Tags
data mining
security
classification
clustering
manet
ontology
genetic algorithm
cloud computing
machine learning
feature extraction
svm
fuzzy logic
fpga
particle swarm optimization
qos
image processing
big data
vanet
segmentation
natural language processing
privacy
authentication
cryptography
mac
information retrieval
neural networks
web services
hadoop
psnr
direct torque control
optimization
network protocols
computer vision
wsn
encryption
ad hoc network
artificial neural network
ad hoc networks
edge detection
feature selection
e-learning
wireless sensor network
steganography
framework
wireless sensor networks
naive bayes
simulation
content based image retrieval
image segmentation
k-means clustering
scheduling
ant colony optimization
image watermarking
decision tree
nlp
vector control
object tracking
performance
decision trees
congestion control
web usage mining
medium access control (mac)
mri
wireless network
soa
aodv
privacy preservation
sensor network
social network analysis
hidden markov model
microcontroller
modelling
mimo
noise
mobile network
block cipher
texture
virtualization
wordnet
wavelets
neural network
mobile
multiagent system
wimax
dsr
compression
singular value decomposition
v2v communication
routing
prediction
data compression
decryption
text mining
algorithms
throughput
semantic web
stemming
artificial neural networks
load balancing
support vector machine
gpu
cuda
knn
dwt
dct
big data analytics
software engineering
arabic language
sentiment analysis
deep learning
gesture recognition
image quality assessment
preemption
twitter
mapreduce
reduced reference
no reference
full reference
oversampling
semantic network analysis
parallel algorithm
wireless sensor networks.
outage probability
log skew normal
alamouti
learning algorithm
language
detection
automation
knowledge management
semantics
access control
higher education
processor
smart
mobile ad hoc network (manet)
wireless sensor networks (wsns)
pmipv6
cluster
image inpainting
exemplar based
privacy preserving data mining
hand gesture
ubiquitous
rotation forest
distributed system.
traffic engineering
trust management
energy harvesting
internet of things
trust
spectrum sensing
distributed system
exploitation
pos tagging
dft
gsm
payload
filtering
peak signal to noise ratio (psnr)
snr
secret sharing
discrete cosine transform
confidentiality
service composition
handoff
guard channel
k-mean
java
middleware
test case generation
smart antennas
microstrip patch antenna
requirements
intrusion detection system (ids)
latency
robustness
discrete wavelet transform
visual cryptography
association rule mining
p2p
jpeg
fcm
medical imaging
data gathering
correlation
software testing
project management
knowledge base
activity recognition
pid controller
robotics
erp implementation
multi-label classification
stbc
cdma
adaptive systems
knowledge discovery
materials database
sensors
embedded system
tracking
mobile ad hoc network
character recognition
support vector machines
j48
partial migration
evolutionary algorithm
bbo
biogeography-based optimization
mobile networks
face detection
lda
leach.
flex
workflow
map reduce
vlsi
xml
cooperation
hierarchical clustering
qos routing.
contourlet transform
intensity
data center
zero crossing rate
modeling
software development
data
gabor filter
mode of operation
authentication.
motion estimation
semantic compression
thresholding
canny
cbr
c4.5
live streaming
apriori algorithm
biclustering
distributed systems
formal concept analysis
sar
fingerprint
image
histogram equalization
mfcc
component
perturbation
reconstruction
social media
model
architecture
sorani
kurmanji
kurdish language
dialect identification
pattern recognition
smoke detection
scrutiny of admission forms
knowledge capturing
hog features
video database
fast search
medical imaging analysis
time dependant
functional response
signal processing
iso/iec 25051
iso/iec 9126
ready to use software
software development cycle
quality analysis
quality model
evaluation process
fta
long-term depression
long-term potentiation
compressed sensing
excitatory postsynaptic potentials
etl
pseudo random number generator (prng)
healthcare
sql
image enhancement
software process modeling
complexity
software architecture
case-based reasoning
huffman coding
vector quantization
memorability of passwords .
snakes & ladders game
graphical passwords
intrusion prevention
rsu
network topology
dsrc
cellular network
wavelet transform
watermarking
rtos
psnr.
privacy requirements
dependability
agile modeling
security architecture
image encryption
energy consumption
educational data mining
assessment
communication
information systems
web services security
energy efficient
manhattan distance
preprocessing
optical character recognition (ocr)
stability
mobility models
mobile ad hoc networks
mobile application
gps
tcp
owl
pir
hindi
support vector machines.
standards
beamforming
routing protocols
top-hat transform
level set method
k-means
xst
lut
fir
dalut
multirate
hidden markov model.
spwvd
wvd
stft
hrv
cloud security
web search engine
web mining
semantic similarity
differential evolution
median
normalization
mean square error (mse)
lifting wavelet transform
opencl
google maps
chemotherapy
breast cancer
fractal dimension
arabic
real-time processing
distributed processing
diabetic retinopathy
transfer learning
manets
video surveillance
supervised learning
opinion mining
recommender systems
knowledge engineering
artificial intelligence
uav
human-computer interaction
semantic analysis
eigen faces
pca
scalability
quality of service
nonparametric regression
time series prediction
kernel regression
rmse
resolution
coherence
surface deformation gradient (sdg)
radar interferometry (insar & dinsar)
discrete hartley transform
kernel discriminant analysis
discrete cosine transform algorithm
lip segmentation
capstone project
waterfall process
agile process
instructional technology
student engagement
evaluation metrics
answer extraction
neutral language processing
question-answering
pronunciation dictionaries.
word distance measurements
semantic similarity.
e-examination
subjective assessments
knapsack problems
african buffalo optimization
binary problems
swarm intelligence
metaheuristic
domain name frequency analysis & malicious dns
malicious domain names
domain generated algorithm
private key
public key
digital rights management
cryptocurrency
blockchain
gnp-gender number person.
pos-parts of speech
tl: target language
sl-source language
mt: machine translation
conformable fractional derivative
exact solutions
fractional partial differential equations
functional variable method
penetration testing standards.
ethical hacker
penetration test
fmri
alzheimer’s disease
dementia
brain network
structural equation model
fuzzy formal concept analysis
fuzzy association rules validation
posterior distribution
class imbalance
butterfly cataloging
ecology
image recognition
analytics
stream processing
urban data streams
amharic posts and comments
social networks and spark
amharic hate speech detection
viterbi algorithm
general regression neural networks
nlp &co-occurrence matrix.
emoticons
hashtags
arabic tweets
classifying
dsm
data resource
evaluation metric
automatic evaluation
sequence-to-sequence models
paraphrasing
systems of systems
reliability
supply chain management.
system of systems
serious game
multi agent systems
economic geography
sparql endpoint.
data warehouse
ontology engineering
hsv
colorization
pseudo-coloring
smart mobility
point of interest
anonymity
location based services
location privacy
contiki cooja.
performance analysis
symmetric key based ciphers
linear and grid based wireless sensor networks
wto
mra
tbt(technical barrier to trade)
conformity assessment
title properties
people titles
rule-based classifier
biomarkers
mass spectrometry
team data science process
foundational methodology for data science
crisp-dm
kdd process
user data discovery
data-driven decision-making
data science methodology
cybersecurity
business models. m-commerce
wireless technologies
mobile payments
fast handover
handover
aaa
university
web-based learning
cricket
multiclass svm
random forest
firmographics
public records
bankruptcy prediction
robotics application
image clustering
darpa third wave of ai.
rumlsm
really useful machine learning
black-box problem
deep neural network
ai risk
recall
product harm crisis
galaxy note7
social communities
social live streaming
twitch.tv
uses and gratification
couchsurfing
airbnb
home-sharing
sharing economy
the duality feature.
the p versus np problem
np complete problems
np problems
p problems
aomdv &dsdv
mobile ip
false vote injection attack
false report attack
aes algorithm..
lsb algorithm
degree of interaction.
time- interaction
digital interactive story telling
graph algorithms
graph parallel computing
graph analytics
graph processing
big graph
boundary scan
jtag
tmp controller
tap
ieee 1149.1
ip core
low resource devices
lightweight cryptography
hight
dydog
digital signatures
concealed data aggregation
smo
part of speech tagging
named entity recognition
footer switch
header switch
leakage current
sleep mode
mtcmos
delay and switching activity.
hazard filtering
multiple threshold transistor
balanced path delay
gate freezing
power dissipation
glitch
test data.
test case optimization
meta-heuristics
harmony search algorithm
triplets
short answer
friendship matrix
friendship graph
risk management & information security
drug response
multifractal
fractal
histology
indoor localization
fall
multi-agent
tele-health
smart-home
relaxation labelling
registration
graph matching
point pattern matching
multiple support vector machines
yacbir
skeleton model
microsoft kinect
turkish sign language recognition
packet routing
setup delay
communication networks
security anal
rsa cryptosystem
fault tolerance
digital signature
permutation flowshop scheduling problem
tabu search
metamodel
lessons learned
technological innovation management
attacks
handshake protocols
ssl/tls protocols
skeletal muscle
micro array gene expression
filter techniques
multi-filter system
sharp objects
precautionary measures
pattern match
real-time dynamic video
surveillance behaviour
management architecture
service management
saml
federated identity management
probabilistic model
topic model
character segmentation and recognition
number plate recognition
number plate localization
wireless.
protocol
future internet
ccn
gossiping
local algorithms
distributetd data mining
postgresql.
mongodb
cassandra
nosql database
multiprocessor and cluster
trajectory queries
databases evaluation
random effect
linear regression
tuition growth rate
modified vortex search algorithm.
vortex search algorithm
numerical function optimization
metaheuristics
emerging markets
gjr model
garch model
conditional volatility
rust detection.
caffe framework
complexity and connectivity.
mutation testing
continuous integration
fault localization
basel.
computer simulation
banking regulation
economical informatics
computer network
erlang c
erlang b
banking system
queueing theory
global optimization
migration period
microprocessors
data encryption standard
communication security
cisc and risc comparison
candidates
conventional universities
hand detection
hand signs construction
sign language
noise in audio recordings.
power grids
media recordings
region of recording
enf
standard completeness
strong completeness
hedge
first-order logic
mathematical fuzzy logic
dynamic environment.
python ide.
pydev
crt decision tree algorithm
thyroid diseases
bootstrapping
asymptotic variances
kalman filtering and smoothing
expectation maximization algorithm
maximum likelihood estimation
state-space model
teo
poa
msa
vot
torque control
brushless machines
electric vehicles
bldc motor control
blac motor control
pmsm motors
prometheeii.
cartography
mcda-gis integration
industrial zones
multi-criteria decision analysis (mcda)
geographic information system (gis)
ch’
gateway
sub-cluster
orphan nodes
o-leach
leach
wsns
probabilistic rules.
bayes sentiment classification
decision rule mining
associative regression
radio channel measurement
multi-radio wmn
labelling
fuzzy clustering
vertebra segmentation
fuzzy term.
web log file
fuzzy association rules
artificial neural network (ann).
hand written and printed character recognition (hw
bottommiddletop layer (bmtl)
topmiddlebottom layer (tmbl) layer
service sector
manufacturing sector
moora
mcdm
madm
gkfcm
kfcm
skew correction
skew detection
braille to text conversion
feature selection & adversarial ir
content spam
spamdexing
web spamming
file transfer
web cloud
file integration
sha-1
final user
conceptual query language
fnirs.
digital watermarking technique and wireless sensor
linear feedback shift register
guidelines
middlebox
security keypad
attack potential
shoulder surfing attack
attack potential of password systems
security requirement of web sites
threat of web sites
password authentication system of web sites
user equipment
mobility management entity
home subscriber server
authentication and key agreement
long term evolution – advanced
transportation modes
similarity analysis
barcode receipt
electronic referendum
election transparency
packet lost.
survey.
security services
attacks on manet
cluster energy & root node.
role factor
histogram
eigen values
match points
safety and liveness property.
node monitoring protocol
verification
validation
sdl (specification and description language)
supervised & unsupervised training
convolutional deep belief network [cdbn]
convolutional neural network [cnn]
image processing & projection method
water meter recognition
dsp
technology-organisationenvironment (toe)
diffusion of innovation (doi)
cloud computing adoption
comprehensibility.
extraction
feed forward
unsupervised system
fabrication
photocopy
document
ocrs
autocorrelation
orientation
number plate
change of radix
re-integerization
fractionification
matrix transformation
gnu/linux core utilities
good programming style
cyber situational awareness
security evaluation
cvss
markov reward models
non-homogeneous markov model
attack graph
traffic-aware
queue length potential field
depth potential field
genomic knowledge.
microarray data
heuristic algorithms
medical diagnosis
island model
trust.
