Tags
data mining
clustering
classification
cloud computing
security
ontology
machine learning
image processing
genetic algorithm
natural language processing
manet
particle swarm optimization
feature extraction
ant colony optimization
sentiment analysis
social media
information retrieval
routing
feature selection
big data
software engineering
optimization
aodv
rough set theory
social networks
k-means
filters
artificial intelligence
privacy
vanet
scheduling
steganography
gpu
pattern recognition
education
project management
surf
biclustering
edge detection
neural network
semantic web
association rule mining
video processing
network protocols
rsa
wsn
neural networks
encryption
fpga
computer vision
artificial neural network
hadoop
noise
twitter
vector control
performance
opinion mining
cuda
qos
decryption
text mining
integration
cooperation
machine learning methods
authentication
multimedia analysis
psnr
attacks
information security
mimo
image
modeling
image segmentation
segmentation
simulated annealing
sar
bayesian framework
fingerprint
support vector machine
link mining
arabic
denoising
induction motor
cognitive radio
stemming
spectrum sensing
mapreduce
fcm
deep learning
artificial neural networks
quality of service
mobility
compression
opencl
wireless sensor networks
object tracking
prediction
breast cancer
wavelets
virtualization
wireless networks
mobile applications
incremental pair-patterns
bayesian belief network.
lossy-counting algorithm
fp-growth
machine translation
model
pass transistor logic
svm
wavelet transform
modelling
correlation
trust management
preemption
sift
cryptography
data set
scraping
social data mining
online social networks
professional career.
linkedin
physician
healthcare
security and privacy concerns
adoption
daisy
hog
vlad
rop
retinopathy of prematurity
canny filters
sobel operator
lab color space
laplacian filters
tweets
arabic language
ofdm
fuzzy clustering
intrusion detection system
metaheuristics
association rules
die size
malware
static analysis
multi-agent system
dpa resistance
modular inverse
encryption key
trust
wsns
wireless sensor networks.
event detection
lte
interpolation
leach
log skew normal
outage probability
plagiarism detection
network
recommender systems
alamouti
manets
visual cryptography
classification algorithms
adaptive automata
e-learning
private key
processor
eigenvector centrality
fractal dimension
robustness
topic model
fault-tolerance
web usage mining
event
subnet
ubiquitous network
degree
induction motor control
direct torque control
decision trees
dictionary
traffic engineering
decision tree
named entity recognition
support vector machine.
usability
backup
data protection
probability model
clustered prior
correlation coefficient
distributed processing
chemotherapy
gesture recognition
digital signature
human computer interaction (hci)
cognitive disability
usability testing
mobile devices.
down syndrome
wireless
kfcm
gkfcm
hidden markov model
formal verification
distributed systems
algorithm
real-time processing
pedestrian detection
dbscan
energy harvesting
medium access control (mac)
big data analytics
higher education
bird eye view
clustering of lines
hough probabilistic transform
mean value theorem on hough lines on curve
weighted centroids
lsb replacement
single mismatch
embedding efficiency
probability of detection
lsb matching
software project.
attrition
software outsourcing
software bug detection
predictive analytics.
longwall systems
machine diagnosis.
virtual environments
semantic modeling
virtual human
shared secret key
block size.
home of keys
symmetric
compressive sensing
clustered compressive sensing
posterior
lasso
sparse prior
open database connectivity
legacy databases
flattened xml documents
open universal database gateway
data dependencies
data semantics
travelling salesman problem
soft computing.
meta-heuristic optimization
capacity problems
learning disability
reduct.
hausdorff distance
simulated annealing optimization
shape matching
medical image segmentation
affine transformation
gaussian filter
shadow and illumination correction
lda
mobile agents
software development
normalization
diabetic retinopathy
thresholding
texture
sensor network
web mining
soa
content based image retrieval
phishing
web application
mobile network
data center
vedic division algorithm
division algorithm
fast bcd division
architecture
industrial designs
tri-state inverters.
adaptive
speckle
formal methods
knowledge engineering
iris
face
ear
databases
ns2
block cipher
key
variable key
usb
pop3
xml encryption
symmetric key
smtp
confidentiality
simulation
payload
novelty detection
lemmatization
hindi
fuzzy-logic
analogy based estimation
similarity difference
vehicle route selection and direction
road traffic analysis
support vector machines
spiking neural networks
fault detection &diagnosis
graph dual & set theory
pipeline
droplet
biochip
multi-core
local gradient
gpu.
steering kernel regression
cloudlets
cloud simulator
cloud ontology system and parameters
leakage power
gdi
simulations
mobile ad hoc networks
wireless sensor network (wsn)
coverage
arduino microcontroller
gps
road traffic
traffic management.
emergency vehicle
mobile application
traffic signal preemption
resource description framework
speech recognition; soft thresholding; discrete wa
blind multiuser detection
code division multiple access
inter symbol inter-ference (isi). multiple access
k-means algorithm.
radial basis function neural network (rbfnn)
lemma
datacenters
image correlation
spatio-temporal fuzzy hostility index
real time video segmentation
community detection
spam detection
email
spam
peptic ulcer.
soft computing
fuzzy inference system (fis)
database
systematic review
robot
fuzzy inference system
android
approximation
wireless network
flex
load balancing
mac
sensor
miller-rabin
stein
cryptosystem
crypto-accelerator
extended binary gcd
public key
metrics
rc4
rc2
des
aes
data type
data size
data density and encryption time
blowfish
triple des
skipjack
electromagnetic code
propagation modelling
near field zone
wimax
software quality
complexity
software architecture
video surveillance
time series
scalability
differential evolution
face detection
image processing
coupler
circulator
microwave components
rectangular waveguide
p ower divide
siw
compliance and real-time change detection
support vector machines.
ontologies
fourier analysis
filtering
microwave
multi-tenancy
hevc
tabu search
histogram
expert system
camera tracking
planar template based tracking
visual odometry
k-means clustering
incremental tabulation for prolog queries
incremental evaluation of tabled prolog
cloud storage
image enhancement
wave atoms
wsq.
mapping
histogram based fast enhancement algorithm
contrast enhancement
histogram equalization
ct image
scalar quantization
unsupervised learning
sgplvm
violence
notification
dimensionality reduction
information extraction
spatial
mobile app
heterogeneous computing
lbp
eye-tracking
unicode
saliency map
halbach permanent magnet array
magnetically levitated planar actuators
induced current
classifier.
keywords: nlp
resource allocation
evolutionary computing
search based software engineering
genetic algorithms
mother tongue
punjabi
and classification.
system security
trust framework .
trusted computing
requirement quality attributes
ensemble
vagueness
ambiguity
malay ambiguity
attribute selection
h.264/avc
transcoding
pu
fast algorithm
this paper presents a distributed software mobile
gurmukhi
keyboard layout.
font conversion
soundex
engineering knowledge
standard arab
modelling and representation of vocal knowledge
(tts text to speech)
dependency relations
global co-occurrence information
word sense disambiguation
non- negative matrix factorization
mammograms
n gram
bag of phrases
traffic
delivery problem
real-world
dijkstra’s algorithm
multicore
hierarchical cache
microrna
ascii
low-ranking features
cancer classification
guided local search
parallel algorithms
cooperative algorithms
continuous optimization problems
quadratic neural unit
real-time-recurrent-learning (rtrl)
roller rig
back-propagation-through-time (bptt)
linear neural unit
unsupervised machine learning
comparability measure
e-mail
semantic orientation
praat
cache locality
linear image filters
colour image processing
oil paint algorithm.
paint algorithm
image filters
gain ratio
pulse clarity
audio classification
system on chip
network on chip
3d architecture
graphcut
maximum likelihood
maximum a posteriori
user-preference
kansei engineering
computed tomography
interactive genetic algorithm
model transformation; institution; uml activity di
text analytics
customer support.
speech analytic
multiplexing mechanism
dual-bit type (dbt)
brain tumor
word level activity
signal transition activity
digital signal processing (dsp)
thread-driven
event-driven
over-the-air
scheduling strategy
dag
task scheduling
ptg
workflow
hdfs (hadoop distributed file system)
telecommunications
regulatory authority
human interaction
structuration theory
human-computer interaction (hci)
colour combinations
manual data entry
data typing
arabic language tools.
question answering system
8-bit dac
chinese abacus & dac circuit
decimation free directional filter bank (ddfb).
fingerprint image enhancement
coherence enhancement diffusion directional filter
factorization
backtracking.
crypto-system
primality test
map reduce
communication protocols
cyber-security.
energy aware
comparative analysis
handwritten arabic characters
secondary component
clustering problem
multilevel paradigm
maturity model
customization modelling
stego-image.
metagraph
software as a service (saas)
hoeffding tree
data stream mining
jazz
adaptive sliding window
manufacturing logistics; mobile robots; path plann
ai
run-time uncertainty
case-based reasoning
self-adaptive software systems
model-driven software
time series prediction
nonparametric regression
kernel regression
kml
3d global
flight trajectory
ossimplanet
open-source platform
pagerank
link similarity
superintelligence
robotics
arabic scripts
similarity measure.
software process modeling
adaptive guidance profile
process engineering
point distribution models
mono-slam
slam
mobile robotics
discrete relaxation
hierarchical mixture of experts
handwritten characters
colour filtering
diving performance
satellite
fft
mosaicking
encoding entropy
coupling
motion detection.
muscle synergy
video segmentation
object detection
emg
articulated object tracking
people tracking
kullbackliebler distance
variational inference
biarticular muscle
nvidia
³¾Ã£±ð
rmse
sarima
ankle joint
web services
pedal operation
software performance engineering
maintainability evaluation
architecture style
third wave of ai.
cohesion
concept mining
morphological disambiguation
morphological analysis
audit; software quality assurance; risk management
automatic trading system
volatility strategy
velocity strategy
open interest contract
multi-objective optimization
protein structure
interaction network
semi-total replication.
partial replication
drtdbms
intransitive choice; preference reversals; recomme
facial aging; facial wrinkles; wrinkle maps; 3d wr
discrete cosine transform (dct)
variation-free
coordinate system
image watermarking
web mining.
fuzzy linguistic modeling
website classification
pitch analysis
mfcc
enlarged training set
emotion recognition
binary encoding
shearlets
xml compaction
image denoising
fuzzy logic
infrastructure sharing
parallel loops
cache-aware scheduling
arabic stemming
bayesian belief networks
water quality assessment
particle swarm
adaption
mutation.
exploration
evolution
attention
sudoku
exploitation
satisficing
proper names
ecg
gradient descent
fuzzy rules
isolated power systems
fuzzy inference systems
coloured petri nets
the detection algorithm has been applied for the t
a novel wavelet-based detection algorithm is intro
in this paper
upper bound
lazy join
typicality
top-k query processing
automatic control
real time motion
collision avoidance.
motion planning algorithm
expectation maximization algorithm
auto landing
quadcopter
flying robot
pre-ranking valorization
memoing.
xml storage
xml labeling
tabulation
justification based truth maintenance systems
intelligent fuzzy control
zero-client
adaptive decision tables
intelligent archiving
automatic document summarization
adaptive petri nets
image fusion 1. introduction
underwater vision system
auv
distribution automation
reactive power control
voltage control.
image-based rendering
wavelet im age compression
novel view generation of compressed images on andr
3d image warping
constraint programming; constraint satisfaction pr
mcf and ns-2
transistor count
microprocessor design
density.
