Editor IJCATR
52
Followers
Personal Information
Unternehmen/Arbeitsplatz
Mumbai Area, India India
Beruf
Editor in Chief at International Journal of Computer Applications Technology and Research
Branche
Technology / Software / Internet
Webseite
WWW.IJCAT.COM
Info
This international journal is directed to researchers, engineers, educators, managers, programmers and users of computers who are interested in computer science engineering.
Tags
cloud computing
clustering
data mining
security
manet
svm
optimization
classification
wireless sensor networks
cryptography
grid computing
ict
qos
routing
feature extraction
genetic algorithm
pattern recognition
machine learning
education
fpga
vanet
database
semantic web
privacy
verilog
fuzzy logic
neural network
android
energy efficiency
encryption
e-government
spam
matlab
clustering.
grid environment
big data
sem
network
x-ray diffraction
scheduling
support vector machine
educational data mining
wireless sensor network
intuitionistic fuzzy topology
authentication
photo-oxygenation
harmonics
ball mill
neighborhood trimming.
psr
radio frequency identification
tag
challenge
naïve bayesian classifier
correlation based fss
feature subset selection
bayesian classifier
non-spam
cbvr
gabor
multiple frames
source system
deterministic prioritization
data warehouse
data staging
ant colony optimisation
multicast
cross layer design
router
arbiter.
noc
execution flow
control statements
similarity value
control structure
performance.
ns-2
v2v
green computing
adoption
leach
xml.
nano fillers
k-means
makespan
simulation
dwt
wsn
lifetime
mining
face recognition
wireless ad hoc networks
psnr
cloud security
rdf
technology
metrics
decision tree
knowledge management system
nanocomposites
pyro industries
data
knowledge-based authentication.
inclusive- exclusive principal
cued click-points
shoulder surfing
graphical password authentication
object-oriented paradigm
web 2.0
rias
web
energy
transmission power
conjunctive queries
disjunctive queries
object-oriented database
object oriented
tag recommendation
item recommendation
recommendation
user recommendation
social tagging system
ip dynamic bayesian network
r&d investment efficiency.
servers
html5
mobile app
wap
client
cloud
web socket api
http
frequent item set (fim)
cluster association rule
differential private frequent item set
application development
design driven software
saas
mda
apu
structural similarity.
sybil attack
katakana
baddeley theory
long term memory
wm training
short term memory
web-based working memory
scholarship
fuzzy method
data grid
replication
replication strategy
forecasting
biometrics
thermal and mechanical properties
electrical resistivity
hardness
maps
usability
sentiment analysis
concurrency
algorithm
gsm
routing protocols
adsorption
congestion control
bayesian
steganography
neural networks
nanostructures
efficiency
segmentation
data security
web mining
computer vision
markov random field
fuzzy clustering
gpsr
anonymity
feature selection
knowledge
wimax
mac
data analytics
ann
association
tracking
vb.net
dsr
reverse route
ad hoc
routing algorithm
watermarking
information systems
raspberry pi
imperialist competition algorithm (ica)
policy
wireless communication
security model
image retrieval
cellular automata
challenges
lip extraction
eye extraction
techniques
trusty uri.
man in the middle attack(mima)
digital artifacts
social media
recycling
ant colony optimization (aco)
jobs
lda
corrosion
statistics
optical character recognition
image processing
social network analysis
social networks
styling
style
formatting
unified recommendation
sensor node
performance
mobile application
information system
software
signal
advanced design system (ads)
fractional bandwidth (fbw)
bandpass filter (bpf)
repair
rehabilitation
bridge strengthening
structural health monitoring
chemical synthesis
magnetic properties.
information technology infrastructure
1-(4-methoxyphenyl)propan-1
4-methoxybenzaldehyde
tetraphenylporphyrine
anethole
2-diol.
eugenol
antipyrine
eugenol methyl ether
eugenol hydroperoxide
labdane diterpenoids
total antioxidant capacity.
10-triepi-cupressic acid
juniperus phoenicea l.
pimarane diterpenoids
9
5
transients
voltage flickers
overvoltage
pq standards
coimbatore
and mumbai
textile mills
madurai
nano coated motors
emi
motor
gravity
granitic gneiss basement
cauvery basin
magnetic
variable density contrast
dvla
vehicle security
sms technology
verification
security service
license
remote system administration
remote frame buffer
remote server
android app
remote desktop protocol
remote access
resonance frequency
low frequency noise(lfn)
eigenmodes
electrical power plant
boraginaceae
echium rauwolfii
pyrrolizidine alkaloids
fatty acids
ir
mmt/chitosan
xrd
ehe-leach
e-leach
multi-level leach
enhanced leach
pi controller.
settling time
tz network
flc
wear rate
brass
wear test
structures
topology control algorithm
manets networks
delay
interference.
energy efficient
nano powder
bemo
routes
ios
openstreetmaps
public transportation
penetration testing
evaluation
safety
wetting process
tin- zinc eutectic alloy
feature level fusion
iris
multiple algorithms
unimodal
performance of algorithms
prototyping model
transaction
transaction system
sales
url.
parallelization
distribution
ee-path
dream
improved apu
lar
environment
fuzzy expert system
cbc test
anemia
fuzzy based controllers
autonomy evaluation method
evaluation methods of uavs
full autonomy
morphological operation
hadoop.
