Tags

authentication
fuzzy cognitive maps
classification
cryptography
cloud computing
security
pattern recognition
health hazards
clustering
integrity
ubiquitous agriculture
vedic agriculture
digital india
cloud computating
parallel processing
high-fidelity
computational efficiency
computer vision
viterbi
deinterleaver
interleaver
wimax
resource surface methodology
extreme learning machine (elm)
deep learning (dl)
multi-layer feed forward netwo
named entity recognition
relation extraction
text mining.
heterogeneous entities
biomedical documents
routing algorithms.
process variation (pv)
network on chip (noc)
congestion
asynchronous design
probabilistic neural networks
dual-tree complex wavelet fea
magnetic resonance imaging
image password
performance
navigation
practical knowledge
virtual environment
virtual reality
natrual language processing.
word recognizer
austroasiatic languages
word analyzers
khasi language
finite state automata
morphological analyzer
scalability
data sharing reablility
cognitive skills
bug localization
frequent subgraph
heuristic approach
pattern mining
graph mining
temporal difference.
optical flow
background subtraction
data integrity
simrank
image retrieval
genetic algorithm (ga);
mathematics
data mining
topsis
education
hidden patterns
limit cycle
dynamics
induced fuzzy cognitive maps
star graph
interconnection network
algorithms
domination
a-magic labeling
video segmentation
cloudcow
segmentation
sparse techniques
encoding/decoding
genetic algorithm (ga)
magnetic resonance
rsa
integrated information.
reliability
dynamic groups
interpersonal skills
knowldege
study
tools
analysis
big data
2-bit rotation
rsa;hill cipher
image compression
cryptograph
shoulder surf
illusion-pin
image
human perception
metaheuristics
football game algorithm
combinatorial problem; distrib
capacitated vehicle routing
testing techniques
test case reduction techniques
software testing
coverage criteria
teacher’s evaluation
rank reversal
sensitivity analysis
estimation
evaluation metrics
gra
copras
multi criteria decision makin
cover image
cipher text
data hiding
symmetric key
decryption
encryption
steganography
instance learning unrest even
feature constraints
separating applicant originato
event forecasts
logical average distance
medical image extraction
k-means algorithm
fuzzy c means algorithm
dice coefficient
tanimoto distance
kuncheva index
jaccard index
stability measurements
quasi-uniform theta graph
uniform theta graph
generalized theta graph
skew chromatic index
edge coloring
band toeplitz matrices
runtime
algorithm complexity
matrix power
manipulationtool
ii. interactive packet
vertex measurable rectangle
vertex measurable graph
course learning outcomes
student-centered learning
programming performance
naive bayes
liver disorder(j48
guided classification
datamining
d2d
tethering
dense areas
tvws
wireless
components
appliedanalysis
abstract
multi-banach spaces
additive-cubic-quartic functio
friendship graph
flower graph
symmetrical graph
path
mean dominating energy
dominating energy
energy of a graph
product of bipolar fuzzy
bipolar fuzzy homomorphism
bipolar fuzzy order
bipolar fuzzy divisor of zero
characteristic bipolar fuzzy
child trafficking
combined fuzzy clustering
combined fcm
induced fcm
damping
distributed delay
impulse
oscillatio
neutral partial differential
testing
proposed methodology
related work
multi port input system
renewable energy
zeta converter
photovoltaic (pv)
blob analysis
ocean snake
jelly fish
oject recognition
marine object
qam(quadrature amplitude modul
qpsk(quadrature phase shift ke
bpsk (binary phase shift key)
ofdm
ieee 802.16e
human computer interaction
zigbee
atmega8 microcontroller
accelerometer
grid
emi (electromagnetic noise)
current fed switched inverter
clustering algorithm
texture
nutrient deficiency detection
macro nutrient
throughput.
message digest
secured hash algorithm
hash
average percentage fault detec
directed acyclic graph(dag)
time management
agile testing
dependency value
k-shingles jaccard similarity
prioritized deciding factor(pd
agile methodology
pedagogy
web development
web design
web-based system development
web engineering
cloud cow
sprase techniques
encoding/decoging
rsa.
