Tags
data mining
classification
clustering
cloud computing
security
ontology
natural language processing
machine learning
image processing
genetic algorithm
particle swarm optimization
manet
social media
sentiment analysis
ant colony optimization
information retrieval
feature extraction
software engineering
routing
optimization
feature selection
big data
steganography
filters
k-means
scheduling
artificial intelligence
social networks
aodv
vanet
privacy
gpu
rough set theory
qos
surf
education
biclustering
rsa
pattern recognition
video processing
neural networks
neural network
hadoop
twitter
cuda
performance
computer vision
wsn
noise
edge detection
network protocols
encryption
association rule mining
project management
semantic web
opinion mining
vector control
artificial neural network
fpga
arabic
cryptography
breast cancer
prediction
deep learning
fcm
preemption
machine translation
sift
trust management
text mining
modelling
cognitive radio
spectrum sensing
mobility
wireless sensor networks
denoising
wavelet transform
svm
mobile applications
link mining
information security
multimedia analysis
machine learning methods
wavelets
correlation
compression
object tracking
opencl
quality of service
mapreduce
sar
bayesian framework
decryption
authentication
psnr
attacks
mimo
image
modeling
image segmentation
segmentation
simulated annealing
fingerprint
support vector machine
integration
cooperation
virtualization
wireless networks
incremental pair-patterns
bayesian belief network.
lossy-counting algorithm
fp-growth
model
pass transistor logic
induction motor
stemming
artificial neural networks
information extraction
dimensionality reduction
unsupervised learning
sgplvm
violence
mobile app
notification
correlation coefficient
distributed processing
chemotherapy
gesture recognition
digital signature
human computer interaction (hci)
cognitive disability
usability testing
mobile devices.
down syndrome
wireless
kfcm
gkfcm
hidden markov model
formal verification
distributed systems
algorithm
real-time processing
pedestrian detection
dbscan
energy harvesting
medium access control (mac)
big data analytics
higher education
processor
eigenvector centrality
fractal dimension
robustness
topic model
fault-tolerance
web usage mining
event
subnet
ubiquitous network
degree
induction motor control
direct torque control
decision trees
dictionary
traffic engineering
decision tree
named entity recognition
support vector machine.
usability
backup
data protection
probability model
clustered prior
compressive sensing
clustered compressive sensing
posterior
lasso
sparse prior
open database connectivity
legacy databases
flattened xml documents
open universal database gateway
data dependencies
data semantics
travelling salesman problem
soft computing.
meta-heuristic optimization
capacity problems
learning disability
reduct.
hausdorff distance
simulated annealing optimization
shape matching
medical image segmentation
affine transformation
gaussian filter
shadow and illumination correction
bird eye view
clustering of lines
hough probabilistic transform
mean value theorem on hough lines on curve
weighted centroids
lsb replacement
single mismatch
embedding efficiency
probability of detection
lsb matching
software project.
attrition
software outsourcing
software bug detection
predictive analytics.
longwall systems
machine diagnosis.
virtual environments
semantic modeling
virtual human
shared secret key
block size.
home of keys
symmetric
encryption key
vlad
hog
daisy
adoption
security and privacy concerns
healthcare
physician
linkedin
professional career.
online social networks
social data mining
data set
scraping
trust
wsns
wireless sensor networks.
event detection
lte
interpolation
leach
log skew normal
outage probability
plagiarism detection
network
recommender systems
alamouti
manets
visual cryptography
classification algorithms
adaptive automata
e-learning
rop
retinopathy of prematurity
canny filters
sobel operator
lab color space
laplacian filters
tweets
arabic language
ofdm
fuzzy clustering
intrusion detection system
metaheuristics
association rules
die size
malware
static analysis
multi-agent system
dpa resistance
modular inverse
private key
miller-rabin
stein
cryptosystem
crypto-accelerator
extended binary gcd
public key
metrics
rc4
rc2
des
aes
data type
data size
data density and encryption time
blowfish
triple des
skipjack
electromagnetic code
propagation modelling
near field zone
wimax
image correlation
spatio-temporal fuzzy hostility index
real time video segmentation
community detection
spam detection
email
spam
peptic ulcer.
soft computing
fuzzy inference system (fis)
database
systematic review
robot
fuzzy inference system
android
approximation
wireless network
flex
load balancing
mac
sensor
multi-tenancy
hevc
tabu search
histogram
expert system
camera tracking
planar template based tracking
visual odometry
k-means clustering
incremental tabulation for prolog queries
incremental evaluation of tabled prolog
cloud storage
image enhancement
wave atoms
wsq.
mapping
histogram based fast enhancement algorithm
contrast enhancement
histogram equalization
ct image
scalar quantization
software quality
complexity
software architecture
video surveillance
time series
scalability
differential evolution
face detection
image processing
coupler
circulator
microwave components
rectangular waveguide
p ower divide
siw
compliance and real-time change detection
support vector machines.
ontologies
fourier analysis
filtering
microwave
spatial
adaptive
speckle
formal methods
knowledge engineering
iris
face
ear
databases
ns2
block cipher
key
variable key
usb
pop3
xml encryption
symmetric key
smtp
confidentiality
simulation
payload
novelty detection
lda
mobile agents
software development
normalization
diabetic retinopathy
thresholding
texture
sensor network
web mining
soa
content based image retrieval
phishing
web application
mobile network
data center
vedic division algorithm
division algorithm
fast bcd division
architecture
industrial designs
tri-state inverters.
leakage power
gdi
simulations
mobile ad hoc networks
wireless sensor network (wsn)
coverage
arduino microcontroller
gps
road traffic
traffic management.
emergency vehicle
mobile application
traffic signal preemption
resource description framework
speech recognition; soft thresholding; discrete wa
blind multiuser detection
code division multiple access
inter symbol inter-ference (isi). multiple access
k-means algorithm.
radial basis function neural network (rbfnn)
lemma
lemmatization
hindi
fuzzy-logic
analogy based estimation
similarity difference
vehicle route selection and direction
road traffic analysis
support vector machines
spiking neural networks
fault detection &diagnosis
graph dual & set theory
pipeline
droplet
biochip
multi-core
local gradient
gpu.
steering kernel regression
cloudlets
cloud simulator
cloud ontology system and parameters
datacenters
detection
crater
astronomy
astrophysics
harq process
ack/nack
incremental redundancy
broadcast
point-to-multipoint
term occurrences.
sentence scoring
text summarization
software defined networking (sdn)
anomalies detectors
network monitoring
four-valued logic
philosophy of computer science
code generation
timed automata
formal method
rvq
mimo-ofdm
general source condition
multi-penalty regularization
learning theory
mandelbrot function
circle detection
case mouth defects
military cartridge
detection time
medical image
survey
smart contracts
blockchain
statistical en-route filtering
wireless sensor network
network simulation
maximum likelihood estimation (mle) algorithm
mean square error (mse).
cuckoo search optimization (cso) algorithm
lstms
recurrent neural networks
subsequence matching
music melody retrieval
music melody plagiarism
lean organization.
business analytics
data-driven decision making
ios & android os
mining reviews
app distribution platforms
app reviews
user satisfaction
user feedback
user rating
hyperspectral unmixing
volume constraint
distance constraint
relative capacity
grammar checker
grammar formalism
computational linguistic
image annotation
lstm
nlp.
intuitionistic fuzzy submodule
intuitionistic fuzzy ideal
intuitionistic fuzzy annihilator
intuitionistic fuzzy prime submodule
semiprime ring.
multirate signal processing
video
fourier transform.
medical imaging
fbmc
isdb-tb
channel estimation
wearable-computing
smart environment
interaction-scenarios
ubicomp
kpca
anfis
anti-phishing
cert center
avatar.
key terms summarizer
arabic sign langauge
accessibility
• algorithms and bioinformatics
• computer architecture and real time systems
• fuzzy mathematics
• fuzzy logic techniques & algorithm
mutual information
anomalies
k-medoids
imaging spectroscopy
hyperspectral imaging
hierarchical
frequency of rekeying
ad-hoc networks
timedriven method
group key management
rekeying operation
wireless mesh networks
joint design
multi-channel multi-radio
end-to-end delay control
massive mimo
multiuser mimo
pso.
hetnets
wireless backhaul
security and compliance management
security management approach.
outsourced it projects
data hiding
image hiding
color transformation
mosaic images
image encryption
load balancing.
geographic multipath transmission
wireless multimedia sensor networks
ip networks
syn flooding
hellinger distance
chi-square
sketch technique
forecast
holt-winters
arima
catalog
storage
r
grammar based data compression
perception-assist
elbow joint motion
motion change
vibration stimulation
textual analysis
edgar search engine
10-k parsing rules
textual sentiment
engineering accreditation
human aspects of engineering
human factors in software engineering
effort estimation
bug-fixing time
defects
defect prediction
software maintenance
academia
expert seeking
entity retrieval
dynamic range
multi-moduli.
binary
lcm
conjugate-pair
mp3
lsb
pedal operation
ankle joint
biarticular muscle
emg
muscle synergy
third wave of ai.
robotics
superintelligence
ai
mosaicking
diving performance
colour filtering
handwritten characters
hierarchical mixture of experts
discrete relaxation
point distribution models
arabic scripts
expectation maximization algorithm
in this paper
a novel wavelet-based detection algorithm is intro
the detection algorithm has been applied for the t
coloured petri nets
adaptive petri nets
adaptive decision tables
xml labeling
xml storage
xml compaction
binary encoding
proper names
arabic stemming
soundex
comparability measure
ascii
mother tongue
punjabi
keywords: nlp
unicode
font conversion
keyboard layout.
gurmukhi
attribute selection
ensemble
and classification.
stego-image.
maturity model
cyber-security.
computed tomography
brain tumor
bayesian fusion
wind speed prediction
wind power prediction
numerical weather prediction
video search
tags computing
social-driven
sdt
graph transformation
modeling composite service
service composition checking
dynamic service composition
neighbour filling
low resolution
super resolution
resizing
total least square (tls)
direction of arrival (doa) estimation
estimation of signal parameters via rotational inv
cyclic ambiguities
extreme programming.
location-based services
android studio
mobile application development
android sdk
pid
level control
computer-controlled system
process control
data acquisition card
electronic medical record (emr)
fog computing
electronic health record (her)
text extraction.
quantization
color space conversion
mean-shift algorithm
large-data sets.
clustering analysis
k-means algorithm
squared-error criterion
predictive analysis
korean wave (hallyu in korean)
anonymity
data sharing.
privacy protection
security integrity
arousal
eeg
multimodal human emotion
bci
valence
télécommunications
added value
heuristic and ai planning strategies
leadership
personalized recommendations
location based social networks
gis
google maps
bus routing
bus tracking
lacunarity
prognosis
image analysis
dataset
keyphrase extraction
real time image processing
apache kafka
computer-aided diagnose
transfer learning
retinal fundus images
landmarks
smile veracity recognition
smile intensity
keystroke
smart keyboard
human computer interaction.
predictive text
dqsmrp
tuned csa
& theory of flow
hofstede's cultural dimensions
gamification
time-delay estimation
underwater acoustics
room acoustics
source localization
big data.
background subtraction
nlp arabic language
supervised learning
digitalization
openskimr
learning roadmap
matching
lustre
life science
cloud
genomicsdb
intubation verification
textural features.