primary health care
health care in china
analytics in health care
browsing
theory
intelligence
csma-ca
cap
wireless sensor networks (wsn)
adc
vanets
aes
otcl
vaodv
cfp
gprs
gspr-mv
partnership and globalization
outsourcing
information and communication technology
leakage water
extrapolation
forecast
least squares
water demand
routing protocols.
its
v2i/v2r
airy zeta function
tracer.
replication techniques.
mobile application; emergency communication system
web-based; job fair; information system; waterfall
expert system
computer security
computer networks
opinion mining
cutting speed
sql injection
web application
fault tolerance
software architecture
haar wavelet
location tracking
power consumption
ocr
license plate
python
ethernet
wireless networks
memory
nano technology
network simulation
database architectures
load balancing
hash table
trust
provenance
reputation
p2p system
hospital
integrated healthcare
polling booth
lan connected computers.
evms
morphing
warping
transition control
mesh-warping
amyotrophic lateral sclerosis; eye-based assistive
knowledge management systems.
knowledge management
service oriented architecture
dictionary
transliteration
mapping
translation
classification algorithm
weka tool
diabetics data
document analysis
pixel intensity
mobile devices
mobile computing
i n t r u s i o n d e t e c t i o n s y s t e m s
lsb
stegnography
access control
contamination
cnt
privacy preservation
data aggregation
k-means clustering
mse
sql
sparql
random forest
ad hoc networks
shg efficiency
artificial neural networks
temporal differencing
time series data
enamel
induction motor
online recognition
cloud storage
decryption
software engineering
pervasive computing
hmm
c4isr framework
petri net
particle swarm optimization
routing protocol
data center
ontology
gabor filter
occlusion
gps
energy star
sift
flexural strength
remote sensing
reliability
rtps
nrtps
web usage mining
association rule mining
web service
data integrity
euclidean distance
personal health records
attribute based encryption
histogram equalization
image fusion
sensor network
intuitionistic fuzzy point
cluster
network lifetime
cutting quality
noise
aodv
image segmentation
compression
bayesian network
infrastructure as a service
online public access catalogs
distribution generation
fuzzy knn
web scrapping
biomedical information
information extraction
openstack;
vehicle clearance
managers
customers
employee
energy; routing;
sdn; openflow
complaints document
decoding complexity.
combined balanced ternary number system
setun
balanced ternary number system
ternary number system
binary number system
hangul
kernel radial basis function
kernel linear
kernel polynomial
design
school
education application
3dp
ordinary node
forwarder node
data packets
acoustic channel
dolphin node
super node
harsh
depth-adjustment
v-shape
water-current
voids
deployment
regularity-loss property.
decay
plate equation
naive bayes.
kdd
diabetes
heart disease
oil spillage
concentration
groundwater
hydrocarbons
surface water and fermentation
total viable counts
species inventory
bacteria colonization
tributaries
réservation
rental business
service providers
booking
futsal field
information assets
noise.
median filtering
logarithmic transformations
enhance
empirical analysis
chinese economic growth
financial development
economic opening
nasal class words
malayalam
automatic speech recognition
availability
colored petri nets
unified modeling language
web browser
memory hogging
browser reference architecture
ddos attack
artificial immune system
wimax network
symmetric.
radix sort
msss
aes encryption
traditional computing
eco-efficient
higher learning institution in tanzania
building blocks
mobile cloud computing
web log mining
web content mining
browsing behavior
website design qualities
integration
e-readiness
primary schools
pseudorandom number generators (prngs)
huffman compression algorithm
jaro-winkler distance
text steganography
capacity ratio
audio steganography
spectrogram
tone insertion
mse.
the device also consists of two buttons
which are used to synchronize the ir code of the e
surf
feature matching
object tracking
mobile platform
methodology
risk
octave
risk assessment
music streaming
choir online communication
messaging system
controller
opsr
dos attac
cluster measures
dissimilarity matrix
speeded up robust feature technique
nandinagari handwritten character recognition
scale invariant feature transform
k means
hierarchical agglomerative clustering
pam
invariant features
hadoop-streaming
mapreduce
nosql
hdfs
hadoop
leadership.
forecasting in leadership
application software
computer-based forecasting
governance
forecasting in governance
task scheduling
weak passwords
web security.
bloom filter
features extraction.
measure
quality
reusability
virtualization
live migration
data centers
host
clustering algorithm
forecastability
forecasters
monetary and fiscal policy
forecast error and forecast accuracy.
economic forecasting
active content
finite state machine
input form
behaviour based malicious url finder
malicious url
rdb
query translation
weather forecasting
mitigating weather change
role of ict in weather forecasting
monitoring weather condition
adapting to weather condition
attack
denial of service
session initiation protocol
voice over ip
vector space model
hybrid recommender system
content-based filtering
collaborative filtering
recommender systems
term frequency inverse document frequency.
preprocessing.
offline recognition
handwritten
android.
real-time
cloud security reference model
principal security dangers to cloud computing
ssl overview
identity management
mental illness
gesture detection
gesture recognition
matrix
elliptic curve
scrambling technique
innovation diffusion theory (idt)
performance expectancy
knowledge economy
unified theory of acceptance and use of technology
effort expectancy
e-float
value proposition
financial inclusion
stem
predictive modeling
enrollment
reasoning mechanism
hei
rule-based
statistical analysis
students
modeling
activity prioritization
hybrid context model
context modeling
context
context-aware computing
correlation factor
peak signal to noise ratio
standard deviation.
image textures
fast wavelet transform
stego-image
data extraction.
data covering
stego-key
modular multiplication
identity based cryptography
visual cryptography.
