ijcsis journal of computer science scopus cloud computing security call for paper information security machine learning data mining computer science data security classification research impact factor ijcsis 2018 feature selection artificial intelligence genetic algorithm optimization encryption information technology e-learning internet of things cryptography international journal intrusion detection system clustering biometrics psnr information systems (is) image processing ontology network security hadoop steganography computer science and engineering web of science biometric online banking k-means publication feature extraction cloud authentication mse neural network pattern recognition modeling mapreduce big data healthcare text classification google scholar face recognition threats software development faq pages chatbots scheduling similarity confidentiality jumping emerging patterns prediction decryption text mining tqm microcontroller stemming computer science (cs) tension sag fault tolerance hpc challenges internet ransomware mri expert system mobile application parallel computing decision making internet of things (iot) template security vulnerabilities image processing techniques hybrid image compression algorithm data compression evidence correlation forensic gsm gps virtualization distributed system eigen value cybercrime forensics api semantic web servers multi-user sharing data sharing social network usability dataset intrusion detection artificial bee colony particle swarm optimization wireless sensor networks sentiment analysis trust median filter fitness multi-agent systems performance bluetooth availability communication technology digital signature pca conceptual model sdn pso principal component analysis cipher text plain text technology proquest international distributed systems thomson reuters mobile application development mobile apps urdu language football risk analysis github support vector machine. linear discriment analysis dominant frequency multivariate wavelet decomposition motor imagery eeg signal developing countries identity-based cryptography commodities smuggling pairings in elliptic curves realtime capture mode (rcm) offline capture mode (ocm) packet capture (pcap) on-demand network data set creation application (o relim unlicensed spectrum coexistence listen-before-talk wireless fidelity long term evolution disassociation process dos attack iot security services ieee 802.15.4 standard deep learning anomoly-based intrusion detection system host-based intrusion detection system virtulization two-tier meta-learner stacked generalization ensemble method detection e-mail process protocol data privacy security protocol mobile banking human identification python electrocardiograph signals support vector machines k-nearest neighbors tradeoff route optimization network mobility mobile ipv6 decision tree word2vec keywords extraction survey case study global software development distributed development peer evaluation team interactions human-computer working memory affordance cognitive load sonnet software. bandwidth c-band return loss substrate thickness m-shaped patch microstrip patch antenna hybrid hierarchically distributed data matrixframe big data processing image binirization and gap filling method geometric properties of text horizontal and vertical projection api calls regular expressions malware classification malware analysis review quality of service soft computing dc power supply robot chassis 7805 ic crystal(3.57mhz) motor driver (l293d) dc motor mobile phone dtmf (dual tone multiple frequency) board (mt8870) journal software defined networs botnet security threats integrity digital library knn diagonal vertical horizontal local binary pattern local binary pattern (lbp) palm vein recognition academia.edu and ebsco linkedin researchgate doaj dblp isi scopus ei compendex cornell’s university library citeseerx arxiv hidden markov random fields kernel matrix kernel k-means pairwise constraints high dimensional data semi-supervised clustering spectrogram of image and spectral components of sp l*a*b image mean euclidian distance scatter plot simulated annealing swarm intelligence hybrid systems similarity relatedness measure semantic similarit information content friedman combinatorial optimization traveling salesman problem heuristics metaheuristics cross-correlation speech recognition application specific integrated circuit (asic) field programmable gate-array (fpga) advanced encryption standard (aes) model validation message sequence chart (msc) specification and description language (sdl) signaling multiparty videoconferencing systems webrtc association algorithm induction method analytic service model (asm) data mining (dm) business intelligence (bi) image features and feature detection imagestitching panorama neural network and support vector machine silhouette biometric feature gait iot center vmware pulse moving object extraction malicious attack network traffic analysis log aggregation design shologuti extinct game self-adaptive chaotic algorithm telemedicine medical image e-learning knowledge study year study program gender student' attitudes artificial neural network autodesk graphics processing unit support vector machine issues privacy d2d zero knowledge proof (zkp) three-factor authentication hr development grameen vikash bank dynamic enviourmrnt demontization assorted eyelid velocity blink cycle human computer interface fatigue kalman filter tf-idf chi-square stop words removal tokenization text preprocessing leadership workplace management styles emotional intelligence fog nodes cloud and fog computing advanced encryption standard encryption technology educational institutions artificial neural networks proportional integral controller three phases induction motor density data objects centroid breast cancer mammographic histogram equalization image negative image enhancement machine translation language assistant arabic language english language android acquisition messenger food identification surf bof point feature matching ica. mrmr ga cbm relief technology. architecture navigation map api pleomorphism nucleus cervical cancer celestial spectral data ultrametric frequent itemsets mining truth discovery. medical knowledge extraction (mke) collaborative intrusion detection system (cids) number theory research unit (ntru) intrusion wasms arduino board gprs zigbee sensors cost-effective storage data reliability data deduplication side minimizing data replication neural network (nn) features from accelerated segment test (fast) principle component analysis (pca) epizootic ulcerative syndrome (eus) span acsr answer quality content quality assessment ranking cuda gpgpu gpu and drawl in wsn lisa llsp lsec mini sec twists ieee 802.15.4 tiny sec k-nearest neighbor (k-nn) and probabilistic neural genetic algorithm (ga) classification accuracy gray level co-occurrence matrix (glcm) brain tumors glcm gabor filters zernike moment random forest bat algorithm (ba) velum oropharyngeal tongue epiglottis (vote) ensemble convolutional neural network with vote cl ensemble feature selection (efs) obstructive sleep apnea (osa) nigeria information and communication technologies (ict) e-governance aviation industry and blowfish ecc role based access control energy hole problem mobile sink clustering protocols protected procedure wsn kdd cup 99 anomaly detection algorithm interference topology ad-hoc networks mikrotik dos (denial of service) metarouter content-aware image resizing extreme gradient boosting seam carving digital image forensics salt and pepper noise guassian noise psmf ssim mssim cnlm impulse noise soma technology education virtual community learning feedback method interactive teaching chronic kidney disease caesar cipher sifs tcp rtt mpsd mac fuzzy gaussian 3d model channel modelling vehicle power line channel power line communication disc-shaped and epoxy resin cavities variable frequency simulation partial discharges anisotropy edema diffusion tensor image ranking algorithm requirements prioritization requirements engineering software systems symphony orchestras non-profit organizations gis sd lar dlar dsdlar vanet pu peu aw qi se cnv tam low-pass filter high-pass filter fir filters ecg signal electrocardiogram darpa dataset detection rules snort network intrusion detection system (nids) url xml firebase auth devices laptop ram live forensics message prometheus gaia feature analysis framework agent oriented methodology agents expectation maximization conversion prediction advertisement recommendation addition-composition fully homomorphic encryption schemes master-slave disks. data syncing hardware and software data storage latency mirroring redundancy disk less clients raid cross-correlation coefficient standard deviation 2d filtering signal to noise ratio research methodologies skeletal image kinect sensor hidden markov model (hmm) natural languages processing arabic-morphology light stemmer keyword-searching arabic information retrieval crop disease diagnostic domain crop management inference engine knowledge base dead space sequence pair simulated annealing algorithm vlsi floorplanning research methodologies. transmission system opportunities network architecture risk assessment risks rule-based site management & buildings department(smb) knowledge based system design process j48.reptree weka software clusters nof network- based outlier detection approach inscription images filling thickening frankle mccann retinex organizations problems human collaboration heterogeneity alcohol consumption prediction student’s performance multimedia real- time streaming congestion control approaches leakage current analog to digital comparator double tail comparator sleepy inverter secure collabaorative routing trust-based protocol wireless d2d communications hetrogeneous networks mental retardation perinatology risk factors diagnostic instruments assessment diagnosis neuropathology neuroimaging disconnection syndrome copy number variation complex genetics autism spectrum disorders owc model laser oow model data and authentication. key orthogonal endoscopy dsa tomography ultrasound iitv ofdm wsn. congestion avoidance hybrid cluster sensor node auction sharing resources exchange badal fine-grained permission attribute-based permission android smartphone high dimensional dataset evolutionary algorithms development policy making knowledge extraction display boards bus navigation system smart cities public transport network threat data bayesian network rust disease uncertainty wheat support and confidence rough set data sfla arm apriori algorithm sugarsync onedrive hightail google drive dropbox response time comparison evolution application performance comparison code shortening reed – solomon erasure meta-model pim model psm model interoperability model parabolic trough collector new innovative approach of water distillation improve the efficiency of tracking sun tracker new control algorithm texture feature zssd sicltp ltp lbp arabic- system usability scale standard usability questionnaire mobile first companies sus system usability scale app usability fingerprint templates cryptosystems attacks digital metadata task migration virtual machines server consolidation cloud center ring signature group sharing forward secrecy authenticity anonymity static hand gesture skin color fourier descriptor combinational features back-propagation lngd. library sort insertion sort sorting restricted boltzmann machine and convolutional neu autoencoder deep belief network hash function. cross-site scripting attacks http protocol cookies pso (particle swarm optimization) vm (virtual machine) csp (cloud service provider) performance evaluation youtube dct transformations bivariate generalized gamma mixture model routing protocol. mac protocol cross layer wsns pso and hbmo. grvq apoa compression vector quantization security on smartphones identity theft applocker oled iot adaptation identifiers personal identifiable information (pii) identification information privacy physical machine virtual machine consolidation direct migration resource allocation energy consumption data center energy green cloud information system communication system best practices frameworks it grc rule based system agriculture knowledge engineering supervised learning nsl-kdd intrusion detection systems message broker rabbitmq distributed application rest web services snr and covariance matrix. normalized error lda san ilp fault tolerant data replica placement bipartite graph photogrammetry and point cloud active passive lidar digitization important sites heritage 3d modeling anti- forensics recovery virtual absolute distance generalized regression neural network(grnn) olap multidimensional modelling etl cube multidimensional data analysis java visual prolog logic programming language simulators neural networks sse-cmm iso 27002 maturity level security system academic information security enterprise architecture. concept of operation conops archimate cr et matlab hv partitioning fractal dwt video compression histogram digital data hiding csp migration vendor lock-in fixed effects panel models nonnegative garrote knowledge management improved inverted indexing technique resource description framework socia networks link prediction sensor deployment. mesh network sinr social networking digitalization mobile computing mongodb apache spark nosql databases big data analyticsy distribution feeder power losses short circuit level voltage solar pv system decryption. volvox colony hybridvr algorithm(hvr) reproduction algorithm(vr) aes and triple des. invertible nonlinear function desd crypto technique cloud service provider recombination image scrambling decomposition chaotic system color image encryption. code book coding theory storage proposed k-means algorithm k-means algorithm unsupervised learning centroids clustering algorithm noise top-hat filtering gaussian filter citrus storage. resource management-user requirements- academic cl knowledge based authentication information retrieval softcast and wavelet scales. denoising clone attacks botnets 802.11 adhoc network wireless networks shoulder-surfing graphical password social big data multi class classification big data analytics residual artifact hadoop platform forensic readiness forensic investigation liecount digital image processing distance camera lie detection honeypot malcodes ids indicators of compromise malware authentication systems. keystroke dynamics probability compression ratio lossless compression lossy compression image compression cloud storage deduplication measurement matrix sparsity compressive sensing convergent encryption min-min algorithm anomaly conflict model rough sets theory conflict analysis energy function hopfield neural network bivalent quadratic programming weighted constraint satisfaction problems v4.0-interval) database-circular distribution iris normalization-casia(v1.0 microcontroller chip random number generator (rng) physical unclonable function (puf) diffusion of innovation. gwea enterprise architecture backtrack on deflection failure. optical burst switching contention problem deflection reflection routing deflection path activity theory (at) information and communications technology (ict) data analytics healthcare analytics twitter term frequency-inverse document frequency naive bayes r multipoint relays watchdog blackhole stagnation multicast tree delayed convergence ant colony diagramming system as a whole methods attributes objects flow things conceptual modeling object-oriented class diagram energy efficient ant colony optimization fact-finder microblogging recommender systems cyclic cubic graph wheel cy- cle energy graph matlab program chromosome priority genetic algorithms load balancing ann. regression exchange rate consumer price index inflation rate gdp and shipt wavelet cholesterol detection radial basis function ann fpga crossover and mutation. rectification location identification gene based refactoring code smell detection software quality maintenance software refactoring proactive approach fetch time estimation re-crawl fuzzy sets data dissemination qos delay vanets methodologies for agentoriented software developme agent-based software engineering intelligent electornic patient record management s telecommunication network administrations. distributed artificial intelligence (dai) maximal ratio combining rayleigh fading space time processing wlan quality control instrument aromatic rice enose resilience remote monitoring hybrid architecture wireless sensors networks total harmonic distortion and dc motor. ac-dc converter elippse detection cicrle detection elippse recognition cicrle recognition computer vision contextawareness context-as-a-service optimization algorithm directed acyclic graph task scheduling competency based approach gaussian mixture model gmm. relative spectral transform perceptual linear pred gammatone frequency cepstral coefficients gfcc robust speaker identification educational content learning engine optimized butterfly graph hash chain communication overhead authentication possibility butterfly graph bilinear pairing elliptic curve certificate less egyptian colleges academic performance student perception social media tools social networks sites macroblocks snr svc quality svc moition estmation motion vector unified modeling language packbits algorithm lsb based steganography haar wavelet transform optimised kd-tree indexing nearestkd-tree indexing multibiometrics indexing linked list. avl tree modulo ten environment visualizing images (envi) program software programming image noise satellite image morphological operation. contrast enhancement blindness microaneurysm diabetic retinopathy http-tunnels firewalls application detection protocol tunnelling three-dimensional morph able models. multimodal emotion recognition image registration guided particle swarm optimization security techniques. security issues hyper-heuristic model bio-inspired model generic model model for solving combinatorial optimisation probl hyper-heuristics physical plant diagrammatic representation engineering system overlay networks transparent proxy server transport layer security software-defined management network design cross-layer transactionalitemsets distributed computation secret key sharing rough sets association rule mining membership function quantification of expression fuzzy rule weighted model) energy model system model (cost model offloading mobile cloud computing(mcc) one time password international mobile equipment identity persuasive cued click points lsb. hpso secondary schools. science studies education delivery platform automation integration algorithms tools models accuracy predictive analytics petri net processes modeling route changing dynamic dispatching ambulance services icjsis and encryption. diffusion five levels shift rotation kdf prng trng subkeys generation seed cache invalidation caching strategies cooperative caching mobile ad hoc network dhaka stock exchange support vector regression financial time series forecasting design phase sdlc class design security metrics software engineering arabic text classification arabic text mining arabic corpus distance bounding technique and differential e v o attacks in vanets vanets (vehicular adhoc networks) mqtt key distribution publish/subscribe npn symmetric & asymmetric cryptography des aes lie academia computing ebsco engineering virtual classroom hand-raise gesture detection face detection computer plug in architecture architecture component-based data-centric architecture erp rtl design rtl simulation symbolic execution test case generation creation and analysis of fsm design finite-state machine j48 social media swahili tweets naïve bayes
See more