gaussian mixture models
sparse classification.
multimodal biometrics
autoencoder
implicit interaction
visualization
human-computer interaction
least-squares method
context information
collage image
image database
semantic analysis
image creation
computer vision performance
subjective quality
image quality assessment
packet scheduling
wdm networks
cognitive architectures
simulation of mental apparatus and applications (s
software agents
artificial general intelligence
cognitive automation
artificial recognition system (ars)
emotion
learning
psychoanalytically inspired ai
infectious disease expansion
connectivity.
ode
neighbour binary rules
deterministic compartmental models
wireless attack
wi-fi fingerprint
connected vehicle security
capstone project
live migration
shadow paging
dynamic page migration
flash-aware index
b-tree index
flash memory.
incident report
emergency response
disaster management
forward conversion
non-coprime moduli set
residue number system
no reference metric
motion blur
image sharpness
out-of-focus
sensors deployment problem
dynamic routing
heterogeneous networks
hpa nonlinearity
new waveform
mbofdm
ecma368
wpan
dynamic analysis
malware detection
ios
top management
cybersecurity
critical success factors
network and communication security
scada networks
code obfuscation
software protection
reverse engineering
security challenges
sdn
beacon
disaster
smartphone
embedded systems
alarm
pot
agents
potrooms
mindtool
lego mindstorms nxt robot
critical thinking
hidden markov models
statistical
computational linguistics
markov chains
system modelling
model checkers
model checking.
well-formed nets
policy
law
regulation.
betweenness centrality
real-world networks
small-world networks
random networks
text analysis
image recapture detection
hsv
blurriness & support vector machine
microarray
gene ontology.
genome annotation
datamining
functional analysis
genes
expression data
taylor-series
floating point division
iterative logarithmic multiplier
random network
small-world network
realworld network
terahertz
pa
100 gbps
rapp model
psss
internet of things (iot)
video forensics.
prnu
g-prnu
feature digitalisation
active shape model
facial expression recognition
computational complexity reduction
p2p
bittorrent
& synchronization
peer-to-peer
literature review
pioneers’ perspective
software maintainability and degradation
change impact
software evolution
change propagation
change ripple-effect
network security
network intrusion detection system
open source
cisco switch configuration & quality of service.
sparse principal component analysis
visual tracking
particle filter
single-channel speech intelligibility enhancement
gaussian mixture models (gmm)
deep neural networks (dnn)
multi-resolution cochleagram (mrcg)
dynamic-integration
services
heterogeneous
and heterogeneous-services.
secure group communication
group key
key tree.
sensing node
key management
dynamic software product lines
dspl
adaptive security
emoticon
social network analysis
uwb antenna
microwave imaging
lsb algorithm
aes algorithm..
degree of interaction.
time- interaction
digital interactive story telling
time dependant logic variables
timing
logic design
graph algorithms
graph processing
graph analytics
graph parallel computing
big graph
ieee 1149.1
dft
boundary scan
tmp controller
tap
jtag
ip core
low resource devices
lightweight cryptography
hight
digital signatures
concealed data aggregation
dydog
texton & coastal zone
obia
structure tensor
part of speech tagging
smo
sleep mode
header switch
leakage current
mtcmos
footer switch
delay and switching activity.
gate freezing
hazard filtering
balanced path delay
power dissipation
glitch
multiple threshold transistor
test case generation
test case optimization
harmony search algorithm
meta-heuristics
test data.
triplets
friendship graph
friendship matrix
short answer
risk management & information security
drug response
fractal
multifractal
histology
smart-home
indoor localization
multi-agent
fall
tele-health
point pattern matching
relaxation labelling
registration
graph matching
multiple support vector machines
yacbir
microsoft kinect
turkish sign language recognition
skeleton model
boolean formulas
symbolic expressions
dnf
cnf
knowledge management (km)
smart pls
indonésia
knowledge transfer (kt)
employees characteristics
knowledge performance
compatibility
trialability
communication networks
packet routing
setup delay
fault tolerance
security analysis
rsa cryptosystem
proxy signature
key agreement
permutation flowshop scheduling problem
parallel algorithm
metamodel
technological innovation mana gement
lessons learned
knowledge management
ssl/tls protocols
handshake protocols
skeletal muscle
multi-filter system
micro array gene expression
filter techniques
sharp objects
pa ttern match
surveillance behaviour
precautionary measures
real-time dynamic video
saml
federated identity management
management architecture
service mana gement
probabilistic model
character segmentation and recognition
number plate localization
number plate recognition
future internet
protocol
ccn
gossipi ng
local algorithms
distributetd data mining
multiproc essor and cluster
trajectory queries
mongodb
databases evaluation
postgresql
nosql database
cassandra
k-means clus tering
linear regression
random effect
tuition growth rate
decision tree
numerical function optimization
vo rtex search algorithm
modified vortex search algorithm.
emerging markets
conditional volatility
neu ral networks
gjr model
garch model
computer v ision
caffe framework
rust detection.
adaptive importance sampling
tunable pa rameters
msbn
ljf
software testing
continuous in tegration
fault localization
mutation testing
guidance process
development context
adaptation
configuration process
basel.
economical informatics
computer simulatio n
erlang c
erlang b
queueing theory
banking system
banking regulation
computer network
migration period
global optimization
para llel algorithm
data encryption standard
microprocessors
cisc and risc comparison
communication security
smart
c ryptography
sub-cluster
ch’
orphan nodes
o-leach
gateway
decision rule mining
associative regression
probabilistic rules.
bayes sentiment classification
radio channel measurement
multi-radio wmn
labelling
vertebra segmentation
mri
fuzzy term.
web log file
fuzzy association rules
optical character recognition (ocr)
artificial neural network (ann).
