Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2591)
Editorial
(392)
by Journal
by Funding Agency
Clear filters
Powered by
86 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: H.3.1 - Content Analysis and Indexing
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Customized Curriculum and Learning Approach Recommendation Techniques in Application of Virtual Reality in Medical Education
Abhishek Kumar
,
Abdul Khader Jilani Saudagar
,
Mohammed AlKhathami
,
Badr Alsamani
,
Muhammad Badruddin Khan
,
Mozaherul Hoque Abul Hasanat
,
Ankit Kumar
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94161
28-09-2022
Unique: 978 | Total: 1698
| Access Period:
949-966
HTML
XML
PDF
Research Article
Automatic Detection and Recognition of Citrus Fruit & Leaves Diseases for Precision Agriculture
Ashok Kumar Saini
,
Roheet Bhatnagar
,
Devesh Kumar Srivastava
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94133
28-09-2022
Unique: 921 | Total: 1454
| Access Period:
930-948
HTML
XML
PDF
Research Article
Extracting concepts from triadic contexts using Binary Decision Diagram
Julio Cesar Vale Neves
,
Luiz Enrique Zarate
,
Mark Alan Junho Song
10.3897/jucs.67953
28-06-2022
Unique: 788 | Total: 1328
| Access Period:
591-619
HTML
XML
PDF
Research Article
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework
Kheir Daouadi
,
Rim Rebaï
,
Ikram Amous
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.026
28-04-2020
Unique: 504 | Total: 875
| Access Period:
496-507
HTML
XML
PDF
Research Article
Cyberattack Response Model for the Nuclear Regulator in Slovenia
Samo Tomažič
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1437
28-11-2019
Unique: 496 | Total: 852
| Access Period:
1437-1457
HTML
XML
PDF
Research Article
A Web3.0-based Intelligent Learning System Supporting Education in the 21st Century
Khaled Halimi
,
Hassina Seridi-Bouchelaghem
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1373
28-10-2019
Unique: 728 | Total: 1286
| Access Period:
1373-1393
HTML
XML
PDF
Research Article
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
Akhtar Ali
,
Imran Bajwa
,
Rafaqat Kazmi
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1261
28-10-2019
Unique: 516 | Total: 953
| Access Period:
1261-1278
HTML
XML
PDF
Research Article
Digital Investigation of IoT Devices in the Criminal Scene
François Bouchaud
,
Gilles Grimaud
,
Thomas Vantroys
,
Pierrick Buret
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1199
28-09-2019
Unique: 902 | Total: 1502
| Access Period:
1199-1218
HTML
XML
PDF
Research Article
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Andrey Fedorchenko
,
Elena Doynikova
,
Igor Kotenko
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1043
28-09-2019
Unique: 556 | Total: 959
| Access Period:
1043-1065
HTML
XML
PDF
Research Article
Building an Educational Platform Using NLP: A Case Study in Teaching Finance
Soto Montalvo
,
Jesus Palomo
,
Carmen Orden
10.3217/jucs-024-10-1403
28-10-2018
Unique: 352 | Total: 470
| Access Period:
1403-1423
HTML
XML
PDF
Research Article
Modelling of Automotive Engine Dynamics using Diagonal Recurrent Neural Network
Yujia Zhai
,
Kejun Qian
,
Fei Xue
,
Moncef Tayahi
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1330
28-09-2018
Unique: 335 | Total: 447
| Access Period:
1330-1342
HTML
XML
PDF
Research Article
Cloud Biometric Authentication: An Integrated Reliability and Security Method Using the Reinforcement Learning Algorithm and Queue Theory
A M N Balla Husamelddin
,
Guang Chen
,
Weipeng Jing
Part of: Advances in Security and Privacy of Multimodal Interfaces
10.3217/jucs-024-04-0372
28-04-2018
Unique: 342 | Total: 468
| Access Period:
372-391
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK