Tags
segmentation
security
steganography
feature extraction
wavelet transform
face recognition
image processing
classification
dwt
authentication
artificial neural network
encryption
cryptography
genetic algorithm
ofdm
svm
mimo
digital forensics
denoising
pattern recognition
performance
machine learning
edge detection
biometrics
natural language processing
fuzzy logic
dct
clustering
information security
data mining
image compression
watermarking
vector quantization
psnr
neural network
fusion
object detection
image registration
pattern matching
digital image processing
network security
cloud computing
neural networks
lattice reduction
image fusion
sift
independent component analysis
image segmentation
fft
robustness
wimax
computer vision
gene expression
routing
deep learning
principal component analysis
fractional fourier transform
hidden markov model
prediction
cbir
compression
wireless sensor networks
sentiment analysis
text mining
speckle noise
pca
image processing.
aodv
image enhancement
software engineering
digital image watermarking
ber
hough transform
multimodal
adaptive filter
reversible data hiding
matlab
k-means
behavior analysis
covid-19
contourlet transform
decryption
cognitive radio
mse
ids
surf
mobile computing
privacy
thresholding
discrete wavelet transform
biometric
remote sensing
image encryption
histogram
lms
semantic web
chattering phenomenon
data hiding
vanet
iot
feature selection
ediscovery
energy
support vector machines
speaker recognition
fuzzy
principle component analysis
imperceptibility
quality of service
steganalysis
simulation
fuzzy inference system
fuzzy sliding mode controller
filtering
corporate governance
numerical simulation
firm performance
hierarchical clustering
magnetic resonance imaging
information hiding
object tracking
preprocessing
trust
bioinformatics
transfer learning
intrusion detection systems
mobile security
nlp
user experience
wavelet packet transform
systematic literature review
corpus linguistics
speech
support vector machine
template matching
molecular docking
ann
papr
knowledge creation
medical imaging
spectrum sensing
electroencephalogram (eeg)
artificial intelligence
motion estimation
median filter
simulink
manet
ontology
gabor filter
data cleaning
digital evidence
haar wavelet
digital watermarking
information extraction
genetic algorithms
modeling
peak signal to noise ratio
fingerprint
grid computing
discrete cosine transform
image analysis
attacks
wlan
point cloud
complex k-best algorithm
fuzzy c-means
eeg
adaptive threshold
iris recognition
image denoising
som
gaussian mixture model
texture analysis
interpolation
entropy
qos
android
detection
bandwidth
gpu
phishing
principal component analysis (pca)
algorithm
sliding mode controller
sensors
color image segmentation
localization
throughput
gabor wavelet
image clustering
computer security
canny
compressive sensing
mathematical morphology
anova
super-resolution
channel estimation
correlation
speech enhancement
dtcwt
diligent drivers
ssim
image transform
jpeg2000
agent drivers
image
rgb
instantaneous frequency estimation
agents
read only memory (rom)
simulink.
hvs
speckle
digital phase locked loop (dpll)
field programmable gate array (fpga)
change detection
threshold
mobility patterns
graph theory
simulator
svm.
euclidian distance
lossy compression
facial expression
image reconstruction
lossless compression
taxonomy
effectiveness
network performance
car-following
cpm
ce-ofdm
congestion
fuzzy c-means clustering
blind source separation
adaptive filtering
real time
discrete cosine transform (dct)
short message service
evacuation time
reversible watermarking
computer networks
reputation
active shape model
fir filter
convolution code
jpeg
watershed transform
sliding mode control
computed tomography
black hole attack
iterative
maodv
odmrp
adaptive method
collaboration
wiki
performance analysis
security issues
voice
affect aware systems
smart and assisted living
smart home
affective states
human computer interaction
confidentiality
msb
mobile forensics
distributed systems
information technology
radon transform
filter bank
luminance
wireless
data security
access points
corporate social responsibility (csr)
face detection
reverse engineering
virtualization
accuracy assessment
wireless network
hill cipher
design
drug discovery
social media
ocr
distortion
malware detection
static analysis
dynamic analysis
grid security
mobile devices
huffman encoding
wavelet
big data
kinect
human computer interaction.
continuous wavelet transform
snr
fuzzy logic control
point cloud library
adversarial attacks
evasion attacks
point data pre-processing.
alert classification
thin plate
clahe
comparison
cloud
synthesis
digitization
kambaata language.
speaker identification
stemming algorithm
kfcg
dft
rule-based stemmer
kambaata stemmer
gaussian distribution.
stego image
applications
cluster
mfcc
wavelet packet
integrity
bitcoin
security protocol
software quality
usability
scheduling
mutual information
participatory ergonomics
gaussian noise
process migration
stereo matching
cbr
cycle spinning
lms algorithm
key management
fuzzing
teager energy operator
thrsholding function
walsh transform
human factors
artifacts
statistical modeling
multi-agent system
signature verification
wireless mesh networks
signal classification
chirp
usability testing
copyright protection
video processing
optical flow
electroencephalogram
brain computer interface
multimodal biometrics
internet
network qos
nlms
similarity
consistency
artificial neural networks
orientation
internet of things
image restoration
verification
dsp kit tms320c6713.
functional magnetic resonance imaging
scada
breast cancer
ecg
correlation coefficient
access control list
firewall
personality
fourier transform
data editing
classification models
airplane crashes
south africa
mobile learning
recognition rate
work organization
graphical user interface
ieee 802.11n
ipt forwarding
wireless backhaul networks
knowledge loss
knowledge sharing
wavelet transformation
agile software development
serial elastic actuator
mimo-ofdm
bond graph
optical character recognition (ocr)
count-to-infinity
network convergence
network reliability
adc
spectral analysis
offline signature verification
ai
superpixels
gis
information retrieval
hybrid
control
identity linking
email fraud
noise cancellation
facial expressions
product code vector quantizers
watermarking.
ar model
prediction.
solar cell energy
stenography
optimization
distributed algorithm
standard arabic
exascale computing
cuda
parallelism
quicksort
linear predictive coding
singular value decomposition
alert management
corpus
reduction of false positive alerts
diffusion
confusion
dicom
object recognition
setswana
survey
morphological analyzer and generator.
smes
sequential constructive crossover
phonetization
traveling salesman problem
bayesian networks
spectrum sharing
robot manipulator
pitch
spike sorting
mri
registration
umts
iterative soft decoding
se enumeration.
lesion
modulation classification
fcm
infrastructure
phonetic transcription
data embedding
mems
evolutionary algorithm
feedback
embedded system
iris patterns & brain waves
electrodes
lbs
network scenarios
covariance matrix
electroencephalography (eeg)
m-commerce
parallel processing
image registration.
manets
monitoring and surveillance
image watermarking
corner detection
concrete
it
canny edge detection
histogram equalization
cloud security
ipv4
ipv6
image contrast enhancement
fast handover
medical image compression
character recognition
precision and recall
image retrieval
feature space
scm
sequence video
multicast
molecular dynamics
metrics
hsv
wavelets
mobility management
information quality
supply chain
metric
vehicular ad hoc networks
peak signal-to-noise ratio (psnr)
voice activity detector
image quality
neuro image coding
handwritten character recognition
signal processing
particle swarm optimization (pso)
measurements
real-time
dsp
congestion control
k-nearest neighbor
nearest neighbour
pre-processing
spatial domain
security.
productivity
connectivity
super resolution
multi-hop
autonomous driving
performance evaluation
network
honeypot
retrieval
classification scoring
analysis
survey data
histogram.
malaria detection
mobile ip
handover latency
link layer information
noise reduction
unscented kalman filter
image quality assessment
decision support
lifting wavelet transform
monitoring
soft thresholding
adaptive interpolation
gprs
gps
embedded systems
kernel
fast fourier transform (fft)
wsn
search engine
rbc classification
wavelet analysis
smmes
target classification.
stationary wavelet
bicoherence
sybil attacks
similarity measure
malicious node
hos
traditional turkish art music.
histogram comparison
bispectrum
maximum likelihood estimation
time-varying autoregressive model
wax-kailath algorithm.
music information retrieval
dynamic key generation
basis functions
crud.
data at rest security
low-pass differentiator
multi-phase power-clocked adiabatic circuits.
finite-impulse response (fir)
cfar
image denosing
fault attacks
phased array radar
digital beamforming
jacobi symbol
mobile platforms
phase-shift
hrv
re-sampling
radar
anti-forensics
electrocardiogram signal.
dictionary learning.
sparse representation
phonetic database
htk
automatic segmentation.