gis
hardware complexity
trilateral filter and in-loop filter.
continued usage
location based social networks
multi-attri bute decision model
cloud service
cloud service selection
personalized recommendations
smart-phones
stereo correspondence & normalized cross correlati
motor drives
machine vector control
switching frequency
meta-heuristic algorithm
lacunarity
improved teaching-learning-based optimization
multi-agents system.
artificial immune system
bus tracking
invasive weed optimization.
multiobjective optimization
flexible job shop scheduling problem
smallest position value
bus routing
boolean modeling
cellular automaton
google maps
back-pr opagation neural network
scale invariant feature
perceptron network
character recognition
central server
dhcp server
arp poisoning
arp
jade
fuzzy log ic
distributed planning
heuristic and ai planning strategies
elec tric field intensity
three- sigma rule
multi-layer a rchitecture
feature selection.
routing protocol
added value
negotiation based routing
apriori-cell
dy namic analysis
leadership
information hiding
qr barcode
online information security
cla ssification
kdd cup 1999
intrusion detection
dimension reduction
incremental data
dynamic redu ct
rough set theory.
dtw
speech recognition
spce061a
pilot assist dec ision-making
classifie rs
iranian cash identification
mobile phone extra usage
visually impaired assistant
mobile learning
technology acceptance model
structural relationship
mdd
traceability
feature models
raise specification language
atl.
group of pictures
bitrate
error rates
and video quality.
multiview video coding
semicircular patch antenna
dual band
l-shaped slot
metadata
web crawler
searching relevance
tags
html
expanded mean value analysis
buffer allocation problem
closed queuing network
queuing theory
openflow
software defined networks
performance analysis
linear matrix inequalities
convex optimization
thau observer
ts fuzzy observer
airships
seamless mobile communication
competency model
smile intensity
smile veracity recognition
landmarks
retinal fundus images
transfer learning
computer-aided diagnose
apache kafka
real time image processing
text categorization
keyphrase extraction
dataset
image analysis
dvb-t
prognosis
parallel architecture
analog signal processing
image alignment
low dimensional feature.
cash identification using mobile
gps-free.
rssi
localization
ad hoc
distance
general game playing
adaptive device
self- modifying machine
keystroke
rule-driven formalisms
cooperating adaptive devices
reactive system
linear systems
lyapunov function
linear matrix inequality
dynamic output controllers
career assessment
profile matching
arm
webcam
recognition
hand
system
sockets
raspberry
multipoint
modeling composite service
coiflet transform.
graph transformation
nondestructive testing (ndt)
wavelet based deconvolution
defect detection
sdt
aspect extraction
customer reviews
opinionmining
diagonal process
part of speech
multiword term extraction
categorisation
summarization.
principal component analysis & fiducial points de
discriminative filtering
inductive logic programming (ilp); shiq+log; hybri
silhouette plots
improve performance
super resolution
fiducial points & parameter grid
low resolution
neighbour filling
dynamic service composition
mobile computing
service composition checking
estimating software
high pass filter.
wind power prediction
ownership protection
circulant matrix
singular value decomposition
digital image watermarking
rich internet applications
wind speed prediction
ajax
ria security
content delivery network
ria frameworks
compute cloud
bayesian fusion
web server.
portal infrastructure
self-service portal
cloud-based m odel
enterprise portal
lsb
embed
georg cantor
enumeration
mobile development
social-driven
mapping application
node replication; network security; energy efficie
packet
tags computing
reconfiguration cost
video search
switching networks
worms &trojon
virus
numerical weather prediction
inter frame (p-frame)
h264/avc
intra frame (i-frame)
multipath routing
aomdv
predictive analysis
squared-error criterion
k-means algorithm
clustering analysis
large-data sets.
mean-shift algorithm
color space conversion
quantization
text extraction.
electronic health record (her)
walsh-hadamard transformation
rotation and classification
privacy preserving
wavelet thresholding
fog computing
electronic medical record (emr)
data acquisition card
flat topology
³Ùé±ô鳦´Ç³¾³¾³Ü²Ô¾±³¦²¹³Ù¾±´Ç²Ô²õ
valence
bci
multimodal human emotion
eeg
arousal
security integrity
privacy protection
data sharing.
cryptographic algorithm.
anonymity
cpu
attributes & external software quality attributes.
korean wave (hallyu in korean)
refactoring
ad hoc network
mobility models.
cross layer
instance
total least square (tls)
relational model
owl
fact
savitzky-golay filter
resizing
watermarking
dct domain
feature points.
image normalization
query optimization
query caching
query decomposition
object databases.
stack based approach (sba)
stack-based query language (sbql)
entity resolution
packet delivery ratio
process control
computer-controlled system
electric field intensity
level control
pid
android sdk
threesigma rule
influence maximization
viral marketing
mobile application development
multi-layer architecture
android studio
location-based services
extreme programming.
cyclic ambiguities
estimation of signal parameters via rotational inv
direction of arrival (doa) estimation
qos.
average case analysis
computer experiment section
empirical-o
statistical bounds
theoretical analysis
automatic control system
micromanufacturing
nano positioning stage
image retrieval based on spatial features
semantic gap
cert center
semantic image retrieval
coverage loss time
node lifetime
maximum stability
data gathering
minimum distance spanning tree
mobile sensor networks
agile software development
semantic web services
key terms summarizer
service discovery
short word
short mail
wordnet
short text dictionary (std)
cepstrum.
zero crossing rate
fundamental frequency
short time energy
database compression
backup optimization
database decompression
real-time database
color image segmentation
avatar.
dominant region
biometrics; biometric fusion; face; finger; contex
anfis
framework
kpca
tagging software
ubicomp
dynamic topology
interaction-scenarios
route trust
smart environment
path trust
vm placement
vm migration
energy management
vm consolidation
wearable-computing
channel estimation
decryption.