bottommiddletop layer (bmtl)
topmiddlebottom layer (tmbl) layer
hand written and printed character recognition (hw
service sector
mcdm
madm
moora
manufacturing sector
braille to text conversion
skew correction
skew detection
web spamming
feature selection & adversarial ir
content spam
spamdexing
sha-1
web cloud
file transfer
file integration
sql
final user
conceptual query language
analysis and performance study.
data dissemination
security screening system.
cross-language information retrieval
border security
weighted kaiser filter.
fetal heartbeat detection
non-invasive
uterine contraction
music spectral estimation
displacements
inter-event time
armada
probability distribution
data mining.
wearable wireless sensor based area network
e-health
m-health
training
empowerment
organizational commitment
job satisfaction
reward
telecommunications company
agglomerative clustering
categorical time series sequence
distance metric
intensification
rcpsp
scenario
grasp
uncertainty
feature model-based virtual cluster commonality an
virtual cluster disk provisioning
call graph
bidirectional search
static source code analysis
huge amount of source code
graph path
ieee/acm computer science curriculum
software job ads
software development curriculum
multiclouds
personal cloud
secure cloud architecture
public cloud
cloudify
appscale
cloud foundry
openshift
stackato & stratos
label ranking.
multi-label classification
learning object
technical skills
skills
human skills
conceptual skills
management competence
managerial skills
deadline
cloud broker
task scheduling algorithm
nist reference model.
intermediation
dynamic service allocation
knowledge capturing
multiagent system
scrutiny of admission forms
quality analysis
software development cycle
iso/iec 25051
ready to use software
evaluation process
iso/iec 9126
quality model
time dependant
functional response
signal processing
medical imaging analysis
fnirs.
smoke detection
data compression
long-term depression
long-term potentiation
compressed sensing
excitatory postsynaptic potentials
kurmanji
sorani
kurdish language
dialect identification
nlp
video database
hog features
fast search
belief revision systems
tabulation for logic programs
justification-based truth maintenance systems
truth maintenance systems
memoing for logic programs.
applications of justification-based truth maintena
distributed algorithms
overlay multicast tree
live streaming
hybrid
peer-to-peer (p2p)
model checking
graph distribution
state space generation
binary decision diagram
hash map
apriori algorithm
prefixed-itemset
large-scale cultural heritage
the grand canal 1. introduction
virtual scene construction
machine diagnosis
machine monitoring
processes & tools & languages
taxonomy
comparison
method engineering
threat modeling
cloud software development
agile methodology
scrum
software crisis
extreme programming
agile manifesto
load-balance
parallel processing
freshness
etl
high-rate
model-based design
embedded automotive systems
hardware-software interface
domain- specific modelling
functional safety
combining classifiers
time-series shapelets
attribute implications
nowledge discovery
engine design
negative attributes
formal concept analysis
apache storm
distributed stream processing
switched array
tan
altimeter
experimental design
orthogonal arrays
sampling theorem
digital signal processing
beamspace transformation
subarray formation
correlated noise
dft beams
cramér-rao bound
geometrical features
hsv appearance
human tracking
non-overlapping views
prediction of stock exchanges
reliability block diagram
software architecture style evaluation
heterogeneous sensor
haar-like feature
co-relation between economy and post-graduation st
we present an adaptive remote display framework co
we can skip unnecessary steps and perform core act
mobile device users can enjoy high quality multime
there is general concern about high power consumpt
as computing performance and network technology ha
indoor positioning
trilateration algorithm
location-based services (lbs)
distance-based filtering algorithm
indoor location tracking
tolerance relation
dilation
temporal databases.
erosion
fuzzy time intervals
temporal relations
dynamic weight
qos metric
weight
unified qos metric
application weight
inria person
daimler.
dct local
hol
dct global
security analysis of mobile authentication using q
cloud security
energy disaggregation
blued
density-based clustering
change-interval detection
nilm
non-intrusive load monitoring
selective opening attack
indistinguishability obfuscation
deniable encryption
functional encryption
decision justification
e-learning systems
2-simplex
cognitive modelling
2-simplex prism
psychosomatic disorders
cognitive graphics
decision-making
rate limitation
self-propagating malware
shared bitmap
connection failure behavior
stable marriage problem with ties and incomplete l
socially stable matching
bipartite matching
stable marriage problem
african national research and education networks (
latency
internet exchange points
software defined networking
educational management
data centre
item competence
active vehicle
processing delay
sensing energy
tag identification
computational rfid
mobile
analytics & cloud computing
web-scale
framed slotted aloha
medium access control.
internet of things
machine-to-machine
random access protocols
wireless lan
grouping
ubiquitous computing
chemical proprieties
group mutations.
frequency
dna sequence
dna bases
position
city services
cloud architectures
smart cities
cost estimation
joint network/channel decoding
network coding
wireless network.
cycle
distributed
tsp
parallel
radio cognitive
primary/secondary user
power spectral density
bpsk modulation
energy detection
image fea tures
cross-validation
cbir
image similarity
circular sectors
sensitivity analysis
remote sensing
lidar calibra tion
camera calibration.
lab test
learning algorithm
fea ture selection
icu
genetic algorithm
dispatching rules
single machine
privacy preserv ing
confidence interval
standard deviation
numeric signature
access control
rouge-su (2)
o pinion mining.
automatic language processing
automatic summary extraction
f- measure
text mining
sentiwordnet
evaluati on
op erating system
reinforcement learning
online machine learning
scheduler
decision tree.
predicti ve model
rheumatoid arthritis
cuckoo’s algorithm
adaboost
minimum spanning tree
data aggregation
fuzzy decision making.
