Personal Information
Occupation
Computer science & Technology(IJFCST)
Industry
Technology / Software / Internet
Website
Tags
algorithms
computer science
cryptography
cloud computing
artificial intelligence
database theory
novel data structures
graphics and visualization ● other emerging applic
● algorithms ● automata and formal languages ● nov
queuing methods
computational complexity
programming languages
combinatorial games
information technology
computational number theory
software engineering
data mining
automata and formal languages
genetic algorithm
computer security
quality of service
management system
wireless sensor networks
big data
foundation of computer
fuzzy relation
natural language processing
cocomo
pareto frontier
technology
? algorithms
mobility
clustering
astrophysics
biochemistry
component
fdn
probabilistic methods
graph
linear optimization
energy consumption
field-effect transistor
network security
wireless internet
wireless networks
pattern recognition and ld-bgp.
biometric
face recognition
networks & data communications
graph database
rdbms
nosql
element sram
manets node
? novel data structures
saudi arabia market
adaptive development process
knowledge discovery
endoscopy capsule
fuzzy relational inequality
crowd management
hajj
congestion
image classification
? cryptography
vanet
automata
formal languages
database
optimization
security
networks & communications
performance
next generation
maximal clique size
mobile networks
design & communication"
texture
curvelet
cbir
paper submission
artificial neural network.
"computer networks
fuzzy logic
software cost estimation
traffic splitting
fuzzy mixed metric
label switched path
traffic regulator.
test case prioritization
ant colony optimization.
regression testing
data bases
intelligent information & data
architecture
geography markup language
text based local descriptor
computation biology
sentiment analysis
aodv
internet of vehicles
large language models (llms)
event stream
migration
data center
uncertain data
event query language, mobile systems.
waterfall model
increment model
review
genetic algorithms
intelligent agents
opinion mining
pearson correlation
reviews
association rules
multi-agent system
digital crime
bit plane
mssim
digital watermarking
curvelet transform
anaphora
heuristics
greedy
movie recommender system
path optimization.
path finding algorithm
stereo matching
market-rate
agricultural-marketing
website
government schemes
e-learning
edge tenacity
event-driven architecture
decreasing of dimension of transistors
random networks
small-world networks
connected components labeling
query optimization
routing
historic perspective.
security goals
security issues
one shot queries
cloudsim
virtual machine (vm)
scheduling management
scheduling algorithms
algorithms automata and formal
continuous queries
circuits xor
optimal trajectory.
linear stochastic dynamic systems
optimal control problem
mems
idle resources
comprehensive digital system
digital crime investigation
cybercrime
geographic information system.
digital evidence
association rule mining
frequent itemset mining
relational databases (rdb)
rdb to rdf mapping
semantic web
mapreduce.
link rewiring
network evolution
epoch
feature extraction
static variables.
poisson distribution
multi protocol label switching
complex networks
classification
parameterized complexity
decision tree
visual cryptography (vc)
business model
semi - active replication protocol
data - centric model
consistency
distributed systems
client - centric model
statistical bound
empirical-o
contourlet
cnn algorithm
abms
location-based recommender
foundations
rami al-jamarat ritual
heterogeneity
deec
cuckoo optimization algorithm (coa)
requirements engineering
simulations.
robotics
bioinformatics
ε-肠辞苍蝉迟谤补颈苍迟
early adopters
random network graphs
probabilistic diffusion
approximation ratio
approximation algorithm
software architecture
bin packing problem
quality management
machine learning
optimization problems
bilateral filter
live security competition
corpus
medical
inflammatory
internet & cloud computing
word prediction
deleted interpolation
discourse
architecture styles
cuckoo optimization algorithm
stochastic model
internet-plus
college english
collaborative filtering
eed
gazetteer method
jellyfish attack
n-gram
metaheuristics
program semantics and logic
recommender system
network
context-aware
heart disease.
saudi arabi
test accuracy
memetics; english writing teac
training accuracy
social network
wireless sensor network
cyber security education
capture the flag
uwsn applications
multicasting
better fitness
uwsn
cyber space
indian legal domain
wind speed
knowledge based system
consumer protection act
packet flow
underwater images enhancement
homomorphic filter.
contrast stretching
anfis
rmse
software effort estimation
mre.
prototype system
ann
negation
hadoop
lexicon
sentiment analysis.
nlp
telecardiology.
cardiovascular disease (cvd)
information security
owa operator
isms
aggregation function
fuzzy screening
soft computing
wireless communication
rule based system.
rssi.
em based cluster
trilateration
mopso
zigbee
localization
pso
wsn
lappin leass approach
real-time databases
transaction processing.
eventual consistency
human computer interaction; hand gesture recogniti
recognition.
icp
registration
pca
multipath
forwarder
routing.
tcp
ns2
protocols
data recovery model
third party service monitor
standard array
jamming detection
jamming types
jamming isolation
reactive jammer
data centres
virtualization
standardization and commoditization
application service providers
user profile
pattern recogniti on
qoe
parkinson’s disease
stock index
centering approach
stock market
s&p 500
dataset
lappin leass approach.
image
region of interest
watermarking.
cropping
multimedia content
dynamic walking
filtering
modelling
colored petri net
it investment
software industry .