isdb-tb
empirical analysis
mapping function.
pair programming
wiener filter
pap smear test
bayesshrink and sureshrink thresholding.
visushrink
knowledge base
cyber-crime
anti-phishing
ssl
internet attacks
and parsing.
society
community
culture
humanistic
art
adaptive step size
qos routing.
hierarchical routing
timedriven method
abstraction
uml
use case
use case model
behavior
ad-hoc networks
frequency of rekeying
ocl
formalization
data
intensity
hierarchical
region growing
x-y-z image
object surface segmentation
multi-agent systems
mobile code
ml
wireless mesh networks
fading correlation
mmse
cross polarization coupling
v-blast
zf
visualization.
rekeying operation
cra
group key management
reconstruction
acquisition
benveniste algorithm
aclms
mathews algorithm.
intrusion detection system (ids)
denial of service (dos)
authentication.
v2v communication
vanet.
v2i communication
• algorithms and bioinformatics
semantic similarity
accessibility
web search engine
arabic sign langauge
web snippets.
citation networks
citation analysis
citation sentiment analysis.
citation extraction
citation classification
service composition
machine
clms
gabor filter
minutiae
bifurcation
binarization
hyperspectral imaging
imaging spectroscopy
k-medoids
median filtering
anomalies
mutual information
exudates
• fuzzy logic techniques & algorithm
• fuzzy mathematics
spoofing
liveness
bagging
contourlet transform
• computer architecture and real time systems
kin selection
overlay
peer-to-peer networks
genetics
altruism
selfish nodes.
lstms
ksordb
cuckoo search optimization (cso) algorithm
mean square error (mse).
maximum likelihood estimation (mle) algorithm
jargon word
concept.
synset
suspicious word
natural language processing (nlp)
network simulation
wireless sensor network
statistical en-route filtering
self organization
app distribution platforms
mining reviews
ios & android os
data-driven decision making
business analytics
lean organization.
music melody plagiarism
retransmissions
ad hoc networks
throughput.
tcp
music melody retrieval
subsequence matching
recurrent neural networks
adiabatic circuit
full adder
ecrl
timed automata
code generation
philosophy of computer science
four-valued logic
network monitoring
anomalies detectors
software defined networking (sdn)
text summarization
sentence scoring
term occurrences.
point-to-multipoint
broadcast
incremental redundancy
ack/nack
harq process
astrophysics
astronomy
crater
detection
pfal
blockchain
smart contracts
survey
medical image
detection time
over-stemming and under-stemming
military cartridge
case mouth defects
circle detection
mandelbrot function
etc
learning theory
multi-penalty regularization
general source condition
mimo-ofdm
back propagation network
rvq
facial recognition technology
remote class attacks
cyber security
outbound traffic.
inbound traffic
extrusion detection systems (eds)
intrusion detection systems (ids)
cyber space
incremental cluster-patterns
incremental cluster-patterns
intuitionistic fuzzy annihilator
incremental cluster-patterns
intuitionistic fuzzy ideal
intuitionistic fuzzy submodule
nlp.
lstm
& cfg
sub-classification of ‘paas’
vanchipaa
rfid
fbmc
pir
medical imaging
wormhole attack
hierarchical clustering
hierarchical node addressing.
dsr
fourier transform.
cache resolution
video
cooperative caching
multirate signal processing
semiprime ring.
intuitionistic fuzzy prime submodule
dummy face
masked face
colour imposed face
grammar formalism
grammar checker
people focus
relative capacity
distance constraint
volume constraint
hyperspectral unmixing
stability
mobility models
connected dominating sets
algorithms
user rating
user feedback
fault resilience
network lifetime
user satisfaction
partition
app reviews
formal method
tampering
venpaa
aasiriyapaa
kalipaa
image annotation
performance and speedup
amdahl's law
chip multicore processor
mix-split
ramp code
fine-grained access control
non-perfect secret sharing
mix-split
computational linguistic
ramp code
fine-grained access control
non-perfect secret sharing
requirements
etc.
control model
virtual machine security
multiple web pages
knowledge discovery and acquisition
engineering accreditation
branch handling
uniprocessing
processor performance.
prefetch
nasal; non-nasal; pitch synchronous; temporal doma
user requirements
scope definition
wbs
software scope verification
inspection
textual sentiment
olap systems
materialized views
hfss.
hfss
academia
software maintenance
defect prediction
defects
bug-fixing time
effort estimation
wall-following robot navigation
robot control systems
policy management
human factors in software engineering
policy managemen t
projection
over-stemming and under-stemming.
human aspects of engineering
back propagation network.
neural model
roi tracking
vector clock
event-b
mutual exclusion.
formal specifications
distributed system
r
lt
sdhtiwcia and message digest.
ilt
lsb-1
camms
ide
collaborative design.
plm
mbd
dmu
cc
consistent clusters.
chaotic spiking
software size
class point
multilayer perceptron; simulated annealing; traing
fast fourier transform (fft)
10-k parsing rules
wavelets.
edgar search engine
wavelets.
textual analysis
vibration stimulation
motion change
elbow joint motion
perception-assist
maxwell's demon
grammar based data compression
non-rigid deformation
multi-resolution pyramid
background suppression
lifting wavelet transform
snr & spcc
mean square error (mse)
audio steganography
theft security
eigen faces
surveillance.
opencv
haar classifers
pca
viola-jones
ladygaga
dynamic range
wom
hitphenomena
advertisement
coldplay
l’arcen- ciel
mp3
optimization methods
conjugate-pair
humans
the human optimization
lcm
binary
multi-moduli.
pig
netflow
network traffic
ict
telemedicine
information communication technology
outliers
heterogeneous.
