The Wayback Machine - https://web.archive.org/web/20190618175132/https://www.academia.edu/Documents/in/Computer_Science
Skip to main content

You're using an out-of-date version of Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.

Uma Abordagem Focada em Gestão de Riscos
    • by 
    •    0 comments
    •    1 participant
    •    
Logics based on Weak Kleene Algebra (WKA) and related structures have been recently proposed as a tool for reasoning about flaws in computer programs [11]. The key element of this proposal is the presence, in WKA and related structures,... more
  • Download
    • by  and +2
    •   3  
      Computer Science, Many-Valued Logic, sequent calculi
ARE YOU A MEMBER OF ANY ACADEMIC PROFESSIONAL ORGANIZATION? WHY AND WHY NOT? One, two, or (too) many memberships? How many is too much? The Scopus Diaries and the (Il)logics of Academic Survival... more
  • Download
    • by 
    •   14  
      Computer Science, Philosophy of Science, Social Sciences, Career Management
Obesity is a major health problem around the world. Saudi Arabia is a nation where obesity is increasing at an alarming rate. Mobile apps could help obese individuals but they need to be usable and personalized to be adopted by those... more
  • Download
    • by 
    •   14  
      Computer Science, Information Technology, User Experience (UX), Software Testing
Steganography is the process of hiding secret messages in color covering images, steganography hides the existence of the message within the color image so that it cannot be noticed by human eyes. Steganography is an important process... more
  • Download
    • by 
    •   13  
      Engineering, Mathematics, Computer Science, Algorithms
This is a self-assessment from the College of Mental Health Counselling www.empathyforu.com
  • Download
    • by 
    •   20  
      History, Sociology, Psychology, Computer Science
“I am the first who explained Religion with Science, Mathematics and Physics in mankind history. Religion and Quantum Evolution” Adrian Ferent “Evolution: each time we are born, we are born with higher Consciousness, because... more
    • by 
    •    0 comments
    •    2 participants
    •    
KYC (Know Your Customer) is used for identity verification in banks, Hospitals, Aadhar, Passport verification, etc. A third party independent KYC system that can be used at multiple places to validate the identity of the individual is the... more
  • Download
    • by  and +1
    •   12  
      Computer Science, Decentralized Systems, Cryptography, Decentralization
A beacon is a small Bluetooth radio transmitter. It's kind of like a lighthouse: it repeatedly transmits a single signal that other devices can see. Instead of emitting visible light, though, it broadcasts a radio signal that is made up... more
  • Download
    • by 
    •   15  
      Information Systems, Computer Science, Information Technology, Technology
Cloud technology enables data-sharing capabilities, which benefits the user through greater productivity and efficiency. However, the Cloud is susceptible to many privacy and security vulnerabilities. Thus, there is a strong demand for... more
  • Download
    • by 
    •   11  
      Computer Science, Information Technology, Technology, Cloud Computing
As there is a rapid increase in technology development increase in identity theft, consumer fraud, threat to personal data also increasing day by day. The methods developed earlier to secure personal information from theft were not... more
  • Download
    • by 
    •   17  
      Information Systems, Computer Science, Information Technology, Technology
Com a realização deste trabalho prático, aperceberamo-nos da efetiva importância que o ato de endereçamento tem nos meandros da indústria informática e outras conexas. Também o indexar de informações identificativas a um dispositivo... more
  • Download
    • by 
    •   3  
      Computer Science, Information Technology, Computer Networking and Telecommunication
Di zaman modernisasi seperti sekarang, manusia sangat bergantung pada teknologi. Hal ini membuat teknologi menjadi kebutuhan dasar setiap orang. Dari orang tua hingga anak muda, para ahli hingga orang awam pun menggunakan teknologi dalam... more
  • Download
    • by 
    •   2  
      Computer Science, Education
Most of the systems presented to date deals with RDF format so they are limited in actually addressing the knowledge base features from the ontology based on OWL semantics. Now, there is a need that actual OWL features i.e. rules and... more
  • Download
    • by 
    •   13  
      Computer Science, Ontology, Semantic Web Technologies, Natural Language Processing
The present paper describes a novel Raspberry Pi and Arduino UNO architecture used as a meteorological station. One of the advantages of the proposed architecture is the huge quantity of sensors developed for its usage; practically one... more
  • Download
    • by 
    •   15  
      Computer Science, Information Technology, Embedded Systems, Information Communication Technology
In human-computer interaction, there are a number of design factors that designers keep in mind while designing the user interfaces to make user experiences easy and less painful. Affordance is one of that and it plays a critical role in... more
  • Download
    • by  and +1
    •   11  
      Information Systems, Computer Science, Information Science, Human Computer Interaction
The outgrowth of transportable wireless communication devices has pushed designers to design miniature size antennas. The most prized among miniature antenna selections is that the microstrip patch antenna. In this paper, A wideband... more
  • Download
    • by 
    •   5  
      Computer Science, Information Technology, Wireless Communications, Network Security
Data is the most valuable entity in today's world which has to be managed. The huge data available is to be processed for knowledge and predictions.This huge data in other words big data is available from various sources like Facebook,... more
  • Download
    • by 
    •   9  
      Information Systems, Computer Science, Information Technology, Information Security
Text detection and recognition in scene images or natural images has applications in computer vision systems like registration number plate detection, automatic traffic sign detection, image retrieval and help for visually impaired... more
  • Download
    • by 
    •   11  
      Computer Science, Information Technology, Image Processing, Information Security
Crime is one of the endless problems in society. Crime acts that happened often cause anxiety and even victim or material loss. Polrestabes Semarang under the command of Polda Jawa Tengah has been developing Sistem Manajemen Informasi... more
  • Download
    • by  and +1
    •   14  
      Information Systems, Computer Science, Crime Mapping, Sistem Informasi