Tags
cloud computing
data mining
grid computing
soft computing
high performance computing
dna computing
knowledge management & ontology
green computing
soa
semantic web
nano computing
cyber security
cryptography
computational science
pervasive computing
advanced computing
software engineering practice
e-learning
wireless networks
gaming models
privacy
networks & data communications
"computer networks
paper submission
design & communication"
mobile networks
next generation
networks & communications
wireless internet
network security
mining trends
social networks
deep learning
machine learning
engineering
bio-metrics
quantum computing
proxy cryptography
homomorphic encryption
computing
clahe
steganography
algorithm
refactoring
education
bio metrics
computer vision
testing
data mining applications
bioinformatics
encryption
fabrication
forgery
visa
passport
algorithms
natural language processing
algorithms and data structures
practices and principles
lean
agile
leadership
devops adoption
it service management
backpropagation neural networks
web engineering
software engineering
big data
ai
cybersecurity
automation
erp
data
multi-population
shuffled frog leaping algorithm
job shop scheduling problem
memetic algorithm
e-commerce
credibility
data integrity
knowledge of the learner.
online education
campus training
vocational training center
pedagogical approach
information technology and communication (ict)
multispectral image fusion
ophthalmology
retinal image analysis
simultaneous vessel identification
watermarking
qr code
clustering
motion compensation
motion estimation
motion vector
macro block classification
vector quantization
personality
demand fulfillment
database
recall
texture
precision
texel
community member
personal data
model
socio-demographic characteristic
weka
refactoring opportunities
ordinal scale
source-code metrics
uml diagrams
● high performance computing ●
analytics
advanced
tecjnology
comuting
internet of things (iot)
artificial intelligence
high performance
biometrics
data management
bio informatics
data base
neural networks
data model
cloud compuitng
discourse
semantic
text mining
grid compting
innovative menu
e-portfolio
cyber portfolio
knowledge management
micro-aggregation
data transformation
industrial performance
industry 4.0
e-maintenance
managing software projects
knowledge processing
knowledge-based systems
web engineering
quality management
advanced topics in software engineering
architectures
networkingc
reputation management
authorization
computer architecture
big data blockchain
algorithms and bioinformatics
mobile app
decryption
applications
infrastructure and platforms
cloud application
service-oriented architecture in cloud computing
cloud business
nios ii ide.
sopc builder
nios ii processor
advanced encryption standard (aes)
hybrid systems
complex adaptive system and theory
robotics
informatics
cybernetics
data structures
probabilistic computation
information theory
information technology
dual resonance non linear (drnl)
kálmán
cochlear implants
automata theory
• algorithms and data structures
health care
physiological signal processing
concept-drift
real-time data stream mining
wban
wireless sensor networks
aspect oriented programming
unicode
freeman code
web mining
test order.
integration testing
uml
stubs
location-based
service discovery
vehicle network
fault tolerant
software process
information retrieval
software engineering practice
quality management
string matching
plagiarism
ergonomics
neuroscience
neuroergonomics
functional magnetic resonance imaging (fmri)
erp and cloud computing
erp security solutions
erp security challenges
erp problems
erp system
image retrieval
smart phone
gps
image content
recommender systems
svm
k-means clustering
glcm
exudates
diabetic retinopathy (dr)
cie lab colour space
automated software testing
code coverage
unit testing
attacks.
directional filter
wavelet transform
load balancing.
optimizing vm load
amazon ec2
infrastructure-as-a-service
sentiment lexicon.
micro-blogging
twitter
ontology
domain specific ontology
sentiment analysis
simulation
aodv protocol
ib-leach
enhanced
nmi
modularity index of clustering results
cluster size
cost of clustering
mcl
rnsc
oop.
object-oriented programming
oof
object oriented framework
framework
cbf
component-based framework
cbd
component-based development
one version data store
legacy erp system
web portal
enterprise resource planning
etl
business intelligence
message confidentiality
backward secrecy
forward secrecy
key distribution
throughput
transmission time
eee leach
k-means clustering.
privacy preserving data mining
code book generation
root and light stemmer.
similarity measures
latent semantic analysis (lsa)
arabic language
precise rate control (prc).
spiht algorithm
image compression
wavelet analysis
multiple precision
convenient modulo
modulo reduction
montgomery algorithm
distributed data mining
apriori
hadoop
distributed computing
frequent itemset
world wide web & pattern extraction
web content mining
web usage mining
e-business
data cleaning
obesity heuristic
artificial immune systems
cell phones.
wireless interfaces
malware
handheld devices
security
prosodic feature
mfcc
gmm-ubm
multilingual
speaker verification
redundant bits
secure cloud architecture.
vulnerabilities
threats
security and privacy
information
dimensional collections
museum
electronic dictionary
solution
finding
path
.
experimental result
decompression
two dimensional scaling transformation
scaling factors (compression factors)
example
digital signature
software maintenance.
code clone
support counts
symmetric-key encryption
privacy-preserving
performance measurement.
heuristic evaluation
fuzzyminmax
cbir
validation.
iintensity of blackberry use
image segmentation.
boundary detection
topological alignments
active contour
segmentation enhancement
security solutions
security challenges
university
web-based learning
aomdv & dsdv
aodv
mobile ip
mobile ad hoc network
feature-less method & semi-dense real-time.
feature-based method
umeyama method
performance metrics
vo
university websites
website design
usability
saudi arabia
distance education
publicauditor
revoke user
signature
relational databases.
graph databases
sqlite
mysql
neo4j
cypher query language
principal component analysis
cholesky decomposition
grayscale image.
integral attack
gpgpu
chosen plaintext attack
light-weight block cipher
image denoising.
edge preserving smoothing
anisotropic diffusion
modified decision based unsymmetric median
vascular structure
optimal vessel forest
microscopic images
automatic microbial counting.
cv algorithm
morphological operation
active contour method
brodatz dataset
fuzzy c-means clustering
new’ texture feature
land cover
land use
land sat data
satellite imagery
reusable learning object
learner behaviour
cognitive model
dft
robustness
embedding
ber
differential evolution algorithm
key points (features)
structure from motion
3d modelling
corner detector
matching.
feature detection
finite-difference time-domain
mobile phone
specific absorption rate
viterbi decoder
viterbi algorithm
code rate
verilog hdl
hamming distance
constraint length
convolutional encoder
fpga.
double data rate (ddr)
duty cycle corrector (dcc)
successive approximation register (sar)
modified successive approximation register (msar)
duty cycle
pvtl.
word sense disambiguation(wsd); classification and
silhouette plots
improve performance
load curve prediction
diabetic retinopathy
classifier
blood vessels
diagnosis
green channel
cognitive radios
convex optimization.
downlink beam - forming and admission control
face recognition; manifold learning; filter; clust
compression
k-nearest neighbour
evidence theory
erp contracting
enterprise resource planning (erp)
erp proposal
erp implementation
business process
request for proposal for erp (erp rfp)
hashing
aes algorithm
image format
i intensity of blackberry use
behavioural authentication.
cognitive authentication
keyboard latency
behavioural biometrics
association based passwords
keyboard dynamics
customers’ purchasing behaviour analysis
big data analysis
feature extraction and machine learning classifier
authorship attribution
text pre- processing
stemming
higher education institutions
virtual computing lab
virtualization
remote areas
web service
poi
layer
augmented reality
layar
cbir; fuzzyminmax
validation
compute unified device architecture
graphical processing units
computational efficiency
discrete cosine transform
peak signal to noise ratio
See more
- Presentations
- Documents
- Infographics