AIRCC Publishing Corporation
5
Followers
Personal Information
Organization / Workplace
Chennai, India India
Industry
Technology / Software / Internet
Website
About
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Contact Details
Tags
computer science
cloud computing
computer science & information technology
semantic web
ontology
information security
security
information technology
data security
big data
web2.0
computer
algorithms and bioinformatics computer architectur
web
secret sharing
computing
semantics
nlp
machine learning
blockchain
secure routing
data mining
signal processing
security behavior
computer design
web design
database
big data challenges
internet of things
bioinformatics
cloud computing.
website
iot
artificial intelligence
embedded system
networking
³Ù¨¦±ô¨¦³¦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
deep learning
algorithm
computer vision
supervised machine learning
electronics
natural language processing
neural networks
powerpoint
classification
information retrieval
mobile device users¡¯ security behaviour
cloud
wireless sensor networks
database and data mining
soft computing
software engineering
communication
clustering
wireless
wireless sensor network
artificial neural network
data warehouse
grid and scalable computing
maximum flow
excess.
preflow
extended mixed network
sensors
heuristic
network
electricity
bayesian network
gene ontology
multimedia
software quality
wireless multimedia sensor networks
image processing
continuous integration
iid
ci environment
quality improvement
theoretical computer science
natural language computing
evolutionary algorithms
information
3d printing
mobile application
machine learning algorithms.
fuzzy logic
modeling
business intelligence
etl
fuzzy system
multipath routing protocol
quality of service
hybrid
optimization
analytics
cloud security threats and countermeasures
engineering
network monitoring
wavelet transform
algorithm of image encryption
bernoulli mapping
anomaly detectors
blocking probability
summarization
software-defined networking (sdn).
smart contracts
systematic mapping study
survey
democracy.
ethereum
bitcoin
satisfiability
smt solver
mignotte¡¯s sequence
emotion annotation
emotion recognition
emotion intensity
frustration.
throughput.
jitter
dsr
aodv
tcp new reno
tcp vegas
tcp sack
congestion control
software artifacts
mining software repositories
extractive summarization
rtt
abstractive summarization
intuitionistic fuzzy (prime) submodule (ideal)
residual quotient intuitionistic fuzzy submodules
intuitionistic fuzzy annihilator
semiprime ring.
agriculture
interface circuit
3d software
monitoring and control
sensor
wireless.
object oriented design
bip components
changeability
manet
programming paradigms
computation models
while programs
recursive automata
nondeterminism
autism screening
fault tolerance
ensemble learners
predictive models
mobile robot
swarm robot
navigation
economics
obstacle avoidance
fuzzy logic controller
social platform
notification
flame intensity
flaming
control network programming
user experience
obesity
usability
novel architecture.
meteorological station
arduino uno
raspberry pi
cnp
method of moments (mom) algorithm
maximum likelihood estimation (mle) algorithm
cuckoo search optimization (cso) algorithm
analysis
responsive web design.
online booking system
augmented reality
customisable web system
booking control system
programming languages
false vote injection attack
false report injection attack
equal gain combining (egc)
nakagami
outage probability
processing time
multipath
network load balancing
flooding attack prevention
multi-path routing
covid-19
s3
ec2
homomorphic token
characterization
machine learning & applications
rule classification
mobile computing
transcript
censor words
flame detector tool
information technology (it)
ranking
hex-cell.
sales forecasting
real-world dataset
prophet
backtesting
interconnection network
matrix multiplication
parallel processing
delphi method
feedback system
moodle
lms
educational data mining
educational data
genetic algorithm
permutation.
multiple independent runs
gpu
rural community
usability evaluation
mobile network.
5g new radio (nr) network
low voltage (l.v.) switchboard
usability problems
wireless fidelity(wifi)
wifi-based rural extension
computer architecture
conceptual graph
map reduce
internet computing
market research
development risk
responsible management
e-commerce
inversion
substituend
bounded sequences
listing permutation
listing binary
parallel algorithms
corporate social responsibility (csr)
internet
linked data
speech processing
asic
vlsi design
analog communication
parallelization
cyber infrastructure-as-a-service
criminal profiling
integrated system
bluetooth
smartphone
tracker
higher education
emergency notification
student performance
prediction
compaction using sparse
smart helmet
text mining
control
anti-theft system cloud based technology
real-time crash detection
question answering
mapreduce
social network
hadoop
risk
challenge
feature selection
framework
unsupervised machine learning
segregation
cooperation
evolution
virtualization
company profiles
research
digital forensics
human vulnerabilities
algorithms
topic generation
3d body scanning
3d reconstruction
the duality feature
reduction
np complete problems
np problems
p problems
rbc.
