
Detection of Android Adware Using Transfer Learning with Computer Vision
Kabombo Katutwa, Dani E. Banda, Julien Shabani
Computer Science and Engineering, 2022 12(1), pp. 30-38
Published Online: August 23, 2022
10.5923/j.computer.20221201.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1371 Views 368 Downloads

Cyberphysical Security Analysis of Digital Control Systems in Hydro Electric Power Grids
Lukumba Phiri, Simon Tembo
Computer Science and Engineering, 2022 12(1), pp. 15-29
Published Online: March 15, 2022
10.5923/j.computer.20221201.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1385 Views 529 Downloads

Petri Net-Based (PN) Cyber Risk Assessment and Modeling for Zambian Smart Grid (SG) ICS and SCADA Systems
Lukumba Phiri, Simon Tembo
Computer Science and Engineering, 2022 12(1), pp. 1-14
Published Online: January 21, 2022
10.5923/j.computer.20221201.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2308 Views 769 Downloads

Enhanced Error Correcting Code on Information Extraction of Message from Digital Image Using Parity Error Correction
Tebepah T., Onuodu F. E., Okolai D. B.
Computer Science and Engineering, 2021 11(3), pp. 41-48
Published Online: December 24, 2021
10.5923/j.computer.20211103.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1292 Views 644 Downloads

Investigating the Effect of E-Learning in Science Education at GCE/O/L
Damith Wickramanayaker, Col. H. A. I. U. Hewaarachchi, Sharlene Brown
Computer Science and Engineering, 2021 11(2), pp. 28-40
Published Online: September 26, 2021
10.5923/j.computer.20211102.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1221 Views 586 Downloads

Efficiently Solving Poisson's Equation Using Simple Artificial Neural Networks
Jay P. Narain
Computer Science and Engineering, 2021 11(2), pp. 23-27
Published Online: June 26, 2021
10.5923/j.computer.20211102.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1435 Views 666 Downloads

Solution of Poisson's Equation Using Artificial Neural Networks
Jay P. Narain
Computer Science and Engineering, 2021 11(1), pp. 17-21
Published Online: June 15, 2021
10.5923/j.computer.20211101.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2767 Views 866 Downloads

A Functional View of Hybrid-Cloud Environment – Use Cases and Best Practices
Prashant Tyagi, Sharada Devi P. P.
Computer Science and Engineering, 2021 11(1), pp. 9-16
Published Online: February 20, 2021
10.5923/j.computer.20211101.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3456 Views 935 Downloads

Use of Artificial Intelligence in Patient Experience in OP
Balagopal Ramdurai
Computer Science and Engineering, 2021 11(1), pp. 1-8
Published Online: February 06, 2021
10.5923/j.computer.20211101.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2585 Views 915 Downloads

Implementing Granular Access Definitions in Log Records
Sandeep Jayashankar, Subin Thayyile Kandy
Computer Science and Engineering, 2020 10(1), pp. 22-30
10.5923/j.computer.20201001.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF17188 Views 11026 Downloads

Approach to Methodology and Design Issues for a Customised Virtual Learning Environment (VLE) Model/Framework for the Universities in Developing Countries
Aaron A. R. Nwabude, Francisca Nonyelum Ogwueleka, Martins E. Irhebhude
Computer Science and Engineering, 2020 10(1), pp. 7-21
10.5923/j.computer.20201001.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2195 Views 1195 Downloads

Resource Utilization Prediction Model for Efficient Dynamic Virtual Machine Consolidation in Cloud
Muhammad I. Umar, Kabiru I. Musa, Musa Nehemiah, Muhammad Aliyu, Rumana K. Aminu, Nahuru A. Sabongari, Mohammed K. Dauda
Computer Science and Engineering, 2020 10(1), pp. 1-6
10.5923/j.computer.20201001.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3105 Views 1611 Downloads

LSTM Network for Predicting Medium to Long Term Electricity Usage in Residential Buildings (Rikkos Jos-City, Nigeria)
Abdulsalam Ya’u Gital, Mustapha Lawal Abdulrahman, Jakawa Jimmy Nerat, Emmanuel Nannin Ramson, Okere Chidi Ebere, Badamasi Jafaru
Computer Science and Engineering, 2019 9(2), pp. 21-30
10.5923/j.computer.20190902.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3229 Views 1471 Downloads

Barcode Detection of Video Images by Using MATLAB SIMULINK
Md. Yousuf Ali, Xuan-De Zhang, Md. Harun-Ar-Rashid, Md. Rakibul Islam
Computer Science and Engineering, 2019 9(1), pp. 12-19
10.5923/j.computer.20190901.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF4273 Views 1605 Downloads

Designing Machine Learning Method for Software Project Effort Prediction
Ketema Kifle Gebretsadik, Walelign Tewabe Sewunetie
Computer Science and Engineering, 2019 9(1), pp. 6-11
10.5923/j.computer.20190901.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF2397 Views 1253 Downloads

Research and Simulation of UAV Security Strategy Based on A*BC Algorithm
Xu Depeng, Le Ziying, Li Mengshan
Computer Science and Engineering, 2019 9(1), pp. 1-5
10.5923/j.computer.20190901.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3002 Views 1768 Downloads

Super Resolution of Medical Reconstructed Image Using Wavelet Transform
Muthana N. Abdul-Hussein Al-Hassany, Mohammed H. Ali Al-Hayani
Computer Science and Engineering, 2018 8(3), pp. 41-46
10.5923/j.computer.20180803.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3143 Views 1528 Downloads

Dynamics of Technology Transfer for Innovation Processes in a Constrained Resource Settings: The Promise of Data Analytics and Computer Simulations
Peter Kiarie, Mwangi Henry, Chunming Rong
Computer Science and Engineering, 2018 8(2), pp. 30-39
10.5923/j.computer.20180802.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF4652 Views 2124 Downloads

Understanding Blockchain Technology
Simanta Shekhar Sarmah
Computer Science and Engineering, 2018 8(2), pp. 23-29
10.5923/j.computer.20180802.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF19463 Views 11361 Downloads

Automatic Detection System to the Sticky Bomb
Raed Majeed, Hiyam Hatem, Muhanad Mohammed
Computer Science and Engineering, 2018 8(2), pp. 17-22
10.5923/j.computer.20180802.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF8457 Views 5273 Downloads