Tags
genetic algorithm
machine learning
security
problem solving
support vector machine
optimization
computational science
computer architecture
decreasing of dimensions of transistor
cryptography
particle swarm optimization
network analysis
software engineering
video streams
video segmentation
association rules
algorithms and simulations
scientific computing
modeling
segmentation
wireless sensor network
fruit recognition
probability
feature extraction
video summarization
software metrics
software quality
software testing
software faults
high performance computing
frequent itemsets
low-correlation data
expert systems
modelling uncertainty
artificial intelligence
nonnegative matrix factorization
data cleaning
pervasive computing
analytical approach for modelling
large scale scientific instruments
nsga-ii
coverage
natural language processing
hidden markov model
data classification
slow learner prediction
floating factor classification.
averaging factor classification
routing
cluster
shadow detection
background subtraction
background removal
cuckoo optimization algorithm (coa)
random forest
linear complementarity problem
nonstationary
asynchronous
³ó−m²¹³Ù°ù¾±³æ.
meta-heuristic algorithm
algorithms
information retrieval
labview
recommender systems
opinion mining
analytical approach to model technological process
data mining
reliability
sentiment analysis
augmented reality
neural networks
manet
wsn
interaction
m- ambiguous words
parikh matrix
feature reduction
vector machines
fcm
genetic operator
ant colony optimization
speeding up
background mixture model.background subtraction
background mixture model.
background mixture model
subword
word line
intelligence
cas
osga
cloud computing; internetworking; grid computing;
x.509
virtual organisation (vo)
web log data
smart work
wsdl
solar cells
nanopillar-based photovoltaics
nanowires (nws).
gsi
analytic hierarchy process(ahp)
air volume
computed tomography (ct) image
volume rendering approach
overlayers
lung
implanted-junction heterorectifiers
decreasing of quantity of radiation defects
matlab scripts
fuzzy theory
symmetric table addition method
vulnerability
persian/arabic document
decreasing length of channel
accounting mechanical stress; optimization the tec
static analysis
modelling of manufacture of a field-effect heterot
website
scanners
sensitivity
attack graph
multimedia retrieval
³Ù±ð²õ³Ù–b±ð»å
reverse social engineering attacks
jpgvirus
pyramidal image structure
stuxnet worm
document segmentation
facebook application
continuous optimization.
online social networks
ssh.
flooding attack
neural list
penglish spams
black list
trainable.
persian spams
rc4
parallel rc4
parallel cryptography
stream cipher
scene recognition
sift
visual descriptor
local binary pattern
hindi language
hindi reviews
mumcut
prioritization
fault
performance index
stochastic simulation.
uncertainty
ant colony system
vrptw
credibility theory
fuzzy sets
underwater
telerobotics.
distributed architecture
mixed reality
key generation
ant colony intelligence (aci)
soft computing
wind energy; weibull distribution; electricity pro
replica management; mapreduce framework; hadoop cl
drift heterobipolar transistor
threats
flood count.
authentication
design properties
biometric images
discrete wavelet transform (dwt)
gaussian noise
hot carrier effect(hce)
n-channel mos (nmos).
technology computer aided design(tcad)
matlab/simulink
photovoltaic module
generalized model
artificial neural network; i–v characteristics;
equivalent circuit parameter
gazetteer method
anaphora
centering approach
discourse
lappin leass approach
best coach.
fuzzy comprehensive evaluation(fce)
topsis method
wimax
minimal mumcut
multiemitter heterotransistor
optimization of manufacturing of transistor
eigen face
partitioning aroundmedoids
fisher face
medoid
k-medoids
language model.
stemming
machine translation
wireless interconnect
network-on-chip
on-chip antenna
parallel transmission 1. introduction
parallel buffer
variance prediction function
cassava
hough transform
canny edge detector
vanishing point
floor segmentation
continuous optimization
firefly algorithm (fa)
artificial bee colony (abc)
semantic web
owl
ontology
computer networks
prediction of traffic accidents
classify by type of accident
eigen vectors
neural classifier
chaincode
fault localization
pseudospectrum
automotive fault diagnosis; sound signal processin
selfish node attack.