b enefits .
cloud computer
e - government
ahp
prioritization
requirement
quality attributes
discrete imperialist competitive algorithm
desirability
disagreement
graph colouring problem
privacy
mobile agent
secret sharing scheme
vi sual secret sharing scheme (vsss)
software - as - a - serv ice
syndrome
biometrics.
service recovery
fine-grained
solid bursts error
parity check matrix
data dissemination
cross domain
fuzzy decision making
broadcast storm
sentiwordnet.
software-as-a-service
disguise image
cropping algorithm
two-stage-approach
program synthesis
orientation histogram
magnitude histogram
software development process
green computing
pvc
e-waste
logmin
social graph
map reduce
mobile computing
call log mining
s-transform
mysql .
multi-agent systems
adaptive systems
systems evolution.
wordnet.
aspect
matlab
luminance condition.
number plate extraction
recognization
digital camera
continuous wavelet transform
regression
qol
image processing
humanoid robots
mobile cloud computing
makespan
ns-2
move
reliability cost.
nsga-ii
sumo
elitism
hindi language wordnet.
software industry
dsdv
zrp
vanets
java card
smart card operating systems
file management system
iso/iec 7816
framework
performance metrics
unknown words
ner
transliteration
devnagari numerals
ocr
modified-sift.
consumer case
ad hoc networks of autonomous intelligent systems
data management issues
* network design and planning
fuzzy compositions and t-norms
anylogic
simple additive weighting (sa
multi-objective optimization p
task scheduling.
software testing
software development
secure routing in manet
increasing of density of elem
optimization of technological
d ld-bgp
geographic information system
multi protocol
label switching
decreasing of dimension of tr
increasing if density of elem
r
integer programming
cryptography database theory
estimation the cost of softwar
multi-layerartificial
neural network
t
local ternary pattern
anylogic.
? combinatorial games
? programming languages
? probabilistic methods
internet
science
the software process
software engineering practice
web engineering
managing software projects ? advanced topics in so
web engineering ?
? automata and formal languages
? database theory
? artificial intelligence
p2p
computing
ai algorithms
neural networks
vision recognition
signal or image processing
increasing if density of ele- ments of sram
cad design & testing
automatic control
information retrieval
parallel processing
pattern recognition
brute force search algorithm
fitness
no. of solutions
time
inflammator
uwsn; better fitness; multicas
real time routing
routing mes
memetics
english writing teaching
; college english
internet plus tools
exploratory research
attac
course evaluation
multiple intelligences theory
performance evaluation
benchmarking
decre
n information theory and machi
radiometric v
conto
genet
? coded modulation
data compr
big data techniques
models an
software agents
deep neural network
artificial neural networks (an
probabilistic neural network
(pnn)
live security
natural language
backoff method
geometric modeling
graphics and visualization
other emerging applications
modm (multi-objective decision
optimization.
ffd firstfit decreasing
computer experiment
watts-strogatz model
digital crime scene
harmony search
wireless sensor network (wsn
s
software process
model and software
mobile systems
tractable and intractable prob
n queens problem
simulated annealing algorithm
d imensionality r eduction
manifold
automatic i mage a nnotation
genetic algorithm (ga).
distributed data sources
matlab and a comparison of algorithm
methodologies and applications of the ais.
normalized correlation (nc)
algorithmic complexity
homomorphic filtering
density based clustering
spatial data mining
spatial outlier detection.
outlier
geographic data mining
software process model and software.
harmony search.
bioinformatics.
digital crime scene.
watts-strogatz model.
wireless sensor network (wsn)
computer experiment.
ffd (first- fit decreasing)
intermediate nodes
network lifetime.
modm (multi-objective decision making)
random graphs
kohonen's self-organizing map (ksofm)
kripke structure
verification
antivirus system
nusmv
protection services
web usage data
personalization.
web mining
lower bound
ant colony system
α-苍别补谤苍别蝉蝉
minimum 1-tree
adaptive strategy.
style
pepa .
c loud s torage
h ig h availability
inverted repeats
direct repeats
complementary palindrome
acl. ano malies
c omponent based
object oriented
sat
random walk
graphics and visualization other emerging applicat
algorithms automata and formal languages novel dat
data model.
cassandra
neo4j
mysql
e-commerce
cypher query language
integer programming.
increasing if density of elements of sram
radiometric variation
exposure.
illumination
rank transform
2university of georgia
1 jackson state university
ms
usa
ga
transform
attack
components
connectors
interface
disease and biocompatible
fuzzy compositions and t-norms.
backtracking algorithm
satisfiability
degree
eigenvector centrality
precursor step.
graph isomorphism
simple additive weighting (saw)
multi-objective optimization problem (mop).
cocomo.
estimation the cost of softwareprojects
multi-layerartificial neural network
local ternary pattern and deep neural network.
artificial neural networks (anns)
probabilistic neural network (pnn)
backoff method.
task scheduling
intelligence test
iq
wechsler’s intelligence theory.
question answering system
increasing of density of elements
optimization of technological process.
secure routing in manets
segmentation
handwritten recognition.
multi-layer perceptron neural networks
mapping characteristic comparison
mapping characteristic comparison.
See more
Users being followed by ijfcstjournal