AIRCC Publishing Corporation
5
Followers
Personal Information
Organization / Workplace
Chennai, India India
Industry
Technology / Software / Internet
Website
About
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Contact Details
Tags
computer science
cloud computing
computer science & information technology
semantic web
ontology
information security
security
information technology
data security
big data
web2.0
computer
algorithms and bioinformatics computer architectur
web
secret sharing
computing
semantics
nlp
blockchain
machine learning
secure routing
data mining
signal processing
security behavior
computer design
web design
big data challenges
database
internet of things
cloud computing.
website
bioinformatics
³Ù¨¦±ô¨¦³¦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
embedded system
networking
algorithm
deep learning
computer vision
supervised machine learning
natural language processing
electronics
powerpoint
neural networks
mobile device users¡¯ security behaviour
classification
database and data mining
wireless sensor networks
iot
cloud
information retrieval
artificial intelligence
data warehouse
grid and scalable computing
wireless sensor network
communication
clustering
artificial neural network
software engineering
wireless
machine learning algorithms.
3d printing
continuous integration
multimedia
multipath routing protocol
cloud security threats and countermeasures
network
fuzzy logic
heuristic
electricity
evolutionary algorithms
image processing
etl
business intelligence
information
hybrid
sensors
optimization
software quality
modeling
gene ontology
theoretical computer science
excess.
iid
quality of service
ci environment
soft computing
quality improvement
mobile application
fuzzy system
wireless multimedia sensor networks
maximum flow
extended mixed network
preflow
analytics
curvature feature
corner keypoints
codebook
word image segmentation
similarity measure
heuristic optimization
ga-bpnn
feature extraction
bag of visual words
ict governance
wavelet transform
network monitoring
anomaly detectors
software-defined networking (sdn).
smart contracts
systematic mapping study
survey
summarization
software artifacts
mining software repositories
extractive summarization
abstractive summarization
intuitionistic fuzzy (prime) submodule (ideal)
residual quotient intuitionistic fuzzy submodules
intuitionistic fuzzy annihilator
semiprime ring.
agriculture
interface circuit
monitoring and control
sensor
wireless.
object oriented design
changeability
maintainability evaluation
3d body scanning
3d reconstruction
iterative closest process
automated scanning system
kinect v2.0 sensor
rgb-d camera
features selection
compaction using sparse
prediction
student performance
higher education
integrated system
hadoop
mapreduce
low voltage (l.v.) switchboard
5g new radio (nr) network
mobile network.
e-commerce
election system
proof of work
smart contract
e-voting
peer-to-peer networks
bitcoin
ethereum
democracy.
economics
analysis
augmented reality
fault tolerance
ranking
sales forecasting
real-world dataset
prophet
backtesting
cost evaluation
ict alignment
ict management
green it
responsible management
corporate social responsibility (csr)
parallelization
multiple independent runs
gpu
usability evaluation
usability problems
smart helmet
anti-theft system cloud based technology
real-time crash detection
emergency notification
tracker
virtualization
challenge
risk
cyber infrastructure-as-a-service
map reduce
wifi-based rural extension
wireless fidelity(wifi)
rural community
internet
analytic hierarchy process
conceptual graph
development risk
delphi method
reduction
the duality feature
topic generation
social media interest generator
topic of tweet
short text analyse
software
intelligent information
network object recognition
hog feature
high resolution remote sensing image
progress monitoring
construction project
manet
congestion control
tcp sack
tcp vegas
tcp new reno
aodv
dsr
jitter
throughput.
mignotte¡¯s sequence
smt solver
satisfiability
bip components
rtt
blocking probability
algorithm of image encryption
bernoulli mapping
neural network
computer architecture
internet computing
social network
load balancing
question answering
text mining
smartphone
bluetooth
evolution
cooperation
segregation
feature selection
parallel algorithms
listing binary
listing permutation
bounded sequences
substituend
inversion
inverted list
information extraction
relationship extraction
malaria
hsv segmentation
watershed segmentation
giemsa blood sample
rbc.
p problems
np problems
np complete problems
customisable web system
online booking system
responsive web design.
cuckoo search optimization (cso) algorithm
maximum likelihood estimation (mle) algorithm
method of moments (mom) algorithm
raspberry pi
arduino uno
meteorological station
novel architecture.