median
transmission line extraction
bbo
simplified bb o
single migration
bwt implementation
cis strategy
speech processing & fir digital filter.
cochlear implant
scaling
level set method
gpu programming
image segm entation
entity retrieval
real-time system
drowsy driver detection
expert seeking
eye detection
haarcascade
image acquisition .
optical flow
uav
music concert
association rules mining
hybrid recommender system
asynchronous discussion group
software metrics
software life cycle
quality assurance
agile methods
discriminability
revocability and fuzzy commitment
cancelability
glcm
ica
bfgs
bss
evolutionary algorithm
biogeography-based optimization
partial migration
ibt
wireless backhaul
authentication and message digest.
vanet architecture
hetnets
phase shift keying
quantum communication
mode of operation
encryption oracle
stream cipher
mobile agent
handoff.
pso.
unsupervised classification
gram-schmidt spectral sharpening
sar ice classification
supervised classification
kappa coefficient.
multiuser mimo
image hiding
data hiding
key distribution
key generation
outsourced it projects
snooze attack ileach
security management approach.
classification;
e-learning; learning styles; ieee lom
urdu ir
optimal cost path.
flat-file-systems
land-type-data-bank
priority
digitized map
land acquisition
lsb-0
security and compliance management
aco
ad-hoc network
opencl programming
python syntax
end-to-end delay control
hpam
multi-channel multi-radio
concept maps
novelty score
topic modeling
cyclic division algebra (cda)
effective channel matrix
reduced golden ratio golden code (rgr-gc)
bit error rate (ber)
low complexity decoding
security techniques
intrusion detection system.
joint design
organizational culture
bt
multitenancy model
role-based access control
access control models
attribute-based encryption model
pso and tamper detection.
hash function
dabechies4
image authentication
java technologies
linear congruent operator
optical orthogonal codes(ooc)
3 dimensional
model b.
galois field (5)
cubic congruent operator
optical code division multiple access
massive mimo
chromosome.
health
communicable disease.
catalog
knowledge representation
ontology development
contextual model
academic networking
recommendation engine
transformer-less shunt hybrid active filter
shunt active filter
power quality
total harmonic distortion
zero crossing rate; peak valley detection; voice a
palm and finger
arima
holt-winters
palm and finger print
forecast
evolutionary clustering
priors
z-transform; frequency domain; mean square error (
compression ratio
affine map
iterated function systems (ifs)
partitioned iterated function systems (pifs). 1. i
quardtree partition
fractal compression
fitting
action unit
storage
facial landmarking
grey relational analysis
software estimation
feature weighted grey relational based clustering
crossover
otsu method
genetic algorithms; parameter control; parametric
roni
harris corner detection
fuzzy c-means
roi
key establishment
rdf
structured information extraction
semantic web.
sparql
syn flooding
ip networks
wireless multimedia sensor networks
geographic multipath transmission
load balancing.
image encryption
mosaic images
color transformation
optimal path identification
advanced sobel operator
modified lesk (ml)
word sense disambiguation (wsd)
bag-of-words (bow).
embedding secret message in quality song
tolerance level of embedding message
bit level encoding.
song authentication
perceptual coding
minimax search
awale
sketch technique
endgame
qos routing
tora
mobile agent.
chi-square
hellinger distance
agent based intrusion detection system (aids)
live streaming
hybrid
peer-to-peer (p2p)
betweenness centrality
model checking
graph distribution
state space generation
binary decision diagram
hash map
apriori algorithm
prefixed-itemset
large-scale cultural heritage
the grand canal 1. introduction
virtual scene construction
machine diagnosis
machine monitoring
processes & tools & languages
taxonomy
comparison
long-term potentiation
compressed sensing
excitatory postsynaptic potentials
kurmanji
sorani
kurdish language
dialect identification
nlp
video database
hog features
fast search
belief revision systems
tabulation for logic programs
justification-based truth maintenance systems
truth maintenance systems
memoing for logic programs.
applications of justification-based truth maintena
distributed algorithms
domain- specific modelling
functional safety
combining classifiers
time-series shapelets
attribute implications
nowledge discovery
engine design
negative attributes
formal concept analysis
apache storm
distributed stream processing
switched array
tan
altimeter
experimental design
orthogonal arrays
sampling theorem
digital signal processing
beamspace transformation
overlay multicast tree
method engineering
threat modeling
cloud software development
agile methodology
scrum
software crisis
extreme programming
agile manifesto
load-balance
parallel processing
freshness
etl
regulation.
law
high-rate
model-based design
embedded automotive systems
scenario
grasp
uncertainty
feature model-based virtual cluster commonality an
virtual cluster disk provisioning
call graph
bidirectional search
static source code analysis
huge amount of source code
graph path
ieee/acm computer science curriculum
software job ads
software development curriculum
multiclouds
personal cloud
secure cloud architecture
public cloud
cloudify
appscale
inter-event time
armada
probability distribution
data mining.
wearable wireless sensor based area network
e-health
m-health
training
empowerment
organizational commitment
job satisfaction
reward
telecommunications company
agglomerative clustering
categorical time series sequence
real-world networks
distance metric
intensification
knowledge capturing
multiagent system
scrutiny of admission forms
quality analysis
software development cycle
iso/iec 25051
ready to use software
evaluation process
iso/iec 9126
quality model
time dependant
functional response
signal processing
medical imaging analysis
fnirs.
smoke detection
data compression
long-term depression
hardware-software interface
rcpsp
cloud foundry
openshift
stackato & stratos
label ranking.
multi-label classification
learning object
technical skills
skills
human skills
conceptual skills
management competence
managerial skills
deadline
cloud broker
task scheduling algorithm
nist reference model.
intermediation
dynamic service allocation
wireless lan
grouping
ubiquitous computing
chemical proprieties
group mutations.
