by enhance... more
  • Download
    • by 
    •   14  
      Information Systems, Engineering, Mathematics, Computer Science
ABSTRACT The problem of determining the maximum size of a ternary code is considered, under the restriction that each symbol should appear a given number of times in each codeword. Upper and lower bounds on the size of such codes under... more
    • by 
    •   13  
      Mathematics, Computer Science, Informatics, Additives