Personal Information
Organization / Workplace
Mumbai Area, India India
Occupation
Editor in Chief at International Journal of Computer Applications Technology and Research
Industry
Technology / Software / Internet
Website
About
This international journal is directed to researchers, engineers, educators, managers, programmers and users of computers who are interested in computer science engineering.
Contact Details
Tags
cloud computing
clustering
data mining
security
manet
classification
optimization
svm
cryptography
ict
wireless sensor networks
grid computing
qos
feature extraction
pattern recognition
fpga
machine learning
genetic algorithm
routing
education
vanet
neural network
database
fuzzy logic
verilog
encryption
semantic web
android
energy efficiency
matlab
privacy
clustering.
educational data mining
big data
spam
intuitionistic fuzzy topology
scheduling
sem
wireless sensor network
support vector machine
e-government
network
x-ray diffraction
grid environment
source system
green computing
multiple frames
deterministic prioritization
k-means
v2v
mining
data warehouse
control structure
similarity value
control statements
performance.
execution flow
lifetime
xml.
photo-oxygenation
noc
arbiter.
router
ns-2
cross layer design
makespan
harmonics
multicast
ant colony optimisation
bayesian classifier
neighborhood trimming.
non-spam
feature subset selection
correlation based fss
psr
radio frequency identification
adoption
ball mill
face recognition
cbvr
authentication
wsn
simulation
nano fillers
tag
naïve bayesian classifier
challenge
leach
gabor
dwt
data staging
replication
nanostructures
association
hardness
fuzzy clustering
algorithm
shoulder surfing
cued click-points
replication strategy
knowledge management system
pyro industries
forecasting
feature selection
knowledge
nanocomposites
rdf
markov random field
katakana
routing protocols
mac
sybil attack
gsm
adsorption
object-oriented paradigm
data
web 2.0
biometrics
graphical password authentication
rias
data analytics
baddeley theory
long term memory
web
anonymity
wm training
gpsr
short term memory
ann
web-based working memory
wimax
scholarship
thermal and mechanical properties
fuzzy method
data grid
mobile app
wap
routing algorithm
ad hoc
reverse route
client
dsr
bayesian
cloud
web mining
vb.net
web socket api
http
frequent item set (fim)
concurrency
cluster association rule
differential private frequent item set
congestion control
sentiment analysis
tracking
technology
usability
application development
design driven software
transmission power
conjunctive queries
disjunctive queries
object-oriented database
object oriented
tag recommendation
efficiency
segmentation
item recommendation
recommendation
energy
user recommendation
social tagging system
psnr
ip dynamic bayesian network
watermarking
r&d investment efficiency.
data security
decision tree
cloud security
servers
html5
metrics
knowledge-based authentication.
apu
computer vision
inclusive- exclusive principal
maps
mda
saas
structural similarity.
wireless ad hoc networks
neural networks
steganography
electrical resistivity
web-based; job fair; information system; waterfall
wear rate
evaluation methods of uavs
full autonomy
cloud storage
cbc test
environment
hmm
tin- zinc eutectic alloy
contamination
morphological operation
occlusion
iris
parallelization
bemo
distribution
ee-path
energy star
flc
c4isr framework
challenges
petri net
tz network
lar
hadoop.
man in the middle attack(mima)
trusty uri.
brass
mobile devices
mobile computing
fuzzy expert system
gps
temporal differencing
i n t r u s i o n d e t e c t i o n s y s t e m s
wear test
lsb
stegnography
structures
topology control algorithm
manets networks
anemia
online recognition
time series data
delay
digital artifacts
feature level fusion
interference.
energy efficient
access control
fuzzy based controllers
autonomy evaluation method
nano powder
routing protocols.
water demand
performance of algorithms
least squares
wireless sensor networks (wsn)
forecast
extrapolation
leakage water
pervasive computing
security model
safety
unimodal
image retrieval
information and communication technology
routing protocol
outsourcing
cnt
partnership and globalization
wetting process
gspr-mv
gprs
cfp
vaodv
adc
decryption
multiple algorithms
otcl
aes
vanets
software engineering
primary health care
mobile application; emergency communication system
improved apu
routes
ios
openstreetmaps
public transportation
dream
health care in china
penetration testing
techniques
particle swarm optimization
eye extraction
analytics in health care
gabor filter
replication techniques.
ontology
tracer.
lip extraction
airy zeta function
browsing
data center
evaluation
v2i/v2r
theory
intelligence
csma-ca
its
cap
2-diol.
sensor network
anethole
tetraphenylporphyrine
4-methoxybenzaldehyde
raspberry pi
1-(4-methoxyphenyl)propan-1
information systems
information technology infrastructure
magnetic properties.
wireless networks
sql injection
web application
chemical synthesis
structural health monitoring
bridge strengthening
rehabilitation
repair
bandpass filter (bpf)
corrosion
fractional bandwidth (fbw)
advanced design system (ads)
signal
intuitionistic fuzzy point
and mumbai
coimbatore
pq standards
overvoltage
lda
voltage flickers
personal health records
attribute based encryption
transients
5
9
pimarane diterpenoids
juniperus phoenicea l.
nano technology
10-triepi-cupressic acid
total antioxidant capacity.