usability
obesity
user experience
control network programming
cnp
programming languages
programming paradigms
computation models
while programs
recursive automata
nondeterminism
autism screening
ensemble learners
predictive models
mobile robot
swarm robot
navigation
obstacle avoidance
fuzzy logic controller
characterization
permutation.
transcript
mobile computing
rule classification
homomorphic token
ec2
s3
multi-path routing
flooding attack prevention
network load balancing
false report injection attack
false vote injection attack
genetic algorithm
educational data
educational data mining
lms
moodle
feedback system
parallel processing
matrix multiplication
interconnection network
hex-cell.
information technology (it)
flame detector tool
censor words
flaming
flame intensity
notification
social platform
booking control system
reliable and autonomic computing distributed and p
equal gain combining (egc)
nakagami
linked data
outage probability
speech processing
frustration.
asic
machine learning & applications
vlsi design
analog communication
covid-19
multipath
company profiles
research
engineering
digital forensics
human vulnerabilities
criminal profiling
processing time
control
algorithms
3d software
natural language computing
framework
unsupervised machine learning
emotion intensity
bayesian network
emotion recognition
emotion annotation
justification of recommendations
extended reality
comments
virtual reality
justification
recommendation
5g
name label switching.
ranking interfaces
cloud storage security
ccn
bdp
ndn
cloak-reduce
task allocation
word spotting
the aircc's international journal of computer scie
sustainable development
cpu
weight adjustment techniques.
academic portals
data-driven scientific research.
signal processing ? image processing ? speech proc
fpga based systems ? internet of things ? real tim
network architecture
interactive authentication
software development
open data
video processing
digital communication
concept map
3video processing
information processing
cellular communication
iaas
tfmcc
aspect-based scoring
sentiment analysis
substitution of the least significant bits.
information encryption
steganographic scheme
nist
learning skills.
reading skills
integrated environment
children literature
experimental analysis.
answer analysis
automated scoring
multiple choice questions
aspects
crosscutting concerns
static analysis
behavior-interaction-priority model
modularization
aspect orientation
mmersive technologies
nformation systems
finite storage and finite server
finite source
grade of service
sdlc
loss system
security awareness
security indicators
simulated training
computer security
cheating detection
computer activities
remote access
lan
monitor restricted files or documents
impose penalties to machine
fuzzy controller
sending rate
link utilization
arabic language
metamodeling
enterprise risk management
security management
enterprise architecture
business continuity management
search engines
discourse analysis
political science.
many applications on smart phones can use various
and then ¡°context of the situation¡± with 5%. where
the findings show that ¡°perceived effectiveness of
deepar+
cnn-qr
classification.
fabric defects detection
object as point
data augmentation
deep learning .
amazon
data analytics
product sentiment
ecommerce.
knowledge
management
multilevel.
logistic
data analysis
node.js
inbounded
crossover
user privacy
mutation
instagram
simulated
annealing
direct search.
mean square error
autism spectrum disorder.
healthcare
ehrs.
e-government
online searches
websites.
teaching
learning
empirical validatio
thick film transistor (tft)
retailing
rfm model
segmentation
adoption.
factors
riyadh
saudi arabia
education
artificial neural networks (ann).
mfcc
plp
speech recognition
agile methods
nearshoring
distributed agile
agile distributed software development
security detection model
computer-based exams
computer test.
web scraping
virtual tour
distributed processing
mean square error (mse).
point cloud library (pcl)
sirna
pso
ga-pso
ann
e-learning
online education
monitoring student attendance.
rfid
context awareness
recommendation systems.
change detection
concept drift
anti-detection
psnr
eight neighbour pixels
minimal distortion
information hiding
secure digital (sd) card.
graphically liquid crystal display (glcd)
wireless fidelity (wi-fi)
advanced risk machine microcontroller (arm) cortex
project management
feed forward artificial neural networks
binary particle swarm optimization
dbscan
k-means
silhouette score value
healthcare data
analytic
dataset
hierarchy process
coded modulation
information theory
learning and inference
prisoner¡¯s dilemma.
cybersecurity
network intrusion detection sy
ai-driven applications
performance indicators
student success
replication
android
consensus algorithms
analog-digital converter
tweet sentiment analysis
search lawyer online
hire lawyer online
online legal serivce
flip-flop
single edge-triggered (
zipf distribution
video popularity
hit ratio
cache update
metrics
market research
software design
feature extraction (fe).