vedic mathematics
rsa cryptosystem
clustering techniques
clustering algorithms
cluster input parameters
cluster input data type.
multimedia streaming
peer to peer network
multicasting
fiestal structure
low-power
des
pipelining
independent task scheduling.
meta-heuristic
task assignment
local search algorithm following the gravitational
artificial intelligence algorithm
safety-driven software product line architecture d
safety analysis
software product line architectures
architectural design
software architecture quality attributes
vulnerabilities
owasp
cost constructive model
software effort estimation.
function point
lines of codes
agile
coronary arteries
visualization
maximum principle curvature.
calcified plaque
sample population
teaching and learning
lcd projector
sample size
degree of a vertex
tree.
randić index
software development
software design
revolutionary algorithms
unicode
binary tree
amazigh alphabet.
post-order
pre-order
elliptic curve cryptography
in-order
monitoring
humans
complex activity recognition
cell phones
ambulatory
accelerometer
online prediction.
mobile and ubiquitous environment
average embedding technique
lsb technique
normal network
intrusion detection
cellular networks
5g.
fertilizers
agriculture monitoring
congestion detection and mitigation
histogram equalization.
kernel
cross validation
maintenance
tractor
operation
daily checks
tractor operators
successful
transactions
problems
automatically
computerised
statcom
emerging topolo-gies
power system faults
ac-dc power converters
multi-level converters
hvdc transmission
contrast enhancement
normal white blood cell
features extraction)
acute leukemia
(digital image processing
fee
rent
system cooperation
marketplace
event organizer
project management
codeigniter
application
project
environmental agency
volkswagen emission test
volkswagen deception
epa standard
wordsense disambiguation
knowledge based
supervised
unsupervised
matrix permutation and combination
capacity of the river
cisc
amd
architecture
risc
moore’s law.
processor design
hardware complexity
transistor count
5th generation
cellular technology
server
microprocessor
intel
pcs
privacy preserving
dynamic secret key
multiple owners
ranked keyword search
networks and rules
classes
neighborhoods
sustainability
safety-critical systems
agile methodology
agile methods
suitability
social-based frameworks and applications
codecs
buffer size
voip
firefly
tehran stock exchange
countermeasures
nic
it infrastructure
managerial layer
sub-layer
layers
sink nodes
lightweight algorithm
cloud service
aging
renewal
program
chi-square
som
lung cancer
pca
data security.
data splitting
t-coloring
bandwidth utilization
channel resilience.
quality of service
internet connectivity
wireless technology
attribute
optimal subset
dimensionality reduction
symmetric
key.
text information
xor operator
sumo
vehicular ad hoc network (vanet)
simulations.
realistic mobility model
bee swarm routing protocol
move
network coding
directional antennas
drought stress
technique
optimization particle algorithm
matlab software
apportion duties
performance isolation
burst handling
starvation
quanta
latency
systems and features.
cbir techniques
content based image retrieval
nand gate
phase frequency detector (pfd)
phase locked loop (pll)
clock signal
d flip-flop
cmos
inspired algorithms
flower pollination algorithm
hybridization
glcm
csrz
mdbnrz
csnrz
fso
mdbrz
dbnrz
proactive network forensic
attack prediction
attack strategy.
cybercrimes
digital forensic
mamdani fuzzy system
grid scheduling
membership functions
execution time
payload.
video attacks
copyright protection
tpa
fine-grained data updates
rmht algorithm
mobile agent
vehicle communicator
signature verification
shape matrix.
biometric identification
web 2.0 tools
higher education
software defect prediction
probabilistic neural networks.
radial basis functions
datasets
mysql database
uml
borland delphi
ga-svm methods
white box testing
mitm
ip (internet protocol)
mac (media access control)
dos
session hijacking
cryptography.
arp (address resolution protocol)
cold storage
gsm module
temperature sensitive product.
temperature sensing
microcontroller
remote monitoring
embedded platform
bayesian belief network
energy conservation
pervasive computing.
one way function
file digest
hash
japanese
hiragana
learning application
nbr
maximum degree of swelling.
percolation threshold
young's modulus
carbon-black nanofiller
ciphertext
auditing
controlled release.
linum usitatissimum
pluronic nano-micelles
8-5’ neolignan
flax
linaceae
attribute-based signatures
attribute-based encryption
cloud storage.
ductile regima grinding
partial ductile mode grinding
ultra precision grinding
aspherical surface generation grinding wheel
elid
attribute encryption
identity encryption
cryptosystem.
key-aggregate cryptosystem
data sharing
this new method is a differential viscosity column
insert (minimum 5 to 8 key words)
decision trees and neural networks.
logistic regression
interfacing
computer interface
computer aided device.
security and privacy
laser and pulse.
ratio
offline recognition: arabic word recognition
holistic approach
vcs (vehicle communication system). vanet (vehicul
gps (global positioning system)
iot (internet of things)
naive bayes
spam emails
tree decision
voting algorithm
quality of service (qos)
service level agreement (sla)
dynamic pricing
revenue maximization
csl
software-as-a-service (saas)
security issues cloud computing infrastructure ser
infrastructure as a service security threats
connected component analysis
edge detection
green channel extraction
opinion target
opinion words
topical relation
route update.
mst
prim’s algorithm
bfs
transformation based classification
opinion generation system
keyword identification.
lexical based algorithm
li-fi (light fidelity)
vlc (visible light communication).
led (light emitting diode)
wi-fi (wireless fidelity)
e-waste
dumping
electronic waste
youngsters
education.
