Personal Information
Occupation
Computer science & Technology(IJFCST)
Industry
Technology / Software / Internet
Website
Tags
algorithms
algorithms automata and formal
software engineering
computer science
cryptography
cloud computing
novel data structures
database theory
artificial intelligence
graphics and visualization other emerging applic
algorithms automata and formal languages nov
queuing methods
computational complexity
programming languages
combinatorial games
information technology
computational number theory
requirem
data mining
consumer case
computer security
quality of service
genetic algorithm
kohonen's self-organizing map
consumer protec
automata and formal languages
wireless sensor networks
foundation of computer
management system
fuzzy relation
big data
cocomo
natural language processing
clustering
graph
probabilistic methods
biochemistry
astrophysics
pareto frontier
fdn
technology
maximal clique size
network security
wireless internet
wireless networks
linear optimization
energy consumption
component
field-effect transistor
mobility
algorithms
image classification
cryptography
text based local descriptor
pattern recognition and ld-bgp.
automata
formal languages
database
adaptive development process
biometric
cbir
curvelet
texture
nosql
rdbms
face recognition
graph database
computation biology
saudi arabia market
artificial neural network.
fuzzy mixed metric
label switched path
traffic regulator.
test case prioritization
ant colony optimization.
traffic splitting
regression testing
data bases
element sram
fuzzy relational inequality
manets node
architecture
geography markup language
endoscopy capsule
novel data structures
crowd management
hajj
congestion
fuzzy logic
software cost estimation
performance
knowledge discovery
vanet
intelligent information & data
security
sentiment analysis
aodv
mobile networks
optimization
networks & communications
next generation
design & communication"
paper submission
"computer networks
networks & data communications
review
genetic algorithms
comprehensive digital system
isms
machine learning
bilateral filter
optimal control problem
linear stochastic dynamic systems
optimal trajectory.
wireless sensor network
circuits xor
scheduling algorithms
greedy
fuzzy screening
semi - active replication protocol
data - centric model
consistency
distributed systems
client - centric model
network
path optimization.
path finding algorithm
government schemes
market-rate
agricultural-marketing
classification
magnitude histogram
geographic information system.
feature extraction
business model
relational databases (rdb)
rdb to rdf mapping
semantic web
software architecture
requirements engineering
visual cryptography (vc)
discourse
multi protocol label switching
gazetteer method
connected components labeling
routing
historic perspective.
anaphora
security goals
security issues
cloudsim
opinion mining
reviews
social network
virtual machine (vm)
scheduling management
frequent itemset mining
recommender system
location-based recommender
empirical-o
statistical bound
parameterized complexity
association rule mining
optimization problems
bin packing problem
approximation algorithm
approximation ratio
probabilistic diffusion
random network graphs
early adopters
simulations.
digital evidence
heterogeneity
network evolution
link rewiring
poisson distribution
complex networks
random networks
small-world networks
one shot queries
continuous queries
mems
query optimization
static variables.
epoch
pearson correlation
movie recommender system
collaborative filtering
mapreduce.
context-aware
cyber space
live security competition
waterfall model
event query language鐚 mobile systems.
uncertain data
event stream
internet of vehicles
corpus
word prediction
event-driven architecture
deleted interpolation
stochastic model
n-gram
metaheuristics
edge tenacity
e-learning
heuristics
deec
cuckoo optimization algorithm (coa)
cybercrime
竜-界看稼壊岳姻温庄稼岳
decision tree
digital crime investigation
digital crime
multi-agent system
contourlet
association rules
heart disease.
test accuracy
training accuracy
cyber security education
capture the flag
intelligent agents
increment model
website
foundations
chaos
college english
curvelet transform
digital watermarking
mssim
bit plane
saudi arabi
jellyfish attack
bioinformatics
eed
architecture styles
cnn algorithm
abms
rami al-jamarat ritual
uwsn applications
robotics
inflammatory
medical
multicasting
better fitness
internet-plus
uwsn
#computerscienceengineering
algorithms automata and form
memetics; english writing teac
quality management
data center
migration
idle resources
decreasing of dimension of transistors
large language models (llms)
program semantics and logic
internet & cloud computing
cuckoo optimization algorithm
stereo matching
routing mes
hindi language wordnet.
e-waste
pvc
green computing
software development process
internet plus tools
software-as-a-service
program synthesis
framework
; college english
exploratory research
software industry
memetics
english writing teaching
biometrics.
benchmarking
data dissemination
performance evaluation
fuzzy decision making
broadcast storm
pattern recogniti on
parkinsons disease
centering approach
multiple intelligences theory
course evaluation
lappin leass approach.
image
region of interest
watermarking.
cropping
dynamic walking
filtering
modelling
colored petri net
image processing
humanoid robots
makespan
reliability cost.
nsga-ii
elitism
attac
real-time databases
transaction processing.
eventual consistency
human computer interaction; hand gesture recogniti
recognition.
icp
registration
pca
multipath
forwarder
routing.
uwsn; better fitness; multicas
tcp
ns2
protocols
packet flow
underwater images enhancement
homomorphic filter.
inflammator
contrast stretching
anfis
rmse
software effort estimation
mre.
ann
negation
real time routing
social graph
map reduce
mysql .
multi-agent systems
adaptive systems
systems evolution.
wordnet.
aspect
matlab
luminance condition.