cluster ing
wireless sensor networks
c ontinuses rule extraction
educational data mining
bee colony optimization
multi-obje ctive algorithm
cuckoo search
numeric association rule
higher education instituti - ons (heis)
critical success factors (csfs)
enterprise resource planning (erp) system
erp implementation
oracle
jdbc
intranet
java programming language.
ordbms
multithreads
applets
oop
public transport network
environmental optimizatio n
middleware
geographic informational systems
commodity of interest
multi-commodity n etwork flow optimization
linear programming
hybrid algorithm
graph theory
alogrithm
parallel.
maximum flow
extended mixed network
semantic relations
an tonym
pattern-based approach
random graphs
graph isomorphism
precursor step
match points
eigen values
safety and liveness property.
node monitoring protocol
validation
sdl (specification and description language)
verification
convolutional neural network [cnn]
convolutional deep belief network [cdbn]
supervised & unsupervised training
image processing & projection method
water meter recognition
dsp
diffusion of innovation (doi)
cloud computing adoption
technology-organisationenvironment (toe)
extraction
feed forward
comprehensibility.
document
unsupervised system
photocopy
fabrication
ocrs
autocorrelation
orientation
number plate
change of radix
re-integerization
matrix transformation
fractionification
gnu/linux core utilities
good programming style
information technogies
modified average distance self-relocation.
average distance based self-relocation
fidelity
embedding algorithm
joint watermarking
mobile security
video streaming
video-on-demand
3g network
multimedia cache
3gpp
sae
aka
umts
low power design.
high speed or gate
domino or gate
low pdp design
quantum cost.
urdhva tiryagbhyam algorithm
reversible logic
multipliers
vedic multiplier
dark channel prior
airlight
direct attenuation
image restoration
fog removal
document analysis
preprocessing
drop fall technique
water reservoir technique
hit-rate and peer-to-peer networks.
baton
bestpeer
hashtag
computational grid
ms
idle time
nsga ii
electrostatic force
van der waals force
proteins
active site
docking
data sharing & voluntary services.
rsu
ontology evaluation
web content mining
ontology learning
machine learning algorithms
deep web
latent dirichlet allocation
latent semantic analysis
form content and page content.
cosine similarity
topology
form content and page content.
latent semantic analys is
deep web
cosine similarity
latent dirichlet allocation
topolog y
physical environment monitoring
adaptive routing
testbed analysis
adaptive authentication
ssh tunnelling
nfs
hpc clusters
face-detection game controller (fdgc)
multi-view face detection
graphic processing unit (gpu)
real-time
spatial reasoning
geometric modeling
intersection detection
classification predicates
triangle-triangle intersection
gauss-markov
opportunistic
social
delay tolerant network
performance evaluation
hem-binding proteins.
function al motifs
conserved patterns
multiple ligand-bound structure alignment
atp-binding proteins
text informativeness
factual density
phase space
lyapunov exponents
ch aos
eo-1 hyperion
hyperspectral image
connected dominating set
s tability
variable radius
maximum likelihood solution
signal detecting
sphere decoding
smart phone application
distance calculation
java development platforms
blood donation information system
density of transisto rs.
number of transistors
feature size
crystal square
design complexity
cup-to-disc ra tio
optic disc
optic cup
fundus image
mainframes
live tiles
cics
t sq.
cursor positioning
node degree
asso rtativity index
network graphs
maximal clique size
distribution
clustering coefficient
transform domain
and largest lyapunov exponent
chaotic system
heart rate variability
lyapunov ex ponent
quality of service (qos)
long term evolution (lte)
ca rrier aggregation (ca)
downlink scheduling.
lte-advanced (lte-a)
adaptive hystresis controlle r
rules
weka classifiers
fault diagnosis
bayesian networks
3d models
vrml
3dmax
vr
arcgis
closeness &inter-connectivity
density
density peaks
k-nearest neigh bour graph
arabic dialogue language understanding.
spoken dialogue acts
arabic dialogue acts
annotation layers
graphical user interface
language resources
annotated corpora
annotation speed
language specific crawler
rule base syllable segmentation
myanmar language
comparable corpora
dictionary and corpus based wsd.
lesk algorithm
corpus-based wsd
acoustic model
hmm
digit speech recognition
grammar
association rule
a-priori.
internet
allocation
multipath
bandwidth
fast
kmeans clustering
texture description
unsupervised image classification.
bov
plsa
region of interest
resource scarcity
performance enhancement.
cloudlet
mobile cloud computing
testing matrix
mobile app testing
automated and manual testing.
personalised learning
collation formation
negotiation.
distributed design
fragmentation distributed xml
xml database
jitter
hardware schedule.
time-triggered/event-triggered
gait analysis &classification
mobile phone applications.
pedometer
tesseract
segmentation.
row finding
optical character recognition
verbal mwes.
nominal mwes
part of speech tagging (pos)
statistical measures
multiword expressions (mwes)
informal domain
conditional random fields
tweet
turkish
graphical models
expected utility
k-clique problem
principal component analysis
iris recognition
image quality
cross-platform
user experience
multiple user interfaces
knowledge management; higher education; lkmc; king
intra-cluster routing; payoff function; wireless s
archive
data recovery
data loss
facebook
social network services
text clustering
extractive text summarization
markov random walk model
rhetorical relations
smart cards
hough transform
time complexity.
fingerprint alignment
java card
cryptographic protocols
computer security
empirical evaluation
visualization and animation
min-based possibilistic networks
possibilistic decision theory
optimistic criteria.
moral graph
script-based cyber attacks; forward-proxy server;
code clone; software evolution; topic; topic model
prediction by partial matching compression
sentence alignment for machine translation
parallel corpus
arabic nlp
query generation
similarity computation
document retrieval .
classification.
virulence protein sequences
bioinformatics
attribute encoding
chaotic structure
tf-idf
complex network
game theory
welfare system
usable security.
