Tags
ijcsis
journal of computer science
scopus
cloud computing
security
call for paper
information security
machine learning
computer science
data mining
classification
data security
impact factor
research
artificial intelligence
ijcsis 2018
genetic algorithm
feature selection
information technology
optimization
cryptography
encryption
e-learning
internet of things
steganography
international journal
information systems (is)
clustering
psnr
biometrics
image processing
ontology
network security
hadoop
computer science and engineering
intrusion detection system
authentication
healthcare
big data
mapreduce
cloud
publication
biometric
k-means
text classification
online banking
modeling
pattern recognition
feature extraction
google scholar
mse
face recognition
web of science
neural network
sdn
expert system
multi-user sharing
servers
mri
conceptual model
median filter
faq pages
chatbots
confidentiality
cybercrime
fitness
forensic
distributed systems
correlation
data sharing
social network
evidence
eigen value
international
data compression
mobile application
microcontroller
hybrid image compression algorithm
intrusion detection
scheduling
computer science (cs)
tension
sag
semantic web
fault tolerance
hpc
similarity
digital signature
communication technology
api
stemming
availability
bluetooth
challenges
performance
prediction
pca
multi-agent systems
internet
ransomware
jumping emerging patterns
decryption
thomson reuters
forensics
parallel computing
artificial bee colony
internet of things (iot)
software development
dataset
template security
virtualization
threats
principal component analysis
tqm
decision making
technology
vulnerabilities
particle swarm optimization
distributed system
usability
gsm
proquest
text mining
wireless sensor networks
trust
gps
pso
cipher text
sentiment analysis
plain text
image processing techniques
power losses
honeypot
short circuit level
voltage
convergent encryption
solar pv system
digital image processing
invertible nonlinear function
decryption.
aes and triple des.
compressive sensing
reproduction algorithm(vr)
lie detection
hybridvr algorithm(hvr)
distance camera
probability
anomaly
sinr
social networking
digitalization
keystroke dynamics
mobile computing
min-min algorithm
authentication systems.
malware
compression ratio
mongodb
apache spark
nosql databases
indicators of compromise
big data analyticsy
ids
distribution feeder
malcodes
lossless compression
volvox colony
clustering algorithm
noise
big data analytics
multi class classification
lossy compression
top-hat filtering
gaussian filter
social big data
citrus
storage.
graphical password
image compression
shoulder-surfing
cloud storage
resource management-user requirements- academic cl
knowledge based authentication
information retrieval
wireless networks
adhoc network
softcast and wavelet scales.
denoising
clone attacks
botnets
liecount
desd crypto technique
cloud service provider
recombination
image scrambling
decomposition
chaotic system
color image
sparsity
encryption.
forensic investigation
code book
forensic readiness
coding theory
storage
proposed k-means algorithm
k-means algorithm
unsupervised learning
measurement matrix
deduplication
centroids
hadoop platform
residual artifact
802.11
identity theft
applocker
oled
iot
adaptation
identifiers
personal identifiable information (pii)
identification
information privacy
physical machine
virtual machine
consolidation
direct migration
resource allocation
energy consumption
data center
energy
green cloud
information system
communication system
best practices
frameworks
it grc
rule based system
agriculture
knowledge engineering
supervised learning
nsl-kdd
intrusion detection systems
message broker
rabbitmq
fourier descriptor
combinational features
back-propagation
lngd.
library sort
insertion sort
sorting
restricted boltzmann machine and convolutional neu
autoencoder
deep belief network
hash function.
cross-site scripting attacks
http protocol
cookies
pso (particle swarm optimization)
vm (virtual machine)
csp (cloud service provider)
performance evaluation
youtube
dct transformations
bivariate generalized gamma mixture model
routing protocol.
mac protocol
cross layer
wsns
pso and hbmo.
grvq
apoa
compression
vector quantization
security on smartphones
distributed application
neural networks
sse-cmm
iso 27002
maturity level
security system
academic information security
enterprise architecture.
concept of operation
conops
archimate
cr
et
matlab
hv partitioning
fractal
dwt
video compression
histogram
digital data hiding
csp
migration
vendor lock-in
fixed effects
panel models
nonnegative garrote
knowledge management
improved inverted indexing technique
resource description framework
socia networks
link prediction
sensor deployment.
rest web services
snr and covariance matrix.