convolutional neural network (cnn)
recognition
iris
biometrics
assistive technologies and pwm.
android phone
microcontroller
wheelchair
k-nearest neighbour.
tour leader
advanced data mining technique
? chunking
malware detection
generative adversarial network
geograph
embedded system and software
domain generated algorithm
dns
activities
mobile cloud offloading
forecasting
context-aware system
mobile cloud computing
bayesian networks
curvelets
speech signals
data mining performance
selection criteria
importance-performance analysis
multiple regression analysis
fuzzy theory
dyslexia
automatic detection
text blob
naive bayes
lstm
support vector machines
text analysis
output signal analysis
basic cell
intelligent agents
search for answers
sustainable environmental prot
financial efficiency
resource pricing
resource management
mobile social networks
centrality
mobile networks
testing
power quality
java enterprise application
web-based solution
rma
alzheimer¡¯s disease
reliable and autonomic computing
dependable
computer architecture and real time systems
social engineering
algorithms and bioinformatics
predict topic from tweet.
behavioral analytics
fintech
children
weet analyse
perceived effectiveness of ols
cultural dimensions
online learning systems (ols)
microsoft teams
speech identification
theories of intelligence
airport collaborative decision
servqual
service quality
competencias
self-efficacy
application security
pattern recognition.
aspect-oriented programming
materials
entropy
coding
ptimized/reduced run length coding
phishing attacks
technology threat avoidance
avoidance motivation
edge computing
stream processing
predictive learning
machine learning algorithms
learning methods
reinforcement learning
webinar
phonology
morphology
parsing
pos tagging
dialog systems
machin
presentation
scalable computing
mobility aid systems
physically disabled people
kinect camera
fall detection
it ¨C project management.
embedded systems
communication processes
organizational management
geographic information system (gis)
content strategy
sema
³¦´Ç³¾³Ü²Ô¾±³¦²¹³¦¾±¨®²Ô
authentication
authorization
assurance
open network operating
network topologies
software-defined networks
computer network
procedural justice.
legal technology
legal service online bangaldesh
gene-gene interaction
in ovo sexing
sexing of chicken embryo
lineal feedback
shift register
non-linear feedback geneticall
routing
information sharing
social network services
software architecture
peer-to-peer computing
world wide web
social computing
rf.
svm
climate services for farmers
disease prediction
clinical decision support system
co-design
hyper-threading.
amd phenom
intel core i7
multi-core processors
object-oriented design
object-oriented manufacturing control
angler phishing.
identity theft
recall
out of bag data
overfitting
k cross validation
maximum likelihood estimation
median imputation
random forest algorithm
logistic regression
data analysts and data scientists
analytical query
festival tourism
databases
automatic code generation
matbase
(elementary) mathematical data model
business rules
triggers and rules
data structures and algorithms for data management
integrity checking
deep learning & skin lesion image
u-net
k-means clustering
self-learning annotation scheme
tracking quality
recognition speed
camera calibration
marker creation
artoolkit
recommendation system
association rules
cluster
collaborative filtering
automata theory
geometry
tourism
algorithms and data structures
dynamic routing.
cluster head
greedy route
cluster-based routing
simulated annealing algorithm.
multi-objective flexible job shop scheduling
brainwave device
molfpp
molfp
transformation characteristics
hilbert¡¯s program
four-valued logic
incompleteness theorem
g?del
networking and communications
pattern recognition
nist test suite
scrambling
chaotic function
fractal
image encryption
grammar based data compression
adaptive automata
agro-ecological situation
decision-making
field scouting
ipm
prediction model
air ticket sales
non-relational constraints
relational constraints
database constraints theory
data modeling
intelligent systems
curvature
polygonal mesh models
crest lines
security and information assurance
3d gan
text-toimage synthesis
face manipulation
deepmasterprints
conditional generative adversarial networks (cgans
ewom
web-based learning
learners.
embedded system and software game and software eng
enterprise architecture evaluation
qualitative scenarios prioritizing
nsga- ii algorithm
headgear
fatigue detecting
supervised learning algorithms
gmm model
lidar point elevation
scheduling parameter
em algorithm
lidar
network antenna
microwave
technology micro-strip
mimo
trigger
misophonia activation scale
emotion
misophonia
organizational agility.
knowledge management systems
dynamic capabilities
data
absorptive capacity
distributed systems
leader election
encoding.