online social network
multi-faceted model
partitions
bipartivity index
network graph
eigenvalue
eigenvector
molecular fingerprints
molecular representation
virtual screening
road region segmentation
sequential monte-carlo estimation
lane recognition
proposed scheme
monitoring the election
applications
qwertykeypad
model drive generation
business process
attributes quality performance
viewpoints.
software process
views
architecture enterprise
lte-a subscribers
red5
ria
web2.0
videoconferencing system
j2ee
queue length potential field
congestion control
traffic-aware
depth potential field
se-cca model
comprehensive advantages
aes cipher
dct
selective encryption
multimedia
imageprocessing
cvss
security evaluation
markov reward models
non-homogeneous markov model
attack graph
cyber situational awareness
dtn and manets
particular real world area.
performance analysis.
femtocells
resource scheduling
macrocells
medical diagnosis
island model
segmentation problems
drls model
interpolation filter
hole filling
depth images
siso
multi carier
mc cdma
diversity
distributed-stbc/dstbc
relay’s diversity
rayleigh fading
stbc
multi-hop system
cdma
middleboxes
network compression
energy conservation
big data mining
manuscript restoration
noise removal
gaussian bandpass filter
interference
correlated lognormal sum
characteristics and behaviour
metrics.
shadowing environment.
moment matching
asymptotic approximation
lognormal sum
arabic natural language processing
corpus linguistics
leach.
clusterhead
wireless sensor networks (wsns)
energy
existing approaches
mb-ofdm
snr
uwb
ber.
ola
ecma-368
cir
zps
task graph
characterization
frequent mining
stream mining
trust.
bio-inspired algorithms
artificial agents
virtual network
security configuration
virtual machine
software defined network
virtualized infrastructure
image depth
dietary inspection
lbp-hf
ofdm/oqam
ostbc
time reversal
genomic knowledge.
heuristic algorithms
microarray data
vanets
its
routing protocols
secret sharing
symmetric key.
random number
differential transformation method (dtm).
spherical particle; acceleration motion; inclinati
qubit model.
data structure
quantum computing
metadata
web crawler
searching relevance
tags
html
expanded mean value analysis
buffer allocation problem
closed queuing network
queuing theory
openflow
software defined networks
performance analysis
linear matrix inequalities
convex optimization
thau observer
ts fuzzy observer
airships
seamless mobile communication
cash identification using mobile
iranian cash identification
mobile phone extra usage
visually impaired assistant
mobile learning
technology acceptance model
structural relationship
mdd
traceability
feature models
raise specification language
atl.
group of pictures
bitrate
error rates
and video quality.
multiview video coding
semicircular patch antenna
dual band
l-shaped slot
gps-free.
rssi
localization
ad hoc
distance
general game playing
adaptive device
self- modifying machine
rule-driven formalisms
cooperating adaptive devices
reactive system
linear systems
lyapunov function
linear matrix inequality
dynamic output controllers
career assessment
profile matching
competency model
text categorization
dvb-t
parallel architecture
analog signal processing
image alignment
stereo correspondence & normalized cross correlati
motor drives
machine vector control
switching frequency
meta-heuristic algorithm
improved teaching-learning-based optimization
multi-agents system.
artificial immune system
invasive weed optimization.
multiobjective optimization
flexible job shop scheduling problem
smallest position value
boolean modeling
cellular automaton
apriori-cell
image-based rendering
wavelet im age compression
novel view generation of compressed images on andr
3d image warping
constraint programming; constraint satisfaction pr
mcf and ns-2
transistor count
microprocessor design
density.
hardware complexity
trilateral filter and in-loop filter.
continued usage
multi-attri bute decision model
cloud service
cloud service selection
smart-phones
dy namic analysis
information hiding
qr barcode
online information security
cla ssification
kdd cup 1999
intrusion detection
dimension reduction
incremental data
dynamic redu ct
rough set theory.
dtw
speech recognition
spce061a
pilot assist dec ision-making
classifie rs
low dimensional feature.
back-pr opagation neural network
scale invariant feature
perceptron network
character recognition
central server
dhcp server
arp poisoning
arp
jade
fuzzy log ic
distributed planning
elec tric field intensity
three- sigma rule
multi-layer a rchitecture
feature selection.
routing protocol
negotiation based routing
flat topology
cryptographic algorithm.
cpu
attributes & external software quality attributes.
refactoring
ad hoc network
mobility models.
packet delivery ratio
multipath routing
aomdv
walsh-hadamard transformation
rotation and classification
privacy preserving
wavelet thresholding
electric field intensity
threesigma rule
influence maximization
viral marketing
multi-layer architecture
qos.
cross layer
instance
relational model
owl
fact
savitzky-golay filter
watermarking
dct domain
feature points.
image normalization
query optimization
query caching
query decomposition
object databases.
stack based approach (sba)
stack-based query language (sbql)
part of speech
multiword term extraction
categorisation
summarization.
principal component analysis & fiducial points de
discriminative filtering
inductive logic programming (ilp); shiq+log; hybri
silhouette plots
improve performance
fiducial points & parameter grid
mobile computing
estimating software
high pass filter.
embed
arm
webcam
recognition
hand
system
sockets
raspberry
multipoint
coiflet transform.
nondestructive testing (ndt)
wavelet based deconvolution
defect detection
aspect extraction
customer reviews
opinionmining
diagonal process
georg cantor
enumeration
mobile development
mapping application
node replication; network security; energy efficie
packet
reconfiguration cost
switching networks
worms &trojon
virus
inter frame (p-frame)
h264/avc
intra frame (i-frame)
entity resolution
ownership protection
circulant matrix
singular value decomposition
digital image watermarking
rich internet applications
ajax
ria security
content delivery network
ria frameworks
compute cloud
web server.