integrated information
dynamic graph
responsbility
interpersonally skills
knowledge
vsi
pwm
ffhc
smc
optimal structures
ii. cascaded h bridge inverter
intel xeon phi-coprocessor
computational fluid dynamics (
burgers equation
lu solver
implicit method
high performance computing
women harassment.
cetd matrix
rtd matrix
atd matrix
λ-cut
optimal solution
l-r fuzzy number
fuzzy quantifier
assignment problem
wheel graph.
cycle graph
complete graph
line graph
α-cuts
number
chromatic
fuzzy sets
fixd point
incrm
ncrm
nrm
ncm
defuzzification.
dual trapezoidal fuzzy number
α-cut
fuzzy number
saturation index of a permutat
saturation numberand
double star
product of permutations
permutation graphs
blood pressure
prediction
cholesterol
cardio vascular
diabetes mellitus
credit card number encryption
aes ctr
small domain
-format preserving encryption
forecasting
weather
climate
cost framework
time of execution
coverage
optimization
fault detection effectiveness
opinion characterizer;
customer survey;
probabilistic feature position
third party auditor
cloud archive
service level agreements
target neurons.
deep brain stimulator (dbs)
subthalamic nucleus (stn)
micro neurosensor recording
dropout indicators
learner;
bromp;
; educational data mining;
object point
story point
function point
metrics
effort estimation
privacy.
security;
; elliptic curve cryptography
image fusion
images
biometric
forward reasoning.
rule based
stock market
expert system
artificial intelligence
interconnection
paths
traffic signals
round robin scheduling
priority scheduling
dual simarlity
– dual similarity
bipartie graph
hoffman graph
optimization.
neural network (ann);
stress
children’s psychological devel
chronic conflicts
projection and conceptual grap
max-min principle
distributive lattice structure
lattice structure
semantically ordering relation
hedge algebra
vehicles pollution
induced fuzzy associative memo
bayesian inference
non homogenenous poisson pr
cumulative shock model
threshold
bifurcation
harvesting
functional response
prey-predator model
totally fuzzy and relative
bpl (below poverty line)
blackwell's sufficiency condit
contractio
bellmen’s equation
:dynamic programming
shoulder-surfing attack
attackers
web-based.
video podcasts
pre-calculus
nanomechanical devices
nanostructure
evolutionary computing
hamiltonian path problem
dna computing
mathematicslearning.
usability
audio – based navigation
interface for blind children
mathematical connection abilit
content marketing
animation
improving
e-learning
parallel computing.
visualization
knowledge discovery in databas
decision making.
normalization
car selection problem
multi criteria decision making
2010 ams subject classificatio
path union
slpit graph
sum numbers
sum graph
sum labeling
iii. basic notion and definiti
disappearance of house sparrow
minimum domination set
domination set
pascal triangle and sierpinski
self-similarity
fractals
cellular automata(ca)
dimensions
connected cubic graph.
exact double domination
double domination
bfs
clique graph
mcs
chordal graph
kaplan_meier estimate.
survival probability
survival models
censored data
stability analysis.
periodic solution
delay differential
logistic growth
chemotherapy
boundary value problem.
integral equations
heat conduction equations
local fractional decomposition
aspect
internal heat generation
rectangular enclosure
double-diffusive natural conve
singular value decomposition.
hexagonal fuzzy number matrice
hexagonal fuzzy number
fully fuzzy linear system
application of fuzzy relations
composition of fuzzy relation
fuzzy relations
induced linked fuzzy relationa
logic connectives
fuzzy soft matrices.
product and complement of intu
intuitionistic fuzzy soft matr
intuitionistic fuzzy soft set
fuzzy logic- minimization of r
movitvation
anxiety
sports
interval valued fuzzy matrix (
fuzzy matrix
trapezoidal fuzzy number.