normalized error
lda
san
ilp
fault tolerant
data replica placement
bipartite graph
photogrammetry and point cloud
active
passive
lidar
digitization
important sites
heritage
3d modeling
anti- forensics
recovery
virtual
absolute distance
generalized regression neural network(grnn)
olap
multidimensional modelling
etl
cube
multidimensional data analysis
java
visual prolog
logic programming language
simulators
mesh network
quantification of expression
membership function
association rule mining
rough sets
secret key sharing
distributed computation
transactionalitemsets
cross-layer
network design
software-defined management
transport layer security
transparent proxy server
overlay networks
engineering system
diagrammatic representation
physical plant
hyper-heuristics
integration
automation
platform
education delivery
science studies
secondary schools.
hpso
lsb.
persuasive cued click points
international mobile equipment identity
one time password
mobile cloud computing(mcc)
offloading
system model (cost model
energy model
weighted model)
fuzzy rule
contrast enhancement
morphological operation.
satellite image
image noise
software programming
environment visualizing images (envi) program
modulo ten
avl tree
linked list.
indexing
multibiometrics
nearestkd-tree indexing
optimised kd-tree indexing
haar wavelet transform
lsb based steganography
packbits algorithm
unified modeling language
model for solving combinatorial optimisation probl
generic model
bio-inspired model
hyper-heuristic model
security issues
security techniques.
guided particle swarm optimization
image registration
multimodal emotion recognition
three-dimensional morph able models.
protocol tunnelling
application detection
firewalls
http-tunnels
diabetic retinopathy
microaneurysm
virtual classroom
engineering
ebsco
computing
academia
lie
aes
des
symmetric & asymmetric cryptography
npn
publish/subscribe
key distribution
mqtt
vanets (vehicular adhoc networks)
attacks in vanets
distance bounding technique and differential e v o
arabic corpus
naïve bayes
swahili tweets
social media
j48
finite-state machine
creation and analysis of fsm design
test case generation
symbolic execution
rtl simulation
rtl design
erp
data-centric architecture
architecture component-based
plug in architecture
computer
face detection
hand-raise gesture detection
prng
kdf
rotation
shift
five levels
diffusion
and encryption.
icjsis
ambulance services
dynamic dispatching
route changing
petri net processes modeling
predictive analytics
models accuracy
tools
algorithms
blindness
arabic text mining
arabic text classification
software engineering
security metrics
class design
sdlc
design phase
financial time series forecasting
support vector regression
dhaka stock exchange
mobile ad hoc network
cooperative caching
caching strategies
cache invalidation
seed
subkeys generation
trng
cy- cle
wheel
cyclic cubic graph
recommender systems
microblogging
fact-finder
ant colony optimization
energy efficient
object-oriented class diagram
conceptual modeling
flow things
objects
attributes
methods
diagramming system as a whole
ant colony
delayed convergence
crossover and mutation.
fpga
radial basis function ann
cholesterol detection
and shipt wavelet
gdp
inflation rate
consumer price index
exchange rate
regression
ann.
load balancing
genetic algorithms
priority
chromosome
matlab program
energy graph
optical burst switching
backtrack on deflection failure.
enterprise architecture
gwea
diffusion of innovation.
physical unclonable function (puf)
random number generator (rng)
microcontroller chip
iris normalization-casia(v1.0
v4.0-interval) database-circular distribution
weighted constraint satisfaction problems
bivalent quadratic programming
hopfield neural network
energy function
conflict analysis
rough sets theory
conflict model
multicast tree
stagnation
blackhole
watchdog
multipoint relays
r
naive bayes
term frequency-inverse document frequency
twitter
healthcare analytics
data analytics
information and communications technology (ict)
activity theory (at)
deflection path
reflection routing
deflection
optimized butterfly graph
learning engine
educational content
robust speaker identification
gammatone frequency cepstral coefficients gfcc
relative spectral transform perceptual linear pred
gaussian mixture model gmm.
competency based approach
task scheduling
directed acyclic graph
optimization algorithm
context-as-a-service
contextawareness
computer vision
cicrle recognition
elippse recognition
cicrle detection
motion vector
moition estmation
quality svc
snr svc
macroblocks
social networks sites
social media tools
student perception
academic performance
egyptian colleges
certificate less
elliptic curve
bilinear pairing
butterfly graph
authentication possibility
communication overhead
hash chain
agent-based software engineering
methodologies for agentoriented software developme
vanets
delay
qos
data dissemination
fuzzy sets
re-crawl
fetch time estimation
proactive approach
software refactoring
software quality maintenance
code smell detection
gene based refactoring
location identification
rectification
contention problem
elippse detection
ac-dc converter
total harmonic distortion and dc motor.
wireless sensors networks
hybrid architecture
remote monitoring
resilience
enose
aromatic rice
quality control instrument
wlan
space time processing
rayleigh fading
maximal ratio combining
distributed artificial intelligence (dai)
telecommunication network administrations.
