Personal Information
Occupation
Computer science & Technology(IJFCST)
Industry
Technology / Software / Internet
Website
Tags
algorithms
cloud computing
cryptography
computer science
database theory
artificial intelligence
graphics and visualization other emerging applic
algorithms automata and formal languages nov
novel data structures
queuing methods
computational complexity
programming languages
software engineering
information technology
combinatorial games
computational number theory
data mining
genetic algorithm
quality of service
computer security
cocomo
foundation of computer
natural language processing
automata and formal languages
big data
management system
fuzzy relation
astrophysics
clustering
graph
probabilistic methods
biochemistry
network security
wireless internet
wireless networks
component
wireless sensor networks
linear optimization
energy consumption
pareto frontier
mobility
field-effect transistor
algorithms
cryptography
crowd management
texture
curvelet
automata
formal languages
database
image classification
congestion
hajj
fdn
technology
computation biology
cbir
pattern recognition and ld-bgp.
biometric
face recognition
text based local descriptor
geography markup language
architecture
data bases
regression testing
ant colony optimization.
test case prioritization
traffic regulator.
label switched path
fuzzy mixed metric
traffic splitting
element sram
artificial neural network.
manets node
novel data structures
saudi arabia market
adaptive development process
endoscopy capsule
fuzzy relational inequality
software cost estimation
security
fuzzy logic
sentiment analysis
aodv
knowledge discovery
vanet
optimization
networks & data communications
performance
"computer networks
paper submission
design & communication"
intelligent information & data
mobile networks
next generation
networks & communications
stochastic model
n-gram
deleted interpolation
reviews
opinion mining
anaphora
metaheuristics
heuristics
greedy
gazetteer method
review
word prediction
social network
corpus
live security competition
cyber space
bilateral filter
machine learning
capture the flag
cyber security education
training accuracy
test accuracy
heart disease.
geographic information system.
relational databases (rdb)
rdb to rdf mapping
semantic web
classification
feature extraction
business model
software architecture
requirements engineering
multi protocol label switching
connected components labeling
visual cryptography (vc)
routing
historic perspective.
security goals
security issues
cloudsim
virtual machine (vm)
scheduling management
scheduling algorithms
circuits xor
optimal trajectory.
linear stochastic dynamic systems
optimal control problem
discourse
genetic algorithms
collaborative filtering
context-aware
recommender system
location-based recommender
empirical-o
statistical bound
parameterized complexity
optimization problems
association rule mining
bin packing problem
approximation algorithm
approximation ratio
probabilistic diffusion
random network graphs
early adopters
simulations.
digital evidence
network evolution
link rewiring
maximal clique size
mapreduce.
poisson distribution
complex networks
random networks
small-world networks
one shot queries
frequent itemset mining
continuous queries
mems
query optimization
static variables.
epoch
pearson correlation
contourlet
internet of vehicles
event-driven architecture
edge tenacity
e-learning
government schemes
website
agricultural-marketing
market-rate
path finding algorithm
path optimization.
network
client - centric model
distributed systems
consistency
data - centric model
semi - active replication protocol
movie recommender system
heterogeneity
cybercrime
digital crime investigation
deec
cuckoo optimization algorithm (coa)
digital crime
multi-agent system
association rules
intelligent agents
increment model
waterfall model
竜-界看稼壊岳姻温庄稼岳
event query language鐚 mobile systems.
decision tree
uncertain data
event stream
decreasing of dimension of transistors
quality management
cnn algorithm
abms
rami al-jamarat ritual
mssim
uwsn applications
multicasting
better fitness
stereo matching
inflammatory
uwsn
digital watermarking
curvelet transform
medical
robotics
bioinformatics
idle resources
migration
data center
foundations
jellyfish attack
nosql
rdbms
eed
program semantics and logic
graph database
internet & cloud computing
bit plane
cuckoo optimization algorithm
architecture styles
humanoid robots
makespan
nsga-ii
reliability cost.
simulated annealing algorithm
elitism
n queens problem
hindi language wordnet.
tractable and intractable prob
software industry
framework
software-as-a-service
mobile systems
model and software
software process
s
uwsn; better fitness; multicas
privacy
mobile agent
secret sharing scheme
vi sual secret sharing scheme (vsss)
biometrics.
inflammator
data dissemination
time
fuzzy decision making
broadcast storm
pattern recogniti on
parkinsons disease
no. of solutions
centering approach
fitness
brute force search algorithm
lappin leass approach.
backtracking algorithm
image
region of interest
watermarking.
cropping
dynamic walking
filtering
modelling
colored petri net
image processing
program synthesis
trilateration
mopso
zigbee
localization
pso
wsn
lappin leass approach
real-time databases
transaction processing.
eventual consistency
human computer interaction; hand gesture recogniti
recognition.
icp
registration
pca
multipath
forwarder
routing.
wireless sensor network
tcp
ns2
protocols
packet flow
underwater images enhancement
homomorphic filter.
watts-strogatz model
wireless sensor network (wsn
software development process
green computing
pvc
e-waste
harmony search
digital crime scene
social graph
map reduce
mysql .
multi-agent systems
adaptive systems
systems evolution.