number plate extraction
recognization
digital camera
consumer protection act
indian legal domain
knowledge based system
rule based system.
rssi.
trilateration
mopso
zigbee
localization
pso
wsn
active control
graph colouring problem
discrete imperialist competitive algorithm
service oriented architecture
service recovery
third party service monitor
prototype system
data recovery model
cardiovascular disease (cvd)
telecardiology.
algorithms automata and fo
small-wor
em based cluster
wind speed
continuous wavelet transform
s-transform
call log mining
mobile computing
logmin
models an
orientation histogram
two-stage-approach
cropping algorithm
disguise image
modified-sift.
algorithms automata and form
automata theory computationa
algorithms and data structures
informa
orientati
hybri
adaptive control
chaotic
mobile cloud computing
qol
multimedia content
qoe
user profile
application service providers
standardization and commoditization
virtualization
data centres
reactive jammer
jamming isolation
jamming types
jamming detection
standard array
parity check matrix
solid bursts error
coded modulation
cross domain
fine-grained
genet
software - as - a - serv ice
conto
it investment
software industry .
b enefits .
cloud computer
e - government
radiometric v
ahp
prioritization
requirement
quality attributes
desirability
disagreement
n information theory and machi
decre
privacy
mobile agent
secret sharing scheme
vi sual secret sharing scheme (vsss)
lappin leass approach
syndrome
ocr
devnagari numerals
big data techniques
transliteration
ner
unknown words
performance metrics
iso/iec 7816
file management system
smart card operating systems
java card
vanets
zrp
dsdv
data compr
sumo
move
ns-2
regression
dataset
s&p 500
stock market
stock index
vision recognition
intermediate nodes
network lifetime.
neural networks
ai algorithms
modm (multi-objective decision making)
computing
random graphs
degree
eigenvector centrality
precursor step.
graph isomorphism
simple additive weighting (saw)
multi-objective optimization problem (mop).
cocomo.
estimation the cost of softwareprojects
multi-layerartificial neural network
p2p
artificial intelligence
database theory
automata and formal languages
web engineering
local ternary pattern and deep neural network.
artificial neural networks (anns)
managing software projects advanced topics in so
d ld-bgp
optimization of technological
increasing of density of elem
wireless sensor network (wsn)
secure routing in manet
software development
software testing
task scheduling.
multi-objective optimization p
simple additive weighting (sa
anylogic
fuzzy compositions and t-norms
* network design and planning
data management issues
computer experiment.
ad hoc networks of autonomous intelligent systems
software agents
pattern recognition
ffd (first- fit decreasing)
parallel processing
information retrieval
automatic control
cad design & testing
increasing if density of ele- ments of sram
signal or image processing
transform
segmentation
handwritten recognition.
multi-layer perceptron neural networks
ga
usa
ms
1 jackson state university
2university of georgia
rank transform
illumination
exposure.
radiometric variation
mapping characteristic comparison
increasing if density of elements of sram
integer programming.
cypher query language
e-commerce
mapping characteristic comparison.
graphics and visualization other emerging applicat
algorithms automata and formal languages novel dat
data model.
cassandra
neo4j
mysql
web engineering
probabilistic neural network (pnn)
software engineering practice
the software process
science
internet
probabilistic methods
programming languages
combinatorial games
anylogic.
backoff method.
task scheduling
intelligence test
iq
wechslers intelligence theory.
fuzzy compositions and t-norms.
question answering system
disease and biocompatible
interface
increasing of density of elements
optimization of technological process.
connectors
components
secure routing in manets
attack
lower bound
ant colony system
留-稼艶温姻稼艶壊壊
minimum 1-tree
adaptive strategy.
n queens problem
style
tractable and intractable prob
pepa .
mobile systems
model and software
software process
s
wireless sensor network (wsn
c loud s torage
h ig h availability
inverted repeats
direct repeats
complementary palindrome
acl. ano malies
harmony search
c omponent based
object oriented
sat
random walk
sentiwordnet.
time
hadoop
lexicon
sentiment analysis.
nlp
no. of solutions
information security
owa operator
fitness
aggregation function
brute force search algorithm
soft computing
wireless communication
backtracking algorithm
kohonen's self-organizing map (ksofm)
kripke structure
verification
antivirus system
nusmv
protection services
web usage data
simulated annealing algorithm
personalization.
web mining
backoff method
natural language
live security
(pnn)
probabilistic neural network
artificial neural networks (an
software process model and software.
harmony search.
deep neural network
bioinformatics.
local ternary pattern
t
neural network
digital crime scene.
multi-layerartificial
estimation the cost of softwar
cryptography database theory
integer programming
r
increasing if density of elem
decreasing of dimension of tr
label switching
multi protocol
watts-strogatz model.
geographic information system
satisfiability
d imensionality r eduction
manifold
automatic i mage a nnotation
genetic algorithm (ga).
distributed data sources
matlab and a comparison of algorithm
methodologies and applications of the ais.
normalized correlation (nc)
algorithmic complexity
homomorphic filtering
density based clustering
spatial data mining
spatial outlier detection.
outlier
geographic data mining
digital crime scene
watts-strogatz model
computer experiment
ffd firstfit decreasing
optimization.
modm (multi-objective decision
other emerging applications
graphics and visualization
geometric modeling
See more
- Presentations
- Documents
- Infographics