bio-inspired algorithms
artificial agents
big data mining
time reversal
ostbc
ofdm/oqam
j2ee .
red5
web2.0
ria
videoconferencing system
energy
clusterhead
ber.
cir
zps
ola
mb-ofdm
ecma-368
uwb
aes cipher
selective encryption
shadowing environment.
asymptotic approximation
moment matching
lognormal sum
interference
correlated lognormal sum
relay’s diversity
siso
multi-hop system
rayleigh fading
diversity
distributed-stbc/dstbc
mc cdma
multi carier
performance analysis.
resource scheduling
lte
macrocells
femtocells
software defined network
security configuration
virtual network
virtual machine
virtualized infrastructure
primary/secondary user
bpsk modulation
power spectral density
energy detection
radio cognitive
image similarity
image features
cross-validation
circular sectors
cbir
camera calibration.
lidar calibration
remote sensing
sensitivity analysis
lab test
icu
single machine
dispatching rules
dependency patterns
dependency parse trees
aspect-based opinion extraction
semantic enrichment
ontology learning
figurative expressions
graded salient hypothesis
teaching
synchronous approach
and semantically enabled web services.
shared understanding
collaborative requirements elicitation
recommendations systems (rs).
quality attributes
a general architectures
multi agent system (mas)
ittp.
d-mux-ittp
voip
bandwidth utilization
packets multiplexing
medical
data stream
visual metrics
svd
medical images
fuzzy c-means (fcm)
t2
multiple sclerosis
speech to text translation
ibm watson api
speaker pronunciation time
informatized caption
lesión
r-cnn
convolution neural network
mammography
web advertising
google ads
pay-per-click advertising
smt.
cyber physical systems
critical infrastructures
detection and prevention systems
security monitoring
crime
analysis
really useful machine learning.
ai
query inversion.
query processing
structured query language (sql)
data provenance
cloud storage service
attribute-based encryption
digital archive management
semantic grid
long-term preservation (lpt)
two-tiered architecture
pmsm control
ubiquitous environments
ubiquitous interaction
model mutation
owl-s
petri-nets
finite element modelling
quartic polynomial equation
energy optimization
manipulator
trajectory
convex set.
gvg roadmap
departability
nonholonomic
sensor based
system management
multi agent system
cloud technologies
mapping.
support
maximal frequent itemset
knowledge pattern.
project life cycle
services security
aomdv protocol.
residual energy
time processing.
em
hmm
machine learning methods
association rule
concept taxonomy
granular computing
multidimensional data mining
statistical analysis
metrical linguistics
environmentology
english text analysis
heart disease diagnosis.
initial centroid selection methods
improved apriori algorithm.
weighted association rule mining (warm)
dynamic programming
web page prediction
reliability.
pssm
rbf
nac
emotion recognition.
human computer interaction
behavioral science
texture analysis
local variance
local binary pattern
image retrieval
and owl-s
learning objects
learning style
mp-soc architecture
road recognition
software processors
multistage architecture
neural network.
park’s vector approach
inter turn stator fault
pwm inverter
doubly fed induction machine
agent
attack prevention
synchronized defense
distributed attack
denial of service
confidence interval
numeric signature
privacy preserving
standard deviation
opinion mining.
sentiwordnet
rouge-su (2)
fmeasure
automatic language processing
evaluation
automatic summary extraction
scheduler
operating system
online machine learning
reinforcement learning
decision tree.
rheumatoid arthritis
predictive model
cuckoo’s algorithm
adaboost
fuzzy decision making.
minimum spanning tree
data aggregation
continuses rule extraction
bee colony optimization
multi-objective algorithm
cuckoo search
numeric association rule
higher education institutions (heis)
critical success factors (csfs)
enterprise resource planning (erp) system
java programming language.
oracle
applets
jdbc
ordbms
oop
multithreads
intranet
geographic informational systems
environmental optimization
public transport network
hybrid algorithm
commodity of interest
multi-commodity network flow optimization
linear programming
graph theory
parallel.
extended mixed network
maximum flow
alogrithm
cycle
distributed
parallel
tsp
pattern-based approach
antonym
semantic relations
precursor step
random graphs
eigenvector centrality
degree
graph isomorphism
fourier analysis
orthogonal arrays
experimental design
sampling theorem
digital signal processing
geometrical features
hsv appearance
non-overlapping views
human tracking
pedestrian detection.
apache storm
distributed stream processing
haar-like feature
heterogeneous sensor
work-experience
stem
unemployment
post-graduation
economy
thyroid tumour patients
malignancy
logistic regression analysis
micro-strip line(mlin).
advanced design system(ads)
gysel power divider(gpd)
wilkinson power divider (wpd)
error convergence rate.
beam width
side lobe level (sll)
augmented clms (aclms)
complex least mean square (clms)
adaptive array
traffic theory
multicasting
markov chain
kendal’s notation
k-fold network
fis edito
routing metrics
aads model
mobility
secure protocol
manet security
bit error rate(ber).
code shifted quadrature chaos shift keying ( csqcs
code shifted differential chaos shift keying (cs-d
quadrature chaos shift keying (qcsk)
differential chaos shift keying (dcsk)
ambient networks.
local preference
mpls
bgp
wired part delay (delay between ar/mag).
binding update/registration delay
total number of hops
wireless link delay
average hop delay
total handover delay
mipv6 protocols
genetic algorithm (ga).
shortest path (sp)
bilateral gradient sharpness criterion.
dwt (discrete wavelet transform)
laplacian pyramid
multiresolution
enhanced packet reception rate (prr)
weight based advanced leach
correctness
multi ttp
single ttp
trusted third party (ttp)
secure multiparty computation (smc)
and soft real-time (srt).
hard real-time (hrt)
real-time routing (rt)
ns2.
wireless adhoc network
backoff
mac layer
spectrum
dcas
fixed channel
dynamic channel
hop count filtering (hcf).
time to live (ttl)
blind spoofing. ip spoofing
replay attack
distributed denial of service attack (ddos)
sha-1(secure hash algorithm)
otp (one time password)
iba (image based authentication)
mobile router.
bulk binding update
nemo
nbs
aodv & rfactor.
energy efficiency
ontology based classification (domain specific).
centroid based classification
hybrid approach
punjabi text classification
ace event.
event coreference resolution
data publishing.