runge-kutta method of order th
fuzzy differential equations
n-parameters medical diagnosi
fuzzy logic (fl)
intuitionistic fuzzy sets (ifs
soft medical knowledge
interval-valued fuzzy soft set
soft set
membership function
heart disease
fast food
fuzzyrule base
induced fuzzy cognitive maps (
noise pollution.
weight loss
pollution index;
weighted pollution matrix (wpm
pollution matrix (pm);
makespan.
genetic algorithm
permutation flowshop schedulin
flowshop scheduling
principles used
introduction
intuitionistic fuzzy relation
generalized intuitionistic fuz
intuitionistic fuzzy set(ifs)
fuzzy subset
risk factors of breast cancer.
fuzzy cognitive maps (
right to information act
neurosophic cognitive maps
neural network
facotrs of personality
personality
bam stress
plastic pollution
special fuzzy matrices
fuzzy associates memories
retaining of information
student centered
learning teacher centered
passive and active
innovative method
t-edges
t-coloring
symptoms
ifcm
breast cancer
media
fuzzy relationship maps (frm)
sustainable development
environmental protection
fuzzy realtional maps (frm)
binary labeling
k-total product cordial
p{roduct cordial
achromatic labeling
shuffle exchange network
sierpinkgraphs
wk- recursive network
pwer domination
hexagonal mesh pyramid
matching preclusion numbers
trivial marketing
packing preclusion
packing
hexagonal mesh
diametrically uniform graphs
hybercubes
circulant graphs
strong metric dimension
strong metric basis
frm ifrm fixed point
arithmetic progression
labeling function
graphics
quality factor
quality criteria
multi agency system
intutionistic fuzzy relation
intuitionistic fuzzy set
fuzzy set
visual cryptograph
stengegraph visual secret shar
visual secret sharing
compenent
heuristics approach
bin packing problem
litertaure survey
vertex magic total labeling
super vertex magic total label
modular super vertex labeling
equations
stance
properties
power
energy(joules)
kinematics
origin
karate
martial arts
unsupervised
real estates
irrigation
cross domestic product
combined disjoint block fcm
air pollution
substainable development
fuzzy relational maps
indian agriculture
agririan crisis
farmer's suicide
neural networks
fuzzy
honeycomb network
extended roman domination numb
extended roman domination
necklace
n-regular caterpillar
laplacian engergy
energy
domination number of a permuta
perumation graphs
girth
vertex connectivity
pancyclic
dna algorithm
regular graph
tree graph
planar graph
degree distance
k-plygonal snake graph
diamond snake graph
trampoline graph
cn with parllel chords
triangular ladder
matching preclusion number
hamiltoncity
planarity
bloom graph
edge corona
sub-division vertex corona
sub-division edge corona
corona graph
b-chromatic number
types constructions applicatio
definitions
finite automata
kirchhoff's 2nd law
ohm's law
circuits
sum of graphs
fuzzy chromatic
k-fuzzy coloring of graphs
fuzzy graphs
genger
dalit women
dalits
caste system
women
violence
medical diagrams
logical operators
fuzzy logic
intuitionistic fuzzy
interval valued
decision making process
transitive
antisymmectric
reflexsive
group decision making
fuzzy prefernces odering
interval maximum equation
interval valued fuzzy relation
fuzzy relational equations
interval valued fuzzy matrices
trapezoidal fuzzy number
youth violence
evaluation labortary
decision making trial
fuzzy theory
causal analysis
2-rainbow domination
rainbow domination
hexagonal network
overview of the paper
prelimaries
human health
induced fam
health impact
climate change
youth activism
social media
pervasive social computing
neturosophic congntive maps
nation building
05c78
ams classification
pair sum graph
pair sum labeling
strength of connectedness
weak arc
strong are
fuzzy domination
cycle with common vertex
group magic
emotional face expression
histogram classical
facial expression analysis
lbp
record etc
ferpa refers files
euclidean distance
frame difference algorithms
k- means clustering
discrete cosine tranform
quadtree
jpeg
mpeg
non-linear programming ratio
predictive coding
computerised problems

See more
Documents
(176)

See all
Documents
(176)

See all
Tags

authentication
fuzzy cognitive maps
classification
cryptography
cloud computing
security
pattern recognition
health hazards
clustering
integrity
ubiquitous agriculture
vedic agriculture
digital india
cloud computating
parallel processing
high-fidelity
computational efficiency
computer vision
viterbi
deinterleaver
interleaver
wimax
resource surface methodology
extreme learning machine (elm)
deep learning (dl)
multi-layer feed forward netwo
named entity recognition
relation extraction
text mining.