portal infrastructure
self-service portal
cloud-based m odel
enterprise portal
text analytics
customer support.
speech analytic
multiplexing mechanism
dual-bit type (dbt)
word level activity
signal transition activity
digital signal processing (dsp)
thread-driven
event-driven
over-the-air
scheduling strategy
dag
task scheduling
ptg
workflow
hdfs (hadoop distributed file system)
map reduce
linear image filters
colour image processing
oil paint algorithm.
paint algorithm
image filters
gain ratio
pulse clarity
audio classification
system on chip
network on chip
3d architecture
graphcut
maximum likelihood
maximum a posteriori
user-preference
kansei engineering
interactive genetic algorithm
model transformation; institution; uml activity di
communication protocols
energy aware
comparative analysis
handwritten arabic characters
secondary component
clustering problem
multilevel paradigm
customization modelling
metagraph
software as a service (saas)
hoeffding tree
data stream mining
jazz
adaptive sliding window
infrastructure sharing
telecommunications
regulatory authority
human interaction
structuration theory
human-computer interaction (hci)
colour combinations
manual data entry
data typing
arabic language tools.
question answering system
8-bit dac
chinese abacus & dac circuit
decimation free directional filter bank (ddfb).
fingerprint image enhancement
coherence enhancement diffusion directional filter
factorization
backtracking.
crypto-system
primality test
system security
trust framework .
trusted computing
requirement quality attributes
vagueness
ambiguity
malay ambiguity
h.264/avc
transcoding
pu
fast algorithm
this paper presents a distributed software mobile
eye-tracking
saliency map
halbach permanent magnet array
magnetically levitated planar actuators
induced current
resource allocation
evolutionary computing
search based software engineering
genetic algorithms
classifier.
lbp
heterogeneous computing
microrna
low-ranking features
cancer classification
guided local search
parallel algorithms
cooperative algorithms
continuous optimization problems
quadratic neural unit
real-time-recurrent-learning (rtrl)
roller rig
back-propagation-through-time (bptt)
linear neural unit
unsupervised machine learning
e-mail
semantic orientation
praat
engineering knowledge
standard arab
modelling and representation of vocal knowledge
(tts text to speech)
dependency relations
global co-occurrence information
word sense disambiguation
non- negative matrix factorization
mammograms
n gram
bag of phrases
traffic
delivery problem
real-world
dijkstra’s algorithm
multicore
hierarchical cache
cache locality
parallel loops
cache-aware scheduling
bayesian belief networks
water quality assessment
particle swarm
adaption
mutation.
exploration
evolution
attention
sudoku
exploitation
satisficing
ecg
gradient descent
intransitive choice; preference reversals; recomme
facial aging; facial wrinkles; wrinkle maps; 3d wr
discrete cosine transform (dct)
variation-free
coordinate system
image watermarking
web mining.
fuzzy linguistic modeling
website classification
pitch analysis
mfcc
enlarged training set
emotion recognition
shearlets
image denoising
fuzzy logic
fuzzy rules
pre-ranking valorization
memoing.
tabulation
justification based truth maintenance systems
intelligent fuzzy control
zero-client
intelligent archiving
automatic document summarization
image fusion 1. introduction
underwater vision system
auv
distribution automation
reactive power control
voltage control.
isolated power systems
fuzzy inference systems
upper bound
lazy join
typicality
top-k query processing
automatic control
real time motion
collision avoidance.
motion planning algorithm
auto landing
quadcopter
flying robot
similarity measure.
software process modeling
adaptive guidance profile
process engineering
mono-slam
slam
mobile robotics
satellite
fft
encoding entropy
manufacturing logistics; mobile robots; path plann
run-time uncertainty
case-based reasoning
self-adaptive software systems
model-driven software
time series prediction
nonparametric regression
kernel regression
kml
3d global
flight trajectory
ossimplanet
open-source platform
pagerank
link similarity
coupling
maintainability evaluation
architecture style
cohesion
concept mining
morphological disambiguation
morphological analysis
audit; software quality assurance; risk management
automatic trading system
volatility strategy
velocity strategy
open interest contract
multi-objective optimization
protein structure
interaction network
semi-total replication.
partial replication
drtdbms
motion detection.
video segmentation
object detection
articulated object tracking
people tracking
kullbackliebler distance
variational inference
nvidia
mãe
rmse
sarima
web services
software performance engineering
optimization methods
humans
the human optimization
pig
netflow
network traffic
ict
telemedicine
information communication technology
outliers
heterogeneous.
median
transmission line extraction
uav
background suppression
lifting wavelet transform
snr & spcc
mean square error (mse)
audio steganography
theft security
eigen faces
surveillance.
opencv
haar classifers
pca
viola-jones
ladygaga
wom
hitphenomena
advertisement
coldplay
l’arcen- ciel
music concert
association rules mining
hybrid recommender system
asynchronous discussion group
software metrics
software life cycle
quality assurance
agile methods
discriminability
revocability and fuzzy commitment
cancelability
glcm
ica
bfgs
bss
evolutionary algorithm
biogeography-based optimization
partial migration
bbo
simplified bb o
single migration
bwt implementation
cis strategy
speech processing & fir digital filter.
cochlear implant
scaling
level set method
gpu programming
image segm entation
real-time system
drowsy driver detection
eye detection
haarcascade
image acquisition .
hfss.
hfss
wall-following robot navigation
robot control systems
policy management
policy managemen t
projection
over-stemming and under-stemming.
back propagation network.
neural model
chaotic spiking
etc.
control model
virtual machine security
multiple web pages
knowledge discovery and acquisition
branch handling
uniprocessing
processor performance.