wap
j2me
xml
parser
molecular graph
benzenoid
and pi Î (g
hexagonal trapezoid system
x) polynomial
omega Ω(g
theta Θ(g
normalized root mean squared error
missing values
normalized mean absolute error
artificial neural network
thyroid disease
classification
back propagation learning algorithm
multi- layer perceptron
qos
analytic queing model
lease abstraction
pap
preemption
intergrid
pm motor
permanent magnet pole
taguchi method
test case prioritization
regression testing
fuzzy-based approach
requirement prioritization
inpainting evaluation
evaluation
inpainting model
image inpainting
embedded
event
detection
video generation
ids
misbehavio
prohibited zones
economic dispatch
simulated annealing.
ramp rate limits
fuzzy logic
fuzzy set
soft-computing.
edge-labeling; vertex-coloring; complete graph
network protocols
public safety networks
modeling call holding times
a mixture of lognormal distributions
em algorithm
query processing (qp)
information retrieval (ir).
natural language processing (nlp)
energy efficiency
behaviour
cih(computer interaction with humanity)
social computing
hci
grid computing
grid over internet.
latest trends
state of the art grid
computational grid
malware
obfuscation
deobfuscation
oligomorphic etc.
normalization
mel-frequency cepstral coefficient (mfcc)
gaussian mixture model (gmm).
feed forward back propagation neural network (ffbn
split protocol; protocol splitting; ddos; tribal f
cloud computing
bootstrap non-linear regression
resources
human intelligence
natural intelligence
dynamic time warping
kernel least mean square
speech enhancement
least mean square
signal to noise ratio
online algorithm
random permutation
extended graph edge coloring
software engineering applications
optical model analysis
°ì±ð²â·É´Ç°ù»å²õ—a±è
ieee
ftp wlan.
bss
survey.
dag; task scheduling; noc
interpolation
comb pilot
signal mapping.
mmse estimation
ofdm
multipath fading channels
corner detection
perspective rectification.
plane homography
sobel operator
multi-objective optimization
visual sensor network
performance metrics
anaphora resolution
named entities
question answering systems
web question answering systems
i-mode
language model (lm)
mac protocol
security threats
security techniques.
cloud security
and artificial neural networks.
data transformation
magnetic lens
focused ion beam
hfss
coupler
power divide
circulator
microwave components
rectangular waveguide
siw
text clustering
ant-colony optimization
latent semantic indexing
bees algorithm
vector space model
leach
³¦³ó’
betweenness routing
local search
health monitoring
cfd.
cross- ignition
heat flux
liquid fuel
multi- burners
one maxproblem
quantum evolution algorithm
knapsack problem.
multiplicative update function
ibk
heart disease
rbf network
naive bayes
adaboostm1
nnge
bagging
geolocation
social media
unauthorized device.
insider
scenario
insider threat
suspect
image regularization
image compression
ransac
snr
blending
entropy
rc6
data collection
a* heuristic search
wsns
gateway
sub-cluster
orphan nodes
steganography
peak signal-to- noise ratio (psnr).
canny edge detection
sobel edge detection
mean square error (mse)
kc1.
ann
cocomo
sa
anfis
inhomogenous doping of channel
field-effect heterotransistor
approximation algorithm
approximation ratio
np-hard.
bin packing problem
time delay
double inverted pendulum
bat algorithm
stability
region head (rh)
o-leach
web page
search engine
world wide web
web mining
page ranking.
reverberation
echo
stereo panning
noise filtration
audio effects
musical signal processing
png arrangement
fractals
jpeg formulation
gif formulation
mse
psnr
wavelets
binary tournament selection.
