Tags
data mining
cloud computing
soft computing
grid computing
high performance computing
green computing
cyber security
machine learning
dna computing
pervasive computing
nano computing
semantic web
soa
artificial intelligence
natural language processing
cryptography
knowledge management & ontology
deep learning
big data
quantum computing
software engineering / metrics
advanced computing
computational science
bio-metrics
bioinformatics
data mining applications
deep learning
software engineering practice
e-learning
wireless networks
gaming models
databases
ar/ vr applications
algorithms
computer vision
software engineering
ar/ vr applications
digital convergence
aspect oriented programming
privacy
database
knowledge processing
network security
wireless internet
networks & communications
high performance computing
next generation
mobile networks
design & communication"
paper submission
"computer networks
networks & data communications
fuzzy cognitive maps
engineering
mining trends
social networks
intelligent robotics
data
clahe
grid computing
knowledge management
steganography
computing
ai
refactoring
algorithm
computational schemes
system reliability
operability
reliability assessment
triangulation
projection matrix
camera calibration
epipolar geometry
image projection
image processing
homomorphic encryption
proxy cryptography
symbolic ai
learning
computer architecture
adaptability
lean
clustering
erp
business intelligence
simultaneous vessel identification
testing
retinal image analysis
ophthalmology
web engineering
quality management
text mining
practices and principles
automation
bio metrics
cybersecurity
education
multispectral image fusion
motion compensation
motion estimation
online education
knowledge of the learner.
qr code
ontology
data integrity
credibility
watermarking
passport
it service management
visa
devops adoption
forgery
fabrication
encryption
leadership
algorithms and data structures
campus training
backpropagation neural networks
vocational training center
pedagogical approach
information technology and communication (ict)
agile
e-commerce
demand fulfillment
texel
precision
texture
nlp
recall
grid and cloud computing
memetic algorithm
data science
job shop scheduling problem
big data algorithms
big data fundamentals
big data management
ubiquitous computing
internet of things (iot
shuffled frog leaping algorithm
hybrid information technology
multi-population
sub-symbolic ai
computer vision & applications
hybrid intelligent systems
natural language processing
knowledge discovery
nano computing
electronic commerce
cloud computing
green computing
blockchain
game theory
uml diagrams
evaluation model.
source-code metrics
internet of things (iot)
ordinal scale
refactoring opportunities
weka
vector quantization
socio-demographic characteristic
model
personal data
security
biometrics
community member
personality
macro block classification
motion vector
soft computing
gmm-ubm
cell phones.
saudi arabia
usability
cypher query language
website design
distance education
wireless interfaces
malware
handheld devices
publicauditor
revoke user
signature
mfcc
neo4j
mysql
prosodic feature
sqlite
relational databases.
image segmentation.
iintensity of blackberry use
information
validation.
cbir
fuzzyminmax
dimensional collections
heuristic evaluation
museum
electronic dictionary
performance measurement.
privacy-preserving
solution
finding
symmetric-key encryption
support counts
path
code clone
.
experimental result
decompression
software maintenance.
digital signature
two dimensional scaling transformation
scaling factors (compression factors)
example
graph databases
university websites
multilingual
vo
performance metrics
umeyama method
feature-based method
feature-less method & semi-dense real-time.
mobile ad hoc network
mobile ip
aodv
aomdv & dsdv
web-based learning
university
speaker verification
redundant bits
secure cloud architecture.
vulnerabilities
security challenges
security solutions
threats
segmentation enhancement
security and privacy
active contour
topological alignments
boundary detection
behavioural authentication.
i intensity of blackberry use
image format
aes algorithm
hashing
request for proposal for erp (erp rfp)
business process
erp implementation
erp proposal
enterprise resource planning (erp)
erp contracting
evidence theory
k-nearest neighbour
compression
face recognition; manifold learning; filter; clust
downlink beam - forming and admission control
convex optimization.
cognitive radios
green channel
diagnosis
blood vessels
classifier
diabetic retinopathy
load curve prediction
improve performance
silhouette plots
word sense disambiguation(wsd); classification and
peak signal to noise ratio
discrete cosine transform
computational efficiency
graphical processing units
compute unified device architecture
validation
cbir; fuzzyminmax
layar
augmented reality
layer
poi
web service
remote areas
virtualization
virtual computing lab
higher education institutions
stemming
text pre- processing
authorship attribution
feature extraction and machine learning classifier
big data analysis
customers purchasing behaviour analysis
keyboard dynamics
association based passwords
behavioural biometrics
keyboard latency
cognitive authentication
pvtl.
cognitive model
learner behaviour
reusable learning object
satellite imagery
land sat data
land use
land cover
new texture feature
fuzzy c-means clustering
brodatz dataset
active contour method
morphological operation
cv algorithm
automatic microbial counting.