reliable and autonomic computing distributed and p
giemsa blood sample
watershed segmentation
hsv segmentation
malaria
iterative closest process
construction project
progress monitoring
high resolution remote sensing image
hog feature
network object recognition
intelligent information
peer-to-peer networks
software
e-voting
smart contract
proof of work
election system
maintainability evaluation
short text analyse
topic of tweet
social media interest generator
relationship extraction
rgb-d camera
features selection
cost evaluation
ga-bpnn
heuristic optimization
corner keypoints
curvature feature
word image segmentation
bag of visual words
codebook
neural network
similarity measure
feature extraction
ict governance
ict alignment
ict management
green it
load balancing
information extraction
inverted list
automated scanning system
kinect v2.0 sensor
informatics
cybernetics
analytic hierarchy process
landscape coffee shops
websites.
teaching
data warehouse (dw)
network architecture.
data-driven scientific research
learning
network simulation
dynamic en-route filtering
false report injection attack.
coffee beans
business continuity management
enterprise architecture
security management
enterprise risk management
metamodeling
arabic language
enterprise data warehouse (edw)
thesis projects
teacher training
teacher education
digital tools
development-oriented
academic portals.
cpu.
sustainable development.
word spotting.
non-functional requirements
mobile application development
data-driven requirement engineering
requirement modelling
point cloud library (pcl).
compromised systems
hacking
penetration testing
exploit
vulnerability
instagram
user privacy
nsl-kdd
kdd-99 cup
intrusion detection system
speed up.
parallel efficiency
parallel bubble sort
node.js
mpi
scheduling
operating systems
process
data analysis
thread
task
gsm
pir
raspberry-pi
empirical validation
legal service online bangaldesh
search lawyer online
hire lawyer online
online legal serivce
flip-flop
single edge-triggered (
zipf distribution
video popularity
hit ratio
cache update
metrics
software design
feature extraction (fe).
convolutional neural network (cnn)
recognition
iris
biometrics
assistive technologies and pwm.
android phone
microcontroller
wheelchair
k-nearest neighbour.
feed forward artificial neural networks
rf.
svm
disease prediction
clinical decision support system
hyper-threading.
amd phenom
intel core i7
multi-core processors
single-core processor
mobility aid systems
physically disabled people
kinect camera
fall detection
it ¨C project management.
communication processes
organizational management
geographic information system (gis)
open network operating
network topologies
software-defined networks
computer network
procedural justice.
legal technology
power quality
java enterprise application
web-based solution
rma
alzheimer¡¯s disease
gene-gene interaction
geograph
embedded system and software
domain generated algorithm
dns
mobile cloud offloading
forecasting
context-aware system
mobile cloud computing
bayesian networks
curvelets
speech signals
data mining performance
importance-performance analysis
multiple regression analysis
fuzzy theory
dyslexia
automatic detection
binary particle swarm optimization
dbscan
k-means
silhouette score value
healthcare data
dataset
prisoner¡¯s dilemma.
performance indicators
student success
android
tweet sentiment analysis
text blob
naive bayes
lstm
support vector machines
text analysis
intelligent agents
search for answers
resource pricing
resource management
mobile social networks
centrality
mobile networks
saudi arabia
education
artificial neural networks (ann).
mfcc
plp
speech recognition
agile methods
nearshoring
distributed agile
agile distributed software development
security detection model
weight adjustment techniques.
interactive authentication
cloud storage security
finite storage and finite server
finite source
grade of service
loss system
security awareness
security indicators
simulated training
computer security
cheating detection
mean square error (mse).
monitoring student attendance.
rfid
context awareness
recommendation systems.
change detection
concept drift
anti-detection
psnr
eight neighbour pixels
minimal distortion
information hiding
secure digital (sd) card.
graphically liquid crystal display (glcd)
wireless fidelity (wi-fi)
advanced risk machine microcontroller (arm) cortex
thick film transistor (tft)
retailing
rfm model
segmentation
adoption.
factors
riyadh
crosscutting concerns
behavior-interaction-priority model
modularization
aspect orientation
aspect-oriented programming
scalable computing
reliable and autonomic computing
dependable
computer architecture and real time systems
algorithms and bioinformatics
predict topic from tweet.