frequency
dna sequence
dna bases
position
markov chains
city services
cloud architectures
smart cities
cost estimation
joint network/channel decoding
network coding
wireless network.
cycle
distributed
software defined networking
educational management
data centre
item competence
active vehicle
processing delay
sensing energy
tag identification
computational rfid
mobile
analytics & cloud computing
web-scale
model checkers
framed slotted aloha
medium access control.
internet of things
machine-to-machine
system modelling
learning algorithm
fea ture selection
icu
genetic algorithm
dispatching rules
single machine
privacy preserv ing
confidence interval
standard deviation
numeric signature
access control
rouge-su (2)
o pinion mining.
automatic language processing
automatic summary extraction
f- measure
text mining
sentiwordnet
evaluati on
random access protocols
tsp
parallel
radio cognitive
primary/secondary user
power spectral density
bpsk modulation
energy detection
image fea tures
cross-validation
cbir
image similarity
circular sectors
sensitivity analysis
remote sensing
lidar calibra tion
camera calibration.
lab test
as computing performance and network technology ha
indoor positioning
trilateration algorithm
location-based services (lbs)
distance-based filtering algorithm
indoor location tracking
tolerance relation
dilation
temporal databases.
erosion
fuzzy time intervals
temporal relations
dynamic weight
qos metric
weight
unified qos metric
application weight
well-formed nets
inria person
subarray formation
correlated noise
dft beams
cramér-rao bound
geometrical features
hsv appearance
human tracking
non-overlapping views
prediction of stock exchanges
reliability block diagram
software architecture style evaluation
heterogeneous sensor
haar-like feature
policy
co-relation between economy and post-graduation st
we present an adaptive remote display framework co
we can skip unnecessary steps and perform core act
mobile device users can enjoy high quality multime
e-learning systems
2-simplex
cognitive modelling
2-simplex prism
psychosomatic disorders
cognitive graphics
decision-making
rate limitation
self-propagating malware
shared bitmap
connection failure behavior
stable marriage problem with ties and incomplete l
socially stable matching
bipartite matching
stable marriage problem
african national research and education networks (
latency
internet exchange points
computational linguistics
there is general concern about high power consumpt
daimler.
dct local
hol
dct global
security analysis of mobile authentication using q
cloud security
energy disaggregation
blued
model checking.
density-based clustering
change-interval detection
nilm
non-intrusive load monitoring
selective opening attack
indistinguishability obfuscation
deniable encryption
functional encryption
hazard filtering
balanced path delay
power dissipation
glitch
multiple threshold transistor
test case generation
test case optimization
harmony search algorithm
meta-heuristics
test data.
triplets
friendship graph
friendship matrix
short answer
risk management & information security
floating point division
taylor-series
drug response
expression data
ip core
low resource devices
lightweight cryptography
hight
digital signatures
concealed data aggregation
dydog
texton & coastal zone
obia
structure tensor
part of speech tagging
smo
sleep mode
header switch
leakage current
mtcmos
footer switch
delay and switching activity.
boolean formulas
symbolic expressions
dnf
cnf
knowledge management (km)
smart pls
¾±²Ô»å´Ç²Ôé²õ¾±²¹
knowledge transfer (kt)
employees characteristics
knowledge performance
compatibility
trialability
communication networks
packet routing
setup delay
fault tolerance
security analysis
rsa cryptosystem
proxy signature
gate freezing
fractal
multifractal
histology
smart-home
indoor localization
multi-agent
fall
tele-health
point pattern matching
relaxation labelling
registration
graph matching
multiple support vector machines
yacbir
microsoft kinect
turkish sign language recognition
skeleton model
literature review
pioneers’ perspective
software maintainability and degradation
change impact
software evolution
change propagation
change ripple-effect
network security
network intrusion detection system
open source
cisco switch configuration & quality of service.
sparse principal component analysis
visual tracking
particle filter
single-channel speech intelligibility enhancement
gaussian mixture models (gmm)
deep neural networks (dnn)
multi-resolution cochleagram (mrcg)
dynamic-integration
small-world network
realworld network
terahertz
pa
100 gbps
rapp model
psss
internet of things (iot)
video forensics.
prnu
g-prnu
feature digitalisation
active shape model
facial expression recognition
computational complexity reduction
p2p
bittorrent
& synchronization
degree of interaction.
time- interaction
digital interactive story telling
time dependant logic variables
timing
logic design
graph algorithms
iterative logarithmic multiplier
graph processing
graph analytics
graph parallel computing
big graph
ieee 1149.1
dft
boundary scan
tmp controller
tap
jtag
genes
peer-to-peer
services
heterogeneous
and heterogeneous-services.
secure group communication
group key
key tree.
sensing node
key management
dynamic software product lines
dspl
adaptive security
emoticon
social network analysis
uwb antenna
microwave imaging
lsb algorithm
aes algorithm..
random network
sub-cluster
³¦³ó’
orphan nodes
o-leach
gateway
decision rule mining
associative regression
probabilistic rules.
bayes sentiment classification
radio channel measurement
multi-radio wmn
labelling
vertebra segmentation
mri
fuzzy term.
web log file
fuzzy association rules
optical character recognition (ocr)
artificial neural network (ann).
configuration process
basel.
economical informatics
computer simulatio n
erlang c
erlang b
queueing theory
banking system
banking regulation
computer network
migration period
global optimization
para llel algorithm
data encryption standard
microprocessors
cisc and risc comparison
communication security
smart
sha-1
web cloud
file transfer
file integration
sql
final user
conceptual query language
analysis and performance study.
data dissemination
security screening system.
cross-language information retrieval
border security
weighted kaiser filter.