maus
path tracing scheme
ad hoc network
sinkhole attacks
resolution enhancement.
earth mover’s distance
locally synchronous (ls)
undecimated double density wavelet transform
digital filters.
globally asynchronous locally synchronous (gals)
image resolution
elliptic curve digital signature algorithm (ecdsa)
static adiabatic logic
cryptography algorithms
compressor
carotid pulse
non-invasive
iir filter
montgomery ladder
b-spline
modular exponentiation
cepal (complementary energy path adiabatic logic)
adaptive beamformer
implementation
2d object filling
object filling
non subsampled conoturlet transform
: face recognition (fr)
radon transform (rt)
ertu
leaf area.
leaf morphology
perimeter
yellow rust
spiral band.
dvorak technique
elliptic fourier descriptors
cyclone cloud intensity
svm classifier.
handwritten hindi text
shape based features
bayes classifier
mrf.
skin color detection
neural networks.
dpcm
backpropagation
daubechies wavelet
situation assessment
median with weight
correlation distortion metrics
additive noise
nonlinear image restoration
monochrome image denoising
sfcm
volumetric image compression
cumulants
indian scripts
nonlinear mapping
electronic nose
radial basis functions
multilayer perception
regularization
model validation
inverse problems in image processing
cross-validation
protection
neural network.
noise removal
dialation morphology
morphology operation
preferred color
memory color
multiple-kernal.
gaussian kernal
spectral reflectance reconstruction
adaptive pseudo-inverse
colorimetry.
quadrature filter
active contour
linear structure tensor
space technology
satellite images
electro-optical sensors.
orthogonal transforms.
key frame
similarity measures
color matching.
bcc
melanoma
skin cancer
scc
tumor extraction
level set method.
co-clustering method
object holes
scaled conjugate gradient.
sliding window amplitude feature
contour feature
transition feature
low level visual features
color
categorization of objects to artificial and natura
objects' super-class categorization
local and global features
frequency.
cut-out style animation
background replacement
magnets.
video compression.
quad-tree
normalized cross correlation
flexible cystoscopy
zero-mean normalized cross- correlation
handling pattern.
position tracking
skin color model.
skin tone
seamless cloning
poisson editing
image inpainting
spectral correlation matrix
hyperspectral compression
band regrouping
multi-gene genetic algorithm
teleradiology
dual watermarking
adaptive compression
multiobjective fitness function
froth flotation
mean sum of absolute difference
:maxima modulus
maxima modulus chains.
principal component analysis(pca)
contourlet transform(ct)
frequency localization
color image watermarking
flame photometer
wiener filter
medical equipment
color embedding and retrival
color to gray and back
counterfeiting
multicast.
ecdlp
dynamic byte substitution
sub key groups.
pseudo-random numbers
least significant bit.
embedding data
sbr algo
password security
password utilization
password management.
spatio-temporal shape variation
a priori knowledge
scintigraphic sequences
boosting
survey.
remote sensing images
gray- scale morphological analysis
structuring element
fuzzy set
ground truth
bsd (berkeley segmentation database)
area analysis
rooftop detection
otsu’s thresholding
sparseness
hessian evaluation
ggvf
anisotropic flow
edge extraction
active contours
spatial convolution
wavelet lifting scheme
longest string
correlation distance
prcp
moments
lsrr
minkowski distance
indoor-outdoor image classification
color correlated temperature
color segmentation
image-based fusion
data fusion via non-linear convolution
multi-senor data fusion
skin color enhancement
multiscale transformation
colorization
color space
spatial domain embedding
stegnography
dominant point detection
nonparametric
non-heuristic
error bound
ellipse detection
fluorescence microscopy
bio-cell organelles
edge sharpener
color models
evaluation metrics
learning method
fast discrete curvelet transform
motion detection
sobel
image subtraction
compressing image
interpolation method
svd method
microarray
human recognition
key-points
musculoskeletal injuries
physiological risk
3-d radon transform
linear discriminate analysis (lda)
advanced encryption standard(aes)
s-box
dynamic s-box generation
roaming
handover
component steganalysis
distortion metric
audio quality measures
master node
updated database
secure architecture design
semantic message addressing
zrp
dsr
dymo
fair share
fair share scheduling
resource allocation
anti-phishing mechanism
cch
image clustering and retrieval
biometric levels
physiognomy
psychometrics
ophthalmogeometry
gunas
value at risk
archimedean copula
dependence
weibull distribution
wavelets transforms
cosine transforms
security system
fingerprint matching
image manipulation
biometric watermarking
edge block analysis
template quality analysis
biometric template security
template invariability
vancomycin resistant genes
plasmodium sp.
enterococci sp.
sequence analysis
giemsa
falciparum
vivax
malariae
mammograms
speech compression
network architecture
one-class-in-one-network (ocon)
all-class-in-one-network (acon)
quality model
quality metrics
stakeholders
quality assurance
non-blocking approach
fault tolerant
co-ordinated checkpointing
mobile computing system
attack
chained codes
complexity
audio watermarking
multiple scrambling
mobile communication devices
watermark
shape adaptive-discrete wavelet transform.
visual model
end user license agreements
distributed software and license key management
user datagram protocol
packets
packet loss
mobile ip handover
distributed denial of service
email
discreet wavelet transform (dwt)
operating condition
line support
forces
signature
real time ids
intruders
network discovery
underwater acoustic network
protocol
permutation entropy
stuttering
time series
correlation dimension
server node (sn)
cluster head (ch)
network lifetime
wireless sensor network (wsn)
embedding strength parameters
wavelet fusion
drive test
mobile phones
hand-offs
lexisearch
bound
bottleneck traveling salesman
alphabet table.
multilayer perceptron and face recognition
survey paper
virtual instrument.
labview
field winding
housing complexes
pv-utility
solar system
oil price
investment
pricing policy
user equilibrium
managed lanes
low-snr.
spike classification
principal-component analysis
linear discriminant analysis
drug discovery.
inference network
chemical databases
molecular similarity searching
np-complete
spoofing
telecommunication
dynamic training
electrical impedance tomography
alopex algorithm
divided electrode method
equivalent circuit model
query rewriting
friction coefficient
surface film
partitioning
design trotter
profiling
heat sink
spice model
peltier effect heat pump
asynchronous adder
vhdl simulation
carry save adder
synchronous adder
unsteady and steady jet
pulse jet
flow separation
vortex formation
mass flow rate
mixing enhancement
er
nonlinear permanent progressive wave
steep water gravity waves
adaptive observer
nonlinear systems
margin parameter variation
ground effect
cylindrical jet
jet separation
renewable energy
minimal transversals
image feature extraction
hybrid classifier
subcellular phenotype images classification
geraniol
cymbopogon citratus
aldose reductase
myrcene
citral
multi-resolution analysis
signature identification
dna microarray
soft computing
pathologist
case-based reasoning
clinical support system
dna sequence
index structure
large database
rdms indexing
sequence transformation
complex object
uml-bd
fingercode
fingerprint recognition
hyperline segment
fuzzy neural network
gaussian mixture model (gmm)
electromyogram
xml
proteomics
protein annotation database
jevbase
functional database
svmprot
japanese encephalitis
prognosis
heavy metals
bioremediation
biometrics identification
minutiae points
singular points
face alignment
query gene
gene ontology
top-down approach
biclustering
gene expression data
clinical trial
basic research
data manipulation
health management
data monitorinh
compression gain
biological sequences
chromosome
cross chromosomal similarity
identification
multicast routing
delay and cost.
stream processing
environment metrological data
pki
pmi
kerberos
an improved trust model
x.509 standard
framework
kenya
3d face model
nearest neighbor
virtual images
3d shape
bilinear pairing
cdh problem
multisignature scheme
public key cryptography
proxy signature scheme
investor agent
mfc super market
user agent 1
user mobile agent 1
secure electronic transaction
banker agent
effectivenes
arabic language
weka
jrip
three dimensional database
ecommerce
dynamic web
mutual exclusion
token
critical section
computer crime
internet security
resource efficient
fault tolerance
byzantine faults
pretty good privacy (pgp)
secure socket layer (ssl)
trusted third party (ttp)
associative rule mining
sequence derived features
amino acid
forensic investigation
digital crime
search & seizure
image recognition
weight matrix
associative memory
ant colony algorithms
multimedia communication
multicast tree
information retrieval performance analysis
hu-moments
classifiers
cross-validation.
haralick
knn
rbf
dermofit.
oil pipeline
leak detection
pump failure.