weet analyse
perceived effectiveness of ols
cultural dimensions
online learning systems (ols)
pattern recognition.
routing
information sharing
social network services
software architecture
peer-to-peer computing
world wide web
social computing
computer activities
remote access
lan
monitor restricted files or documents
impose penalties to machine
fuzzy controller
sending rate
link utilization
tfmcc
aspect-based scoring
sentiment analysis
substitution of the least significant bits.
information encryption
steganographic scheme
learning skills.
reading skills
integrated environment
children literature
experimental analysis.
answer analysis
automated scoring
multiple choice questions
aspects
mutation
crossover
inbounded
logistic
multilevel.
management
knowledge
technology acceptance
model
driver drowsiness.
bluetooth low energy (ble)
vigilance monitoring
electroencephalogram (eeg)
brain computer interface
genetic algorithm.
mesh topology
partitioning
multicore
network-on-chip
and selective probability (sp).
ant colony optimization (aco)
university class scheduling problem (ucsp)
computer games
field of vision
weight adjustment techniques
genetic interactive authentication
systems maturity.
system quality
information quality
e-commerce.
pso
sirna
point cloud library (pcl)
empirical validatio
ecommerce.
product sentiment
data analytics
amazon
deep learning .
data augmentation
object as point
fabric defects detection
classification.
cnn-qr
deepar+
the findings show that ¡°perceived effectiveness of
and then ¡°context of the situation¡± with 5%. where
many applications on smart phones can use various
political science.
discourse analysis
search engines
online searches
e-government
ehrs.
healthcare
autism spectrum disorder.
mean square error
direct search.
annealing
simulated
epidemiologic
clinical features
weighted graph and rb
traffic channel
aggregate offered traffic
mobile application.
smart city
smart parking
constraint-based modeling
student model
language tutoring systems
talend
cloudera
hdfs
transitive closure
entity resolution
rsa.
idea
xkms
saml
soap
web services
process mining.
knowledge discovery
data processing
requirements elicitation
requirements engineering
predict topic from tweet
tweet analyse
pattern recognition
drop-ship
customer behavior
simulation
fuzziness measure.
shadowed fuzzy numbers
shadowed sets
intuitionistic fuzzy numbers
fuzzy numbers
smart camera.
hacker
worms &trojon
virus
mobile network
wireless network
network protocols
next generation sequencing.
early disease detection
single nucleotide polymorphism
microarray
multiple sclerosis
3ds max.
real time rendering
cloud service models
5g mobile network
network centralized storage
qr code
railway trackside safety
lichen planopilaris
histology
demographics
content strategy
embedded systems
co-design
climate services for farmers
non-linear feedback geneticall
shift register
lineal feedback
sexing of chicken embryo
in ovo sexing
application security
self-efficacy
competencias
service quality
servqual
airport collaborative decision
theories of intelligence
speech identification
microsoft teams
children
fintech
behavioral analytics
social engineering
presentation
machin
dialog systems
pos tagging
parsing
morphology
phonology
webinar
information technologies
ai
selection criteria
activities
generative adversarial network
malware detection
? chunking
advanced data mining technique
testing
financial efficiency
sustainable environmental prot
basic cell
output signal analysis
analog-digital converter
consensus algorithms
replication
ai-driven applications
network intrusion detection sy
cybersecurity
learning and inference
information theory
coded modulation
hierarchy process
analytic
tour leader
assurance
authorization
authentication
³¦´Ç³¾³Ü²Ô¾±³¦²¹³¦¾±¨®²Ô
sema
justification of recommendations
iaas
cellular communication
information processing
3video processing
concept map
digital communication
video processing
open data
software development
network architecture
fpga based systems ? internet of things ? real tim
signal processing ? image processing ? speech proc
data-driven scientific research.
academic portals
cpu
sustainable development
the aircc's international journal of computer scie
word spotting
task allocation
cloak-reduce
distributed processing
virtual tour
web scraping
computer test.
computer-based exams
online education
e-learning
ann
ga-pso
reinforcement learning
learning methods
machine learning algorithms
predictive learning
stream processing
edge computing
avoidance motivation
technology threat avoidance
phishing attacks
ptimized/reduced run length coding
coding
entropy
materials
static analysis
nist
project management
sdlc
nformation systems
mmersive technologies
extended reality
virtual reality
5g
name label switching.