suppression
anonymization
generalization
data privacy
min-based operator
product-based operator
possible worlds
possibilistic linkage model
possibilistic linkages
possibilistic data model
uncertain object model
uncertain data
computation
partitioning
criteria
contourlet transfor
medical image compression
extended wavelet transform
overloading.
toll-plaza
vehicle checking
vehicle classification
hsrp (high security registration plate)
digital video holography.
digital image holography
code book generation
stream cipher.
permutation
self organizing map
rf transceivers
ultracapacitors
medium access protocols
sensor node architecture
dvs
comparison.
co-occurrence matrix
principle component analysis
representative rule.
distortion
association rule hiding
k-means clustering.
computing intelligence
project clustering
software effort estimation
neural networks.
levenberg – marquardt
genetic algorithm (ga)
fuzzy systems
diabetes
low-resource
lwl classifier
k star classifier
ibk classifier
ib1 classifier
delay tolerant network.
routing protocol
mobile trace
opportunistic network
e-learning broker & e-learning registry
e-learning discovery
web service
maximal frequent item first (mfif).
apriori algorithm (aa)
association rules (ar)
frequent item set (fis)
data mining (dm)
4g
umts
gprs
edge
awgn and raleigh fading channels
bit error rate(ber)
ecb and cfb cryptographic algorithm
pre-zf
pre-mmse
mimo-ofdm
robots cleaning
directed acyclic graph (dag)
session construction
partial ancestral graph (pag)
test case generator.
plan synthesizer
path synthesizer
watch variable handler
flow graph analyzer
token parser
test bed
master section head.
event driven
lifetime
sensor nodes
search environment.
uml models
mdl
phy
amc
ofdma
802.16e
802.16m
ieee
principle component analysis (pca)
text classification
feature clustering
sensitive data
visual editor
flow based programming
complex event processing
fuzzy c-mean.
artificial neural networks (anns)
hidden markov model (hmm)
features extraction
human computer interaction (hci)
hand posture
empirical mean
principal component analysis
de-blurred fused image
modified genetic search algorithm.
haar wavelets
attribute subset selection
computational intelligence
cognitive user
common control channel
primary users
spectrum opportunities
cognitive radio (cr)
motor controller.
dispenser
monitoring
pervasive
medical diagnosis systems.
ensembles
similarity matching & image retrieval.
teo-cb-auto-env.
duration
vocal tract spectrum
lpc
formant frequencies
power system stabilizer
d-k iteration
h∞ control theory
secret key
multiple keys
bitmap image
braille format
ip networks.
lan router and switches
soc
ethernet
etl algorithm.
fuzzy cmeans algorithm
binary neural network
geometrical expansion
semisupervised classification
explicit window adaptation(ewa)
dynamic buffer sizing
transmission control protocol (tcp)
wireless lans(wlans)
flip-flops
atpg
bi-stable element
latch
scan chain
low complexity video compression
2d svd
wiener index.
fibonacci weighted tree
distance in graphs
image fusion.
hpdi
spatial metrics
spectral metrics
image quality
in-vehicle network
health monitoring ecu
ecu
adaptive learning
learner portfolio
scaffolding
asynchronous e-learning
web filtering
messenger application
client server
proximity
monotonicity
m)-anonymity
(ε
k-anonymity
smart phone application
radar
mobile maps
android
fuzzy logic optimization
asynchronous motor control
load balancing.
replication
delay-tolerant networks
heterogeneous processors
mpsoc
creativity.
what if ?
why not ?
adaptation
tutelage
anthropomorphism
content mirroring
remote display
location-based services (lbs)
trilateration algorithm
distance-based filtering algorithm
indoor positioning
indoor location tracking
weight
application weight
unified qos metric
dynamic weight
qos metric
qr-code
data protection
deniable encryption
indistinguishability obfuscation
selective opening attack
functional encryption
african national research and education networks (
internet exchange points
software defined networking
active vehicle
tag identification
processing delay
sensing energy
computational rfid
medium access control.
framed slotted aloha
random access protocols
wireless lan
grouping
machine-to-machine
point-to-multipoint (p2mp)
wireless metropolitan area networks (wmans)
los (line of sight)
digital subscriber line (dsl)
visible watermarking technique and discrete wavele
digital watermarking
neighbourhood function
weight vector
learning rate
anomaly detection
interference management
hsupa
load matrix
resource allocation
target trajectory
i-imm
tracking and prediction
geomagnetic sensor technology
surface surveillance
label ranking.
learning object
cognitive radio
wireless network.
network coding
joint network/channel decoding
software job ads
software development curriculum
ieee/acm computer science curriculum
personal cloud
public cloud
secure cloud architecture
multiclouds
nist reference model.
intermediation
task scheduling algorithm
deadline
dynamic service allocation
cloud broker
stackato & stratos
openshift
cloudify
cloud foundry
appscale
feature model-based virtual cluster commonality an
virtual cluster disk provisioning
security screening system.
cross-language information retrieval
border security
displacements
inter-event time
probability distribution
armada
analysis and performance study.
data dissemination
huge amount of source code
static source code analysis
bidirectional search
graph path
call graph
action unit
fitting
bayesian framework
facial landmarking
bag-of-words (bow).
modified lesk (ml)
word sense disambiguation (wsd)
semantic web.
sparql
rdf
structured information extraction
feature weighted grey relational based clustering
grey relational analysis
software estimation
mutual exclusion.
formal specifications
event-b
vector clock
formal methods
collaborative design.
camms
mbd
dmu
cc
ide
plm
processor performance.
branch handling
prefetch
uniprocessing
exploration
parametric uniform crossover
parameter control
genetic algorithms
software size
olap systems
materialized views
class point
academic networking
recommendation engine
contextual model
ieee lom
learning styles
inspection
wbs
user requirements
scope definition
software scope verification
urdu ir
tora
awale
databases
endgame
minimax search
total harmonic distortion
transformer-less shunt hybrid active filter
shunt active filter
power quality
tertius algorithm
inference engine
root cause analysis
communicable disease.
health
ontology development
knowledge representation
il pos tag set
brain abnormality .
computer tomography
magnetic resonance imaging
fpgas
stastical anlysis method
voice activity detection
peak valley detection
temporal domain.
pitch synchronous
non-nasal
nasal
subscriber identity module (sim)
lcd
partitioned iterated function systems (pifs).
iterated function systems (ifs)
affine map
quardtree partition
compression ratio
fractal compression
authentication and message digest.
lsb-0
ibt
bt
optimal cost path.