heterogeneous entities
biomedical documents
routing algorithms.
process variation (pv)
network on chip (noc)
congestion
asynchronous design
probabilistic neural networks
dual-tree complex wavelet fea
magnetic resonance imaging
image password
performance
navigation
practical knowledge
virtual environment
virtual reality
natrual language processing.
word recognizer
austroasiatic languages
word analyzers
khasi language
finite state automata
morphological analyzer
scalability
data sharing reablility
cognitive skills
bug localization
frequent subgraph
heuristic approach
pattern mining
graph mining
temporal difference.
optical flow
background subtraction
data integrity
simrank
image retrieval
genetic algorithm (ga);
mathematics
data mining
topsis
education
hidden patterns
limit cycle
dynamics
induced fuzzy cognitive maps
star graph
interconnection network
algorithms
domination
a-magic labeling
video segmentation
cloudcow
segmentation
sparse techniques
encoding/decoding
genetic algorithm (ga)
magnetic resonance
rsa
integrated information.
reliability
dynamic groups
interpersonal skills
knowldege
study
tools
analysis
big data
2-bit rotation
rsa;hill cipher
image compression
cryptograph
shoulder surf
illusion-pin
image
human perception
metaheuristics
football game algorithm
combinatorial problem; distrib
capacitated vehicle routing
testing techniques
test case reduction techniques
software testing
coverage criteria
teacher’s evaluation
rank reversal
sensitivity analysis
estimation
evaluation metrics
gra
copras
multi criteria decision makin
cover image
cipher text
data hiding
symmetric key
decryption
encryption
steganography
instance learning unrest even
feature constraints
separating applicant originato
event forecasts
logical average distance
medical image extraction
k-means algorithm
fuzzy c means algorithm
dice coefficient
tanimoto distance
kuncheva index
jaccard index
stability measurements
quasi-uniform theta graph
uniform theta graph
generalized theta graph
skew chromatic index
edge coloring
band toeplitz matrices
runtime
algorithm complexity
matrix power
manipulationtool
ii. interactive packet
vertex measurable rectangle
vertex measurable graph
course learning outcomes
student-centered learning
programming performance
naive bayes
liver disorder(j48
guided classification
datamining
d2d
tethering
dense areas
tvws
wireless
components
appliedanalysis
abstract
multi-banach spaces
additive-cubic-quartic functio
friendship graph
flower graph
symmetrical graph
path
mean dominating energy
dominating energy
energy of a graph
product of bipolar fuzzy
bipolar fuzzy homomorphism
bipolar fuzzy order
bipolar fuzzy divisor of zero
characteristic bipolar fuzzy
child trafficking
combined fuzzy clustering
combined fcm
induced fcm
damping
distributed delay
impulse
oscillatio
neutral partial differential
testing
proposed methodology
related work
multi port input system
renewable energy
zeta converter
photovoltaic (pv)
blob analysis
ocean snake
jelly fish
oject recognition
marine object
qam(quadrature amplitude modul
qpsk(quadrature phase shift ke
bpsk (binary phase shift key)
ofdm
ieee 802.16e
human computer interaction
zigbee
atmega8 microcontroller
accelerometer
grid
emi (electromagnetic noise)
current fed switched inverter
clustering algorithm
texture
nutrient deficiency detection
macro nutrient
throughput.
message digest
secured hash algorithm
hash
average percentage fault detec
directed acyclic graph(dag)
time management
agile testing
dependency value
k-shingles jaccard similarity
prioritized deciding factor(pd
agile methodology
pedagogy
web development
web design
web-based system development
web engineering
cloud cow
sprase techniques
encoding/decoging
rsa.