labdane diterpenoids
eugenol hydroperoxide
eugenol methyl ether
antipyrine
histogram equalization
eugenol
image fusion
memory
mse
aodv
sparql
software architecture
image segmentation
sql
location tracking
unified recommendation
social network analysis
social networks
formatting
compression
bayesian network
style
styling
sales
transaction system
transaction
induction motor
haar wavelet
enamel
prototyping model
infrastructure as a service
artificial intelligence (ai)
ethernet
software
fault tolerance
statistics
information system
cluster
network lifetime
python
license plate
ocr
ad hoc networks
privacy preservation
data aggregation
mobile application
cutting quality
noise
random forest
power consumption
performance
optical character recognition
cellular automata
image processing
sensor node
remote sensing
service oriented architecture
knowledge management
computer security
imperialist competition algorithm (ica)
computer networks
knowledge management systems.
amyotrophic lateral sclerosis; eye-based assistive
mesh-warping
transition control
reliability
warping
morphing
opinion mining
pyrrolizidine alkaloids
cutting speed
evms
rtps
nrtps
lan connected computers.
polling booth
artificial neural networks
echium rauwolfii
boraginaceae
wireless communication
settling time
sift
pi controller.
enhanced leach
pixel intensity
flexural strength
document analysis
diabetics data
policy
weka tool
classification algorithm
multi-level leach
e-leach
ehe-leach
xrd
mmt/chitosan
translation
mapping
transliteration
dictionary
ir
fatty acids
expert system
security service
shg efficiency
verification
sms technology
vehicle security
dvla
variable density contrast
magnetic
web usage mining
cauvery basin
association rule mining
web service
granitic gneiss basement
data integrity
gravity
motor
emi
nano coated motors
madurai
textile mills
ant colony optimization (aco)
euclidean distance
jobs
k-means clustering
integrated healthcare
hospital
social media
p2p system
reputation
provenance
trust
hash table
electrical power plant
load balancing
url.
recycling
eigenmodes
database architectures
low frequency noise(lfn)
resonance frequency
remote access
remote desktop protocol
network simulation
android app
remote server
remote frame buffer
remote system administration
license
nonperforming loans
economic growth
housing loans
ertps
fault tolerant
steganalysis
structural similarity measure
³¾Ã£±ð
wmse
non linear support vector machine
contourlet transform
transcription units
protein synthesis
drug design
api reference documentation
api
knowledge types
searching.
large graph
graph partitioning
sub grap
constructive covering algorithm
citation knn
multi-instance problem
bayesian knn
discrimination
mining model.
classifier
drp algorithm
discrimination measures
array signal processing; uniform linear array; bea
housing market
data extraction
dom tree
auxiliary information
record alignment
stego image and stego key.
image steganography
fpm; ann; mlp; ff; bp
semi-supervised approach
sentiment analysis.
latent dirichlet allocation (lda)
joint sentiment-topic (jst) model
constraint programming; optimization; feasibility;
filter
pattern recognition.
finger-vein detection
perturbation data mining
red variants
red algorithm
red parameters
red
aqm
flooding attack
legitimate traffic;
distributed denial of service
ns-3
be
merkle skyline r-tree
location based services
dicom
orthogonal wave velocity
ultra-fast scanner
orthogonal modulus
sliding rectangle algorithm
tele-medical field
transient elasticity
compromised machines
nice
spam zombies
compromised machine detection algorithms scenario
protective behaviors
educational package
dust phenomenon
face recognition; local directional pattern; princ
communication protocols
tcptransmission control protocol
primary backup
udp- user datagram protocol.
cloud workload
cloud storage and invariant reports
hybrid resource provisioning
component; formatting; style; styling; insert (min
reveres engineering; software architecture; docume
workload imitation
md5
rotor angle
park transformation
transient
symmetrical fault
synchronous machine
losses
transmission bandwidth
video compression.
noise cancellers.
acoustic echo cancellation (aec)
adaptive filtering
hybrid
value stream analysis tool (valsat) process activi
vsm
future stat map.
current stat map
networking
adhoc networks
correlated shadowing
localization
parallel mining
big data mining
mapreduce.
challenges for big data mining
big data mining algorithms
outsourcing data management
cloud service provider
novel partial s4-tree
mobile phones
global positioning system (gps).
prediction algorithms
short message service (sms)
classification.
email spam
optical character recognition; handwriting; image
static timing strategies
local search algorithm following the binary gravit
genetic algorithms
optimizing time
identification protocol
cluster as a service
deduplication
pow
erp systems
erp implementation
user participation.
enterprise resource planning
iris center localization
wavelet transform
hepatitis
clinical decision support system (cdss)
decision trees (dt)
support vector machine (svm) and sequential minima
medical decision support system (mdss)
k nearest neighbor (k-nn)
linear regression
anomaly base detection
botnet
hash function
ddos
hierarchical attribute-set-based encryption.
fine-grained access control
attribute-set-based encryption
rsync.web security
wodrpress
language modeling
smoothing
chunking
semantic
statistical
cordic
beamforming
sonar imaging
validity region
metropolitan area networks (mans)
and possibly wide area networks (wans) [2]. a metr
and efficient failure-handling mechanism [3]. curr
rstp. 1. introduction ethernet is a family of comp
metropolitan area networks (man)
it is a critical requirement to have a fast
reliable
spanning tree protocol
formatting hierarchal clustering; markov model; pa
service; service-oriented architecture; performanc
workflow data-flow modeling and verification; petr
wfio-net and its firing rule
activity-data incidence matrix
transesterification
tbc
callophyllum oil
pu learning; p ositive - u nlabeled learning; one
i ntrusion detection system; self organizing map s
mobile computing security
mobile operating systems
cache management
mobile limitations.