intelligent electornic patient record management s
human computer interface
blink cycle
eyelid velocity
assorted
demontization
dynamic enviourmrnt
grameen vikash bank
hr development
three-factor authentication
zero knowledge proof (zkp)
d2d
privacy
issues
support vector machine
graphics processing unit
autodesk
artificial neural network
student' attitudes
proportional integral controller
artificial neural networks
educational institutions
encryption technology
advanced encryption standard
cloud and fog computing
fog nodes
emotional intelligence
management styles
workplace
leadership
text preprocessing
tokenization
stop words removal
chi-square
tf-idf
kalman filter
vmware pulse
iot center
gait
biometric feature
silhouette
neural network and support vector machine
panorama
imagestitching
image features and feature detection
business intelligence (bi)
data mining (dm)
analytic service model (asm)
induction method
association algorithm
webrtc
multiparty videoconferencing systems
signaling
specification and description language (sdl)
fatigue
gender
study program
study year
e-learning knowledge
medical image
telemedicine
chaotic algorithm
self-adaptive
game
extinct
shologuti
design
log aggregation
network traffic analysis
malicious attack
extraction
moving object
principle component analysis (pca)
features from accelerated segment test (fast)
neural network (nn)
minimizing data replication
side
data deduplication
data reliability
cost-effective storage
sensors
zigbee
gprs
arduino board
wasms
intrusion
number theory research unit (ntru)
collaborative intrusion detection system (cids)
medical knowledge extraction (mke)
truth discovery.
k-nearest neighbor (k-nn) and probabilistic neural
tiny sec
ieee 802.15.4
twists
mini sec
lsec
llsp
lisa
and drawl in wsn
gpu
gpgpu
cuda
ranking
content quality assessment
answer quality
acsr
span
surf
food identification
messenger
acquisition
android
english language
arabic language
language assistant
machine translation
image enhancement
image negative
histogram equalization
mammographic
breast cancer
centroid
data objects
density
three phases induction motor
epizootic ulcerative syndrome (eus)
frequent itemsets mining
ultrametric
celestial spectral data
cervical cancer
nucleus
pleomorphism
map api
navigation
architecture
technology.
relief
cbm
ga
mrmr
ica.
point feature matching
decision tree
mobile ipv6
network mobility
route optimization
tradeoff
k-nearest neighbors
support vector machines
electrocardiograph signals
python
human identification
mobile banking
security protocol
data privacy
protocol
e-mail process
detection
ensemble method
stacked generalization
substrate thickness
return loss
c-band
bandwidth
sonnet software.
cognitive load
affordance
working memory
human-computer
interactions
team
peer evaluation
distributed development
global software development
case study
survey
keywords extraction
offline capture mode (ocm)
realtime capture mode (rcm)
pairings in elliptic curves
commodities smuggling
identity-based cryptography
developing countries
eeg signal
motor imagery
multivariate wavelet decomposition
dominant frequency
linear discriment analysis
support vector machine.
github
risk analysis
football
urdu language
mobile apps
mobile application development
word2vec
two-tier meta-learner
virtulization
host-based intrusion detection system
anomoly-based intrusion detection system
deep learning
ieee 802.15.4 standard
iot security services
dos attack
disassociation process
long term evolution
wireless fidelity
listen-before-talk
coexistence
unlicensed spectrum
relim
on-demand network data set creation application (o
packet capture (pcap)
simulated annealing
scatter plot
mean euclidian distance
l*a*b image
spectrogram of image and spectral components of sp
semi-supervised clustering
high dimensional data
pairwise constraints
kernel k-means
kernel matrix
hidden markov random fields
arxiv
citeseerx
cornell’s university library
ei compendex
isi scopus
dblp
doaj
bof
message sequence chart (msc)
model validation
advanced encryption standard (aes)
field programmable gate-array (fpga)
application specific integrated circuit (asic)
speech recognition
cross-correlation
metaheuristics
heuristics
traveling salesman problem
combinatorial optimization
friedman
information content
semantic similarit
similarity relatedness measure
hybrid systems
crystal(3.57mhz)
7805 ic
robot chassis
dc power supply
soft computing
quality of service
review
malware analysis
malware classification
regular expressions
api calls
horizontal and vertical projection
geometric properties of text
image binirization and gap filling method
big data processing
hybrid hierarchically distributed data matrixframe
microstrip patch antenna
m-shaped patch
swarm intelligence
researchgate
linkedin
academia.edu and ebsco
palm vein recognition
local binary pattern (lbp)
diagonal vertical horizontal local binary pattern
knn
digital library
integrity
security threats
botnet
software defined networs
journal
dtmf (dual tone multiple frequency) board (mt8870)
mobile phone
dc motor
motor driver (l293d)
owc model
autism spectrum disorders
complex genetics
copy number variation
disconnection syndrome
neuroimaging
neuropathology
diagnosis
assessment
diagnostic instruments
risk factors
perinatology
mental retardation
hetrogeneous networks
wireless d2d communications
trust-based protocol
secure collabaorative routing
sleepy inverter
resources
sharing
auction
sensor node
hybrid cluster
congestion avoidance
wsn.