integrated information
dynamic graph
responsbility
interpersonally skills
knowledge
vsi
pwm
ffhc
smc
optimal structures
ii. cascaded h bridge inverter
intel xeon phi-coprocessor
computational fluid dynamics (
burgers equation
lu solver
implicit method
high performance computing
women harassment.
cetd matrix
rtd matrix
atd matrix
λ-cut
optimal solution
l-r fuzzy number
fuzzy quantifier
assignment problem
wheel graph.
cycle graph
complete graph
line graph
α-cuts
number
chromatic
fuzzy sets
fixd point
incrm
ncrm
nrm
ncm
defuzzification.
dual trapezoidal fuzzy number
α-cut
fuzzy number
saturation index of a permutat
saturation numberand
double star
product of permutations
permutation graphs
blood pressure
prediction
cholesterol
cardio vascular
diabetes mellitus
credit card number encryption
aes ctr
small domain
-format preserving encryption
forecasting
weather
climate
cost framework
time of execution
coverage
optimization
fault detection effectiveness
opinion characterizer;
customer survey;
probabilistic feature position
third party auditor
cloud archive
service level agreements
target neurons.
deep brain stimulator (dbs)
subthalamic nucleus (stn)
micro neurosensor recording
dropout indicators
learner;
bromp;
; educational data mining;
object point
story point
function point
metrics
effort estimation
privacy.
security;
; elliptic curve cryptography
image fusion
images
biometric
forward reasoning.
rule based
stock market
expert system
artificial intelligence
interconnection
paths
traffic signals
round robin scheduling
priority scheduling
dual simarlity
– dual similarity
bipartie graph
hoffman graph
optimization.
neural network (ann);
stress
children’s psychological devel
chronic conflicts
projection and conceptual grap
max-min principle
distributive lattice structure
lattice structure
semantically ordering relation
hedge algebra
vehicles pollution
induced fuzzy associative memo
bayesian inference
non homogenenous poisson pr
cumulative shock model
threshold
bifurcation
harvesting
functional response
prey-predator model
totally fuzzy and relative
bpl (below poverty line)
blackwell's sufficiency condit
contractio
bellmen’s equation
:dynamic programming
shoulder-surfing attack
attackers
web-based.
video podcasts
pre-calculus
nanomechanical devices
nanostructure
evolutionary computing
hamiltonian path problem
dna computing
mathematicslearning.
usability
audio – based navigation
interface for blind children
mathematical connection abilit
content marketing
animation
improving
e-learning
parallel computing.
visualization
knowledge discovery in databas
decision making.
normalization
car selection problem
multi criteria decision making
2010 ams subject classificatio
path union
slpit graph
sum numbers
sum graph
sum labeling
iii. basic notion and definiti
disappearance of house sparrow
minimum domination set
domination set
pascal triangle and sierpinski
self-similarity
fractals
cellular automata(ca)
dimensions
connected cubic graph.
exact double domination
double domination
bfs
clique graph
mcs
chordal graph
kaplan_meier estimate.
survival probability
survival models
censored data
stability analysis.
periodic solution
delay differential
logistic growth
chemotherapy
boundary value problem.
integral equations
heat conduction equations
local fractional decomposition
aspect
internal heat generation
rectangular enclosure
double-diffusive natural conve
singular value decomposition.
hexagonal fuzzy number matrice
hexagonal fuzzy number
fully fuzzy linear system
application of fuzzy relations
composition of fuzzy relation
fuzzy relations
induced linked fuzzy relationa
logic connectives
fuzzy soft matrices.
product and complement of intu
intuitionistic fuzzy soft matr
intuitionistic fuzzy soft set
fuzzy logic- minimization of r
movitvation
anxiety
sports
interval valued fuzzy matrix (
fuzzy matrix
trapezoidal fuzzy number.