re - ranking algorithms
e - catalog
personalization
user profile
information retrieval
knowledge base
pixel classification
: adaptive image contrast
signal to noise ratio
mimo systems
channel state information
antenna selection
rf modules
security ; attacks; manet; pr eve ntion; routing
ad - hoc networks ; secure routing ; secure neighb
feature selection; unsupervised feature selection;
ugs
gdp
fast features
region properties
euclidean
multimodal
tga
varnish
micronutrients
crops
cement dust
adsorbents
thermodynamic parameters
gibbs free energy
heavy metals
spent lubrication oil
activation energy.
radial basis function neural network
face detection
sliding window.
granite
fluoride enrichment
kanigiri
ground water
cloud computing;
load balancer
service bus
storage
graphical concrete syntax
metamodel
model driven engineering
ns-2 programing.
mobile parking management system
named entity recognition
parts of speech tagging
video categorization
natural language processing
wordnet
encryption; decryption; security; gps technology;
web security
malicious injection
cross-site scripting (xss)
and web application attacks.
methodology; web-based; cad/cam; software model; d
group digital signature
digital signature
revocation
cryptograph
al2o3
tio2
quantum dots
disadvantages
advantages
applications
nano particles
nano wires
thin plate splines
round trip time.
hop-by-hop authentication
source privacy
public-key cryptosystem
modified elgamal signature
trade-off between reliability and security
falsified data injection and forward error correct
multiple access relay network
multimedia system
fibonacci splitting approach
usability engineering
agile process models
special-purpose hardware.
educational data mining; classification; analysis;
special-purpose hardware
thin plate splines.
mobility models
pixel classification.
adaptive image contrast
intrusion detection system; self organizing maps;
rf module
vehicle
slicing techniques
data flow equation
control flow graph
program dependence graph
transparency
sms
m-payment
e-revolution
prototype and ehcb.
windev
generalized digital certificate; user authenticati
fair scheduling
ieee 802.16
fft
qpsk.
ifft
ofdm
gpio
micro blaze
virtex 5 fpga board
rtd transducer
data acquisition
cloud computing; multi-agent; web services; servic
security issues
trend analysis; linear regression; forecast accura
data sharing.
accountability
code parser
testing
automation
priority
hybrid testing
noise processing; black level; speckle noise; salt
distributed computing & cluster computing
high performance computing
parallel computing
satellite image
asymptotic stability
neutral
mild solution
impulse
stochastic
sms gateway
rreq
rrep
one-to-one compound mapping
translucent watermark
two-fold monotonically
mapping randomization
parameter randomization
alpha blending
velocity
lucas-kanade algorithm
motion estimation
optical flow
low power digital filter
reconfigurable filter.
web log data
weblog expert lite7.8
behaviour trust
evaluation strategy.
black list
mobile adhoc network
usability.
wsn algorithm
security mechanism
konark
upnp
jini
service discovery and service
salutation
discovery protocols
slp
mobile ad hoc networks
context; computing; context models; reasoning; ont
wsla
wsdl
sla
b2b
quality of services
soa
uddi
and organized standards bodies have led to the nex
i.e. confirming another identifier such as a passw
fingerprints have been one of the most highly used
stft
enabling surveillance and sorting of groups of peo
pin or a photograph. 2. identification
svd
walsh transform 1. introduction for over a century
localized detection xed
eed
replication attacks
collusion attacks
blob
histograms of oriented gradients descriptors
mixture of gaussians techniques
abandoned object.
object classification
morphological operator
edge histogram
black hole attack
reversible logic circuits. carry save adder tree
mbe
reversible logic gate
dkg
pll
uart
digital clock manager (dcm)
international data encryption algorithm (idea)
virtual machine
dynamic resource allocation
cloud users
resources
grid network- petri net- reliability- cpn tools- r
ontology matching
domain knowledge
merging ontologies
government evaluation and needs
providing a discrete identifier (or identifiers) t
fingerprint-based biometric systems are so popular
traffic light control
chaotic traffic
short message services
gps services
eco-friendly
recyclability
tco certification
dct
blur
wavelet.
mechanical properties
anaerobic extraction
bisphenol
pineapple leaf fiber
transverse vibration; matrix material; mode shapes
nimus
informal learning.
animation
mobile learning
neighbors monitoring scheme
which promises faster and higher quality acquisiti
ns2 simulator
wireless ad hoc network
intrusion detection system
tomato fruit
tomato leaf
morphology
filter based feature selection
wrapper based feature selection
grid; adaptation; resources; entities; component s
product functionality (pf)
bill of materials (bom)
product knowledge
knowledge acquisition (ka)
co2 emission.
blackle
tco
neutral stochastic functional differential equatio
sensing; bts
neighborhood
adjacency matrix
annihilator
zero-divisor
commutative ring
diffusion method
prediction
mobile commerce
qr code reader.
qr code
rotation of object
bot
hackers
images generation
spammers
captcha
local phase quantization
linear ternary patterns
point spread function (psf)
blur kernel
magnetic field
open-type magnetizer
permutation flow shop; evolutionary algorithms; lo
co2 laser cutting
hardox-400
glass etching
and chemical etching.
sandblasting
acid etching
networked control system
model predictive control
access network selection
radio resource management
mra
rat
joint allocation
multi- radio access
intuitionistic fuzzy generalized semipre regular o
intuitionistic fuzzy generalized semipre regular c
pr-owl
mebn
unbbayes
pde
weiner filter
deblurring
psf
spectrum sensing
network management.
spectrum holes
primary users
cognitive radio
intuitionistic fuzzy semipre generalized super con
intuitionistic fuzzy semipre generalized connected
service-level agreements
software as a service
hybrid pricing.
platform as a service
k-means algorithm.