prefetch
nasal; non-nasal; pitch synchronous; temporal doma
user requirements
scope definition
wbs
software scope verification
inspection
olap systems
materialized views
software size
class point
multilayer perceptron; simulated annealing; traing
fast fourier transform (fft)
wavelets.
wavelets.
maxwell's demon
non-rigid deformation
multi-resolution pyramid
optical flow
roi tracking
vector clock
event-b
mutual exclusion.
formal specifications
distributed system
lt
sdhtiwcia and message digest.
ilt
lsb-1
camms
ide
collaborative design.
plm
mbd
dmu
cc
consistent clusters.
evolutionary clustering
priors
z-transform; frequency domain; mean square error (
compression ratio
affine map
iterated function systems (ifs)
partitioned iterated function systems (pifs). 1. i
quardtree partition
fractal compression
fitting
action unit
facial landmarking
grey relational analysis
software estimation
feature weighted grey relational based clustering
crossover
otsu method
advanced sobel operator
chromosome.
health
communicable disease.
knowledge representation
ontology development
contextual model
academic networking
recommendation engine
transformer-less shunt hybrid active filter
shunt active filter
power quality
total harmonic distortion
zero crossing rate; peak valley detection; voice a
palm and finger
palm and finger print
modified lesk (ml)
word sense disambiguation (wsd)
bag-of-words (bow).
embedding secret message in quality song
tolerance level of embedding message
bit level encoding.
song authentication
perceptual coding
minimax search
awale
endgame
qos routing
tora
mobile agent.
agent based intrusion detection system (aids)
genetic algorithms; parameter control; parametric
roni
harris corner detection
fuzzy c-means
roi
key establishment
rdf
structured information extraction
semantic web.
sparql
key distribution
key generation
snooze attack ileach
classification;
e-learning; learning styles; ieee lom
urdu ir
optimal cost path.
flat-file-systems
land-type-data-bank
priority
digitized map
land acquisition
lsb-0
bt
ibt
authentication and message digest.
vanet architecture
phase shift keying
quantum communication
mode of operation
encryption oracle
stream cipher
mobile agent
handoff.
unsupervised classification
gram-schmidt spectral sharpening
sar ice classification
supervised classification
kappa coefficient.
multitenancy model
role-based access control
access control models
attribute-based encryption model
pso and tamper detection.
hash function
dabechies4
image authentication
java technologies
linear congruent operator
optical orthogonal codes(ooc)
3 dimensional
model b.
galois field (5)
cubic congruent operator
optical code division multiple access
optimal path identification
aco
ad-hoc network
opencl programming
python syntax
hpam
concept maps
novelty score
topic modeling
cyclic division algebra (cda)
effective channel matrix
reduced golden ratio golden code (rgr-gc)
bit error rate (ber)
low complexity decoding
security techniques
intrusion detection system.
multi-agent systems
mobile code
ml
fading correlation
mmse
cross polarization coupling
v-blast
zf
visualization.
cra
reconstruction
acquisition
benveniste algorithm
aclms
mathews algorithm.
clms
adaptive step size
qos routing.
hierarchical routing
abstraction
uml
use case
use case model
behavior
ocl
formalization
data
intensity
region growing
x-y-z image
object surface segmentation
gabor filter
minutiae
bifurcation
binarization
median filtering
exudates
spoofing
liveness
bagging
contourlet transform
intrusion detection system (ids)
denial of service (dos)
authentication.
v2v communication
vanet.
v2i communication
semantic similarity
web search engine
web snippets.
citation networks
citation analysis
citation sentiment analysis.
citation extraction
citation classification
service composition
semantic web services
service discovery
short word
short mail
wordnet
short text dictionary (std)
cepstrum.
zero crossing rate
fundamental frequency
short time energy
database compression
backup optimization
database decompression
real-time database
color image segmentation
dominant region
empirical analysis
average case analysis
computer experiment section
empirical-o
statistical bounds
theoretical analysis
automatic control system
micromanufacturing
nano positioning stage
image retrieval based on spatial features
semantic gap
semantic image retrieval
coverage loss time
node lifetime
maximum stability
data gathering
minimum distance spanning tree
mobile sensor networks
agile software development
mapping function.
pair programming
wiener filter
pap smear test
bayesshrink and sureshrink thresholding.
visushrink
knowledge base
cyber-crime
ssl
internet attacks
and parsing.
society
community
culture
humanistic
art
machine
biometrics; biometric fusion; face; finger; contex
framework
tagging software
dynamic topology
route trust
path trust
vm placement
vm migration
energy management
vm consolidation
decryption.
rfid
pir
wormhole attack
hierarchical clustering
hierarchical node addressing.
dsr
cache resolution
cooperative caching
dummy face
masked face
colour imposed face
tampering
facial recognition technology
remote class attacks
cyber security
outbound traffic.
inbound traffic
extrusion detection systems (eds)
intrusion detection systems (ids)
cyber space
incremental cluster-patterns
incremental cluster-patterns
incremental cluster-patterns
& cfg
sub-classification of ‘paas’
vanchipaa
venpaa
aasiriyapaa
kalipaa
performance and speedup
amdahl's law
chip multicore processor
mix-split
ramp code
fine-grained access control
non-perfect secret sharing
mix-split
ramp code
fine-grained access control
non-perfect secret sharing
requirements
organizational culture
people focus
stability
mobility models
connected dominating sets
algorithms
fault resilience
network lifetime
partition
self organization
retransmissions
ad hoc networks
throughput.
tcp
adiabatic circuit
full adder
ecrl
pfal
kin selection
overlay
peer-to-peer networks
genetics
altruism
selfish nodes.
ksordb
jargon word
concept.
synset
suspicious word
natural language processing (nlp)
over-stemming and under-stemming
etc
back propagation network
See more
- Presentations
- Documents
- Infographics