microscopic images
optimal vessel forest
vascular structure
modified decision based unsymmetric median
anisotropic diffusion
edge preserving smoothing
image denoising.
light-weight block cipher
chosen plaintext attack
gpgpu
integral attack
grayscale image.
cholesky decomposition
duty cycle
modified successive approximation register (msar)
successive approximation register (sar)
duty cycle corrector (dcc)
double data rate (ddr)
fpga.
convolutional encoder
constraint length
hamming distance
verilog hdl
code rate
viterbi algorithm
viterbi decoder
specific absorption rate
mobile phone
finite-difference time-domain
feature detection
matching.
corner detector
3d modelling
structure from motion
key points (features)
differential evolution algorithm
ber
embedding
robustness
dft
principal component analysis
e-maintenance
industry 4.0
industrial performance
data transformation
micro-aggregation
cyber portfolio
e-portfolio
innovative menu
grid compting
semantic
discourse
cloud compuitng
data model
neural networks
data base
bio informatics
data management
high performance
comuting
tecjnology
advanced
analytics
high performance computing
high performance com
advanced networking technology
environmental geosciences
geochemistry
geochronology
geophysics
gis
information theory
probabilistic computation
data structures
cybernetics
informatics
robotics
complex adaptive system and theory
hybrid systems
advanced encryption standard (aes)
nios ii processor
sopc builder
nios ii ide.
cloud business
service-oriented architecture in cloud computing
cloud application
infrastructure and platforms
applications
decryption
mobile app
algorithms and bioinformatics
big data blockchain
authorization
reputation management
networkingc
architectures
advanced topics in software engineering
quality management
web engineering
knowledge-based systems
managing software projects
server performance indicator
priority service
big data applications
iot
real time systems
autonomic computing
devops models
distributed and parallel syste
/image processing
embedded system
software
fuzzy systems
information technology managem
intelligent information
modeling and simulation
machine learning applications
compiler design
computer graphics
software engineering/metrics/t
internet of things(iot)
web engineering
high speed networks
internet and web applications
internet of things (iot)
network architectures
support vector regression
wheat yield prediction
precision agriculture
nonlinear models
uzbekistan
geomatics
mineralogy
paleontology
petrology
soilsciences
tectonics
stratigraphy
physicalgeography
image analysis
e-learning/ e-governance
knowledge management & ontolog
data mining foundations
business
trust
pervasive computing
software engineering
cyber security
artificial intelligence
cloud computing
quantum computing
software design
medical informatics
multimedia convergence
embedded systems
autonomous agent
health and medical informatics
sub-symbolic ai.
smart card and rfid technologi
phonology
morphology
model evaluation
key distribution
forward secrecy
backward secrecy
message confidentiality
etl
enterprise resource planning
web portal
legacy erp system
one version data store
component-based development
cbd
component-based framework
cbf
framework
object oriented framework
oof
object-oriented programming
oop.
rnsc
mcl
cost of clustering
cluster size
modularity index of clustering results
nmi
enhanced
ib-leach
aodv protocol
simulation
sentiment analysis
domain specific ontology
artificial immune systems
obesity heuristic
data cleaning
e-business
web usage mining
web content mining
world wide web & pattern extraction
frequent itemset
distributed computing
hadoop
apriori
distributed data mining
montgomery algorithm
modulo reduction
convenient modulo
multiple precision
wavelet analysis
image compression
spiht algorithm
precise rate control (prc).
arabic language
latent semantic analysis (lsa)
similarity measures
root and light stemmer.
code book generation
privacy preserving data mining
k-means clustering.
eee leach
transmission time
throughput
neuroergonomics
neuroscience
ergonomics
plagiarism
string matching
software engineering practice
information retrieval
software process
fault tolerant
vehicle network
service discovery
location-based
stubs
uml
integration testing
test order.
web mining
freeman code
unicode
wireless sensor networks
wban
real-time data stream mining
concept-drift
physiological signal processing
health care
algorithms and data structures
automata theory
cochlear implants
一叩鉛馨叩稼
dual resonance non linear (drnl)
twitter
micro-blogging
sentiment lexicon.
infrastructure-as-a-service
amazon ec2
optimizing vm load
load balancing.
wavelet transform
directional filter
attacks.
unit testing
code coverage
automated software testing
cie lab colour space
diabetic retinopathy (dr)
exudates
glcm
k-means clustering
svm
recommender systems
image content
gps
smart phone
image retrieval
erp system
erp problems
erp security challenges
erp security solutions
erp and cloud computing
functional magnetic resonance imaging (fmri)
information technology
See more
- Presentations
- Documents
- Infographics