society
business
environmental impact
tech waste
management
fuzzy decision tree
naive bayesian
anti-spam
id3 algorithm
model
service levels
virtiuation
usage pattern
migrating agent
relevant search
image based crawling.
indexer
page ranking
domain profile
webcrawler
diagnosis
membership function and rules blocks
treatment
inference component
2d array searching algorithms
matrix searching algorithms
2d array linear searching
algorithms
complexity analysis
2d array grid searching
searching algorithms
suffrage
makespan.
naïve bayes
neurosky mindwave.
knn
eeg signal
stress
fuzzy enterprise architecture
fuzzy colored petri nets
enterprise architecture evaluation
nba guards
classification number
k-means clustering algorithm
bentonite drilling fluid
shear stress
interactive effect
nanoparticles
thermal stability
cellulose degrader
phylogenetic analysis
biochemical and molecular characterization
hydrogen producer
clinic
health metrics network
opd
health information system
morbidity
public service
location based service
xcode ios 4.2
google maps
interest point
learning
and animal.
biology
spring steel
tafel
leaf spring
hcl
koh
tafel.
8-hydroxyquinoline
6061 al-sic composite
enhanced apu
destination aware routing.
android application.
nfc tags
nfc enabled smart phone
web server
dbms
etc
epq model
inventory
variable demand rates
deteriorating item
permissible delay in payment.
driver
license verification
ghana revenue
dvla ghana
vehicle theft
causal-covering method.
diagnosis issue
bayesian method
mathematical modelling
inference engine
hole healing.
routing holes
coverage holes
off-line handwriting recognition
handwriting
finite state automata
automatic machine
prototype
success and failure factors
e-government implementation
kenya.
data acquisition system
versatile systems
wireless protocol
sigma delta
digital filter design
kalman filter
estimation and prediction
effect of security in it industry
academic networks
mathematics
retail sector
weka
overlooking
user’s pin.
bank server
chip and pin
shoulder-surfing
iits
co-authorship networks
authors suggested a mechanism for these permeabili
differential thermal analysis (dta) and tensile te
dnaalkylating agent.
2-(4-methoxyphenyl)propan- 2-ol
innovation
government organizations
transformational leadership
internal process
learning and growth
police performance
technology improvement
technology acceptance
and ministry performance.
white space.
signal activity pattern acquisition and sequential
signal activity pattern
secondary user
charnockite basement
eigenfrequencies
pulsed laser
polymer nanocomposite
heat equation .
e-governance
good governance
internet
service delivery
fingerprint compression
enhancement
wiener2 filter
minutiae extraction
sparse representation
multimedia information
memory package
personalized notes
smart phone
structural similarity
insert(minimum 5 to 8 key words)
component
url
marathi.
nlp
cross language information retrieval
machine translation
neuro-fuzzy
cost management.
intellectual property
artificial intelligent system
intelligent traffic systems
traffic lights
smart cities
fes
road traffic
sleep mode nodes
alternate path.
data routing
pasccc
wsns
distributed database
tsqlann
bitmap
fuzzy object oriented database
object oriented database
fuzzy database
tag xml.
fuzzy query
international committee of the red cross(icrc)
national disaster operation centre(ndoc)
missing persons community of interest(mpci)
united nations(un)
emergency communication system(ecs)
emergency communication system
web-based
waterfall model
job fair
user
2-(4-methoxyphenyl)propan-2-ol
dna-alkylating agent.
charnockite basement
eigenfrequencies.
target depth
pseudo-sections
physical modeling
resistivity prospecting
induced polarization
egovernment; organizational; critical factors; pro
mmrm
lrm
image change detection
sar
mrffcm
unified recommendation.
random walks
social network services
sampling methods
multi graph
graph sampling.
hygiene
educational games
moving object detection
optical flow estimation
camera.
blob analysis
neuro-fuzzy; intellectual property; cost managemen
sensor network; data routing; ns-2; sleep mode nod
data; distributed database; performance; tsqlann
bitmap 1. introduction
constrained task scheduling
biogeography based optimization
dag
ranking
polymer nanocomposite; simulation ; pulsed laser ;
manufacturing engineering
agile manufacturing
lean manufacturing
production planning and control
tracer
replication techniques
drug discovery
pharmacy and poisons board of kenya
pharmaceutical imports
distribution of water
least square
beyond oil; information technology; competiveness;
stiffness
glass fiber reinforced polymer (gfrp)
box beams
scaling.
damage mode
deflection
blast load
dynamic response resistance
stiffness degradation
hybrid fibers
beam-column joint
energy dissipation
ductility factor
abaqus.
curved beams
satellite imagery
landsat data
land use
land cover
android; fashion; mobile; store; online; technopre
fatigue damage
ese(t) specimen
corrosion fatigue
is 2062 gr. e 300 steel
fatigue crack growth
shell
compressive
fiber orientation
circular glass fiber reinforced polymer (gfrp)
regression testing; test case prioritization; mode
mrr
sr
arc gap
en8 (aisi 1040)
kw
taguchi design.
air pressure
date mining; k-means technique; algorithm complexi
page rank ;markov chain; criminal gangs; biologica
monitoring system
weather station
exsys corvid
digital analysis
hacking
risk and vulnerability
em algorithm
svm algorithm
emotion
speech; mental retardation; spectrum analysis; pit
taguchi method
laser power
weldox-700
surface roughness
kerf width
fuzzy logic; image processing; color image enhance
large scale data set anonymization
map reduce
scalable two-phase top-down specialization approac
tds approach
black box testing; web testing tools; open source;
linear discriminant analysis
false acceptance rate
false rejection rate
iris recognition
efficient and fast search
skip list
and distributed networks
skip graph
viterbi algorithm
forward backward algorithm
colour segmentation.