fetal heartbeat detection
non-invasive
uterine contraction
music spectral estimation
displacements
decision justification
c ryptography
bottommiddletop layer (bmtl)
topmiddlebottom layer (tmbl) layer
hand written and printed character recognition (hw
service sector
mcdm
madm
moora
manufacturing sector
text analysis
random networks
small-world networks
braille to text conversion
skew correction
skew detection
web spamming
feature selection & adversarial ir
content spam
sharp objects
pa ttern match
surveillance behaviour
precautionary measures
real-time dynamic video
saml
federated identity management
management architecture
service mana gement
probabilistic model
character segmentation and recognition
number plate localization
number plate recognition
future internet
hsv
protocol
ccn
gossipi ng
local algorithms
key agreement
functional analysis
permutation flowshop scheduling problem
parallel algorithm
datamining
genome annotation
gene ontology.
microarray
blurriness & support vector machine
metamodel
technological innovation mana gement
lessons learned
knowledge management
ssl/tls protocols
handshake protocols
skeletal muscle
multi-filter system
micro array gene expression
neu ral networks
gjr model
garch model
computer v ision
caffe framework
image recapture detection
rust detection.
adaptive importance sampling
tunable pa rameters
msbn
ljf
software testing
continuous in tegration
fault localization
mutation testing
guidance process
development context
adaptation
spamdexing
filter techniques
distributetd data mining
multiproc essor and cluster
trajectory queries
mongodb
databases evaluation
postgresql
nosql database
cassandra
k-means clus tering
linear regression
random effect
tuition growth rate
decision tree
numerical function optimization
vo rtex search algorithm
modified vortex search algorithm.
emerging markets
conditional volatility
incident report
flash memory.
b-tree index
flash-aware index
dynamic page migration
shadow paging
live migration
capstone project
connected vehicle security
wi-fi fingerprint
wireless attack
deterministic compartmental models
neighbour binary rules
ode
connectivity.
infectious disease expansion
psychoanalytically inspired ai
learning
emotion
hpa nonlinearity
heterogeneous networks
dynamic routing
sensors deployment problem
out-of-focus
image sharpness
motion blur
no reference metric
residue number system
non-coprime moduli set
forward conversion
classification.
virulence protein sequences
bioinformatics
attribute encoding
chaotic structure
tf-idf
disaster management
context information
least-squares method
human-computer interaction
visualization
implicit interaction
autoencoder
multimodal biometrics
sparse classification.
gaussian mixture models
textural features.
intubation verification
genomicsdb
cloud
life science
lustre
matching
usable security.
learning roadmap
online social network
emergency response
artificial recognition system (ars)
cognitive automation
artificial general intelligence
software agents
simulation of mental apparatus and applications (s
cognitive architectures
wdm networks
packet scheduling
image quality assessment
subjective quality
computer vision performance
image creation
semantic analysis
image database
complex network
game theory
welfare system
tweet
network and communication security
turkish
graphical models
expected utility
k-clique problem
principal component analysis
iris recognition
critical success factors
image quality
cross-platform
user experience
multiple user interfaces
cybersecurity
knowledge management; higher education; lkmc; king
intra-cluster routing; payoff function; wireless s
archive
top management
ios
xml database
jitter
hardware schedule.
time-triggered/event-triggered
gait analysis &classification
mobile phone applications.
scada networks
pedometer
tesseract
segmentation.
row finding
optical character recognition
verbal mwes.
nominal mwes
part of speech tagging (pos)
statistical measures
multiword expressions (mwes)
informal domain
min-based possibilistic networks
possibilistic decision theory
optimistic criteria.
moral graph
script-based cyber attacks; forward-proxy server;
code clone; software evolution; topic; topic model
prediction by partial matching compression
sentence alignment for machine translation
parallel corpus
arabic nlp
query generation
similarity computation
document retrieval .
dynamic analysis
wpan
ecma368
mbofdm
new waveform
collage image
conditional random fields
data recovery
data loss
facebook
social network services
text clustering
malware detection
extractive text summarization
markov random walk model
rhetorical relations
smart cards
hough transform
time complexity.
fingerprint alignment
java card
cryptographic protocols
computer security
empirical evaluation
visualization and animation
arabic natural language processing
corpus linguistics
time-delay estimation
leach.
clusterhead
wireless sensor networks (wsns)
energy
gamification
existing approaches
mb-ofdm
snr
uwb
ber.
ola
ecma-368
cir
zps
task graph
characterization
middleboxes
network compression
energy conservation
big data.
big data mining
manuscript restoration
noise removal
gaussian bandpass filter
interference
correlated lognormal sum
characteristics and behaviour
metrics.
shadowing environment.
source localization
room acoustics
moment matching
asymptotic approximation
lognormal sum
genomic knowledge.
heuristic algorithms
microarray data
tuned csa
vanets
dqsmrp
its
routing protocols
secret sharing
symmetric key.
predictive text
random number
differential transformation method (dtm).
spherical particle; acceleration motion; inclinati
qubit model.
data structure
quantum computing
human computer interaction.
smart keyboard
underwater acoustics
frequent mining
stream mining
trust.
hofstede's cultural dimensions
bio-inspired algorithms
artificial agents
virtual network
security configuration
virtual machine
software defined network
virtualized infrastructure
image depth
dietary inspection
lbp-hf
ofdm/oqam
ostbc
& theory of flow
viewpoints.