c4.5
zero-divisor graph
l1 norm
test driven development; continuous integration; e
ballpark algorithm; transmit algorithm; wireless s
variable weighting
w-k-means
fuzzy-k-means clustering (fkm)
feed forward neural network; impulse noise; image
idle nodes
optimal path
dijkstra’s algorithm
feature similarity index (fsim)
low level feature
structural similarity index (ssim)
gradient magnitude(gm)
phase congruency (pc)
image quality assessment (iqa)
spread spectrum
scalar costa scheme.
anonymizer; database management; safe zone; spatia
fingerprint; palmprint; multimodal biometrics; min
candidate sets
itemsets
apriori
return of investment (roi)
cost and benefit
quality attributes
organizational capitals.
enterprise architecture analysis
color transfer technology
color contrast enhancement
test data compression
test data volume
dictionary based encoding
selective encoding
data grid; data replication; group replication; ar
disaster management
finite automata (fa)
deep packet inspection
wrts
dempster shafer theory;
k-means; k-medoids; centroids; clusters;
cbir
features
color
shape
demonstrable data retention
data retention.
zero knowledge
homomorphic
cooperative
storage outsourcing
multiple cloud
distributed environment
multi-authority attribute-based encryption
intrusion; anomaly; machine learning; ids
service-oriented architecture (soa)
embedded devices (sensors).
intuitionistic fuzzy contra semipre generalized co
intuitionistic fuzzy almost contra semipre general
intuitionistic fuzzy completely semipre generalize
intuitionistic fuzzy almost semipre generalized cl
intuitionistic fuzzy almost semipre generalized co
trust; trusted platform module (tpm); integrity me
rw-closed maps
rw-open maps.
path loss
csp algorithm
attenuation factor.
indoor propagation model
cluster-head
sink node.
distributed data mining
multi agent data mining
multi-agent based distributed data mining.
multi-agent systems
toroidal
jpeg2000
simple object access protocol (soap).web services
pattern matching
regular expressions
differential encoding
routing and wavelength assignment
contention resolution
obs research issues.
optical burst switching
aon
psnr (peak signal to noise ratio)
frequency domain
spatial domain
image watermarking
mse (mean square error).
least significant bit (lsb)
grid computing; job scheduling; regression tree; f
lighting control system
ldr
pir sensor
energy saving
electric properties
chalcogenides
semiconductors
.
fp-lapw+lo
density functional theory
amino acid complex; nlo; doping; single crystal; s
goniometry
conductivity
sensitivity
fabric strain sensor
polyaniline
alkali metals
p-nitrophenol
crystal morphology; x-ray diffraction; growth from
single crystals
nlo
benzophenone
solution growth
melt growth
cryptography; elliptic curve; finite field; mappin
combustion process
microwave
nano phosphors
display application
solubility and crystal growth of 4-abp
hybrid fibre composites; vinyl ester; mechanical p
co precipitation
magnetic properties
manganese oxide
optical
surfactant
crystal structure
stannous oxide; semiconductor; nanoparticles; morp
design of experiments
yield
box-behnken
crystallite size
hydroxyapatite
acoustic survey
order linked trade credit.
time dependent demand
variable production rate
three echelon supply chain
policy algebra framework; ubiquitous enforcement m
sink
eadc
cluster head(ch)
march algorithms
hybrid mbist
fsm mbist
flexible
low area
asynchronous soc
wavelets transform
level set
gaussian mixture
periodicity detection
segment periodicity
strontium
drum seeder
ergonomics studies.
molding process
polymer
cono weeder
rice mechanization
shielding fabric; core conductive fabric electroni
fasteners; aerospace; countersunk; screws; stress
crystal growth; crystal structure; x-ray diffracti
copper thin film
mtt assay
stainless steel aisi 316l
anti-microbial effect
direct current magnetron sputtering
l-alanine; admixtured crystal; solution growth; nl
wireless sensor networks (wsn); sensor; data sink;
bats
echolocation call
fif.
nhpp
sa
mvf
black hole
ad-hoc network
r2rml
mapping language
owl
semantic web.
mapping patterns
relational databases
intrusion
layered approach
ber; capacity
steganography;psnr;mse
pattern recognition; hopfield network; back propag
multi-criteria decision making
response time
grid network
control and data dependence
lagging
leading
inductive type
synchronous condenser
power factor
power quality
magnetic tunnel junction (mtj)
hybrid cmos/mtj process
stt-ram
perpendicular magnetic anisotropy (pma)
lpddr2 mc; design; device initialization; refresh
gpu.
parallel
travelling salesman problem
opencl
ant colony optimization
network.
weight based clustering
background subtraction.
soft impute method
object detection
moving object extraction
attacks; malicious; obu; rsu; vanet
functional coverage; axi; uvm; lpddr2 mc; ddr2 mem
wireless communication network; wireless sensor ne
voodoo
directfb
mobile applications
philips jointspace tv
pattern identification
mines interesting knowledge or patterns
data revelation
olap (online analytical processing)
homomorphic encryption
cryptdb
k-anonymity.
logging
support vector machine.
srgm
topsis
j48
naïve bayse
adaboostmi
intelligent algorithms
information retrieval; query processing system; co
signal and brain wave simulation process
bmi
bmi techniques
eeg signals
machine –human interaction
brain machine interface
mobile ad-hoc networks; taodv routing protocol; st
cloud computing; iaas; paas; saas; cloud security;
ip address
birthday paradox
bloom filters
high-resolution
ranking model
customer behaviour
feedback sessions
pseudo-documents
network security.