baum welch algorithm
hidden markov model (hmm)
jamming
packet drop
misbehaviour
wireless mesh networks
insider attacks
mobile ad hoc network; packet encapsulation; out o
dbdh- decision bilinear diffie hellman assumption
acg-access control gadgets
kgc-key generative center.
ibe-identity based encryption2 pc-protocol to prot
cp-abe- cipher text-policy attribute-based encrypt
dtn- disruption tolerant network
pki-public key infrastructure
object oriented software analysis
testability metrics
software testability
oo metrics
ciphertext policy
short decryption key.
maximal mining
incremental mining
interactive mining
support;
video compression
wireless video transmission
video coding
tabu search algorithm.
test case generation
test sequence
testing criteria
lndr
wireless data broadcast
mcdr
multichannel
polymer/graphite composite
electro-mechanical
piezo-resistance
compressive capacitance
qtc
pressure sensors
fusible alloys
shielding blocks
thermal friction drilling; optimization; process p
thermal properties
structure
resistivity
bearing alloys.
internal friction
titanium oxide
microstrip lines.
standard schiffman phase shifters
phase deviation
coupled lines
lang coupler
case based reasoning
software selection process.
component based software development (cbsd)
component based software engineering (cbse)
software component selection
recycled materials; alternative wall; construction
thiazolidinediones
hypolipidemic activity
antidiabetic agents.
hypoglycemic activity
imidazothiadiazoles
information and communication technology; ontology
multi objective particle swarm optimization; artif
capacity; pixel-value differencing; image quality
virtual organization
grid layers
pipelining vo formation.
minimum path algorithm
msvof mechanism
vulnerable.
sql injection prevention
tag refinement
online social networking.
decision based access control
shadow removing
tensors
flash image
k-nn classifier
decision making
constraints.
personal health records.
sqlite
mysql server
secure computation.
confidentiality
arima; forecast; injured; killed; casualty
intrusion detection system (ids)
multipath routing
heterogeneous wsn (hwsn).
trust management
mouse behaviour signatures; biometric authenticati
metasearch
query bundle
qb-c
content based filtering
quest trail
fuzzy inference system.
position tracking
resource allocation; constrained resource scheduli
requirement engineering
reengineering
non-functional requirement
legacy
crime
hotspots
buffering.
geographical information system (gis)
implicit meaning
soft computing.
disease treatment
stemming algorithm & natural language processing m
medline
skip-list
cas
lock-free
modified skip list
branch and bound
flower pollination algorithm; meta-heuristics; opt
dna; information technology; nanotechnology; bio-
smart home
wellness
activities of daily living
elder care
home monitoring
speech synthesis
prosody analysis
speech recognition
phonemes
speech api.
android; surveillance; peer to peer; internet conn
robotic rover; embedded c; microcontroller; progra
performance evaluation and time colored petri net.
blackboard technique
real-time simulation
application of real-time security systems.
survey on face recognition approaches
clustering; databases; banks; discipline; manageme
retarded double time green’s function formalism
superconductivity and spin density wave.
spin singlet and triplet state
systems integration
virtual learning system
service oriented architecture (soa)
biometrics; fingerprints; templates; security; enc
irc
ids
anomaly
countermeasure
denial of service.
musical instrument; monophonic; polyphonic; classi
firefly algorithm; metaheuristic; optimization; ch
dwt; interpolation;iwt; resolution; wzp;
intuitionistic fuzzy pgr open mapping
intuitionistic fuzzy pgr continuous
intuitionistic fuzzy pgr closed mapping and intuit
intuitionistic fuzzy set
attribute based encryption.
spatial index
keyword-based apriori item-set
neighbour search
merge multiple
k-mean
sequential patterns
noaa-avhrr images
association rules
time series mining
maximum cross correlation
national football league
hybrid system
k-nearest neighbour
linear regression
artificial intelligence (ai)
k nearest neighbor (k-nn)
medical decision support system (mdss)
support vector machine (svm) and sequential minima
decision trees (dt)
clinical decision support system (cdss)
hepatitis
wavelet transform
iris center localization
enterprise resource planning
user participation.
erp implementation
erp systems
pow
deduplication
cluster as a service
identification protocol
optimizing time
genetic algorithms
local search algorithm following the binary gravit
static timing strategies
optical character recognition; handwriting; image
email spam
classification.
short message service (sms)
prediction algorithms
global positioning system (gps).
mobile phones
service; service-oriented architecture; performanc
formatting hierarchal clustering; markov model; pa
spanning tree protocol
reliable
it is a critical requirement to have a fast
metropolitan area networks (man)
rstp. 1. introduction ethernet is a family of comp
and efficient failure-handling mechanism [3]. curr
and possibly wide area networks (wans) [2]. a metr
metropolitan area networks (mans)
validity region
sonar imaging
beamforming
cordic
statistical
semantic
chunking
smoothing
language modeling
wodrpress
rsync.web security
attribute-set-based encryption
fine-grained access control
hierarchical attribute-set-based encryption.
ddos
hash function
botnet
anomaly base detection
md5
workload imitation
reveres engineering; software architecture; docume
component; formatting; style; styling; insert (min
hybrid resource provisioning
cloud storage and invariant reports
cloud workload
udp- user datagram protocol.
primary backup
tcptransmission control protocol
communication protocols
face recognition; local directional pattern; princ
dust phenomenon
educational package
protective behaviors
compromised machine detection algorithms scenario
spam zombies
nice
compromised machines
transient elasticity
tele-medical field
sliding rectangle algorithm
orthogonal modulus
ultra-fast scanner
orthogonal wave velocity
dicom
location based services
merkle skyline r-tree
novel partial s4-tree
cloud service provider
outsourcing data management
big data mining algorithms
challenges for big data mining
mapreduce.
big data mining
parallel mining
localization
correlated shadowing
adhoc networks
networking
current stat map
future stat map.
vsm
value stream analysis tool (valsat) process activi
hybrid
adaptive filtering
acoustic echo cancellation (aec)
noise cancellers.
video compression.
transmission bandwidth
losses
synchronous machine
symmetrical fault
transient
park transformation
rotor angle
nano wires
nano particles
applications
advantages
disadvantages
quantum dots
tio2
al2o3
cryptograph
revocation
digital signature
group digital signature
methodology; web-based; cad/cam; software model; d
and web application attacks.
cross-site scripting (xss)
malicious injection
web security
encryption; decryption; security; gps technology;
wordnet
natural language processing
video categorization
parts of speech tagging
named entity recognition
mobile parking management system
ns-2 programing.
model driven engineering
metamodel
graphical concrete syntax
control and data dependence
program dependence graph
control flow graph
data flow equation
slicing techniques
vehicle
rf module
intrusion detection system; self organizing maps;
adaptive image contrast
pixel classification.
mobility models
thin plate splines.
special-purpose hardware
educational data mining; classification; analysis;
special-purpose hardware.
agile process models
usability engineering
fibonacci splitting approach
multimedia system
multiple access relay network
falsified data injection and forward error correct
trade-off between reliability and security
modified elgamal signature
public-key cryptosystem
source privacy
hop-by-hop authentication
round trip time.
thin plate splines
feature selection; unsupervised feature selection;
ad - hoc networks ; secure routing ; secure neighb
security ; attacks; manet; pr eve ntion; routing
rf modules
antenna selection
channel state information
mimo systems
signal to noise ratio
: adaptive image contrast
pixel classification
knowledge base
information retrieval
user profile
personalization
e - catalog
re - ranking algorithms
mobile limitations.
cache management
mobile operating systems
mobile computing security
i ntrusion detection system; self organizing map s
pu learning; p ositive - u nlabeled learning; one
callophyllum oil
tbc
transesterification
activity-data incidence matrix
wfio-net and its firing rule
workflow data-flow modeling and verification; petr
storage
service bus
load balancer
cloud computing;
ground water
kanigiri
fluoride enrichment
granite
sliding window.
face detection
radial basis function neural network
activation energy.
spent lubrication oil
heavy metals
gibbs free energy
thermodynamic parameters
adsorbents
cement dust
crops
micronutrients
varnish
tga
multimodal
euclidean
region properties
fast features
gdp
housing loans
economic growth
nonperforming loans
housing market
data extraction
dom tree
auxiliary information
record alignment
stego image and stego key.
image steganography
fpm; ann; mlp; ff; bp
semi-supervised approach
sentiment analysis.
latent dirichlet allocation (lda)
joint sentiment-topic (jst) model
constraint programming; optimization; feasibility;
filter
pattern recognition.
finger-vein detection
perturbation data mining
red variants
red algorithm
red parameters
red
aqm
flooding attack
legitimate traffic;
distributed denial of service
ns-3
be
ugs
ertps
fault tolerant
steganalysis
structural similarity measure
mãe
wmse
non linear support vector machine
contourlet transform
transcription units
protein synthesis
drug design
api reference documentation
api
knowledge types
searching.
large graph
graph partitioning
sub grap
constructive covering algorithm
citation knn
multi-instance problem
bayesian knn
discrimination
mining model.
classifier
drp algorithm
discrimination measures
array signal processing; uniform linear array; bea
lagging
leading
inductive type
synchronous condenser
power factor
power quality
magnetic tunnel junction (mtj)
hybrid cmos/mtj process
stt-ram
perpendicular magnetic anisotropy (pma)
lpddr2 mc; design; device initialization; refresh
gpu.
parallel
travelling salesman problem
opencl
ant colony optimization
network.
weight based clustering
srgm
fif.
nhpp
sa
mvf
black hole
ad-hoc network
r2rml
mapping language
owl
semantic web.
mapping patterns
relational databases
intrusion
layered approach
ber; capacity
steganography;psnr;mse
pattern recognition; hopfield network; back propag
multi-criteria decision making
response time
grid network
topsis
j48
naïve bayse
adaboostmi
intelligent algorithms
information retrieval; query processing system; co
signal and brain wave simulation process
bmi
bmi techniques
eeg signals
machine –human interaction
brain machine interface
mobile ad-hoc networks; taodv routing protocol; st
cloud computing; iaas; paas; saas; cloud security;
ip address
birthday paradox
bloom filters
high-resolution
sr images.
background subtraction.
soft impute method
object detection
moving object extraction
attacks; malicious; obu; rsu; vanet
functional coverage; axi; uvm; lpddr2 mc; ddr2 mem
wireless communication network; wireless sensor ne
voodoo
directfb
mobile applications
philips jointspace tv
pattern identification
mines interesting knowledge or patterns
data revelation
olap (online analytical processing)
homomorphic encryption
cryptdb
k-anonymity.
logging
cryptography; elliptic curve; finite field; mappin
combustion process
microwave
nano phosphors
display application
solubility and crystal growth of 4-abp
hybrid fibre composites; vinyl ester; mechanical p
co precipitation
magnetic properties
manganese oxide
optical
surfactant
crystal structure
stannous oxide; semiconductor; nanoparticles; morp
design of experiments
yield
box-behnken
crystallite size
hydroxyapatite
strontium
electric properties
chalcogenides
semiconductors
.
fp-lapw+lo
density functional theory
amino acid complex; nlo; doping; single crystal; s
goniometry
conductivity
sensitivity
fabric strain sensor
polyaniline
alkali metals
p-nitrophenol
crystal morphology; x-ray diffraction; growth from
single crystals
nlo
benzophenone
solution growth
melt growth
drum seeder
ergonomics studies.
molding process
polymer
cono weeder
rice mechanization
shielding fabric; core conductive fabric electroni
fasteners; aerospace; countersunk; screws; stress
crystal growth; crystal structure; x-ray diffracti
copper thin film
mtt assay
stainless steel aisi 316l
anti-microbial effect
direct current magnetron sputtering
l-alanine; admixtured crystal; solution growth; nl
wireless sensor networks (wsn); sensor; data sink;
bats
echolocation call
support vector machine.
acoustic survey
order linked trade credit.
time dependent demand
variable production rate
three echelon supply chain
policy algebra framework; ubiquitous enforcement m
sink
eadc
cluster head(ch)
march algorithms
hybrid mbist
fsm mbist
flexible
low area
asynchronous soc
wavelets transform
level set
gaussian mixture
periodicity detection
segment periodicity
sequence periodicity
symbol periodicity
periodic pattern mining
character recognition; feature extraction; feature
clarans.
breast cancer
cancer
k-medoid
impulse noise
gaussian noise
iterative filtering algorithm
edge based comparison
web page change detection
zone selection of web page
change monitoring
generalized tree comparison
node comparison
web page monitoring
html
serial-serial multiplier
partial products (pps)
accumulation.
ripple carry adder (rca)
csa
software reliability growth models
software reliability
maximum likelihood estimation
partical swarm optimization
parameter estimation
load test
shear wall; response spectrum method; etabs softwa
pulse compression
matched filter
radar
range resolution
lfm
grid resistance
current injection method
actual touch and step voltage
multisim simulation software.
ground potential rise
earth rod
earthling grid design
linear feedback shift register (lfsr)
code division multiple access (cdma)
pseudo-noise (pn)
optical code division multiple access (ocdma)
field programmable gate array (fpga)
keyword extraction
page segmentation
tf-idf weighting
k-means algorithm
cosine similarity
computing; technical; security; cloud; issues
employability
personal development
sugeno type inference
understanding power
knowledge management; learning knowledge; traditio
information era; e-learning
eeg; glcm; anfis; fis;bpn
advanced encryption standard (aes)
central server (cs)
mobile device sensor (mds)
user sensor (us)
entity recognition
leadline
topic modeling
event detection
hbc
secret key
iwt
pseudo random number
rdh
words feature
letters width
persian cursive handwriting
uci data repository.
clustering problem; genetic algorithms; ant colony
id3 classification techniques
data verification
dynamic operations
certificate authority
audit service
image restoration
salt and pepper noise
noise detection
denoising
degraded images
gaussian
wireless sensor networks; fault tolerance; fuzzy a
candidate itemsets; frequent itemset; high utility
recommender system
swarm intelligence optimization
target marketing.
natural inspired technique
e- commerce
ranking model
customer behaviour
feedback sessions
pseudo-documents
network security.
plain text
cipher text
human-centric computing
ubiquitous computing
human-machine interaction.
two criterion functions
multiviewpoint
singleviewpoint
similarity measure
hand gesture interface
hci
orientation histogram
wireless network; pipeline; sensor; forwarding; ro
control system
arduino
sensors faults
actuator faults
technological systems
decision based algorithm
image restoration and enhancement
visual threshold
visual cryptography
privacy concern
information revelation
social engineering.
social networking sites (sns)
awareness
executable model
non-functional requirements
enterprise architecture
: clustering
fcm
swarm
local binary pattern
content based face image retrieval
unnecessary handovers
wrong decision probability
missing handovers
on-chip bus
amba ahb
soc debugging
software architecture; colored petri nets; object-
grid computing; load balancing; hierarchical; sche
max-min algorithm
firefly algorithm
flowtime
: image scaling; android os; application; memory c
tspr
page rank algorithm
web mining weighted pagerank
hits
semantic annotation
mix-zone
zone partition
reversible logic circuits. carry save adder tree
mbe
reversible logic gate
dkg
pll
uart
digital clock manager (dcm)
international data encryption algorithm (idea)
virtual machine
dynamic resource allocation
cloud users
resources
grid network- petri net- reliability- cpn tools- r
ontology matching
domain knowledge
merging ontologies
government evaluation and needs
providing a discrete identifier (or identifiers) t
fingerprint-based biometric systems are so popular
which promises faster and higher quality acquisiti
and organized standards bodies have led to the nex
i.e. confirming another identifier such as a passw
fingerprints have been one of the most highly used
stft
enabling surveillance and sorting of groups of peo
pin or a photograph. 2. identification
svd
walsh transform 1. introduction for over a century
localized detection xed
eed
replication attacks
collusion attacks
blob
histograms of oriented gradients descriptors
mixture of gaussians techniques
abandoned object.
object classification
morphological operator
edge histogram
black hole attack
ns2 simulator
wireless ad hoc network
intrusion detection system
tomato fruit
tomato leaf
morphology
filter based feature selection
wrapper based feature selection
grid; adaptation; resources; entities; component s
product functionality (pf)
bill of materials (bom)
product knowledge
knowledge acquisition (ka)
co2 emission.
blackle
tco
neutral stochastic functional differential equatio
sensing; bts
wrts
traffic light control
chaotic traffic
short message services
gps services
eco-friendly
recyclability
tco certification
dct
blur
wavelet.
mechanical properties
anaerobic extraction
bisphenol
pineapple leaf fiber
transverse vibration; matrix material; mode shapes
nimus
informal learning.
animation
mobile learning
trend analysis; linear regression; forecast accura
data sharing.
accountability
code parser
testing
automation
priority
hybrid testing
noise processing; black level; speckle noise; salt
distributed computing & cluster computing
high performance computing
parallel computing
satellite image
asymptotic stability
neutral
mild solution
impulse
stochastic
sms gateway
usability.
transparency
sms
m-payment
e-revolution
prototype and ehcb.
windev
generalized digital certificate; user authenticati
fair scheduling
ieee 802.16
fft
qpsk.
ifft
ofdm
gpio
micro blaze
virtex 5 fpga board
rtd transducer
data acquisition
cloud computing; multi-agent; web services; servic
security issues
wsn algorithm
security mechanism
konark
upnp
jini
service discovery and service
salutation
discovery protocols
slp
mobile ad hoc networks
context; computing; context models; reasoning; ont
wsla
wsdl
sla
b2b
quality of services
soa
uddi
neighbors monitoring scheme
rreq
rrep
one-to-one compound mapping
translucent watermark
two-fold monotonically
mapping randomization
parameter randomization
alpha blending
velocity
lucas-kanade algorithm
motion estimation
optical flow
low power digital filter
reconfigurable filter.
web log data
weblog expert lite7.8
behaviour trust
evaluation strategy.
black list
mobile adhoc network
dempster shafer theory;
k-means; k-medoids; centroids; clusters;
cbir
features
color
shape
demonstrable data retention
data retention.
zero knowledge
homomorphic
cooperative
storage outsourcing
multiple cloud
distributed environment
multi-authority attribute-based encryption
intrusion; anomaly; machine learning; ids
service-oriented architecture (soa)
embedded devices (sensors).
simple object access protocol (soap).web services
anonymizer; database management; safe zone; spatia
fingerprint; palmprint; multimodal biometrics; min
candidate sets
itemsets
apriori
return of investment (roi)
cost and benefit
quality attributes
organizational capitals.
enterprise architecture analysis
color transfer technology
color contrast enhancement
test data compression
test data volume
dictionary based encoding
selective encoding
data grid; data replication; group replication; ar
disaster management
finite automata (fa)
deep packet inspection
pattern matching
regular expressions
differential encoding
routing and wavelength assignment
contention resolution
obs research issues.
optical burst switching
aon
psnr (peak signal to noise ratio)
frequency domain
spatial domain
image watermarking
mse (mean square error).
least significant bit (lsb)
grid computing; job scheduling; regression tree; f
lighting control system
ldr
pir sensor
energy saving
intuitionistic fuzzy contra semipre generalized co
intuitionistic fuzzy almost contra semipre general
intuitionistic fuzzy completely semipre generalize
intuitionistic fuzzy almost semipre generalized cl
intuitionistic fuzzy almost semipre generalized co
trust; trusted platform module (tpm); integrity me
rw-closed maps
rw-open maps.
path loss
csp algorithm
attenuation factor.
indoor propagation model
cluster-head
sink node.
distributed data mining
multi agent data mining
multi-agent based distributed data mining.
multi-agent systems
toroidal
magnetic field
open-type magnetizer
permutation flow shop; evolutionary algorithms; lo
co2 laser cutting
hardox-400
glass etching
and chemical etching.
sandblasting
acid etching
networked control system
model predictive control
access network selection
radio resource management
mra
rat
joint allocation
multi- radio access
intuitionistic fuzzy generalized semipre regular o
intuitionistic fuzzy generalized semipre regular c
zero-divisor graph
neighborhood
adjacency matrix
annihilator
zero-divisor
commutative ring
diffusion method
prediction
mobile commerce
qr code reader.
qr code
rotation of object
bot
hackers
images generation
spammers
captcha
local phase quantization
linear ternary patterns
point spread function (psf)
blur kernel
l1 norm
test driven development; continuous integration; e
ballpark algorithm; transmit algorithm; wireless s
variable weighting
w-k-means
fuzzy-k-means clustering (fkm)
feed forward neural network; impulse noise; image
idle nodes
optimal path
dijkstra’s algorithm
feature similarity index (fsim)
low level feature
structural similarity index (ssim)
gradient magnitude(gm)
phase congruency (pc)
image quality assessment (iqa)
spread spectrum
scalar costa scheme.
jpeg2000
pr-owl
mebn
unbbayes
pde
weiner filter
deblurring
psf
spectrum sensing
network management.
spectrum holes
primary users
cognitive radio
intuitionistic fuzzy semipre generalized super con
intuitionistic fuzzy semipre generalized connected
service-level agreements
software as a service
hybrid pricing.
platform as a service
k-means algorithm.
c4.5
Mehr anzeigen
- Präsentationen
- Dokumente
- Infografiken