Image Captioning Using Deep Learning Models
Ravi Kumar, Dinesh Kumar, Ahmad Saeed
Computer Science and Engineering, 2024 14(6), pp. 162-168
Published Online: October 29, 2024
10.5923/j.computer.20241406.06
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF248 Views 37 Downloads
Leveraging Large Language Models for Log Mining: A New Paradigm in Data Analysis
Abhishek Gupta
Computer Science and Engineering, 2024 14(6), pp. 155-161
Published Online: October 18, 2024
10.5923/j.computer.20241406.05
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF74 Views 52 Downloads
Cross-Domain Content Generation with Domain-Specific Small Language Models
Ankit Maloo, Abhinav Garg
Computer Science and Engineering, 2024 14(6), pp. 142-154
Published Online: October 15, 2024
10.5923/j.computer.20241406.04
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF79 Views 53 Downloads
Transformative Effects of Artificial Intelligence on Cloud Computing
Alekya Jonnala
Computer Science and Engineering, 2024 14(6), pp. 135-141
Published Online: October 14, 2024
10.5923/j.computer.20241406.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF73 Views 45 Downloads
AI-Driven Innovations in Modern Cloud Computing
Animesh Kumar
Computer Science and Engineering, 2024 14(6), pp. 129-134
Published Online: October 14, 2024
10.5923/j.computer.20241406.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF93 Views 59 Downloads
Cloud Computing and Its Impact on the Security of Financial Systems
Naga Rishyendar Panguluri
Computer Science and Engineering, 2024 14(6), pp. 121-128
Published Online: September 21, 2024
10.5923/j.computer.20241406.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF180 Views 71 Downloads
Financial Close Automation with SAP S4 HANA Advanced Financial Close Technology
Shoukathali Jambagi
Computer Science and Engineering, 2024 14(5), pp. 108-119
Published Online: September 14, 2024
10.5923/j.computer.20241405.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF16075 Views 6579 Downloads
Marketing Analytics - Campaigns Influence on Consumer Preferences Across Channels
Tarini Mishra
Computer Science and Engineering, 2024 14(5), pp. 98-107
Published Online: September 13, 2024
10.5923/j.computer.20241405.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF218 Views 72 Downloads
Method and System for Enabling Ringback Tone Service without Network Dependency
Umaasudhan Nataraja
Computer Science and Engineering, 2024 14(4), pp. 83-85
Published Online: September 10, 2024
10.5923/j.computer.20241404.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF123 Views 60 Downloads
Comparative Analysis of Leading Vendor Spatial Databases
Prashant Nadagoud
Computer Science and Engineering, 2024 14(5), pp. 87-97
Published Online: September 10, 2024
10.5923/j.computer.20241405.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF95 Views 56 Downloads
Cyber Risk Quantification's Role in Enterprise Threat Management: A Detailed Analysis
Sharat Ganesh
Computer Science and Engineering, 2024 14(4), pp. 78-82
Published Online: August 30, 2024
10.5923/j.computer.20241404.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF462 Views 99 Downloads
Safeguarding Your Backups: Ensuring the Security and Integrity of Your Data
Taresh Mehra
Computer Science and Engineering, 2024 14(4), pp. 75-77
Published Online: August 28, 2024
10.5923/j.computer.20241404.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF3678 Views 3135 Downloads
Transforming Customer Experience with Digital Voice Assistants
Alekya Jonnala
Computer Science and Engineering, 2024 14(3), pp. 67-74
Published Online: August 08, 2024
10.5923/j.computer.20241403.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF221 Views 105 Downloads
Leveraging Deep Learning Techniques for Enhanced Intrusion and Malware Detection Performance
Asmaa Ourdighi, Sarah Yamina Messaoudi, Ikram Belabed
Computer Science and Engineering, 2024 14(3), pp. 56-66
Published Online: July 06, 2024
10.5923/j.computer.20241403.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF769 Views 129 Downloads
Evaluation of a Cyber Security Resilience as a Factor for Regulating Critical Infrastructure
Grenah Sivwimi, Simon Tembo
Computer Science and Engineering, 2024 14(3), pp. 51-55
Published Online: July 06, 2024
10.5923/j.computer.20241403.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF235 Views 135 Downloads
Log Event Collector: An Automated Framework for Comprehensive Component Testing
Kirit Nimdia, Balasubrahamnya Balakrishna
Computer Science and Engineering, 2024 14(2), pp. 42-49
Published Online: April 30, 2024
10.5923/j.computer.20241402.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1134 Views 178 Downloads
Securing the Digital Backbone: An In-depth Insights into API Security Patterns and Practices
Mayank Hindka
Computer Science and Engineering, 2024 14(2), pp. 35-41
Published Online: April 25, 2024
10.5923/j.computer.20241402.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF543 Views 218 Downloads
Secured and Strategic Deployment of Mission-Critical APIs from External Caching to Cloud-Based Solutions
Balasubrahmanya Balakrishna
Computer Science and Engineering, 2024 14(2), pp. 25-34
Published Online: April 17, 2024
10.5923/j.computer.20241402.01
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF1360 Views 208 Downloads
Design of a System to Reduce Patient Crowding at UTH
Owen Hangoma, Dr Evaristo Musonda, Ir D. Mubiligi
Computer Science and Engineering, 2024 14(1), pp. 15-23
Published Online: March 09, 2024
10.5923/j.computer.20241401.03
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF709 Views 229 Downloads
Seamless Integration of Third-Party Service Charges into Utility Bills: Leveraging SAP S/4HANA and SAP Cloud Connector
Khurram Qumar Siddique
Computer Science and Engineering, 2024 14(1), pp. 7-14
Published Online: March 09, 2024
10.5923/j.computer.20241401.02
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.
Full-Text HTMLDownload Full-Text PDF57193 Views 52989 Downloads