plain text
cipher text
human-centric computing
ubiquitous computing
human-machine interaction.
two criterion functions
multiviewpoint
singleviewpoint
similarity measure
hand gesture interface
hci
orientation histogram
wireless network; pipeline; sensor; forwarding; ro
control system
arduino
uci data repository.
clustering problem; genetic algorithms; ant colony
id3 classification techniques
data verification
dynamic operations
certificate authority
audit service
image restoration
salt and pepper noise
noise detection
denoising
degraded images
gaussian
wireless sensor networks; fault tolerance; fuzzy a
candidate itemsets; frequent itemset; high utility
recommender system
swarm intelligence optimization
target marketing.
natural inspired technique
content based face image retrieval
unnecessary handovers
wrong decision probability
missing handovers
on-chip bus
amba ahb
soc debugging
software architecture; colored petri nets; object-
grid computing; load balancing; hierarchical; sche
max-min algorithm
firefly algorithm
flowtime
: image scaling; android os; application; memory c
tspr
page rank algorithm
web mining weighted pagerank
hits
semantic annotation
mix-zone
zone partition
e- commerce
sensors faults
actuator faults
technological systems
decision based algorithm
image restoration and enhancement
visual threshold
visual cryptography
privacy concern
information revelation
social engineering.
social networking sites (sns)
awareness
executable model
non-functional requirements
enterprise architecture
: clustering
fcm
swarm
serial-serial multiplier
partial products (pps)
accumulation.
ripple carry adder (rca)
csa
software reliability growth models
software reliability
maximum likelihood estimation
partical swarm optimization
parameter estimation
load test
shear wall; response spectrum method; etabs softwa
pulse compression
matched filter
radar
range resolution
lfm
grid resistance
current injection method
actual touch and step voltage
sr images.
sequence periodicity
symbol periodicity
periodic pattern mining
character recognition; feature extraction; feature
clarans.
breast cancer
cancer
k-medoid
impulse noise
gaussian noise
iterative filtering algorithm
edge based comparison
web page change detection
zone selection of web page
change monitoring
generalized tree comparison
node comparison
web page monitoring
knowledge management; learning knowledge; traditio
information era; e-learning
eeg; glcm; anfis; fis;bpn
advanced encryption standard (aes)
central server (cs)
mobile device sensor (mds)
user sensor (us)
entity recognition
leadline
topic modeling
event detection
hbc
secret key
iwt
pseudo random number
rdh
words feature
letters width
persian cursive handwriting
local binary pattern
html
multisim simulation software.
ground potential rise
earth rod
earthling grid design
linear feedback shift register (lfsr)
code division multiple access (cdma)
pseudo-noise (pn)
optical code division multiple access (ocdma)
field programmable gate array (fpga)
keyword extraction
page segmentation
tf-idf weighting
k-means algorithm
cosine similarity
computing; technical; security; cloud; issues
employability
personal development
sugeno type inference
volkswagen deception
epa standard
wordsense disambiguation
knowledge based
supervised
unsupervised
matrix permutation and combination
capacity of the river
cisc
amd
architecture
risc
moore’s law.
processor design
hardware complexity
transistor count
5th generation
hvdc transmission
contrast enhancement
normal white blood cell
features extraction)
acute leukemia
(digital image processing
fee
rent
system cooperation
marketplace
event organizer
project management
codeigniter
application
project
environmental agency
volkswagen emission test
social-based frameworks and applications
codecs
buffer size
voip
firefly
tehran stock exchange
countermeasures
nic
it infrastructure
managerial layer
sub-layer
layers
sink nodes
lightweight algorithm
cloud service
aging
renewal
cellular technology
server
microprocessor
intel
pcs
privacy preserving
dynamic secret key
multiple owners
ranked keyword search
networks and rules
classes
neighborhoods
sustainability
safety-critical systems
agile methodology
agile methods
suitability
teaching and learning
lcd projector
sample size
degree of a vertex
tree.
randić index
software development
software design
revolutionary algorithms
unicode
binary tree
amazigh alphabet.
post-order
pre-order
elliptic curve cryptography
in-order
monitoring
safety-driven software product line architecture d
safety analysis
software product line architectures
architectural design
software architecture quality attributes
vulnerabilities
owasp
cost constructive model
software effort estimation.
function point
lines of codes
agile
coronary arteries
visualization
maximum principle curvature.
calcified plaque
sample population
kernel
cross validation
maintenance
tractor
operation
daily checks
tractor operators
successful
transactions
problems
automatically
computerised
statcom
emerging topolo-gies
power system faults
ac-dc power converters
multi-level converters
humans
complex activity recognition
cell phones
ambulatory
accelerometer
online prediction.
mobile and ubiquitous environment
average embedding technique
lsb technique
normal network
intrusion detection
cellular networks
5g.
fertilizers
agriculture monitoring
congestion detection and mitigation
histogram equalization.
program
ga-svm methods
white box testing
mitm
ip (internet protocol)
mac (media access control)
dos
session hijacking
cryptography.
arp (address resolution protocol)
cold storage
gsm module
temperature sensitive product.
temperature sensing
microcontroller
remote monitoring
embedded platform
bayesian belief network
tpa
fine-grained data updates
rmht algorithm
mobile agent
vehicle communicator
signature verification
shape matrix.
biometric identification
web 2.0 tools
higher education
software defect prediction
probabilistic neural networks.
radial basis functions
datasets
mysql database
uml
borland delphi
pluronic nano-micelles
8-5’ neolignan
flax
linaceae
attribute-based signatures
attribute-based encryption
cloud storage.