ppm
the importance of health sector in colombia is not
risk matrix
software project risk assessment
geometry ? computational physics & biology ? compu
automata theory ? computational complexity
fuzzy particle swarm optimization & frequent patte
intelligent information & database systems
game and software engineering
multimedia systems and services
gis
google maps
bus tracking
bus routing
mate selection.
the interoperability of heath history. due to the
personalized web acceleration web performance opti
performance engineering
caching strategy
web performance
colombia must begin a process to accomplish such a
the standar fhir is an example of successfull impl
weighted mean rank risk-adjusted model
data splitting algorithms
multiplayer
mobile game testing
unity
web services.
interoperability
erp
nanotips.
lattice networks
controlled switching
carbon nanotubes
3d circuits and systems
evolutionary computing
mmre
cocomo
ssl
set
security risks
e-payment
zero-width character.
pointed characters
kashida
steganography
arabic text
preprocessing
grammar-based
cfg
video streaming
video encoding
h.265
content adaptation
dsis
cloud gaming
? computer archite
von neumann bottleneck.
smart memories
processor-centric computing
processing in/near memory
memory-centric computing
memory latency reduction and tolerance
marker-based camera tracking
animated assembly design
social media
data compression
arabic text categorisation
festival
android mini game
e-shops.
pir
raspberry-pi
thesis projects
teacher training
teacher education
digital tools
development-oriented
academic portals.
5g mobile network
cloud service models
real time rendering
cpu.
3ds max.
multiple sclerosis
microarray
sustainable development.
single nucleotide polymorphism
early disease detection
next generation sequencing.
network protocols
wireless network
mobile network
word spotting.
traffic channel
weighted graph and rb
clinical features
epidemiologic
demographics
histology
lichen planopilaris
railway trackside safety
qr code
network centralized storage
nsl-kdd
kdd-99 cup
intrusion detection system
speed up.
parallel efficiency
parallel bubble sort
mpi
scheduling
operating systems
process
thread
task
gsm
ant colony optimization (aco)
and selective probability (sp).
network-on-chip
multicore
partitioning
vulnerability
exploit
penetration testing
hacking
compromised systems
mesh topology
genetic algorithm.
brain computer interface
electroencephalogram (eeg)
vigilance monitoring
bluetooth low energy (ble)
driver drowsiness.
model
technology acceptance
requirement modelling
data-driven requirement engineering
mobile application development
non-functional requirements
virus
worms &trojon
hacker
smart camera.
fuzzy numbers
intuitionistic fuzzy numbers
shadowed sets
point cloud library (pcl).
shadowed fuzzy numbers
fuzziness measure.
simulation
customer behavior
drop-ship
e-commerce.
information quality
empirical validation
system quality
systems maturity.
genetic interactive authentication
weight adjustment techniques
field of vision
computer games
university class scheduling problem (ucsp)
quantum computing architecture
m&g
3³¦¡¯²õ
7±¹¡¯²õ
knowledge discovery
nosql
process mining.
integration
classroom technology
it
job education
public health
cloud e-learning
stability measures.
selection stability
feature selection algorithms
framework.
web services
soap
saml
xkms
optimized/reduced run length coding.
idea
adoption
online shopping
tweet analyse
ict
secondary access
rural broadband enhancement
spectrum occupancy
important-performance analysis
service performance
core services
home stay
predict topic from tweet
requirements engineering
requirements elicitation
data processing
e ¨C commerce application.
agile
e ¨C commerce
light and sound excitation of live creatures
synapse control
decoherence
coloured algebras
quantum biological computing
data warehouse evolution
schema evolution
materialized view
data mart
master data management (mdm)
master data vault
business data vault
data vault (dv)
enterprise data warehouse (edw)
data warehouse (dw)
coffee beans
student model
landscape coffee shops
false report injection attack.
dynamic en-route filtering
network simulation
network architecture.
constraint-based modeling
smart parking
smart city
mobile application.
data-driven scientific research
aggregate offered traffic
jpeg image compression
entropy coding
finding like-minded vehicle
interest privacy
ecdsa
base point
ecc
vehicle chatting
vanet
rsa.
entity resolution
transitive closure
hdfs
cloudera
concept map.
talend
language tutoring systems
users¡¯ satisfaction
technology acceptance model
mobile payment
nosql.
relational database management system (rdms)
metadata repository
single-core processor
See more
Users being followed by AIRCC Publishing Corporation