ranking interfaces
ccn
bdp
ndn
recommendation
justification
comments
nsga- ii algorithm
polygonal mesh models
crest lines
security and information assurance
3d gan
text-toimage synthesis
face manipulation
deepmasterprints
conditional generative adversarial networks (cgans
headgear
fatigue detecting
brainwave device
molfpp
molfp
transformation characteristics
hilbert¡¯s program
four-valued logic
incompleteness theorem
g?del
networking and communications
nist test suite
scrambling
chaotic function
fractal
image encryption
grammar based data compression
adaptive automata
agro-ecological situation
decision-making
field scouting
ipm
simulated annealing algorithm.
multi-objective flexible job shop scheduling
object-oriented design
object-oriented manufacturing control
angler phishing.
identity theft
recall
out of bag data
overfitting
k cross validation
maximum likelihood estimation
median imputation
random forest algorithm
logistic regression
data analysts and data scientists
analytical query
databases
automatic code generation
matbase
(elementary) mathematical data model
business rules
triggers and rules
data structures and algorithms for data management
integrity checking
non-relational constraints
relational constraints
database constraints theory
data modeling
intelligent systems
curvature
public health
cloud e-learning
stability measures.
selection stability
feature selection algorithms
framework.
optimized/reduced run length coding.
jpeg image compression
entropy coding
finding like-minded vehicle
interest privacy
ecdsa
base point
ecc
vehicle chatting
vanet
concept map.
users¡¯ satisfaction
technology acceptance model
mobile payment
nosql.
relational database management system (rdms)
metadata repository
data warehouse evolution
schema evolution
materialized view
data mart
master data management (mdm)
master data vault
business data vault
prediction model
air ticket sales
e-shops.
adoption
online shopping
ict
secondary access
rural broadband enhancement
spectrum occupancy
important-performance analysis
service performance
core services
home stay
e ¨C commerce application.
agile
e ¨C commerce
light and sound excitation of live creatures
synapse control
decoherence
coloured algebras
quantum biological computing
quantum computing architecture
m&g
3³¦¡¯²õ
7±¹¡¯²õ
nosql
integration
classroom technology
it
job education
web performance
weighted mean rank risk-adjusted model
data splitting algorithms
supervised learning algorithms
gmm model
lidar point elevation
scheduling parameter
em algorithm
lidar
network antenna
microwave
technology micro-strip
mimo
trigger
misophonia activation scale
emotion
misophonia
organizational agility.
knowledge management systems
dynamic capabilities
data
absorptive capacity
distributed systems
leader election
encoding.
ppm
preprocessing
grammar-based
cfg
video streaming
qualitative scenarios prioritizing
enterprise architecture evaluation
embedded system and software game and software eng
learners.
web-based learning
ewom
festival tourism
tourism
festival
social media
the standar fhir is an example of successfull impl
colombia must begin a process to accomplish such a
the interoperability of heath history. due to the
the importance of health sector in colombia is not
risk matrix
software project risk assessment
geometry ? computational physics & biology ? compu
automata theory ? computational complexity
fuzzy particle swarm optimization & frequent patte
intelligent information & database systems
game and software engineering
multimedia systems and services
gis
google maps
bus tracking
bus routing
mate selection.
personalized web acceleration web performance opti
performance engineering
caching strategy
cocomo
ssl
set
security risks
e-payment
zero-width character.
pointed characters
kashida
steganography
arabic text
deep learning & skin lesion image
u-net
k-means clustering
self-learning annotation scheme
tracking quality
recognition speed
camera calibration
marker creation
artoolkit
recommendation system
association rules
cluster
collaborative filtering
automata theory
geometry
algorithms and data structures
dynamic routing.
cluster head
greedy route
cluster-based routing
video encoding
h.265
content adaptation
dsis
cloud gaming
? computer archite
von neumann bottleneck.
smart memories
processor-centric computing
processing in/near memory
memory-centric computing
memory latency reduction and tolerance
marker-based camera tracking
animated assembly design
data compression
arabic text categorisation
android mini game
multiplayer
mobile game testing
unity
web services.
interoperability
erp
nanotips.
lattice networks
controlled switching
carbon nanotubes
3d circuits and systems
evolutionary computing
mmre
data vault (dv)
See more
Users being followed by AIRCC Publishing Corporation