ductile regima grinding
partial ductile mode grinding
ultra precision grinding
aspherical surface generation grinding wheel
elid
attribute encryption
identity encryption
cryptosystem.
key-aggregate cryptosystem
data sharing
energy conservation
pervasive computing.
one way function
file digest
hash
japanese
hiragana
learning application
nbr
maximum degree of swelling.
percolation threshold
young's modulus
carbon-black nanofiller
ciphertext
auditing
controlled release.
linum usitatissimum
text information
xor operator
sumo
vehicular ad hoc network (vanet)
simulations.
realistic mobility model
bee swarm routing protocol
move
network coding
directional antennas
drought stress
technique
optimization particle algorithm
matlab software
apportion duties
performance isolation
burst handling
chi-square
som
lung cancer
pca
data security.
data splitting
t-coloring
bandwidth utilization
channel resilience.
quality of service
internet connectivity
wireless technology
attribute
optimal subset
dimensionality reduction
symmetric
key.
mdbnrz
csnrz
fso
mdbrz
dbnrz
proactive network forensic
attack prediction
attack strategy.
cybercrimes
digital forensic
mamdani fuzzy system
grid scheduling
membership functions
execution time
payload.
video attacks
copyright protection
starvation
quanta
latency
systems and features.
cbir techniques
content based image retrieval
nand gate
phase frequency detector (pfd)
phase locked loop (pll)
clock signal
d flip-flop
cmos
inspired algorithms
flower pollination algorithm
hybridization
glcm
csrz
noise.
median filtering
logarithmic transformations
enhance
empirical analysis
chinese economic growth
financial development
economic opening
nasal class words
malayalam
automatic speech recognition
availability
colored petri nets
unified modeling language
web browser
memory hogging
browser reference architecture
diabetes
heart disease
oil spillage
concentration
groundwater
hydrocarbons
surface water and fermentation
total viable counts
species inventory
bacteria colonization
tributaries
°ùé²õ±ð°ù±¹²¹³Ù¾±´Ç²Ô
rental business
service providers
booking
futsal field
information assets
e-readiness
primary schools
pseudorandom number generators (prngs)
huffman compression algorithm
jaro-winkler distance
text steganography
capacity ratio
audio steganography
spectrogram
tone insertion
mse.
the device also consists of two buttons
which are used to synchronize the ir code of the e
surf
feature matching
object tracking
mobile platform
ddos attack
artificial immune system
wimax network
symmetric.
radix sort
msss
aes encryption
traditional computing
eco-efficient
higher learning institution in tanzania
building blocks
mobile cloud computing
web log mining
web content mining
browsing behavior
website design qualities
integration
predictive genomics
deep learning
machine learning (ml)
rna analysis
dna sequencing
mpox virus
online public access catalogs
distribution generation
fuzzy knn
web scrapping
biomedical information
information extraction
openstack;
vehicle clearance
managers
customers
employee
structural integrity; frame strength; compression
critical infrastructure; ports and shipping; naval
maritime cybersecurity; cyber threats
proactive threat analysis; cybersecurity; machine
6. advanced manufacturing analytics.
5. ai integration in manufacturing
4. machine learning in manufacturing
3. process optimization
2. predictive maintenance
topological data analysis (tda)
artificial intelligence (ai); principal component
6. privacy regulations.
5. ethical considerations
4. information integrity
3. threat detection
2. data privacy
ai-driven cybersecurity
ordinary node
forwarder node
data packets
acoustic channel
dolphin node
super node
harsh
depth-adjustment
v-shape
water-current
voids
deployment
regularity-loss property.
decay
plate equation
naive bayes.
kdd
energy; routing;
sdn; openflow
complaints document
decoding complexity.
combined balanced ternary number system
setun
balanced ternary number system
ternary number system
binary number system
hangul
kernel radial basis function
kernel linear
kernel polynomial
design
school
education application
3dp
methodology
performance expectancy
knowledge economy
unified theory of acceptance and use of technology
effort expectancy
e-float
value proposition
financial inclusion
stem
predictive modeling
enrollment
reasoning mechanism
hei
rule-based
statistical analysis
students
modeling
activity prioritization
term frequency inverse document frequency.
preprocessing.
offline recognition
handwritten
android.
real-time
cloud security reference model
principal security dangers to cloud computing
ssl overview
identity management
mental illness
gesture detection
gesture recognition
matrix
elliptic curve
scrambling technique
innovation diffusion theory (idt)
rsa cryptosystem
clustering techniques
clustering algorithms
cluster input parameters
cluster input data type.
multimedia streaming
peer to peer network
multicasting
fiestal structure
low-power
des
pipelining
independent task scheduling.
meta-heuristic
task assignment
local search algorithm following the gravitational
artificial intelligence algorithm
hybrid context model
context modeling
context
context-aware computing
correlation factor
peak signal to noise ratio
standard deviation.
image textures
fast wavelet transform
stego-image
data extraction.
data covering
stego-key
modular multiplication
identity based cryptography
visual cryptography.
vedic mathematics
invariant features
hadoop-streaming
mapreduce
nosql
hdfs
hadoop
leadership.
forecasting in leadership
application software
computer-based forecasting
governance
forecasting in governance
task scheduling
weak passwords
web security.
bloom filter
features extraction.