ofdm
iitv
ultrasound
tomography
dsa
endoscopy
orthogonal
key
data and authentication.
oow model
nof
clusters
software
weka
j48.reptree
design process
knowledge based system
site management & buildings department(smb)
rule-based
risks
risk assessment
network architecture
opportunities
transmission system
research methodologies.
vlsi floorplanning
simulated annealing algorithm
sequence pair
laser
double tail comparator
analog to digital comparator
leakage current
congestion control approaches
real- time streaming
multimedia
student’s performance
alcohol consumption prediction
heterogeneity
human collaboration
organizations problems
frankle mccann retinex
thickening
filling
inscription images
outlier detection approach
network- based
sus
mobile first companies
standard usability questionnaire
arabic- system usability scale
lbp
ltp
sicltp
zssd
texture feature
new control algorithm
sun tracker
improve the efficiency of tracking
new innovative approach of water distillation
parabolic trough collector
interoperability model
psm model
pim model
meta-model
skin color
static hand gesture
anonymity
authenticity
forward secrecy
group sharing
ring signature
cloud center
server consolidation
virtual machines
task migration
metadata
digital
attacks
cryptosystems
fingerprint templates
app usability
rust disease
bayesian network
data
threat
network
public transport
smart cities
bus navigation system
display boards
knowledge extraction
development policy making
evolutionary algorithms
high dimensional dataset
android smartphone
attribute-based permission
fine-grained permission
badal
exchange
system usability scale
erasure
reed – solomon
code shortening
performance comparison
evolution application
response time comparison
dropbox
google drive
hightail
onedrive
sugarsync
apriori algorithm
arm
sfla
rough set data
support and confidence
sifs tcp
caesar cipher
chronic kidney disease
interactive teaching
learning feedback method
virtual community
technology education
soma
impulse noise
cnlm
mssim
ssim
psmf
guassian noise
salt and pepper noise
digital image forensics
seam carving
extreme gradient boosting
requirements prioritization
ranking algorithm
diffusion tensor image
edema
anisotropy
partial discharges
simulation
variable frequency
cavities
disc-shaped and epoxy resin
power line communication
vehicle power line channel
channel modelling
3d model
fuzzy gaussian
mac
mpsd
and blowfish
aviation industry
e-governance
information and communication technologies (ict)
nigeria
obstructive sleep apnea (osa)
ensemble feature selection (efs)
ensemble convolutional neural network with vote cl
velum oropharyngeal tongue epiglottis (vote)
bat algorithm (ba)
random forest
zernike moment
gabor filters
glcm
brain tumors
gray level co-occurrence matrix (glcm)
classification accuracy
genetic algorithm (ga)
rtt
content-aware image resizing
metarouter
dos (denial of service)
mikrotik
ad-hoc networks
topology
interference
algorithm
anomaly detection
kdd cup 99
wsn
protected procedure
clustering protocols
mobile sink
energy hole problem
role based access control
ecc
cross-correlation coefficient
raid
disk less clients
redundancy
mirroring
latency
hardware and software data storage
data syncing
master-slave disks.
fully homomorphic encryption schemes
addition-composition
advertisement recommendation
conversion prediction
expectation maximization
agents
agent oriented methodology
feature analysis framework
gaia
uncertainty wheat
dead space
knowledge base
inference engine
crop management
crop disease diagnostic domain
arabic information retrieval
keyword-searching
light stemmer
arabic-morphology
natural languages processing
hidden markov model (hmm)
kinect sensor
skeletal image
research methodologies
signal to noise ratio
2d filtering
low-pass filter
tam
cnv
se
qi
aw
peu
pu
vanet
dsdlar
dlar
lar
sd
gis
non-profit organizations
symphony orchestras
software systems
requirements engineering
standard deviation
prometheus
message
live forensics
ram
laptop
devices
firebase auth
xml
url
network intrusion detection system (nids)
snort
detection rules
darpa dataset
electrocardiogram
ecg signal
fir filters
high-pass filter
See more
Users following IJCSIS Research Publications