land acquisition
priority
land-type-data-bank
flat-file-systems
digitized map
sdhtiwcia and message digest.
lsb-1
ilt
lt
wavelets.
spatial
adaptive
microwave
speckle
roi tracking
optical flow
non-rigid deformation
multi-resolution pyramid
maxwell's demon
clbp
periocular
chromosome.
crossover
advanced sobel operator
otsu method
image fidelity (if).
frequency domain
z-transform
wireless communication.
session key
traingularized
simulated annealing
multilayer perceptron
bit level encoding.
tolerance level of embedding message
song authentication
perceptual coding
embedding secret message in quality song
mobile agent.
ns2
agent based intrusion detection system (aids)
sequences
conservation
alignment
homology
mirna
consistent clusters
priors
evolutionary clustering
mean square error (mse) and peak signal to noise r
mpeg (moving picture experts group)
jpeg (joint photographic experts group)
least significant bit (lsb)
background color and feature extraction.
foreground color
color segmentation
denoising and filters
video processing
gray & color image.
modified directional weighted cascaded-mask median
stego-image
adaptive pixel-value differencing
pixel-value differencing
sensor node and sink
relay node
dominating set
image extraction and classification
pre-processing
ocr
object oriented database model.
materials informatics
engineering materials
halftone visual cryptography
error diffusion
mean square error and peak signal to noise ratio
quantization
substitution cipher
ciphertext
plaintext
key establishment
key distribution
key generation
face recognition.
region covariance matrix descriptor
monogenic scale space
riesz transform
log-gabor transform
adaptive summarization
center-surround color difference
motion coherence
motion intensity
visual attention index
vanet.
wireless networks
v2i communication
energy consumption.
simulator
& cfg
sub-classification of ‘paas’
vanchipaa
kalipaa
aasiriyapaa
venpaa
issues
adhoc network
sensor netwok
digital evidence.
digital forensic history
digital forensic model
computer forensics
digital forensics
application layer & entropy
ddos
service discovery
semantic web services
computer experiment section.
average case analysis
empirical-o
statistical bounds
empirical analysis
theoretical analysis
shape
braintumor
linear discriminant analysis
time complexity
information hiding
image steganography
channel borrowing
dynamic
nk
sc
dpso
pso
propagation model
path loss exponent
pathloss
hsv color space
cross-layer framework
cross-layer optimization
cross-layer design
cross-layer
medical confidentiality
roi & roni
ant colony optimization (aco)
wireless ad hoc networks
steiner tree
multicast routing
sharing
two way security
cloud environment
mobile sink
reference set
model set
starter
reference graph
model graph
cloud computing and storage
near field communication (nfc)
root mean-squared error
naviebayes
mean absolute error
bayesnet
emotion word ontology
textual emotion detection
web traffic content.
associations
hybrid clustering
k-harmonic mean
clustering algorithm
c#.
browser
platform
xss attack
replace technique
parsing mitigation technique
test optimization.
test coverage
state chart diagram / state charts
test sequence generation
test generation technique
error handling
choreography
services
esb
bpel
micro -rotations.
pipelined architecture
cordic
ie3d software.
circular polarization
adaptive array antenna.
power management
mobility aware.
ma-aodv
ad-hoc
pentagonal and circular polarization (cp).
wireless capsule endoscopy
root
features
pos
rmwe
crf
organizational culture
people focus
petri net
message sequence charts(msc)
modeling/simulation
spatial web services
mapping function.
pair programming
agile software development
kfcm.
adaptive thresholding
information loss.
variable-size
microaggregation
denial of service (dos)
cache
prefetching
real-time database
backup optimization
database decompression
database compression
diastole cycle
systole cycle
rr- cycle
formant frequency
bayesian belief network.
fp-growth
incremental cluster-patterns
incremental pair-patterns
lossy-counting algorithm
white-washing.
free-rider
incentive mechanism
multimodal authentication
exponential kronecker product (ekp)
kronecker product
context-sensitive exponent associative memory mode
finger
face
biometric fusion
biometrics
dna computing.
asymmetric cryptography
otp
symmetric cryptography
dna security
routing optimization
cluster head gateway
proactive
apriori
pattern growth
isomorphism
frequent subgraph mining
self-management and live migration.
autonomic computing
industrial designs
fine-grained access control
non-perfect secret sharing
ramp code
mix-split
density histogram
image representation
similarity
kernel density function
entropy encoder
source reduction
image compression
integration
tagging software
web application
nbs distance.
mhcph histogram
smooth distribution
hsv colour space
human colour perception
swarm intellegence.
super pixels
performance and speedup
chip multicore processor
amdahl's law
local content preservation
enhancement
human vision thresholdin
human visual system
adaptive histogram equalization
scanning methods.
hardware accelerators
h.264/avc
range filter
texture filter
medical image texture segmentation
and parsing.
cyber-crime
ssl
phishing
internet attacks
quantization.
boundary artifacts
mse
jpeg2000
state space point distribution parameter
state space map
reconstructed state space
coverage loss time
node lifetime
mobile sensor networks
minimum distance spanning tree
maximum stability
engine”
openness of a search
input/output file
verification program
automatic assessment
programming assignment
tampering.
facial recognition technology
masked face
colour imposed face
dummy face
product
reusability
fault detection.
modified condition/ decision coverage (mcdc)
branch operator strategy (bor)
boolean specification
humanistic
society
community
machine
culture
art
image entropy.
xml schema
robust secure coder (rsc)
triple des
fs1015 lpc
data encryption standards (des)
enhanced melp
mamdani fis
early estimations
effort estimation
service model
sqa
practitioner managed
itil
cmmi
process improvement
requirement based test effort estimation (rbtee)
sdlc
software requirement specification (srs)
rbdee
ieee-830:1998 - srs
requirement based development effort function poin
irbc
role management
oop php
mvc architecture
online journal
spem.extension
adaptive guidance
guidance profile
meta modeling
program test data generation
search based test data generation
competencies.
expertise
project managers
imbalanced data
c-svm
bipartite networks
software product evaluation
lexico-semantic similarity.
semantic integration
automatic ontology mapping
grid computing
data replication
data grid
twinrotor
vtol
dynamic model of mobility.
artificial traffic data
traffic microsimulation
modeling and simulation
robot
feed-forward controller
nero-fuzzy system
artificial bee colony
shuffled frog leaping
dynamic equations
gryphon
flying robot
quadcopter
human detection
triadic association rules.