risk
octave
risk assessment
music streaming
choir online communication
messaging system
controller
opsr
dos attac
cluster measures
dissimilarity matrix
speeded up robust feature technique
nandinagari handwritten character recognition
scale invariant feature transform
k means
hierarchical agglomerative clustering
pam
malicious url
rdb
query translation
weather forecasting
mitigating weather change
role of ict in weather forecasting
monitoring weather condition
adapting to weather condition
attack
denial of service
session initiation protocol
voice over ip
vector space model
hybrid recommender system
content-based filtering
collaborative filtering
recommender systems
measure
quality
reusability
virtualization
live migration
data centers
host
clustering algorithm
forecastability
forecasters
monetary and fiscal policy
forecast error and forecast accuracy.
economic forecasting
active content
finite state machine
input form
behaviour based malicious url finder
this new method is a differential viscosity column
black box testing; web testing tools; open source;
linear discriminant analysis
false acceptance rate
false rejection rate
iris recognition
efficient and fast search
skip list
and distributed networks
skip graph
viterbi algorithm
forward backward algorithm
colour segmentation.
baum welch algorithm
hidden markov model (hmm)
jamming
packet drop
misbehaviour
digital analysis
hacking
risk and vulnerability
em algorithm
svm algorithm
emotion
speech; mental retardation; spectrum analysis; pit
taguchi method
laser power
weldox-700
surface roughness
kerf width
fuzzy logic; image processing; color image enhance
large scale data set anonymization
map reduce
scalable two-phase top-down specialization approac
tds approach
incremental mining
interactive mining
support;
video compression
wireless video transmission
video coding
tabu search algorithm.
test case generation
test sequence
testing criteria
lndr
wireless data broadcast
mcdr
multichannel
polymer/graphite composite
electro-mechanical
piezo-resistance
wireless mesh networks
insider attacks
mobile ad hoc network; packet encapsulation; out o
dbdh- decision bilinear diffie hellman assumption
acg-access control gadgets
kgc-key generative center.
ibe-identity based encryption2 pc-protocol to prot
cp-abe- cipher text-policy attribute-based encrypt
dtn- disruption tolerant network
pki-public key infrastructure
object oriented software analysis
testability metrics
software testability
oo metrics
ciphertext policy
short decryption key.
maximal mining
production planning and control
tracer
replication techniques
drug discovery
pharmacy and poisons board of kenya
pharmaceutical imports
distribution of water
least square
beyond oil; information technology; competiveness;
stiffness
glass fiber reinforced polymer (gfrp)
box beams
scaling.
damage mode
deflection
blast load
dynamic response resistance
educational games
moving object detection
optical flow estimation
camera.
blob analysis
neuro-fuzzy; intellectual property; cost managemen
sensor network; data routing; ns-2; sleep mode nod
data; distributed database; performance; tsqlann
bitmap 1. introduction
constrained task scheduling
biogeography based optimization
dag
ranking
polymer nanocomposite; simulation ; pulsed laser ;
manufacturing engineering
agile manufacturing
lean manufacturing
shell
compressive
fiber orientation
circular glass fiber reinforced polymer (gfrp)
regression testing; test case prioritization; mode
mrr
sr
arc gap
en8 (aisi 1040)
kw
taguchi design.
air pressure
date mining; k-means technique; algorithm complexi
page rank ;markov chain; criminal gangs; biologica
monitoring system
weather station
exsys corvid
stiffness degradation
hybrid fibers
beam-column joint
energy dissipation
ductility factor
abaqus.
curved beams
satellite imagery
landsat data
land use
land cover
android; fashion; mobile; store; online; technopre
fatigue damage
ese(t) specimen
corrosion fatigue
is 2062 gr. e 300 steel
fatigue crack growth
compressive capacitance
smart home
wellness
activities of daily living
elder care
home monitoring
speech synthesis
prosody analysis
speech recognition
phonemes
speech api.
android; surveillance; peer to peer; internet conn
robotic rover; embedded c; microcontroller; progra
performance evaluation and time colored petri net.
blackboard technique
real-time simulation
application of real-time security systems.
survey on face recognition approaches
legacy
crime
hotspots
buffering.
geographical information system (gis)
implicit meaning
soft computing.
disease treatment
stemming algorithm & natural language processing m
medline
skip-list
cas
lock-free
modified skip list
branch and bound
flower pollination algorithm; meta-heuristics; opt
dna; information technology; nanotechnology; bio-
intuitionistic fuzzy pgr continuous
intuitionistic fuzzy pgr closed mapping and intuit
intuitionistic fuzzy set
attribute based encryption.
spatial index
keyword-based apriori item-set
neighbour search
merge multiple
k-mean
sequential patterns
noaa-avhrr images
association rules
time series mining
maximum cross correlation
national football league
hybrid system
k-nearest neighbour
clustering; databases; banks; discipline; manageme
retarded double time green’s function formalism
superconductivity and spin density wave.
spin singlet and triplet state
systems integration
virtual learning system
service oriented architecture (soa)
biometrics; fingerprints; templates; security; enc
irc
ids
anomaly
countermeasure
denial of service.
musical instrument; monophonic; polyphonic; classi
firefly algorithm; metaheuristic; optimization; ch
dwt; interpolation;iwt; resolution; wzp;
intuitionistic fuzzy pgr open mapping
software selection process.
component based software development (cbsd)
component based software engineering (cbse)
software component selection
recycled materials; alternative wall; construction
thiazolidinediones
hypolipidemic activity
antidiabetic agents.
hypoglycemic activity
imidazothiadiazoles
information and communication technology; ontology
multi objective particle swarm optimization; artif
capacity; pixel-value differencing; image quality
virtual organization
grid layers
pipelining vo formation.
minimum path algorithm
qtc
pressure sensors
fusible alloys
shielding blocks
thermal friction drilling; optimization; process p
thermal properties
structure
resistivity
bearing alloys.