mass balance
arrhythmia detection.
aliasing
heterodynes.
reconstruction
sampling
extracellular recording.
matlab® toolbox
network analysis
bio signal processing
modulation recognition
non-parametric.
vertical box control chart
rls
benes network
all-optical network (aon).
optical network management
optical cross connect (oxc)
information retrieval systems
diacritics
cluster heads
cloud architecture
crossing number
post-processing algorithm
afis
multi-bands wavelet
semi blind watermark detection
auto-flushing
low operational power
rfid module
line follower
robotic arm.
mathematical model
ebola virus disease.
epidemiology
infected
epidemic
sir
recovered
susceptible
parametric stereo.
mdct
parametric audio coding
sign language recognition
height to width ratio
ycrcb color space.
pan sharpened multispectral image
role based access control rbac
caching technique
business process management system bpms
convergance
diifferent variants
adaptive
step size
dm5.
multi agent system
lunix read hat
platform
distributed secure system
access write
net
non-ocr
captcha2
ocr (optical character recognition)
hijacking
botnet
peer-to-peer network
embedded zerotree wavelet
set partitioning in hierarchical trees
cr
cad
metadata
logistic regression
medical dataset
sensitivity analysis
simple mail transfer protocol
visualization
knowledge discovery
security framework
security analysis
computer attacks
expert system
anomaly detection
distributed data mining
wireless sensor network
system reliability
stochastic-flow network
alert clustering
false positive alert reduction
tcp syn flood
tcp header
ip header
three-way handshake
rate-based detection
lbg
kmcg
code vectors
optimized multiple huffman tables
omht performance analysis
image encryption and compression
concept mapping
digital investigations
case domain modeling
classification accuracy
security maturity model
security self study
maturity model
security measure
black box
mirroring
network backup system
raid
backup
nir
node
our-nir
svm classifier
otsu thresholding
symmetric encryption
hash algorithm
a symmetric encryption
concurrent programming
parallel programming
matrix multiplication
multi-core processors
communication protocol
parallel genetic algorithms
job shop scheduling problem
asymmetric key
nonlinear system
cryptographic algorithm
data compression
aco
fake website
association and classification technique
payload
facial recognition
training image
discriminate
lda.
audio- visual client recognition
multi-model biometric system
one time pad
arithmetic coding
hexadecimal
network connectivity
twin
typographic
multilingualism
computing
diacritical marks
sparse random projection
centralized defense
source address entropy
deployment
traffic cluster entropy
distributed defense
ddos
handicapped
internet brwosing
phased arrays.
time dissemination
bhattacharyya distance
p-wave picking
seismic data.
seisming signal processing
chaotic communication
error probability
sequences
iterative soft decoding.
k-best algorithm
sparse recovery
relaxation methods
greedy algorithms
lms approximation
sub-nyquist rate.
digital forensic investigations.
data carving
cloud storage forensics
data remnants
cloud application artifacts
indian sign language
category-level
map-level
image classification
comparison.
accuracy measures
medical image
contourlet transform.
node path
graph network
friendship link
online social network
multifaceted text categorization
arabic natural language processing
hierarchical text categorization
oromo language
computational methods.
lexical distance
levenshtein algorithm
oromo dialect
ontology learning systems
ontology engineering
ontology learning
ontology evaluation.
weak signals
similarity function.
decision making process
anticipative information
bi-directional
gpsr
omnet++.
sumo
tiered storage.
storage virtualization
array signal processing
calibration
wavelet.
sad.
stereo vision robotic
correspondence algorithm
l0 sparsity
blind deconvolution
image restoration.
directional filtering
deblurring
motion blur
high dynamic range imaging
ghosting artefacts
single shot imaging.
multiple exposure fusion
face turn detection.
eye blink
alcoholic detection
heartbeat
passive detection.
resampling
image forgery
golden section search.
brightness preservation
human visual system
back propagation neural networks
robust.
imperceptible
zernike moments
contactless biometry
sampled data circuits
multivariate regression.
eigenfeatures
three-dimensional face shape
shape from shading
sine transform.
fresnel transform
cosine transform
diffraction
blood cell analysis.
extreme learning machine (elm)
smart phone
discrete wavelet transform (dwt).
cover image
adaptive scaling
lwt
entropy.
contour detection
illegal sand mining
color based segmentation.
ebcot.
spread spectrum (ss) watermarking technique
quantization index modulation (qim)
anaglyphic 3d images
robust watermarking.
feature extraction.
content-based image retrieval
semantics
spatial filter
cost benefits
higher education
cost estimate
surveillance
anomalous events detection
foreground detection
frame extraction
background subtraction
erp success factors
erp
enterprise resource planning
saudi arabia
residual coding
redundancy.
low rate wireless personal area network
ieee 802.15.4
key management system.
lr-wpan
social networks.
covert channels
keylogger
os (operating system) high performance computing [
chip multi-core
software challenges
microprocessor
benchmark
ping-pong effect
cpu affinity
tfc
information system
information-security measurement
time complexity.
grouping comparison sort
merge sort
sort
quick sort
task management
browser
web.
guidelines
revisit
lookup table (lut)
color management system (cms)
paper check print.
colorimetric reproduction
inkjet color printer
customer knowledge
technology acceptance model.
e-banking
xor
key sensitivity.
digital signature.
icn
denial of service
erasure coding
forward error correction.
data reliability
coercion-resistance
intra-operator
agreement
measurement error
body dimensions
inter-operator.
job performance
workforce requirements.
future skills
organizational skills
intention
organic food
consumer behaviour.
fault detection and isolation
zero gravity control.
eigenvector
trajectory planning.
free-configuration space
motion planning
formation.
vtol
flocking
under-actuated
customer
mobile usability
mobile transaction
it innovation acceptance
souq.com
reference chain.
joint encryption and error correction
social media security
cyber threats.
xkeyscore
heartbleed detection
ssl
beast attack
crime attack
tls
rc4.
mobile-learning model.
adaptive of mobile learning
cache poisoning
dns
dnssec
dos
dns hijacking.
banking security
chip and pin
atm.
gammachirp filter
impulsive noise.
nfc.
e-payment
electronic voting.
hybrid encryption
incoercible encryption
receipt-freeness
deniable encryption
edge antimagic total labelling
cycles
fan graphs
paths
conversion relational schema into xml schema
xsd schema
transformation schema
xml schema.
multinomial
specificity
misclassifications.
group
re-test
sensitivity
educational assessment
e-learning
multiple choice questions generation
unsupervised relation extraction
biomedical domain.
automatic assessment
dynamic capabilities
external competencies
external environment.
relationship capability
optimism and overconfidence
regulatory focus theory
strategic key performance indicators.
benchmarking procedure
escalation and deescalation of commitment
type inference algorithm
principal type scheme
types
verbal protocols.
think-aloud studies
human computer interaction (hci)
contextual design
mobile apps.
context aware
user interface design
mobile user interface guidelines
context of use
electrodermal and cardiac activities
safety
driving simulator
cerebral
time constraint
mental strain
traffic behavior.
seat comfort index
seat comfort modeling.
efficient algorithms
skip list
web search.
friendship graphs.
wheels
edge antimagic vertex labelling
graph labeling
region merging
wire crossover
majority gate.
quantum dot cellular automata
ode converter
clock zones
extraction and classification.
qrs detection
ecg biometric
parallel computing toolbox
matlabmpi.
biclustering analysis
high performance computing (hpc).
openmp
exaflops.
opengl shading language
opengl
software product line
feature model
extraction method review
classifying true positive alert based on their att
security alert classification
intrusion detection system
zeus
cryptosytem
toolkits
mitigation
botnets
botmaster
super edge antimagic labelling
service quality
employee job satisfaction
private hospital.
commercial analysis.
website technique
heat affected zone (haz)
brinell hardness number (bhn)
metallography
ultimate tensile strength (uts)
weld factor.
social engineering.
radio frequency identification (rfid)
electronic product code (epc).
internet of things (iot)
waste collection
travelling salesman problem
simulation-based optimization
real-world case study.
multi-scale urban analysis.
urban growth
land use change
2d variance.
shot detection
motion vector
video segmentation
social engineering
wavelet shrinkage process.
noise estimation
trojan
network monitoring
morphological operation
diseased fish images
performance.
measurement
image steganography
mean square error (mse).
pixel value difference (pvd)
privilege
personal computer
web links
smart phones
user interface.
semi-restricted
authentication.
customer trust
wap security
dos attack
ntp
penetration testing
icmp
honey pot systems.
