cloud computing data mining grid computing soft computing high performance computing dna computing knowledge management & ontology green computing soa semantic web nano computing cyber security cryptography computational science pervasive computing advanced computing software engineering practice e-learning wireless networks gaming models privacy networks & data communications "computer networks paper submission design & communication" mobile networks next generation networks & communications wireless internet network security mining trends social networks deep learning machine learning engineering bio-metrics quantum computing proxy cryptography homomorphic encryption computing clahe steganography algorithm refactoring education bio metrics computer vision testing data mining applications bioinformatics encryption fabrication forgery visa passport algorithms natural language processing algorithms and data structures practices and principles lean agile leadership devops adoption it service management backpropagation neural networks web engineering software engineering big data ai cybersecurity automation erp data multi-population shuffled frog leaping algorithm job shop scheduling problem memetic algorithm e-commerce credibility data integrity knowledge of the learner. online education campus training vocational training center pedagogical approach information technology and communication (ict) multispectral image fusion ophthalmology retinal image analysis simultaneous vessel identification watermarking qr code clustering motion compensation motion estimation motion vector macro block classification vector quantization personality demand fulfillment database recall texture precision texel community member personal data model socio-demographic characteristic weka refactoring opportunities ordinal scale source-code metrics uml diagrams ● high performance computing ● analytics advanced tecjnology comuting internet of things (iot) artificial intelligence high performance biometrics data management bio informatics data base neural networks data model cloud compuitng discourse semantic text mining grid compting innovative menu e-portfolio cyber portfolio knowledge management micro-aggregation data transformation industrial performance industry 4.0 e-maintenance managing software projects knowledge processing knowledge-based systems web engineering quality management advanced topics in software engineering architectures networkingc reputation management authorization computer architecture big data  blockchain algorithms and bioinformatics mobile app decryption applications infrastructure and platforms cloud application service-oriented architecture in cloud computing cloud business nios ii ide. sopc builder nios ii processor advanced encryption standard (aes)  hybrid systems  complex adaptive system and theory robotics informatics cybernetics data structures probabilistic computation information theory information technology dual resonance non linear (drnl) kálmán cochlear implants automata theory • algorithms and data structures health care physiological signal processing concept-drift real-time data stream mining wban wireless sensor networks aspect oriented programming unicode freeman code web mining test order. integration testing uml stubs location-based service discovery vehicle network fault tolerant software process information retrieval software engineering practice quality management string matching plagiarism ergonomics neuroscience neuroergonomics functional magnetic resonance imaging (fmri) erp and cloud computing erp security solutions erp security challenges erp problems erp system image retrieval smart phone gps image content recommender systems svm k-means clustering glcm exudates diabetic retinopathy (dr) cie lab colour space automated software testing code coverage unit testing attacks. directional filter wavelet transform load balancing. optimizing vm load amazon ec2 infrastructure-as-a-service sentiment lexicon. micro-blogging twitter ontology domain specific ontology sentiment analysis simulation aodv protocol ib-leach enhanced nmi modularity index of clustering results cluster size cost of clustering mcl rnsc oop. object-oriented programming oof object oriented framework framework cbf component-based framework cbd component-based development one version data store legacy erp system web portal enterprise resource planning etl business intelligence message confidentiality backward secrecy forward secrecy key distribution throughput transmission time eee leach k-means clustering. privacy preserving data mining code book generation root and light stemmer. similarity measures latent semantic analysis (lsa) arabic language precise rate control (prc). spiht algorithm image compression wavelet analysis multiple precision convenient modulo modulo reduction montgomery algorithm distributed data mining apriori hadoop distributed computing frequent itemset world wide web & pattern extraction web content mining web usage mining e-business data cleaning obesity heuristic artificial immune systems cell phones. wireless interfaces malware handheld devices security prosodic feature mfcc gmm-ubm multilingual speaker verification redundant bits secure cloud architecture. vulnerabilities threats security and privacy information dimensional collections museum electronic dictionary solution finding path . experimental result decompression two dimensional scaling transformation scaling factors (compression factors) example digital signature software maintenance. code clone support counts symmetric-key encryption privacy-preserving performance measurement. heuristic evaluation fuzzyminmax cbir validation. iintensity of blackberry use image segmentation. boundary detection topological alignments active contour segmentation enhancement security solutions security challenges university web-based learning aomdv & dsdv aodv mobile ip mobile ad hoc network feature-less method & semi-dense real-time. feature-based method umeyama method performance metrics vo university websites website design usability saudi arabia distance education publicauditor revoke user signature relational databases. graph databases sqlite mysql neo4j cypher query language principal component analysis cholesky decomposition grayscale image. integral attack gpgpu chosen plaintext attack light-weight block cipher image denoising. edge preserving smoothing anisotropic diffusion modified decision based unsymmetric median vascular structure optimal vessel forest microscopic images automatic microbial counting. cv algorithm morphological operation active contour method brodatz dataset fuzzy c-means clustering new’ texture feature land cover land use land sat data satellite imagery reusable learning object learner behaviour cognitive model dft robustness embedding ber differential evolution algorithm key points (features) structure from motion 3d modelling corner detector matching. feature detection finite-difference time-domain mobile phone specific absorption rate viterbi decoder viterbi algorithm code rate verilog hdl hamming distance constraint length convolutional encoder fpga. double data rate (ddr) duty cycle corrector (dcc) successive approximation register (sar) modified successive approximation register (msar) duty cycle pvtl. word sense disambiguation(wsd); classification and silhouette plots improve performance load curve prediction diabetic retinopathy classifier blood vessels diagnosis green channel cognitive radios convex optimization. downlink beam - forming and admission control face recognition; manifold learning; filter; clust compression k-nearest neighbour evidence theory erp contracting enterprise resource planning (erp) erp proposal erp implementation business process request for proposal for erp (erp rfp) hashing aes algorithm image format i intensity of blackberry use behavioural authentication. cognitive authentication keyboard latency behavioural biometrics association based passwords keyboard dynamics customers’ purchasing behaviour analysis big data analysis feature extraction and machine learning classifier authorship attribution text pre- processing stemming higher education institutions virtual computing lab virtualization remote areas web service poi layer augmented reality layar cbir; fuzzyminmax validation compute unified device architecture graphical processing units computational efficiency discrete cosine transform peak signal to noise ratio
Mehr anzeigen