runge-kutta method of order th
fuzzy differential equations
n-parameters medical diagnosi
fuzzy logic (fl)
intuitionistic fuzzy sets (ifs
soft medical knowledge
interval-valued fuzzy soft set
soft set
membership function
heart disease
fast food
fuzzyrule base
induced fuzzy cognitive maps (
noise pollution.
weight loss
pollution index;
weighted pollution matrix (wpm
pollution matrix (pm);
makespan.
genetic algorithm
permutation flowshop schedulin
flowshop scheduling
principles used
introduction
intuitionistic fuzzy relation
generalized intuitionistic fuz
intuitionistic fuzzy set(ifs)
fuzzy subset
risk factors of breast cancer.
fuzzy cognitive maps (
right to information act
neurosophic cognitive maps
neural network
facotrs of personality
personality
bam stress
plastic pollution
special fuzzy matrices
fuzzy associates memories
retaining of information
student centered
learning teacher centered
passive and active
innovative method
t-edges
t-coloring
symptoms
ifcm
breast cancer
media
fuzzy relationship maps (frm)
sustainable development
environmental protection
fuzzy realtional maps (frm)
binary labeling
k-total product cordial
p{roduct cordial
achromatic labeling
shuffle exchange network
sierpinkgraphs
wk- recursive network
pwer domination
hexagonal mesh pyramid
matching preclusion numbers
trivial marketing
packing preclusion
packing
hexagonal mesh
diametrically uniform graphs
hybercubes
circulant graphs
strong metric dimension
strong metric basis
frm ifrm fixed point
arithmetic progression
labeling function
graphics
quality factor
quality criteria
multi agency system
intutionistic fuzzy relation
intuitionistic fuzzy set
fuzzy set
visual cryptograph
stengegraph visual secret shar
visual secret sharing
compenent
heuristics approach
bin packing problem
litertaure survey
vertex magic total labeling
super vertex magic total label
modular super vertex labeling
equations
stance
properties
power
energy(joules)
kinematics
origin
karate
martial arts
unsupervised
real estates
irrigation
cross domestic product
combined disjoint block fcm
air pollution
substainable development
fuzzy relational maps
indian agriculture
agririan crisis
farmer's suicide
neural networks
fuzzy
honeycomb network
extended roman domination numb
extended roman domination
necklace
n-regular caterpillar
laplacian engergy
energy
domination number of a permuta
perumation graphs
girth
vertex connectivity
pancyclic
dna algorithm
regular graph
tree graph
planar graph
degree distance
k-plygonal snake graph
diamond snake graph
trampoline graph
cn with parllel chords
triangular ladder
matching preclusion number
hamiltoncity
planarity
bloom graph
edge corona
sub-division vertex corona
sub-division edge corona
corona graph
b-chromatic number
types constructions applicatio
definitions
finite automata
kirchhoff's 2nd law
ohm's law
circuits
sum of graphs
fuzzy chromatic
k-fuzzy coloring of graphs
fuzzy graphs
genger
dalit women
dalits
caste system
women
violence
medical diagrams
logical operators
fuzzy logic
intuitionistic fuzzy
interval valued
decision making process
transitive
antisymmectric
reflexsive
group decision making
fuzzy prefernces odering
interval maximum equation
interval valued fuzzy relation
fuzzy relational equations
interval valued fuzzy matrices
trapezoidal fuzzy number
youth violence
evaluation labortary
decision making trial
fuzzy theory
causal analysis
2-rainbow domination
rainbow domination
hexagonal network
overview of the paper
prelimaries
human health
induced fam
health impact
climate change
youth activism
social media
pervasive social computing
neturosophic congntive maps
nation building
05c78
ams classification
pair sum graph
pair sum labeling
strength of connectedness
weak arc
strong are
fuzzy domination
cycle with common vertex
group magic
emotional face expression
histogram classical
facial expression analysis
lbp
record etc
ferpa refers files
euclidean distance
frame difference algorithms
k- means clustering
discrete cosine tranform
quadtree
jpeg
mpeg
non-linear programming ratio
predictive coding
computerised problems

See more