galois lattice
projection
symbolic induction
induction graph
planning
bloksworld
data analysis.
schema mapping
relational databases
ontology building
speech recognition.
part-of-speech tagger
natural language parsing
natural language applications
similarity measures.
keyphrases extraction
suffix tree algorithm
arabic text clustering
visualization tool.
formal conceptual graph
synthetic representation
association rules validation
erp proposal
business process
erp contracting
request for proposal for erp (erp rfp)
enterprise resource planning (erp)
casi.
cellular automaton
boolean inference engine
concepts lattice
text categorization
jcolibri
diabetes diagnosis
multi-criteria decision support
decision support
design reuse
openrisc
systems on chip
voice over ip
mobile robots.
kalman filtering
flocking
induction motor control
space vector modulation
fuzzy logic control
migration
pressure transmitter
diaphragm actuation
differential pressure sensor
cantilever based mechatronics
weighting function
k-nearest neighbours
mimo-cdma
ber performance
object uniqueness.
object clustering
similarity distance measure
modified k-means clustering
pixel segmentation
qos optimization
qos management
service-oriented software engineering
peer to peer (p2p)
video on demand (vod)
distributed file system
google file systems
parallelization
trade list
undirected item set graph
allocation
high level synthesis
geospatial agricultural census data
column charts
enhanced visualization
geo-spatial ontology
idf(inverse document frequency) and recall
term frequency(tf)
gss coefficient
keywords
summary
document image understanding
script recognition
document images
correlation .
regression
mechanical property
materials selection
performance index
similarity measure
visual basic.
ntc thermistor
transmitter
cross compiler
center of gravity (cg) and feature extraction.
blob
visual surveillance
rule cover cluster
hea
moga
associative classification
multi label classification
context-free-grammar
naive bayesian theory
function tagging
grammatical relations
cache replacement
cache sharing
caching
wbem
icmp
dns
mib
snmp
arp
aes
des
ism
frequency hoping
scatter net
pico net
bluetooth
simple cart
rbf neural networks
earliest deadline first
frequency switching
pre-emption
dynamic voltage scaling
unified modeling language
software performance engineering
attackers .
mac-layer
threshold level
hpc-maq.
computational quantitative biology
whole genome reference assembly
high performance computing
mysql and presents
oltp application
single migration
simplified bbo
sbml.
narrative language
bio-pepa
epidemiology
personality
demand fulfillment
blackberry use
scaling
gpu programming
speech processing & fir digital filter.
cochlear implant
cis strategy
bwt implementation
network simulator
image acquisition .
drowsy driver detection
haarcascade
real-time system
eye detection
hfss.
coupler
circulator
power divide
siw
microwave components
rectangular waveguide
robot control systems
wall-following robot navigation
3d camera
smoothing
triangulation
3d reconstruction
mesh
point cloud
policy management
compliance and real-time change detection
gme
ransac
(tvbc
tu
cvc model
citation sentiment analysis.
citation networks
citation extraction
citation classification
citation analysis
concept maps
novelty score
hpam
topic modeling
novelty detection
wsn)
ajax
content delivery network
ria frameworks
ria security
rich internet applications
web server.
compute cloud
self-service portal
enterprise portal
cloud-based model
portal infrastructure
multi-tenancy
customer support.
speech analytic
text analytics
word level activity
signal transition activity
multiplexing mechanism
dual-bit type (dbt)
digital signal processing (dsp)
over-the-air
scheduling strategy
thread-driven
event-driven
ptg
dag
task scheduling
hdfs (hadoop distributed file system)
oil paint algorithm.
paint algorithm
colour image processing
linear image filters
image filters
pulse clarity
gain ratio
audio classification
system on chip
3d architecture
mapping
network on chip
graphcut
maximum likelihood
maximum a posteriori
kappa coefficient.
unsupervised classification
supervised classification
gram-schmidt spectral sharpening
sar ice classification
mems
handof
mobile agent
cross polarization coupling
fading correlation
ml
mmse
zf
v-blast
dar
pepas
attacks.
vanet architecture
backpropagation (bp)
system identification
bayesshrink and sureshrink thresholding
visushrink
wiener filter
pap smear test
mathews algorithm.
benveniste algorithm
aclms
clms
adaptive step size
image retrieval based on spatial features.
semantic image retrieval
semantic gap
association
hibernate
orm (object relational mapping)
outbound traffic.
inbound traffic
extrusion detection systems (eds)
intrusion detection systems (ids)
remote class attacks
cyber security
cyber space
dominant region
color image segmentation
visualization.
cra
acquisition
decryption.
rfid
path trust
route trust
dynamic topology
hierarchical node addressing.
wormhole attack
optimal path identification
aco
ad-hoc network
cyclic division algebra (cda)
low complexity decoding
effective channel matrix
bit error rate (ber)
reduced golden ratio golden code (rgr-gc)
wireless networks.
cooperative caching
cache resolution
hierarchical routing
xml encryption
usb
variable key
key
symmetric key
smtp
pop3
intrusion detection system.
security techniques
mobile code
multi-agent systems
mobile agents
roni
roi
harris corner detection
fuzzy c-means
spoofing
liveness
bagging
pso and tamper detection.
hash function
dabechies4
image authentication
web snippets.
x-y-z image
region growing
object surface segmentation
simulated annealing.
median filtering
exudates
vm migration
vm placement
vm consolidation
energy management
model b.
3 dimensional
galois field (5)
cubic congruent operator
linear congruent operator
optical orthogonal codes(ooc)
optical code division multiple access
cepstrum.
fundamental frequency
short time energy
multitenancy model
attribute-based encryption model
role-based access control
access control models
ocl
formalization
uml
use case
use case model
abstraction
behavior
business intelligence
amd
csia
short text dictionary (std)
short word
short mail
bifurcation
binarization
minutiae
encryption oracle
stream cipher
phase shift keying
quantum communication
vedic division algorithm
fast bcd division
division algorithm
iaas
paas
regularization
super-resolution
intellectual property protection
w-shingling
sentence hashing
longest common subsequence
plagiarism detection
lexical relationships
knowledge acquisition
semantic network
gamma distribution.
between class variance
image thresholding
mri images
radar image.
gradient
weibull distribution
otsu method .
sar images
hamming distance.
wavelet
daugman
iris
induction graph.
boolean modelling
automatic learning
support vector machine.