virtual reality
visualization
visual
computer
learning methods and analysis
text mining
• machine translation
factorial experiments
computer experiments
parameterized complexity
robustness
average case complexity
partition-sort
video copy retrieval
multimedia fingerprinting
content-based fingerprinting
video copy detection
hyperchaotic chen system
hyperchaotic systems
hybrid synchronization
hyperchaos
linguistic resources
chunking/shallow parsing
information technology
trust management
• knowledge-based systems
formal methods
visual software
computer science
• quality management
testing
• web engineering
decision making
• search engines
privacy
• managing software projects
• languages
• multimedia
software process
programming
i/o
chaos synchronization
adaptive control
hardware and os issues
compiler
architectures and computation models
computational sciences
technology
digital record
ecr
supports.
supports
machine vision
dcnn
bits
qkd
photons and qubits
quantum cryptography
phase detection
awareness
natural disaster
roulette wheel selection
memory system
sliding mode control
social tags
hosvd
tensors
• network analysis
• machine learning
• scientific computing
supervised learning
age classification
active learning
entropy change
algorithm
computational complexity
information entropy
adaptive mutation
non-revisiting
function optimization
moore-spiegel system
nonlinear control
metaio sdk
vuforia sdk
d’fusion sdk
blob analysis
sign board classification
gaussian mixture model
partial least squares
support vector machine.
mild cognitive impairment
alzheimer’s disease
forgery detection
forgery
image source identification
tamper detection
spoof attacks.
wired network .
tcp
cbr
ddos
nam
dos
mobile database
mobile transaction
reference architecture
mobile host
public key cryptography
parallel implementation.
rsa algorithm
lad tree classifier
rep tree classifier.
proficiency comparison
credit risk forecast
cseam model
multimodal authentication.
pca by svd
lu factorization
feature selection
exponential kronecker product (ekp)
tracking.
artoolkit sdk
ar sdk’s
pattern
vessel segmentation
fundus
retinal image
classification.
preprocessing
crime and violence are inherent in our political a
but also changing the way crime takes place all ov
we present various measures being taken in order t
the popularity of internet grows continuously
with not only changing our views of life
wan
checkpointing
lan
±¹²¹²Ô±ð³Ù’s.
²õ²¹²Ô’s
recovery
distributesd system
wavelet domain
image recognition
spectrum entropy
wikitude sdk
parkinson’s disease (pd)
computer aided diagnosis (cad)
statistical parametric mapping (spm)
image analysis
grain deformation
motion detection
deformation models
template matching.
missing observations
precision of parameter estimates
central composite designs
predictive capability
gsr
result
bvp
model
temperature
microcontroller
equation
automatic diagnosis
coronary heart disease
hand geometry
identification
indexing
palm print
binning
zbca.
sleep deprivation attack
intrusion detection system
and compression ratio
lz77
reference base
non-repetition
redundancy
optimized exact repeat
dna
data tree induction
data preprocessing
data integration
data quality
act system
mobile agent (ma)
mobile network station (mns)
fixed network station (fns)
network station (ns)
mobile node (mn)
pearson correlation coefficient
collaborative filtering
content-based filtering
location-based recommender
crowding distance
pareto-optimal solution
task scheduling
bi-objective
independent task.
cryptography algorithms.
routing overhead
routing protocols
packet delivery ratio
multiclass
boost converter
chaos
bifurcation
singular value decomposition
deep learning
regularization
feature subset selection
gradient vector flow active contour
knowledge based constraints
tumor detection
graph cut method
hepatic tumor
multi layer perceptron.
naïve bayes
maximum entropy
network on chip
angle routing
adaptive routing algorithm
average delay
concurrency control
emotions
binary
optimization.
data envelopment analysis (dea)
multi-objective decision making (modm)
web page clustering.
entity name resolution
personal name disambiguation
lattices
hash algorithm
dna detecting
k-mer index
index model
transistor-transistor logic
optimization of manufacturing
forced convection.
homotopy perturbation method
successive linearization method (slm)
intelligent agents
multi-agent system
knowledge discovery
nonlinear effect
See more
Users following ijcsa