packet loss.
global position systems
threshold value.
data envelopment analysis
constant return to scale
super efficiency
clbp
forecast
silica sand
demand.
algorithms
mahalanobis technique.
contact angle
development length
recycled steel
reinforcement bars
yield stree.
load disturbance.
pid control
dc motor model
closed loop
speed control
malaria classification.
binary classification
misclassification error rate (mer).
gaussian bayes classifier
outlier modification
top de genes selection
netflow
bot botnet
threat
behavior analysis.
nfsen
nfdump
rural employment
social intent
voluntarism
technology implementation
diffusion of innovation
change management
culture
mathematics
tangible manipulative
membership function
fuzzy number
? -cut and ? - level fuzzy midrange.
fuzzy control charts
statistical process control
knowledge hoarding.
model matching control.
modulo adder
residue number system
multiplexer
binary to residue conversion
moore sequential
s
logic circuit
connective
semint specific parser
propositional logic
propositional variables
compound proposition
truth table
worm
computer crime.
computer forensic
digital forensic
time stamp
reversible.
frequency domain
watermark detection
watermark embedding
robust
simulation.
business continuity
rpo
disaster recovery
rto
deadline
scheduler
hyper threading.
security alert management
real-time security alert classification
precise classifying true positive alerts.
intrusion detection
msldip (modified substitute last digit in pixel)
enterprise.
forensic
namoelectronics
nanotubes
nanotechnology
skewed economic growth
discrete sine transform
sub bands.
image compression.
mae
hybrid transform
zone
blob
boundary
dilation
centroid
bounding box.
script
ultrasound imaging.
despeckling
image classification.
xinjiang high morbidity of kazak
esophageal cancer
comprehensive feature
shape from focus
3d shape recovery.
multi-scale morphological sequence
high spatial solution
spectral - space characteristics
tumor.
cerebral mri images
scene image.
bayesian logistic regression
bayesian network
pose correction
bpnn
video features.
audio features
movie recommendation
emotion recognition
connotative features
unsupervised learning
image categorisation
dimension reduction.
fixed-language
pre-processing techniques in character recognition
training neural networks
gabor filter.
strokes
obr
recto
braille
eight-connectivity
connected component labelling
verso.
object classification.
steiner tree
wavelet transform.
image gradients
eyes-free computing
skewed barcode localization & scanning
cloud computing.
realtime
background detection
visual basic 6
assembly simulation
modular fixtures
solidworks api
nuclear power
iran
load frequency control.
interconnected powersystem
modelling
river
sediment
pbt
ucs
subgrade
dcp
shear wave velocity (vs)
south of tehran
liquefaction potential index (pl)
standard penetration test (spt)
liquefaction
epon (onu
hybrid fiber-wireless (fiwi) access networks
onu-bs
automated social engineering (ase)
social networking sites (sns)
wimax bs
olt)
direct torque control
multiresolution
texture map and principal component analysis.
spectral transformations
depth map
rotation invariance
cuda.
key based scrambling
scrambling
discrete hartley.
dst
real fourier
sinusoidal transforms
quantitative segmentation evaluation
automatic segmentation
imagej.
binarization quality assessment
intensity thresholds
lcp.
cephalometry landmarks
reeb graph
maximum range block size (r max )
canonical classification
minimum range block size (r min )
psnr (peak signal to noise ratio)
affine transformation
cr (compression ratio).
histogram based thresholding
object detection.
blank background images
spatially confined nmf.
non-negative matrix factorization (nmf)
partial face occlusion
local nmf
quality assessment
pixel level
high resolution satellite imagery.
object level
codebook
rac
fast-rnn
microstructure.
smsf
gamma
human vision
hsb
hsi
light.
standard deviation factor.
pixel to noise ratio
mean square error
laplacian of gaussian
half width factor
least significant bit (lsb).
receiver operating characteristics curve.
fisher faces
local binary pattern
clustering.
pedestrian counting
j48
block matching
feature vector
target detection
clutter rejection
fuzzy clustering
fuzzy gustafson-kessel (fgk).
data normalization
knn.
tm
wavelet decomposition
chaos game representation
hci.
facs
correspondence.
stereo vision
image matching algorithms
mser
local binary pattern (lbp)
enamel
dental radiograph
dentine
caries
isef
pulp
rct
dentistry.
patterns.
centre-pixel-weighed.
exponential filter
centre-pixel
autonomous cars.
traffic signs recognition
m-pcnn.
polsar
nsst
multi-spectral data fusion
grey world assumption.
skin detection
white patch retinex
color constancy
gaussian distribution
full-reference quality assessment
perceptual weights.
extreme learning machine.
document segmentation
discriminative classifier
automatic image annotation
bayesian networks.
generative classifier
one to one.
conjugate symmetry
mirror
lip reading.
3-d dwt
2-d dwt
dmey wavelet
handwriting analysis
invisible watermarking
imperceptibility in watermarking
intermediate significant bits (isb)
alzheimer
neuroinformatics.
bilinear interpolation
cerebral cortex
brain imaging
hyper chaotic system
peak signal to noise ratio.
digital watermarks
self-reversible embedding
encrypted image
complexity.
levenberg-marquardt
training
multilayer perceptron
scaled conjugate gradient
local keypoint descriptor
sift descriptor.
keypoint orientation
keypoint matching
artificial neural network (ann).
thinned binary image (tbi)
offline signature verification system (svs)
freeman chain code (fcc)
homomorphic filtering
ct image
template averaging
pca features and svm classifier.
cognitive biometrics
power spectral density.
dna sequencing
de novo assembly
olc assemblers
overlap-layout-consensus
overlap detection
whole genome shotgun assembly.
capture
hypertext and hyperlinks
document management
storage
vpki
tpd
crl
iriscode
cancelable biometrics
bioencoding scheme
data visualization
applications of data mining
business intelligence
database systems
estimation and planning
agile methodology
agile model
confidentiality model
privacy model
message digest
healthcare
medical images
isoflavone
ochna squarrosa
estrogen receptor
biometric-data indexing
index key generation.
face identification
mit/bih database.
electrocardiogram classification
individual patient recognition
cartilage
knee joint
osteoarthritis
constrained optimization.
evolutionary algorithms
genetic restoration
arabidopsis thaliana
heating into the fresh air.
fire resistance
antivenom drugs
molecular docking.
combinatorial screening
sequence alignment
superimposition studies
phospholipase a2
curvelet transform
key share
clustering technique
threshold cryptography
misbehaving nodes
trust count
learning vector quantization
true positive and false positive classification
codons
evolutionary tree
mtdna
short path routing
network routing
link cost
encrypted
vertical database
regular patterns
data streams
resource monitoring
scalability.
l*a*b* colour model.
malaria parasites
knowledge building
tools
pedagogy
constructivism.
online learning environment
blog
vulnerability measurement and penetration test.
security threats
feature level
information security model
flooding based denial-of-service (ddos) attack
data analysis
data integration
zero copy
security/perofrmance tradeoff
thorup
adjacent node algorithm
heuristic genetic algorithm
single source shortest path problem
dijkstra
mcommerce applications
smartphone
location
embedding algorithm
threshold value
expanding the near wall zone
pressure flow
combination of pressure and couette flow
design phase
machine leaning
security vulnerabilities
multiple paths
mini-sink mobility
overview
image files
current techniques
adaptive steganography
turbine-column combined device
wind effects
vent column
natural ventilation
surface inspection of ceramic tiles
avis
classification of tiles
porous media
forced convection heat transfer
phase change material
adaptive methodology
fuzzy lookup table changed sliding mode controll
fuzzy logic methodology
poundo yam
process plant
manufacturing
secured data
text stream
vehicle acoustical comfort index
vibration
sound quality
vbration dos value
naca 0012 airfoil
flow control
blowing amplitude and coefficient
lift and drag coefficients.
blowing
ode45
disadvantages
indirect matrix converter.
active learning method
reactive distillation
ethyl acetate
dynamic models
percentage residual
computed torque controller
unstructured model uncertainties
baseline tuning computed torque controller
chattering free
matlab/simulink
puma 560 robot manipulator
method
nonlinear position control
computed torque control
cmos
pdp
csd multiplier
stscl
white-noise
stochastic linearization
hysteretic damper
connected structures
uncertainties
robot arm
nonlinear controller
chattering free mathematical error-based tuning sl
thermal buoyancy effects
network.
analog multiplexer
automotive industry.
ocb
hr variables
performance measurement
power electronics
converter
control dynamic behavior.
