Register
|
Login
Full Text
Author
Title
Submit manuscript
About
Articles
Issues
Author Guidelines
Special Issues
Call for Papers
Imprint
Editorial Team
Contacts
Filter
Search
Full Text
Author
Title
by Subject
Topic A - General Literature
Topic B - Hardware
Topic C - Computer Systems Organization
Topic D - Software
Topic E - Data
Topic F - Theory of Computation
Topic G - Mathematics of Computing
Topic H - Information Systems
Topic I - Computing Methodologies
Topic J - Computer Applications
Topic K - Computing Milieux
Topic L - Science and Technology of Learning
Topic M - Knowledge Management
by Publication Date (dd/mm/yyyy)
from
to
by Publication Type
Research Article
(2694)
Editorial
(409)
by Journal
by Funding Agency
Clear filters
Powered by
76 items matching your criteria
Sort by:
Publication date newest
Publication date oldest
Total views
Unique views
Best match
Citations count
Highly accessed (last month)
Highly accessed (last 3 months)
Highly accessed (last 6 months)
Highly accessed (last year)
Filter By:
Subject: H.3.7 - Digital Libraries
Clear All
Copy link
RSS Feed
RSS Feed filters articles only by Classification type, Date (from/to), Publication type
1
2
3
4
5
Select:
All
None
Download:
Citation
XML
PDF
Export format
RIS
BIBTEX
Bookends
EasyBib
EndNote (tagged)
EndNote 8 (xml)
Medlars
Mendeley
Papers
RefWorks Tagged
Ref Manager
Zotero
Mods (xml)
Plain text (txt)
Download
Research Article
Retail Indicators Forecasting and Planning
Nelson Baloian
,
Jonathan Frez
,
José A. Pino
,
Cristóbal Fuenzalida
,
Sergio Peñafiel
,
Belisario Panay
,
Gustavo Zurita
,
Horacio Sanson
Part of: Traceable use of emerging technologies in smart systems
10.3897/jucs.112556
28-11-2023
Unique: 1550 | Total: 2365
| Access Period:
1385-1403
HTML
XML
PDF
Research Article
Customized Curriculum and Learning Approach Recommendation Techniques in Application of Virtual Reality in Medical Education
Abhishek Kumar
,
Abdul Khader Jilani Saudagar
,
Mohammed AlKhathami
,
Badr Alsamani
,
Muhammad Badruddin Khan
,
Mozaherul Hoque Abul Hasanat
,
Ankit Kumar
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94161
28-09-2022
Unique: 2318 | Total: 4172
| Access Period:
949-966
HTML
XML
PDF
Research Article
Automatic Detection and Recognition of Citrus Fruit & Leaves Diseases for Precision Agriculture
Ashok Kumar Saini
,
Roheet Bhatnagar
,
Devesh Kumar Srivastava
Part of: AI Empowered Big Data Analytics for Industrial Applications
10.3897/jucs.94133
28-09-2022
Unique: 2064 | Total: 3138
| Access Period:
930-948
HTML
XML
PDF
Research Article
Ordered Fuzzy Numbers Applied in Bee Swarm Optimization Systems
Dawid Ewald
,
Hubert Zarzycki
,
Łukasz Apiecionek
,
Jacek Czerniak
Part of: Research on Heuristic Optimization and Operations in IoT
10.3897/jucs.2020.078
28-11-2020
Unique: 1035 | Total: 1649
| Access Period:
1475-1494
HTML
XML
PDF
Research Article
A Semantic Web-based Representation of Human-logical Inference for Solving Bongard Problems
Jisha Maniamma
,
Hiroaki Wagatsuma
10.3897/jucs.2020.070
28-10-2020
Unique: 1008 | Total: 1656
| Access Period:
1343-1363
HTML
XML
PDF
Research Article
The Modified
Principal Component Analysis
Feature Extraction Method for the Task of Diagnosing Chronic Lymphocytic Leukemia Type
B-CLL
Mariusz Topolski
Part of: Progress in Features, Data, Patterns and Similarity Analysis
10.3897/jucs.2020.039
28-06-2020
Unique: 924 | Total: 1629
| Access Period:
734-746
HTML
XML
PDF
Research Article
Real-Time Bot Detection from Twitter Using the Twitterbot+ Framework
Kheir Daouadi
,
Rim Rebaï
,
Ikram Amous
Part of: Practical Applications of Data Analysis, Classification and Anomaly Detection
10.3897/jucs.2020.026
28-04-2020
Unique: 1047 | Total: 1924
| Access Period:
496-507
HTML
XML
PDF
Research Article
Cyberattack Response Model for the Nuclear Regulator in Slovenia
Samo Tomažič
,
Igor Bernik
Part of: Cyberattack Detection and Response
10.3217/jucs-025-11-1437
28-11-2019
Unique: 997 | Total: 1595
| Access Period:
1437-1457
HTML
XML
PDF
Research Article
High-Performance Simulation of Drug Release Model Using Finite Element Method with CPU/GPU Platform
Akhtar Ali
,
Imran Bajwa
,
Rafaqat Kazmi
Part of: Intelligent Computing for Society
10.3217/jucs-025-10-1261
28-10-2019
Unique: 1045 | Total: 1739
| Access Period:
1261-1278
HTML
XML
PDF
Research Article
The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach
Ziad Al-Sharif
,
Mohammed Al-Saleh
,
Yaser Jararweh
,
Ahmed Shatnawi
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1174
28-09-2019
Unique: 1060 | Total: 1693
| Access Period:
1174-1198
HTML
XML
PDF
Research Article
Determination of System Weaknesses Based on the Analysis of Vulnerability Indexes and the Source Code of Exploits
Andrey Fedorchenko
,
Elena Doynikova
,
Igor Kotenko
Part of: Recent Advances in Detection, Investigation and Mitigation of Cyber Crimes
10.3217/jucs-025-09-1043
28-09-2019
Unique: 1045 | Total: 1719
| Access Period:
1043-1065
HTML
XML
PDF
Research Article
Modelling of Automotive Engine Dynamics using Diagonal Recurrent Neural Network
Yujia Zhai
,
Kejun Qian
,
Fei Xue
,
Moncef Tayahi
Part of: Recent Advancements in Big Data Technologies and Applications in Computing, IoT and Computer Engineering Technology
10.3217/jucs-024-09-1330
28-09-2018
Unique: 808 | Total: 1069
| Access Period:
1330-1342
HTML
XML
PDF
1
2
3
4
5
This website uses cookies in order to improve your web experience.
Read our Cookies Policy
OK