wordnet.
aspect
matlab
luminance condition.
number plate extraction
recognization
digital camera
consumer case
consumer protection act
indian legal domain
knowledge based system
rule based system.
standard array
parity check matrix
solid bursts error
syndrome
internet-plus
graph colouring problem
discrete imperialist competitive algorithm
attac
service recovery
third party service monitor
prototype system
data recovery model
cardiovascular disease (cvd)
telecardiology.
exploratory research
internet plus tools
em based cluster
wind speed
continuous wavelet transform
s-transform
call log mining
mobile computing
logmin
magnitude histogram
conto
radiometric v
n information theory and machi
algorithms automata and formal
decre
benchmarking
performance evaluation
large language models (llms)
multiple intelligences theory
course evaluation
mobile cloud computing
qol
multimedia content
qoe
user profile
application service providers
standardization and commoditization
virtualization
data centres
college english
reactive jammer
jamming isolation
jamming types
jamming detection
dataset
s&p 500
stock market
stock index
sentiwordnet.
memetics
cross domain
fine-grained
memetics; english writing teac
software - as - a - serv ice
routing mes
it investment
software industry .
b enefits .
cloud computer
e - government
real time routing
ahp
prioritization
requirement
quality attributes
desirability
disagreement
saudi arabi
orientation histogram
two-stage-approach
cropping algorithm
disguise image
modified-sift.
ocr
devnagari numerals
; college english
transliteration
ner
unknown words
performance metrics
iso/iec 7816
file management system
smart card operating systems
java card
vanets
zrp
dsdv
english writing teaching
sumo
move
ns-2
regression
rssi.
p2p
artificial intelligence
ffd (first- fit decreasing)
database theory
automata and formal languages
web engineering
managing software projects advanced topics in so
web engineering
software engineering practice
intermediate nodes
network lifetime.
the software process
science
internet
probabilistic methods
modm (multi-objective decision making)
programming languages
random graphs
degree
eigenvector centrality
precursor step.
graph isomorphism
simple additive weighting (saw)
multi-objective optimization problem (mop).
software testing
task scheduling.
multi-objective optimization p
simple additive weighting (sa
anylogic
watts-strogatz model.
fuzzy compositions and t-norms
* network design and planning
data management issues
wireless sensor network (wsn)
ad hoc networks of autonomous intelligent systems
software agents
pattern recognition
parallel processing
information retrieval
automatic control
cad design & testing
increasing if density of ele- ments of sram
signal or image processing
vision recognition
neural networks
ai algorithms
computer experiment.
computing
increasing of density of elements
optimization of technological process.
ms
1 jackson state university
2university of georgia
secure routing in manets
rank transform
illumination
exposure.
radiometric variation
segmentation
increasing if density of elements of sram
handwritten recognition.
multi-layer perceptron neural networks
integer programming.
cypher query language
e-commerce
mysql
neo4j
mapping characteristic comparison
cassandra
data model.
algorithms automata and formal languages novel dat
graphics and visualization other emerging applicat
cocomo.
estimation the cost of softwareprojects
multi-layerartificial neural network
combinatorial games
anylogic.
local ternary pattern and deep neural network.
artificial neural networks (anns)
probabilistic neural network (pnn)
fuzzy compositions and t-norms.
disease and biocompatible
interface
connectors
components
backoff method.
attack
task scheduling
transform
intelligence test
comprehensive digital system
iq
wechslers intelligence theory.
question answering system
ga
usa
antivirus system
nusmv
protection services
web usage data
modm (multi-objective decision
personalization.
web mining
lower bound
ant colony system
留-稼艶温姻稼艶壊壊
minimum 1-tree
adaptive strategy.
other emerging applications
style
graphics and visualization
pepa .
geometric modeling
backoff method
natural language
live security
(pnn)
c loud s torage
h ig h availability
inverted repeats
contrast stretching
anfis
rmse
software effort estimation
mre.
ann
negation
computer experiment
hadoop
lexicon
sentiment analysis.
nlp
ffd firstfit decreasing
information security
owa operator
isms
aggregation function
fuzzy screening
soft computing
wireless communication
optimization.
kohonen's self-organizing map (ksofm)
kripke structure
verification
artificial neural networks (an
deep neural network
local ternary pattern
t
neural network
multi-layerartificial
estimation the cost of softwar
cryptography database theory
integer programming
r
increasing if density of elem
decreasing of dimension of tr
label switching
multi protocol
geographic information system
software process model and software.
harmony search.
d ld-bgp
bioinformatics.
optimization of technological
increasing of density of elem
secure routing in manet
digital crime scene.
software development
direct repeats
complementary palindrome
acl. ano malies
probabilistic neural network
c omponent based
object oriented
sat
random walk
satisfiability
d imensionality r eduction
manifold
automatic i mage a nnotation
genetic algorithm (ga).
distributed data sources
matlab and a comparison of algorithm
methodologies and applications of the ais.
normalized correlation (nc)
algorithmic complexity
homomorphic filtering
density based clustering
spatial data mining
spatial outlier detection.
outlier
geographic data mining
mapping characteristic comparison.
See more
- Presentations
- Documents
- Infographics