gene finding
motif finding
normalization
quantile transformation
frost filter
fuzzy level set method
cage
5'end mrna
gene expression profiling
transcription start sites
gene regulation
next generation sequencing
reference assembly
colour space code
smith-waterman
parrots
fingerprinting
filing ridges
conservation
age estimation
turbine ventilator
engineering
de
reduced pin count
area-time2
serial multiplication
risk prioritization
risk priority number
failure modes
risk factors
statistical analysis
pakistan.
energy policy
barriers
industrial energy efficiency
drivers
wind energy
self excitation
frequency regulation.
induction generators
voltage regulation
okumura-hata.
path loss
friis
radio wave
models
data acquisition and logging
pic microcontroller
coordination
digital supply chain
sustainable business model.
open business model
business model innovation
business model
polygonal approximation
canny edge
computer vision..
open cv
license plates
lapi
roc..
photogrammetry
unmanned aerial vehicles
drone
aerial images..
borderless piece..
jigsaw puzzle
square piece
default mode network..
mild cognitive impairment
alzheimer's disease
digital data
compression rate
data security..
compression techniques
operators..
classroom performance
dynamic sitting desk
university students
cobalt alloys
gmaw cold wire
client forensics.
cloud storage services
cloud forensics
stresser
dos exemplar
dos similarity score
denial of service flow comparison
adaptive sorting.
sorting
and one-site coach.
development cycle
one-site customer
extreme programming
morphological analysis
arabic verb forms
finite-state
computational morphology
word correspondence alignment.
afaan oromo language
statistical machine translation
morphological alignment.
tokenisation
pos-tagging
arabic
setswana noun morphology
innovation strategy.
idea management
innovation capability
collaboration.
standing desk
public sector.
learning goal
generational diversity
engagement
baby boomers
gen xers
millennials
business process
bpmn
knowledge base.
meta-model
patterns recovery
design patterns
gang of four
architecture
saas
software customization
multi-layred
process algebra
navigation
mobile robot
path planning
computer supported collaborative work
collaborative augmented reality
sense augmentation
distributed augmented reality
shellsort
circlesort
heapsort
introsort
modified diminishing increment sorting
internal component
distributed cooperative system
fault detection
robot system
awareness
semantic technologies
conceptual product design
hidden markov models.
speech segmentation
probabilistic neural networks
filter bank energy
hand gesturing
arabic sign language
candescent
data integrity..
rule-based.
physical restraints
production management..
theory of constraints
labor productivity
marketing theory
transaction marketing
relationship marketing
emotional exhaustion
emotional intelligence
emotional labour
organizational behavior
service industry
performance prove
performance avoid
job crafting
crossover
adaptive mutation
multi objective fitness function
confidence
support
association rule mining
existence-uniqueness conditions
finite impulse-response filters
image super-resolution
reversible data embedding
visual quality
hvs characteristics
reversible enhancement
block matching 3d collaborative filter (bm3d)
bayesian least squares gaussian scale mixtures (bl
non-local means (nlm)
approximate message passing (d-amp)
compressive sampling matching pursuit (cosamp)
basis pursuit (bp)
data integrity
operating systems
vulnerabilities
polymorphic malware
optimization problem
operators
rule-based
tweet
twitter
multi dialect
phonological variations
dialectal arabic
easy maintenance
coding xml
framework extension
xml programming
developer productivity
cloud service discover
word sense disambiguation
semantic search
query composition
cloud ontology
topography
apriori algorithm
biometric fingerprint
rsa public encryption algorithms
information
android forensics
md5
cat map
2d-stcm
user experience.
motor imagery signal classification for bci
eeg signal classification
motor imagery bci
cross validation
robust classification
linear discriminant classifiers
classifier ensemble
classifier space
feature fusion
hog descriptors
hybrid water marking
workers safety and working conditions
missing value
imputation methods
categorical variable
edge preservation
ultrasound images
image frequency
noise density
image noise
interactive image segmentation
suitability
level sets
localized region based active contours
sparse field matrix
multi-kernel sift
volume estimation
magnetic resonance imaging (mri)
brain tumor
pixel value indicator.
lsb
segmentation.
peripheral blood
pixels
leukocytes
convolution neural network.
musculoskeletal disorders.
workshop
work system design
ergonomic analysis.
solidarity economy
cavitations
erosion
ohs
csr
stakeholders' roles
rmg sector
sales promotions
technology adaptation
e-coupon
innovation behavior
competitive advantage
shared values
corporate culture
buyer performance
complementary assets
adaptation
steel constructor
h-beam
bim
energy-saving efficiency
micro-vertical farm
sheet mental housing
green-roof
adaptive constant false alarm rate (acfar)
time-frequency domain
multi-frame acoustic signal processing
target spectrum signature detection
k-best decoder
generalized spatial modulation
affective state
context-awareness
purchase-decision involvement
re-imputation accuracy rate
bottle neck
glass ceiling
ethnic minorities
testing
dependency structures
test case prioritization
branch coverage.
behavior-based intrusion detection.
learning
classifier.
ucs.
fibre channel over ethernet
data centre
fibre channel
storage area network
attack graphs
network security.
vulnerability analysis
co-channel interference
minimum mean-square error
wigner distribution.
multimodal.
multiclass
tumor
multiple kernel learning
cerebral mri
fisher face
dct coefficients selection
cosine similarity.
ar
2d dct
model checking
sql.
relational algebra
atl
web services
think-aloud protocol
personality dimensions.
point-placement
turnpike problem
experimental algorithms.
computational geometry
second language acquisition
introverts
extroverts.
image pyramids
image blending.
semantic concept based video retrieval
glcm texture.
key-frame extraction
hsv histogram
usability evaluation.
machine intelligence
software interface
user interface
user interface evaluation
musculoskeletal symptoms
psychosocial aspects.
ergonomics interventions
diversity
diverse culture.
recruitment policy
occlusion.
session
queue
multirate multicast
network virtualization
service-oriented architecture
network service
green computing
server cluster
energy proportional
ieee 802.11
service time statistics
dcf
overlay networks
ip multicast
bandwidth analysis
end-to-end delay
end-system multicasting
rstp
opc da
web
maximum flow
shortest path
multi paths
delay tolerant networks
intermittent network connectivity
dtn
fuzzy logic system
cross-layer design
ad hoc
dynamic network
network clustering
ransac
normals
graph-based segmentation
surface detection
rigid transformation
image mosaicking
harris corner detector
correspondence point filter
radial distortion
ahe.
he
urban macro.
urban micro
mu-mimo
otsu
digital investigation
formal model.
onsite triage
process model
on-scene examination
meanshift
stereo vision.
vlsi architecture.
se enumeration
satellite network vulnerabilities
satellite communications
satellite hacking.
satellite security analysis
satellite network security
satellite network treats
satellite network
heterogeneous
homogeneity..
patches
fractional order
wart
atopic dermatitis..
skin disease
sfinge
synthetic fingerprint
3-d image features
3-d image segmentation
lung nodule classifier..
volume growth
hexagonal grid
edge detection..
top-hat transform
mr images
automatic detection.
femoral cartilage
pathology
type-iv crater lesions
edge directed bicubic
image zooming
pde.
totalvariation method.
nesterov’s first order method
low-dose cbct
split bregman method
fisher criterion
dimensionality reduction.
single image super resolution (sisr)
swar
hindi
authorship
transcription rules
pronunciation dictionaries
opinion mining
fit of equation
phonemes
allophones
statistical studies
syllables
allosyllables
ranked frequency distribution
setswana verb morphology
multi-agent
coverage.
unmanned systems
mobile sinks
sound speed profile
interleaving
undersea links
coding
constraint length
clutter
radar..
dwt-huffman
lpcdh technique..
lpc-huffman
supraventricular tachycardia (svt)..
mmse
normal sinus rhythm (nsr)
single image semi coupled dictionary learning (si-
encryption and decryption
rsa-crt
1024 bit and 4096 bit.
gaussian smoothing.
image edge detection
uncertain trajectory data
trajectory querying
applications of trajectory data mining
trajectory data mining
trajectory clustering
implicit authentication
behavioral modeling
java reflection
decompiler.
byte code
software obfuscation
http protocol.
wsdl
soa
stub
skeleton
cobra
rmi
soap protocol
distributed system
dynamic load balancing
algorithms.
data loss prevention
networking
virtual testbed
distributed networks
normalized correlation.