sequential floating forward search
multi-layer perceptron
coronary artery disease
best first search
bayes naïve
memoing for logic programs.
tabulation for logic programs
incremental tabulation for prolog queries
incremental evaluation of tabled prolog
justification-based truth maintenance systems
truth maintenance systems
belief revision systems
applications of justification-based truth maintena
overlay multicast tree
hybrid
peer-to-peer (p2p)
distributed algorithms
model checking
formal verification
state space generation
binary decision diagram
graph distribution
hash map
prefixed-itemset
association rules
the grand canal
large-scale cultural heritage
virtual scene construction
machine diagnosis
machine monitoring
taxonomy
comparison
processes & tools & languages
cloud software development
method engineering
threat modeling
extreme programming
scrum
agile manifesto
software crisis
agile methodology
algorithm
load-balance
database
parallel processing
high-rate
freshness
functional safety
domainspecific modelling
model-based design
hardware-software interface
embedded automotive systems
combining classifiers
time-series shapelets
engine design
attribute implications
negative attributes
nowledge discovery
switched array
altimeter
tan
subarray formation
dft beams
correlated noise
beamspace transformation
cramér-rao bound
prediction of stock exchanges
reliability block diagram
software architecture style evaluation
temporal databases
erosion
dilation
tolerance relation
fuzzy time intervals
temporal relations
daimler.
inria person
dct global
dct local
hol
pedestrian detection
energy disaggregation
blued
nilm
non-intrusive load monitoring
dbscan
density-based clustering
change-interval detection
event detection
cognitive modelling
psychosomatic disorders
e-learning systems
education
decision justification
decision-making
2-simplex prism
2-simplex
cognitive graphics
stable marriage problem with ties and incomplete l
bipartite matching
socially stable matching
stable marriage problem
& decision tree
faulty model
fault detection and isolation
web mining.
fuzzy linguistic modeling
website classification
phase estimation
quantum fourier transform
quantum computation
voltage control.
reactive power control
isolated power systems
fuzzy inference systems
distribution automation
planar template based tracking
visual odometry
camera tracking
wsq.
wave atoms
ct image
histogram based fast enhancement algorithm
contrast enhancement
linear feedback shift registers cellular automata
pitch analysis
emotion recognition
enlarged training set
hamming distance
cellular automata
formatting
shearlets
image denoising
coordinate system
variation-free
discrete cosine transform (dct)
cr(vi) reduction
mutagenic effects
toxicological effects
hexavalent chromium
trivalent chromium
chromium
heavy metals
pump power and signal power
scalar wave equation of core profile
erbium doped fiber amplifier
dispersion shifted fiber
dispersion compensating fiber
chromium (iii)
multichannel analyser
ϒ) reaction
(n
radionuclide
dialysis sac
ph
radiotracer
pvp (poly-n-vinylpyrrolidone)
hpge detector
aggregation & suppression
arginine
aggregation
protein
exact algorithm
inhomogeneities
complex permittivity
iteration
imaging
continuous wavelet transform.
interharmonics
harmonics
fcl
band-reject filter
multilayer structure
reflection coefficient
bragg mirror
maodv
ih-aodv
hierarchical
wireless mesh networks
heat sink
thermal resistance
lumped analytical model
junction temperature
impatt diode
educational management
data centre
item competence
economic.
ecofriendly
ldr
inverter transformer
compact fluorescent lamps
intensity control circuit
solar cell
and stability limit formulation
energy merging
transient energy function
directs method
power system
transient stability
analytics & cloud computing
web-scale
bandwidth.
resonant frequency
slot
patch
compact
foam
counter
flip-flop
vhdl
perceptron
threshold logic
group mutations.
frequency
position
dna bases
chemical proprieties
dna sequence
city services
cost estimation
cloud architectures
smart cities
b-coefficients.
combined economic and emission dispatch (ceed)
economic emission dispatch (eed)
economic load dispatch (eld)
wi-fi
fnirs
attenuation coefficient.
fwhm
leakage loss
transition loss
s-shape bend
excitation efficiency
factorial design.
multiplier
decremented
mosfet scaling
routing overhead.
opi
malicious nodes
correlation among neighbour nodes
trust enhancement
dimensionality reduction.
eigen vector
principal component analysis (pca)
distributed data mining (ddm)
business intelligence reporting
snowflake schema
star schema
fact table
dimension table
business intelligence (bi)
data warehouse architecture
online examination system (oes)
true random number generator (trrng)
php random number generator (phprng)
procedural language random number generator (prrng
pseudo random pattern generator (prpg)
ceptral coefficients
intelligent system
acoustic signatures
ballmill
telemedicine.
electronic medical records
clinical management information systems
information communication technology (ict)
information technology(it)
6-letter exchange group method.
2-gram encoding method
protein sequence
rough set classifier
fuzzy artmap model
neural network model
threshold.
congestion
backward reservation protocol
wavelength division multiplexing
optical network
domain key constraint
replicated copy
chunk
deduplication
image fusion 1. introduction
auv
underwater vision system
similarity measure.
adaptive guidance profile
process engineering
cohesión
coupling
architecture style
maintainability evaluation
run-time uncertainty
self-adaptive software systems
model-driven software
software quality
directed graph.
parameterization
unified modeling language (uml)
software component
software reusability
business excellence
engagement maturity
risk management
software quality assurance
audit
kml
ossimplanet
3d global
open-source platform
flight trajectory
multi-objective optimization
interaction network
protein structure
satellite
scalar quantization
fft
encoding entropy
evidence theory.
k-nearest neighbor
h264
vpx
corba
pcl
openni
kinect
3d monitoring
deafblind & emotional color
finger braille
emotional communication
semi-total replication. 1. introduction
partial replication
drtdbms
open interest contract
velocity strategy
volatility strategy
automatic trading system
invisible watermarking
radial symmetry transform
link similarity
pagerank
social networks
morphological disambiguation
morphological analysis
concept mining
ant colony algorithm
path planning
mobile robots
manufacturing logistics
originating calls
channel allocation
blocking probability
synchronous programming language
reactive control system
esterel
cruise control
safety algorithm
key space.
binary sequence
chaotic map lattice
wavelet subspaces.
multiscale embedding
transposition technique.
encryption systems
chaos
real time application
shortest path
wormhole
mobile ad hoc networking
inter band prediction
s-transform
spectral decorrelation
spatial transforms
qualnet
dcf
ieee 802.11
ad hoc routing
cross language information retrieval (clir)
thermal effects
3dmemory
3d integration
big image
dna sequences
arnold cat map
text-based.
optical character recognition
human interactive proof
devanagari
captcha
two objective genetic algorithm
non-dominated rule sets
rule generation using fuzzy system
intrusion detection system
speech classification.
zernike moment
qos parameters.
eolsr-ec
eolsr-re
olsr
packet delivery ratio
lar1
id3 algorithm
c4.5algorithm
linear parabolic lane model.
road pixels
lane boundaries
edge pixels
query expansion
intelligent information retrieval
information access
domain ontology
digital library
twouln2004a.