software process
views
architecture enterprise
lte-a subscribers
red5
ria
web2.0
videoconferencing system
j2ee
openskimr
queue length potential field
congestion control
digitalization
traffic-aware
depth potential field
se-cca model
comprehensive advantages
aes cipher
multi-faceted model
partitions
bipartivity index
network graph
eigenvalue
eigenvector
molecular fingerprints
molecular representation
virtual screening
road region segmentation
sequential monte-carlo estimation
lane recognition
proposed scheme
monitoring the election
applications
qwertykeypad
model drive generation
business process
medical diagnosis
island model
segmentation problems
drls model
interpolation filter
background subtraction
hole filling
depth images
siso
multi carier
mc cdma
diversity
distributed-stbc/dstbc
relay’s diversity
rayleigh fading
stbc
multi-hop system
cdma
time reversal
attributes quality performance
dct
selective encryption
multimedia
supervised learning
imageprocessing
cvss
security evaluation
markov reward models
non-homogeneous markov model
attack graph
cyber situational awareness
dtn and manets
particular real world area.
nlp arabic language
performance analysis.
femtocells
resource scheduling
potrooms
embedding algorithm
joint watermarking
mobile security
video streaming
video-on-demand
3g network
multimedia cache
3gpp
sae
aka
umts
low power design.
high speed or gate
domino or gate
low pdp design
quantum cost.
urdhva tiryagbhyam algorithm
reversible logic
document
unsupervised system
photocopy
fabrication
ocrs
autocorrelation
orientation
number plate
change of radix
re-integerization
matrix transformation
fractionification
gnu/linux core utilities
mindtool
good programming style
information technogies
modified average distance self-relocation.
average distance based self-relocation
ms
idle time
nsga ii
electrostatic force
van der waals force
proteins
active site
docking
data sharing & voluntary services.
rsu
ontology evaluation
web content mining
ontology learning
alarm
machine learning algorithms
deep web
latent dirichlet allocation
latent semantic analysis
form content and page content.
fidelity
multipliers
vedic multiplier
dark channel prior
airlight
direct attenuation
image restoration
fog removal
document analysis
preprocessing
drop fall technique
water reservoir technique
hit-rate and peer-to-peer networks.
baton
bestpeer
agents
hashtag
computational grid
cuckoo search
numeric association rule
hidden markov models
higher education instituti - ons (heis)
critical success factors (csfs)
enterprise resource planning (erp) system
erp implementation
oracle
jdbc
intranet
java programming language.
ordbms
multithreads
applets
oop
public transport network
environmental optimizatio n
middleware
geographic informational systems
statistical
op erating system
reinforcement learning
online machine learning
scheduler
decision tree.
predicti ve model
rheumatoid arthritis
cuckoo’s algorithm
adaboost
minimum spanning tree
data aggregation
fuzzy decision making.
cluster ing
wireless sensor networks
c ontinuses rule extraction
educational data mining
bee colony optimization
eigen values
safety and liveness property.
node monitoring protocol
validation
sdl (specification and description language)
verification
convolutional neural network [cnn]
convolutional deep belief network [cdbn]
supervised & unsupervised training
image processing & projection method
water meter recognition
dsp
diffusion of innovation (doi)
cloud computing adoption
technology-organisationenvironment (toe)
extraction
feed forward
comprehensibility.
pot
multi-obje ctive algorithm
commodity of interest
multi-commodity n etwork flow optimization
linear programming
hybrid algorithm
graph theory
alogrithm
critical thinking
parallel.
maximum flow
extended mixed network
semantic relations
an tonym
pattern-based approach
random graphs
graph isomorphism
precursor step
lego mindstorms nxt robot
match points
vrml
3dmax
vr
arcgis
closeness &inter-connectivity
density
density peaks
k-nearest neigh bour graph
arabic dialogue language understanding.
spoken dialogue acts
arabic dialogue acts
annotation layers
graphical user interface
language resources
annotated corpora
annotation speed
language specific crawler
rule base syllable segmentation
myanmar language
clustering coefficient
transform domain
and largest lyapunov exponent
chaotic system
heart rate variability
lyapunov ex ponent
quality of service (qos)
long term evolution (lte)
ca rrier aggregation (ca)
downlink scheduling.
lte-advanced (lte-a)
adaptive hystresis controlle r
sdn
rules
security challenges
weka classifiers
fault diagnosis
bayesian networks
kmeans clustering
texture description
unsupervised image classification.
bov
plsa
region of interest
resource scarcity
performance enhancement.
cloudlet
mobile cloud computing
testing matrix
mobile app testing
automated and manual testing.
personalised learning
collation formation
negotiation.
distributed design
fragmentation distributed xml
macrocells
3d models
reverse engineering
software protection
comparable corpora
dictionary and corpus based wsd.
lesk algorithm
corpus-based wsd
acoustic model
hmm
digit speech recognition
grammar
association rule
a-priori.
internet
code obfuscation
allocation
multipath
bandwidth
multi-view face detection
graphic processing unit (gpu)
real-time
spatial reasoning
geometric modeling
intersection detection
classification predicates
triangle-triangle intersection
gauss-markov
opportunistic
social
delay tolerant network
performance evaluation
hem-binding proteins.
function al motifs
conserved patterns
multiple ligand-bound structure alignment
atp-binding proteins
text informativeness
cosine similarity
topology
form content and page content.
latent semantic analys is
deep web
cosine similarity
latent dirichlet allocation
embedded systems
topolog y
smartphone
disaster
physical environment monitoring
adaptive routing
testbed analysis
adaptive authentication
ssh tunnelling
nfs
hpc clusters
number of transistors
feature size
crystal square
design complexity
cup-to-disc ra tio
optic disc
optic cup
fundus image
mainframes
live tiles
cics
t sq.
cursor positioning
node degree
asso rtativity index
network graphs
maximal clique size
distribution
fast
face-detection game controller (fdgc)
factual density
phase space
lyapunov exponents
ch aos
eo-1 hyperion
hyperspectral image
connected dominating set
beacon
s tability
variable radius
maximum likelihood solution
signal detecting
sphere decoding
smart phone application
distance calculation
java development platforms
blood donation information system
density of transisto rs.
See more
- Presentations
- Documents
- Infographics