quantization
sum of absolute differences
approximation
stereo corresponding
disparity
edges in color images
statistical learning
morphological gradient operators
gaussian filter
multi-scale transformation
edge detection algorithms
algorithm evaluation
rbf-nn method
active and reactive performance indices
contingency analysis
analytical method
ranking .
top de genes selection for patient clustering.
inverse problem of covariance matrix
patient clustering
multi biometrics
perceptron
support vectors
ensemble
probability.
plasmodium falciparum
microscopic imagery
sauvola thresholding
malaria
rsa
scaled coverage measure
publication
research
management
open governance
crowdsourcing
public value
new public governance
public innovation
informal sector
economic factors
residential mortgage
italy
fragile five countries
financial crises
topsis method
soundness of financial institutions
financial fragility
software projects
project success
requirements engineering practices
gulf cooperation council
requirements engineering
relational grammar
link grammar
syntactic analysis
greek language
cost-effective
power
equipment
industrial
voltage sag
security camera
robotics
live streaming
video surveillance
facial component detection
hog features
facial expression recognition
support vector machine (svm)
histogram of oriented gradients (hog)
component
complementary pair
insertion
substitution
evidence management
electronically stored information (esi)
data predictive data mining
hiv
genetic evolutionary algorithms
leaf
parent
aggregation gain
aggregation time
online transactions
fraud detection
spelling correction
dutch
inclusion
covid19
digital transformation
living and working environments
thematic analysis
tracking.
connected component labeling
keyboard design.
rsi
trinity design
msd
ergonomic keyboard
nitrile.
latex
glove fit
donning
medical examination gloves
model transformation.
multidimensional design pattern
multidimensional canonical partitioning
model driven engineering
function point analysis.
cyber physical systems
secure tropos
software reliability
organizational practices.
technical practices
cybersecurity
data breach
crack detection.
convolutional neural network
modern greek.
food and beverage sector
aspect-level
pronouns.
linking verbs
concordances
optical flow technique
faster r-cnn.
ssd
cyclist detection
pedestrian detection
image degradation
dynamic and hybrid detection.
static
secondary school.
teacher
principal
capacity building
economic modeling.
aicc
bic
aic
elastic net
ridge
lasso
penalized regression
stochastic approximation.
hilbert space
linear monotone operator
decision tree.
smart grid
malware
cyberattack
kalman filter.
gaussian mixture
child monitoring
gpgpu
reusability
extensibility
modularity
modifiability
maintainability
mvc architecture
supply chain.
pharmaceutical industries
network optimization models
critical infrastructure business
institutional communication.
crisis management
young adults
topic fatigue
vaccination hesitancy
government
information behavior
small and medium sized dairy processing firms.
strategic learning
cash flow
cash flow statement
business decision making
determinants
firm autonomy
mncs
usage
plastic bags
cape metropole
profitability
sin tax
digital technologies
empirical studies.
object-oriented modelling
conceptual design
sdlc
software design
unified modelling language (uml)
function modelling
information presentation
wearable augmented reality
transfer of care
latency.
internet protocol television (iptv)
multiple-access edge computing (mec)
software-defined networking (sdn)
voice over ip (voip).
sip security
session initiation protocol (sip)
implicit least squares.
direct computation method
high precision
carrier phase double differencing
cerebral small vessel disease.
vessel enhancement
signal-to-noise ratio
time-of-flight magnetic resonance angiography
cerebrovascular segmentation
security testing.
grammar analysis
software testing
testability.
flexibility
museums
django framework
lstm
audit quality
and governance risks
social
environment
women on boards
board dynamics
environmental protection
stock market index
economy
naive bayes classifier
sentimental analysis
network forensics
network attack detection
supervised learning
accounts
apology
crisis communication
trust repair
microaneurysms
diabetic retinopathy
mathematical morphological operation
retina optic disc
retina image
materials
benchmarks
technologies
fet arrangement
mjpeg
obstacle avoidance
stress
working hours
delphi method
qualitative prediction
w&b
dhc-6
seaplanes
mobile
java
tfidf
plagiarism
approximate
interferon
sars
gene set enrichment analysis
meta-analysis
pathway activity
poisson distribution
machine-learning
sport
football
legal analytics
digital forensic analytics
electronic stored information
technical english
teaching
multi-word lexical units (mwlus)
lexical competencies
risk assessment models
risk assessment
byod
varying psf
richardson-lucy
deconvolution
user interest
semantic gap
multiple query
content based image retrieval
elderly people
efficiency
electronic round
intermediary objects
security guard
private security
thin films
local pressure
dissipative particle dynamics
mdpd
ieee 802.11ac
traffic channel
call drop rate
call setup time
call setup success rate
key performance indicators
statistical language model
arabic part-of-speech tagger
corpus-based approach
the qur'an
annotation
euphemism
lebanon
obstacles
joint kinematics
video gaming
mathematics education
rich tasks
co-operative work
education
ergonomics
decibels
radiologist
steganographic
coop.
co-op
co-operatives
agriculture cooperatives
social engineering solutions
social engineering tools
security policies
social engineering measures
social engineering threats
incident forensics
electronic stored information (esi)
electronic discovery reference model (edrm)
weighted features
tags
low-level features
image concept detection
imbalanced dataset
deep features
multi-label classification
cnn
semantic concept detection
women in business
control points
distance
rtk
particle filter
hog feature
robust tracking
video surveillance system
communication
hide
binary
imo
viber
wechat
whatsapp
android app
file input quality
techniques
mutation
generation
grammar-based
impulse noise
2d gaussian blur
jaccard similarity coefficient
trust-region algorithm
emotion modeling
emotional state
incident response team
cognitive security
security operation center
smartphone forensics
nova-pca
companies
heat transfer enhancement
circular tube
al2o3 nanoparticles
super vector machine
random forest
academic performance
motivating environment
personal goals
focus
positive-thinking
individual-interest
self-efficacy
self-confidence
poisoning attacks
malware classification
genetic transfer learning
vertical accuracy
height measurement
alos
srtm
aster
lidar
dems
total electron content
elevation angle
multi station
ibs
dcbs
scale factor
ldp
arima
time series forecasting
software defects
shell scripting
interactive shell
command-line
console
bash
adaptive learning
real-time systems
perclos
healthcare workers
musculoskeletal disorders
architectural maturity model
legacy code
software erosion
software maintenance
architecture erosion
software architecture
technology and trust
risk
direct voice input
smart contracts.
blockchain
smart car.
misbehavior detection systems
cooperative intelligent transportation systems
dram.
sram
flash memory
solid-state drives (ssd)
computer
linguistics
organizational culture.
emergency
culture shock
acculturation
process model.
society
regulations
decision makers
hash function.
authentication system
laplace mask
iris features
fuzzy clustering neural networks.
student performance
speed tracking
car plate recognition
variational mode decomposition (vmd)
non-stationary
culling
blind source separation (bss)
global positioning system
interferer
rapid application model
agile
big bang
v-model
spiral
waterfall
fbprophet
maodv protocol.
roughness
wrinkle
combination
icloud
cloudiot
taint analysis
binary analysis
concolic execution
concrete execution
symbolic execution
association rules
solar flares
reasoning
transportation
proximity
smart city
bovw
encoding methods
deep learning models
shallow models
interdisciplinary leadership
business communication
business transformation
complex theories
management innovation
robust optimal control
robotic manipulator
particle swarm optimization method
super twisting control
firefly algorithm
electromyography (emg) muscle activity
aodv protocol
wireless network(vanets)
association algorithms
confusion matrices
arabic corpus analysis tools
arabic corpus resources
mobile chatting.
yoruba language
english language
rule-based machine translation
corpus-based machine translation
computational linguistics
semantic similarity measures.
concept context
arabic semantic relation extraction
arabic nlp
relation extraction
specific domain corpus.
arabic term extraction
concept extraction
arabic language processing
arabic ontology
ontology construction
hurricane.
principle component regression (pcr)
precipitable water vapor (pwv)
gnss meteorology
thresholding surface
gradient minimization
active surface
line tracking
supervised classifiers
zernike moment
digital elevation map(dem)
topographic map
moore neighborhood
tracing
contour line
haar transform
kekre’s transform
fractional coefficients
rms
ultrasound
ionizing radiations
daubechies wavelet transform
multi-layer perceptron and face recognition
thermal image
haar wavelet transform
local histogram
earth mover’s distance.
bilateral filtering
binary tree classifier
script identification
multi-lingual document processing
bss
dewatermarking
bfgs
mixing matrix
script identification.
