Tags
data mining
cloud computing
soft computing
grid computing
high performance computing
green computing
cyber security
dna computing
pervasive computing
nano computing
soa
semantic web
knowledge management & ontology
machine learning
cryptography
natural language processing
big data
quantum computing
software engineering / metrics
artificial intelligence
bio-metrics
advanced computing
computational science
deep learning
deep learning
databases
ar/ vr applications
gaming models
software engineering practice
wireless networks
software engineering
bioinformatics
e-learning
data mining applications
high performance computing
digital convergence
aspect oriented programming
network security
wireless internet
networks & communications
next generation
mobile networks
design & communication"
paper submission
"computer networks
networks & data communications
privacy
ar/ vr applications
steganography
algorithm
refactoring
engineering
clahe
computing
knowledge processing
computer vision
social networks
mining trends
homomorphic encryption
proxy cryptography
ai
data
grid computing
intelligent robotics
symbolic ai
fuzzy cognitive maps
adaptability
learning
fabrication
forgery
visa
passport
multispectral image fusion
ubiquitous computing
cloud computing
vector quantization
algorithms
knowledge discovery
electronic commerce
encryption
personality
demand fulfillment
multi-population
shuffled frog leaping algorithm
job shop scheduling problem
image processing
memetic algorithm
internet of things (iot
database
soft computing
green computing
backpropagation neural networks
clustering
data integrity
credibility
knowledge of the learner.
erp
computer vision & applications
online education
campus training
it service management
devops adoption
leadership
agile
lean
practices and principles
vocational training center
algorithms and data structures
pedagogical approach
web engineering
motion compensation
motion estimation
motion vector
macro block classification
information technology and communication (ict)
sub-symbolic ai
simultaneous vessel identification
texel
education
triangulation
retinal image analysis
watermarking
big data management
ontology
ophthalmology
community member
camera calibration
security
personal data
model
biometrics
socio-demographic characteristic
big data fundamentals
internet of things (iot)
weka
refactoring opportunities
ordinal scale
source-code metrics
projection matrix
uml diagrams
big data algorithms
nano computing
e-commerce
automation
natural language processing
qr code
testing
epipolar geometry
hybrid intelligent systems
recall
cybersecurity
text mining
texture
precision
nlp
image projection
bio metrics
active contour method
revoke user
brodatz dataset
signature
morphological operation
cv algorithm
vascular structure
automatic microbial counting.
microscopic images
optimal vessel forest
light-weight block cipher
chosen plaintext attack
image denoising.
edge preserving smoothing
anisotropic diffusion
gpgpu
modified decision based unsymmetric median
integral attack
grayscale image.
cholesky decomposition
principal component analysis
cypher query language
neo4j
mysql
sqlite
graph databases
relational databases.
boundary detection
image segmentation.
iintensity of blackberry use
validation.
cbir
fuzzyminmax
heuristic evaluation
performance measurement.
privacy-preserving
symmetric-key encryption
support counts
code clone
software maintenance.
digital signature
example
scaling factors (compression factors)
two dimensional scaling transformation
decompression
experimental result
.
path
finding
solution
electronic dictionary
publicauditor
distance education
saudi arabia
usability
website design
university websites
vo
performance metrics
umeyama method
feature-based method
feature-less method & semi-dense real-time.
mobile ad hoc network
mobile ip
aodv
aomdv & dsdv
web-based learning
university
embedded systems
security challenges
security solutions
multimedia convergence
segmentation enhancement
active contour
topological alignments
museum
authorship attribution
feature extraction and machine learning classifier
big data analysis
customers purchasing behaviour analysis
keyboard dynamics
association based passwords
behavioural biometrics
keyboard latency
cognitive authentication
behavioural authentication.
i intensity of blackberry use
sub-symbolic ai.
image format
health and medical informatics
aes algorithm
hashing
request for proposal for erp (erp rfp)
business process
erp implementation
erp proposal
enterprise resource planning (erp)
erp contracting
evidence theory
k-nearest neighbour
compression
autonomous agent
iot
big data applications
priority service
server performance indicator
morphology
phonology
smart card and rfid technologi
grid and cloud computing
peak signal to noise ratio
discrete cosine transform
computational efficiency
graphical processing units
compute unified device architecture
validation
cbir; fuzzyminmax
layar
augmented reality
layer
poi
web service
remote areas
virtualization
virtual computing lab
higher education institutions
stemming
viterbi algorithm
viterbi decoder
specific absorption rate
mobile phone
finite-difference time-domain
feature detection
matching.