internal friction
titanium oxide
microstrip lines.
standard schiffman phase shifters
phase deviation
coupled lines
lang coupler
case based reasoning
arima; forecast; injured; killed; casualty
intrusion detection system (ids)
multipath routing
heterogeneous wsn (hwsn).
trust management
mouse behaviour signatures; biometric authenticati
metasearch
query bundle
qb-c
content based filtering
quest trail
fuzzy inference system.
position tracking
resource allocation; constrained resource scheduli
requirement engineering
reengineering
non-functional requirement
msvof mechanism
vulnerable.
sql injection prevention
tag refinement
online social networking.
decision based access control
shadow removing
tensors
flash image
k-nn classifier
decision making
constraints.
personal health records.
sqlite
mysql server
secure computation.
confidentiality
eeg signal
stress
fuzzy enterprise architecture
fuzzy colored petri nets
enterprise architecture evaluation
nba guards
classification number
k-means clustering algorithm
bentonite drilling fluid
shear stress
interactive effect
nanoparticles
thermal stability
cellulose degrader
phylogenetic analysis
biochemical and molecular characterization
hydrogen producer
webcrawler
diagnosis
membership function and rules blocks
treatment
inference component
2d array searching algorithms
matrix searching algorithms
2d array linear searching
algorithms
complexity analysis
2d array grid searching
searching algorithms
suffrage
makespan.
naïve bayes
neurosky mindwave.
knn
koh
tafel.
8-hydroxyquinoline
6061 al-sic composite
enhanced apu
destination aware routing.
android application.
nfc tags
nfc enabled smart phone
web server
dbms
etc
epq model
inventory
variable demand rates
deteriorating item
permissible delay in payment.
clinic
health metrics network
opd
health information system
morbidity
public service
location based service
xcode ios 4.2
google maps
interest point
learning
and animal.
biology
spring steel
tafel
leaf spring
hcl
voting algorithm
quality of service (qos)
service level agreement (sla)
dynamic pricing
revenue maximization
csl
software-as-a-service (saas)
security issues cloud computing infrastructure ser
infrastructure as a service security threats
connected component analysis
edge detection
green channel extraction
opinion target
opinion words
topical relation
route update.
mst
insert (minimum 5 to 8 key words)
decision trees and neural networks.
logistic regression
interfacing
computer interface
computer aided device.
security and privacy
laser and pulse.
ratio
offline recognition: arabic word recognition
holistic approach
vcs (vehicle communication system). vanet (vehicul
gps (global positioning system)
iot (internet of things)
naive bayes
spam emails
tree decision
environmental impact
tech waste
management
fuzzy decision tree
naive bayesian
anti-spam
id3 algorithm
model
service levels
virtiuation
usage pattern
migrating agent
relevant search
image based crawling.
indexer
page ranking
domain profile
prim’s algorithm
bfs
transformation based classification
opinion generation system
keyword identification.
lexical based algorithm
li-fi (light fidelity)
vlc (visible light communication).
led (light emitting diode)
wi-fi (wireless fidelity)
e-waste
dumping
electronic waste
youngsters
education.
society
business
driver
artificial intelligent system
intelligent traffic systems
traffic lights
smart cities
fes
road traffic
sleep mode nodes
alternate path.
data routing
pasccc
wsns
distributed database
tsqlann
bitmap
fuzzy object oriented database
object oriented database
fuzzy database
minutiae extraction
sparse representation
multimedia information
memory package
personalized notes
smart phone
structural similarity
insert(minimum 5 to 8 key words)
component
url
marathi.
nlp
cross language information retrieval
machine translation
neuro-fuzzy
cost management.
intellectual property
pseudo-sections
physical modeling
resistivity prospecting
induced polarization
egovernment; organizational; critical factors; pro
mmrm
lrm
image change detection
sar
mrffcm
unified recommendation.
random walks
social network services
sampling methods
multi graph
graph sampling.
hygiene
tag xml.
fuzzy query
international committee of the red cross(icrc)
national disaster operation centre(ndoc)
missing persons community of interest(mpci)
united nations(un)
emergency communication system(ecs)
emergency communication system
web-based
waterfall model
job fair
user
2-(4-methoxyphenyl)propan-2-ol
dna-alkylating agent.
charnockite basement
eigenfrequencies.
target depth
success and failure factors
e-government implementation
kenya.
data acquisition system
versatile systems
wireless protocol
sigma delta
digital filter design
kalman filter
estimation and prediction
effect of security in it industry
academic networks
mathematics
retail sector
weka
overlooking
user’s pin.
license verification
ghana revenue
dvla ghana
vehicle theft
causal-covering method.
diagnosis issue
bayesian method
mathematical modelling
inference engine
hole healing.
routing holes
coverage holes
off-line handwriting recognition
handwriting
finite state automata
automatic machine
prototype
and ministry performance.
white space.
signal activity pattern acquisition and sequential
signal activity pattern
secondary user
charnockite basement
eigenfrequencies
pulsed laser
polymer nanocomposite
heat equation .
e-governance
good governance
internet
service delivery
fingerprint compression
enhancement
wiener2 filter
bank server
chip and pin
shoulder-surfing
iits
co-authorship networks
authors suggested a mechanism for these permeabili
differential thermal analysis (dta) and tensile te
dnaalkylating agent.
2-(4-methoxyphenyl)propan- 2-ol
innovation
government organizations
transformational leadership
internal process
learning and growth
police performance
technology improvement
technology acceptance
understanding power
See more
- Presentations
- Documents
- Infographics