document processing
visual surveillance
object classification
smart network
art
hide data
bmp image
local features
anisotropic diffusion
directional diffusion
occlusion
depth perception
parallax method
disparity map
3d model
stereo pair
flawed biscuits detection
euclidean distance
fuzzy moment descriptors
eucledian distance
kekre's algorithm
the human visual system
insertion force
processing elements
reconfigurable hardware
virtual reconfigurable circuit
wave atom shrinkage
rician noise
magnetic resonance images
de-noising
script separation
horizontal profiles
indian script
bilingual (english-oriya) ocr
nsct
geometric feature
optical character recognition
fuzzy hidden markov
markov chains
bayesian image classification
cranial malformations
crest lines
elliptical fourier descriptors
sign language
curvelets transform
gaussian filtering
lung nodule
computer assisted diagnostic
chest radiography
indexing
video clip
key frames extraction
video coding
ramanujan ordered number dct
multiplierless dct
wavelet shrinkage
high noise environments
thresholding neural networks
context modeling
zero shifting
resolution scalability
2d spiht
difference expansion
ssim index
adaptive quantization
region of interest coding
image representation
transform domain
regression
multispectral
vegetation analyses
atmospheric correction
genetic algorithm(ga)
probabilistic neural network(pnn).
spatial gray level dependence method (sgldm)
discrete wavelet transform(dwt)
receiver operating characteristic (roc) analysis
biomedical image processing
image processing application in agriculture scienc
coading analysis and recognition
chain code
recognition
line drawing
intersections recognition
path information table (pit)
topology preservation
local condition
minimum spanning forest
flooding
path-cost minimization
morphological operator
spot segmentation
fuzzy k-means
genes
microarray image
enhanced fuzzy c-means clustering (efcm).
hand written farsi characters
decision tree
virtual pointer detection
modeling and simulation
decomposition strategies
empirical evaluation
semantic
audiovisual
multidimensional
rician fading channel
image transmission
multiple descriptions coding
noise
road signs
lesh
validity index
clustering metric
content description
semantic clustering
network comparison
segmentation quality
segmentation accuracy
quantitative analysis
vessel segmentation
pca/lda/ica
statistical models
distance measure methods
image matching
trademarks
skin segmentation
face tracking
text recognition
text extraction
source symbols reduction
lossless image compression
artificial neural networks (ann)
license plate recognition (lpr)
shoe mark
look-up tables
nearest neighbor search
robust detectors
pca-sift
summary and highlight
text detection
finite state machine
binarization
lbg algorithm
euclidean distance classifier
laplacian of gaussian ( log
principle component analysis (pca)
independent component analysis (ica)
mahalanobis distance classifier.
derivative filter
edge finding
recognition system
chain code creation
training system
morphology
geomatrical constraints
ladder
domain description
huma action detection
audivisual
screen pointing device
e-comic
laplacian edge detection
super resolution reconstruction
object based image classification
radial basis functions neural network.
vq
feed-through
show-through
background removing
scanned documents processing
geometric distortion
image archives
camera based ocr
dominant and additional features selection.
one frequency
face sketch
new dimension
natural grouping.
region growing
bamboo boundary
symmetry-curvature duality
merging point
protrusion
walshlet
dct wavelet
phase unwrapping
gaussian scale mixtures
interferogram
quantitative
sbp
analytical
fbp
manga
edges
gender recognition
ramanujan ordered number
high-speed evaluation
cosine approximation
rule discovery
decision tree induction
fuzzy c means
uep
eep
jscc
puncturing
image processing and understanding
omnidirectional system
trespasser detection
thermal imaging system
faint detection
monitoring system
fall detection
shape signature
enhancement
shape representation
secret sharing
qr code
barcode
hotelling transform
gesture recognition
image segmentation.
hsv color model
brightness calculation
buckling pressure
internal pressure
four-centered ellipse method
fgm plates
variable thickness plate
higher order plate theories
thermal buckling
concrete mix proportions
concrete behavior
cement type
voltage stability limit
power system
synchronism
power (angle) stability limit
supply chain management
operations management
production scheduling
circulation control
lift augmentation
drag reduction
ultrasonic pulse velocity
fibers
zero current switching
dc dc boost converter
zero voltage switching
fluid mechanics
cfd
sudden expansion
mean square error.
back-propagation
backstepping controller
hvac
sea water
stress shielding
finite element analysis
hybrid composite material
bone resorption
316l grade stainless steel implant
total knee arthroplasty
iso 9001
quality management
small and medium sized enterprises
cooling enhancement
electrical synchronous engine
convective heat transfer
abrasive wear
wear resistance
carburized digger tooth steel
model
analytic seated human body model
biodynamic response
regeneration
gas turbine
sailing speed thermal efficiency
fuel consumption
fuzzification
heterogeneous wireless network
z-n
cstr
anfis
imperialist competitive algorithm
torispherical
backstepping on-line tune fuzzy sliding mode cont
broadband connection
operating system
microkernel
monolithic-kernel
discrete-time modeling
switched systems
one cycle-averaging
sampled data model
pulse-width modulation (pwm)
prediction equation
hand tools
industrial worker
hand anthropometric measurements
web mining
unstructured data
network’s decomposition
real time carpooling
distributed dynamic graph modeling
bridges
corrosion
fem analysis
remaining strength
multiple sub filters
aec
finite element modeling
bolted momentconnections
beam column
column bases
wear particles
dry sliding wear
oil type
optical burst sitching network
contention resolution
blocking probability
computer aided design
couplings
equations
couplingcad
inverse dynamic control
adaptive fuzzy sliding mode inverse dynamic like
fuzzy estimator sliding mode control
sliding mode algorithm
grating length
number of grids
bragg wavelength
reflection
fiber bragg grating
database engineering
real time systems
expert systems
computer systems
information management
nonliner controller part
chattering free adaptive sliding mode fuzzy cont
adaptive fuzzy sliding mode algorithm
adaptive mimo fuzzy compensate fuzzy sliding mode
fuzzy logic controller
lyapunov based
adaptive law
internal combustion engine
chattering control
base station
gait signature
machine condition monitoring system
quaternion
neuro fuzzy system
image processing applications
thresholding.
sar images
image coding
side match
spatial histograms
local gabor phase pattern
gabor wavelets
adaptive binning
global gabor phase pattern
hosvd
multilinear discriminant analysis
subspace learning
multilinear principal component analysis
dimensionality reduction
point of interest
wavelet coefficients
fabric textile defect detection
lirs and lsrr
sum of absolute difference
statistical measures
mobile network
even-odd method
distance measures
lsb embedding
glcm
perfect reconstruction
image capturing
snow cover estimation
resourcesat -1 awifs
development of automated algorithm
wireless video image enhancement
adaptive noise filter
image enhencement
blockiness and blurriness measurement
full reference
nano-particles characterization
tem image scaning
particle swarm optimization
palmprint authentication
similarity measurement
sliding window method
complex gabor wavelet
image alignment
image transformation
objective metrics
color perception
haar
walsh
kekre
intensity inhomogeneity correction
brain extraction
mri segmentation
image quality score
m-svd
spectral feature extraction
two-dimensional fourier transform
palm-print recognition
quadrature mirror filter
aerothermochemistry
thermal protection system
aeroheating
atmospheric reentry
nonequilibirum hypersonic flow
thermal/vortex blobs
buoyant plume/body interaction
brinkman domain embedding
selection
rating
simulation software
input current waveshaping
harmonics
ac-dc converter
water heater
laboratory apparatus
heat pump
pdc
continuous t-s systems
observer based controller
power planning
forecasting
power load demand
micro-fluidics
laminar flow
high zeta-potentials
fully developed
analytical solutions
parallel-plate micro-channels
sahl-hasheesh
economical study
sub-band coding
psnr(peak signal to noise ratio)
mse(mean square error)
recognition rate (rr)
false acceptance rate (far)
hidden markov model (hmm)
face recognition (fr)
augmented reality
least squares method
chessboard corners detection
pinhole model
ternary
fly ash
strength
curing
silica fume
wire mesh
jacket
ferrocement
beams
retrofitting
accident
atmospheric plasma
non-thermal
dielectric barrier discharge
coding scheme
tcp
link adaptation
electrostatic
electromagnetic
dac
data transmission
hierarchical networks
neural fuzzy petri net
phoneme recognition
brain-computer interface
extracted parameter
detection rate.