corner detector
3d modelling
structure from motion
key points (features)
differential evolution algorithm
ber
embedding
robustness
dft
data science
cognitive model
learner behaviour
reusable learning object
satellite imagery
land sat data
land use
land cover
new texture feature
fuzzy c-means clustering
text pre- processing
face recognition; manifold learning; filter; clust
downlink beam - forming and admission control
convex optimization.
cognitive radios
green channel
diagnosis
blood vessels
classifier
diabetic retinopathy
load curve prediction
improve performance
silhouette plots
word sense disambiguation(wsd); classification and
pvtl.
duty cycle
modified successive approximation register (msar)
successive approximation register (sar)
duty cycle corrector (dcc)
double data rate (ddr)
fpga.
convolutional encoder
constraint length
hamming distance
verilog hdl
code rate
physiological signal processing
health care
algorithms and data structures
automata theory
cochlear implants
一叩鉛馨叩稼
dual resonance non linear (drnl)
information technology
information theory
probabilistic computation
data structures
cybernetics
informatics
robotics
complex adaptive system and theory
hybrid systems
advanced encryption standard (aes)
nios ii processor
sopc builder
nios ii ide.
cloud business
service-oriented architecture in cloud computing
cloud application
infrastructure and platforms
applications
trust
decryption
mobile app
erp security solutions
erp and cloud computing
functional magnetic resonance imaging (fmri)
neuroergonomics
neuroscience
ergonomics
plagiarism
string matching
quality management
software engineering practice
information retrieval
software process
fault tolerant
vehicle network
service discovery
location-based
stubs
uml
integration testing
test order.
web mining
freeman code
unicode
pervasive computing
wireless sensor networks
wban
real-time data stream mining
concept-drift
e-learning/ e-governance
data model
neural networks
data base
bio informatics
data management
high performance
comuting
tecjnology
advanced
analytics
high performance computing
high performance com
image analysis
advanced networking technology
physicalgeography
stratigraphy
environmental geosciences
geochemistry
geochronology
geophysics
gis
geomatics
mineralogy
paleontology
petrology
soilsciences
tectonics
algorithms and bioinformatics
big data blockchain
computer architecture
authorization
reputation management
networkingc
architectures
advanced topics in software engineering
quality management
web engineering
business
knowledge-based systems
managing software projects
e-maintenance
industry 4.0
industrial performance
data transformation
micro-aggregation
knowledge management
cyber portfolio
e-portfolio
innovative menu
grid compting
data mining foundations
knowledge management & ontolog
semantic
discourse
cloud compuitng
hadoop
apriori
distributed data mining
montgomery algorithm
modulo reduction
convenient modulo
multiple precision
wavelet analysis
image compression
spiht algorithm
precise rate control (prc).
arabic language
latent semantic analysis (lsa)
similarity measures
root and light stemmer.
code book generation
privacy preserving data mining
k-means clustering.
eee leach
transmission time
throughput
key distribution
forward secrecy
backward secrecy
message confidentiality
business intelligence
etl
enterprise resource planning
dimensional collections
hybrid information technology
information
security and privacy
threats
vulnerabilities
secure cloud architecture.
redundant bits
speaker verification
multilingual
gmm-ubm
mfcc
prosodic feature
handheld devices
malware
wireless interfaces
cell phones.
artificial immune systems
obesity heuristic
data cleaning
medical informatics
e-business
web usage mining
web content mining
world wide web & pattern extraction
software design
frequent itemset
distributed computing
amazon ec2
optimizing vm load
load balancing.
wavelet transform
directional filter
attacks.
unit testing
code coverage
automated software testing
cie lab colour space
diabetic retinopathy (dr)
exudates
glcm
k-means clustering
svm
recommender systems
image content
gps
smart phone
image retrieval
quantum computing
cloud computing
artificial intelligence
cyber security
software engineering
erp system
erp problems
erp security challenges
web portal
legacy erp system
one version data store
component-based development
cbd
component-based framework
cbf
framework
object oriented framework
oof
object-oriented programming
oop.
rnsc
mcl
cost of clustering
cluster size
modularity index of clustering results
nmi
enhanced
ib-leach
aodv protocol
simulation
sentiment analysis
domain specific ontology
twitter
micro-blogging
sentiment lexicon.
infrastructure-as-a-service
See more
Users following acijjournal