74ls244
74als573bs
7segments
pic16f877amicrocontrolle
microprocessortrainer
i/ounit
key predistribution
merging blocks
reed-solomon codes
e-governance
integrity
object oriented paradigm
network
telecommunication
internet
business strategy
cisco
pattern recognition.
neocognitron
multiple classifier combination
error back-propagation
classifier ensemble
non-linear
carima
generalized predictive controller
predictive preemptive approach
power
lagrange interpolation
ad-hoc wireless networks
formal
security framework
vdm++
soap
e – healthcare
ws-security
metro
ws-reliability
ws-policy
hop count.
symmetric token routing protocol
backpropagation
self-organizing map (som)
learning vector quantization (lvq)
neuro fuzzy (nf)
artificial neural network (ann)
adult asthma
pascal matrix and pascal graph
wsn routing protocol
white noise.
fractal analysis
continuous wavelet transform (cwt)
linear scaling.
echocardiograph data set
bipolar coding
back propagation
steganography.
numerical method
csps
randomized search algorithms
graph colouring
gsat
sat
genetic algorithm.
dividend
entropy-cost ratio model
interval numbers
stock portfolio selection
domain keyword extraction.
term frequency inverse document frequency (tf•idf)
weighting method
modified euclidean distance
color histogram
distance metric
vector cosine angle distance
euclidean distance
asymptotically stable.
susceptible
infectious disease
epidemic modeling
and decision support system (dss).
extract transform and load (etl)
health care data warehouse
influenza or flu
over segmentation
under segmentation
compound word
neuro computing
soft computing
mixed 0-1 programming
interval-valued gp
goal programming
fractional bilevel programming
multiple objective genetic algorithm
utility function
possibilistic risk premium
possibilistic sharpe ratio
fuzzy portfolio selection problem
proactive acknowledgement.
priority assignor
flooding
broadcast redundancy
classification.
rule based machine translator
machine translation
f-score measurement
tri-state inverters.
pass transistor logic
gdi
leakage power
simulations
connected dominating sets
fault resilience
network lifetime
partition
coverage
self organization
wireless sensor network (wsn)
traffic management.
road traffic
emergency vehicle
arduino microcontroller
traffic signal preemption
retransmissions
resource description framework
cloud and text computing
adiabatic circuit
full adder
pfal
ecrl
selfish nodes.
peer-to-peer networks
overlay
kin selection
genetics
altruism
naïve bayes classifier.
wavelet packet decomposition
discrete wavelet transforms
soft thresholding
speech recognition
ir
ksordb
vmm
inter symbol inter-ference (isi). multiple access
code division multiple access
blind multiuser detection
nds
upo
concept
synset
suspicious word
jargon word
natural language processing (nlp)
k-means algorithm.
induction motor
radial basis function neural network (rbfnn)
over-stemming and under-stemming.
lemma
lemmatization
etc.
analogy based estimation
similarity difference
fuzzy-logic
back propagation network.
road traffic analysis
vehicle route selection and direction
spiking neural networks
pipeline
graph dual & set theory
fault detection &diagnosis
droplet
biochip
visual web spider i
csv
gpu.
multi-core
local gradient
steering kernel regression
cloud ontology system and parameters
datacenters
cloudlets
rough set theory
cloud simulator
vulnerabilities.
osi
wireless
ecosystem
re-sampling
sampling
imbalanced learning
shielding effect
ieee802.11ac
full spectrum knowledge
local spectrum knowledge
cognitive radio networks
neighborhood
neighbor
bonus points
grade
mirror
roi segmentation.
lane departure
lane detection
hough transform
markov random field
image segmentation. active counters
difference in strength map
watershed
k - nearest neighbor
mel frequency cepstral coefficient
isolated digit recognition
resampling
rr tachogram
legacy applications on cloud
cloud data storage
application scalability on cloud
web snippets
the human optimization
humans
optimization methods
software metrics
software life cycle
quality assurance
agile methods
motion detection.
object detection
video segmentation
heterogeneous.
outliers
snr & spcc
audio steganography
nvidia
location based social networks.
personalized recommendations
gis
bus tracking
bus routing
prognosis
lacunarity
image analysis
dataset
keyphrase extraction
apache kafka
real time image processing
computer-aided diagnose
retinal fundus images
smile intensity
landmarks
smile veracity recognition
human computer interaction.
usability
predictive text
keystroke
smart keyboard
mobile app
dqsmrp
tuned csa
& theory of flow
hofstede's cultural dimensions
expert system
gamification
room acoustics
underwater acoustics
source localization
time-delay estimation
big data.
background subtraction
nlp arabic language
bfgs
bss
glcm
ica
matching
learning roadmap
digitalization
openskimr
life science
cloud
lustre
genomicsdb
textural features.
gaussian mixture models
intubation verification
sparse classification.
autoencoder
multimodal biometrics
background suppression
transmission line extraction
context information
implicit interaction
visualization
least-squares method
kullbackliebler distance
people tracking
articulated object tracking
variational inference
image database
image creation
collage image
subjective quality
computer vision performance
surveillance.
theft security
viola-jones
haar classifers
opencv
approximation
packet scheduling
wdm networks
software agents
psychoanalytically inspired ai
cognitive automation
cognitive architectures
artificial recognition system (ars)
simulation of mental apparatus and applications (s
artificial general intelligence
emotion
learning
connectivity.
neighbour binary rules
ode
deterministic compartmental models
infectious disease expansion
software performance engineering.
information communication technology
ict
telemedicine
l’arcen-ciel
ladygaga
coldplay
wom
music concert
advertisement
hitphenomena
revocability and fuzzy commitment
discriminability
cancelability
time series
mãe
sarima
network traffic
netflow
pig
hybrid recommender system
association rules mining
asynchronous discussion group
See more
- Presentations
- Documents
- Infographics