neural classifier
wavelet transforms
voicing detection
multi-scale
automatic modulation recognition
constellation diagram
multifractal dimension
hölder exponent
wtmm
earth radiation budget sattelite(erbs)
singularity spectrum
full text available (484.48kb) this is an open
lmmse
svd
mutual coupling
beam-forming
extreme value theory
bursts
linear predictive coefficients
voice banking
line spectral frequencies
eigenvalues
spectral subtraction
singular values decomposition
noise power estimation
heuristic algorithm.
secondary users.
licensed users
non-financial performance
smes.
accounting information system
alignment
ims
sip
handoff
heterogeneous.
eap-aka
lte
random numbers logic
audio compression
speech synthesis
phones prosody
standard malay
personality knowledge
five factor theory
antenna array
sidelobe cancellation
ecg compression
wavelet coding
data glove
euclidean distance.
noise vibration harshness (in car)
code book generation
hybrid vector quantizers
hidden markov models
artifact
adaptive modulation
gaussian modeling
auditory model
distributed sensors
sensor fusion.
fading distribution
rayleigh fading
trained symbol
nakagami-m channel
sample rate converter
upsample-downsample filter
wireless communication
hrtf model
hrir model
principal components analysis
modified haar
modified daubechies
dwdm system
mimo-ofdm system
space time coding
least pth norm
filter banks
signalogic
digital signal processor
scrambler
56kbps modem
cognitive radio (cr)
orthogonal frequency division multiplexing (ofdm)
ultra wideband (uwb)
wavelet packet based mcm (wpmcm)
hybrid algorithm
maximum entropy principle (mep)
multicarrier modulation
dt-cwt
wpt
fiber radio networks
orthogonal frequency division multiplexing (ofdm).
multimode optical fiber (mmof)
quantum neural network
ica
probabilistic data association algorithm
target tracking
kalman filter
data association
digital phase-locked loop (dpll)
numerically-controlled oscillator (nco)
accent command
f0 contour
fujisaki parameters
phrase command
arabic tts
least mean square (lms)
motion artifact
power line interference
block lms (blms)
normalized lms (nlms)
cramer rao lower bound
cepstrum
unbiasedness
convergence
immune algorithm
digital filters
spectro-temporal domain
simulation study
transition probability matrix
queuing
three
two
one
greedy position based routing
ebgr
revival mobility model
active network
reconfiguration
network processor
dynamically adapting processor
runtime adaptation
scalability
network protocols
information efficiency
time delay
agent
proactive mechanism
routing instability
failure recovery
re-convergence
node-to-node communication
modulator
networking techniques
bottleneck
load balancing
cross layer interaction
ad hoc networks
sensor network
sdc
emulator
opportunistic networks
bpsk
msk
queue size
qam_64
bundle routing game
nash equilibrium
game theory
probabilistic routing protocol using history of en
kakutani’s theorem
delay and disruption tolerant networking
esprit
music
adaptive array
active queue management
wdm networks
hybrid topology
vlan
metro ethernet
spanning tree
cache
location management
call delivery
location registration
fixed local anchor
space-division switch
reaching probabilities
markov chain model
cross-bar technology
ad-hoc network
multi-protocol label switching
traffic engineering
n jobs m machine job sequencing technique
packet format
qos architecture
aggregation
data dissemination
rfid
web applications
tcp/ip
scada (supervisory control and data acquisition)
security attack/issues.
prevention and detecteion system
traffic characteristics.
rule ordering
packet filter
wdm
p-cycle
integer linear programming (ilp)
distributed cycle pre- configuration (dcpc) and sp
firewall policy.
firewall configuration
mobile wireless sensor network
time bounded essential localization
markov decision process
gps and gis.
antenna
radio interference
tdma
time slot assignment
ieee 802.16j
media traffic
tfrc
iptv network
analytical model
tcp congestion control algorithms
loose coupling integration
heterogeneous networks
tight coupling integration
umts-wlan integration
vertical handoff
network scalability
rstp compatibility
frame flooding
ring flushing
traffic modeling
ieee 802.11a
interference characterization.
average packet delay
stable route
fuzzy controller
route lifetime
network planning
mac address
arp protocol
ip protocol
ethernet
traffic identification
internet traffic
flow classification
constraint based routing
mpls-te
enforcement of security
people
policy
dimensions of security
authentification
cdma
security practices
non-operating system software
users’ security management
hispanic
antivirus software
software update
identity theft
medical security
3g mobile network security
shuffling
advanced encryption standard
patent protection
quadtree
genetic algorithm (ga)
facial feature extraction
license plate recognition
surface coils
peak signal-to-noise ratio
contrast-to-noise ratio
single-scale retinex
multiscale retinex
object oriented
urban morphology.
spatial information
touching characters
dna profiles
identification problems
godfried williams
adnan
full text available (212.48kb) this is an open
m. safa pages - 36 - 47 | revised - 05-08-2
a.w.m lung
computer forensics
disks
fraud
separation of duty
constraints
location hierarchy schemas.
c-rbac
manats
multi-biometric
vein
parallel multipliers crypto hardware
elliptic curve cryptography
cryptography hardware
jacobian projective coordinates
modulo multipliers
coefficient
multicasting
trust management system
lsb method
two dimensional discrete fourier transform
modularization
dominant spectral feature
adoption
smart card security
upper zone
video transcoding
backward repeat
global feature
biometric technology
local feature
optical security
double random phase
cover-image
data-hiding
stego-image
emd
opening
closing
shape
representation
optimal thresholding
complex discrete wavelet transform (cdwt)
shift invariance
dual-tree
peak-signal-tonoise- ratio (psnr)
image enhancement (ie)
fuzzy logic (fl)
digital image processing (dip)
low resolution natural scene image
texture features
text region extraction
medical image processing
adaptive resonance theory
mammography
shared memory
multi-core
middle zone
character segmentation
lower zone
interface
mahii
stroke
multi-domain
heuristics.
cerebrospinal fluid (csf)
gray matter (gm)
white matter (wm)
unsupervised expectation maximization
imaging surveillance
consistency subset evaluator
gradient vector flow field
color saliency
local descriptors
echo state neural network
intelligent segmentation
back-propagation algorithm
jnd histogram
just noticeable difference
water body
multi-resolution satellite image
coefficient-bias approach
min-max algorithm
iwt
face hallucination
eigen transformation
frame rate video transcoding
forward repeat
fpga
frequency estimator
maneuvering
tracking
syllable classification
dynamic time warping
utterance syllabification
automatic meter detection
poetries catagorization
cepstral coefficients
h statistic
linear prediction coefficients
f statistic
hard thresholding
electrocardiogram
r-wave detection
spurious free dynamic range (sfdr)
software defined radio (sfdr)
cross correlation
kalman gain
mode-selection
empirical mode decomposition
fundamental frequency
spectral noise
belbic
classification of ecg arrhythmias
plc
mel frequency cepstral coefficients (mfcc)
wavelet filterbank.
amplitude modulation (am)
probability of detection
newton's method
maximum entropy density (maxent density)
lagrangian multiplier
zak transform
amr
fir
coefficient segmentation
power reduction
steepest decent
spt
singular value
periodogram
a nonuniform sampled data
iterative adaptive approach
least-squares method
volume
zero cross rating
end point detection
voice activity detection
robust speech recognition
distributed speech recognition
late integration
reliability-ratio based weight optimization
audio-visual speech recognition
tonal components detection
psychoacoustic modeling
recurrent spiking som
self-organizing spiking neurons
kohonen map
word recognition
leaky integrators neurons
qostbc
bwa
nc-ofdm
zero crossing
speech recognition
adaptive equalization
evolutionary programming
modified kaiser window
bandpass filtering
multirate processing
spectral output
net input samples
decimation
clusters
real time system
security services
information privacy
tlc-pp
manual privacy management (mpm)
community observed privacy (cop)
evaluator module (pem)
self-invertible matrix.
time complexity
umts (universal mobile telecommunication system)
gsm (global system for mobile communication)
encoding
decoding
communications and data security
virtual organization
policy mappings
policy based authorization
authorization
m-psk
social capital
cameras
electronic eye
coding techniques
rin
optical
fractional moments
ambiguity function
wireless communications
dispersive channel
babai's algorithm
finite wordlength coefficients
closest vector problem
fir filter design
lll algorithm
hmm
tts
mel frequency cepstral coefficients
cepstral mean subtraction
gender classification
partitioned convolution
overlap save method
crosstalk cancellation
mixed filtering
convolution
teo
energy separation algorithm
fm signal
mixer
instantaneous frequency
huffman coding
See more
Users following CSCJournals