Tags
cloud computing
big data
data mining
security
machine learning
internet of things
classification
wireless sensor networks
deep learning
blockchain
modeling
algorithm
artificial neural network
information retrieval
feature selection
svm
e-commerce
mapreduce
hadoop
machine learning.
feature extraction
sensors
singular value decomposition
wireless sensor network
software engineering
optimization
segmentation
image processing
covid-19
competitiveness
iot
social media
text mining
load balancing
multithreading
information extraction
usability
watermarking
computer design
parallel processing
fuzzy logic
simulation
technology acceptance model
trust
software quality
graphs
routing
ict
ontology
image encryption
web services
object oriented metrics
genetic algorithm
sustainability
digitalization
chaos cryptosystem.
discrete wavelet transform
medical image
pandemic
covid-19.
data analytics
e-commerce.
3d software
analysis
wavelet transform
business continuity management
vulnerability
exploit
penetration testing
hacking
compromised systems
rtt
blocking probability
smartphone
natural language processing
bluetooth
clustering
secret sharing
hybrid
3d reconstruction
3d printing
sensor
cloud e-learning
higher education
framework.
business intelligence
heuristic
augmented reality
machine learning algorithms.
etl
integration
data warehouse
memory-level parallelism
multicore processor
competitive cache misses
cache memory
hmm
controlled switching
random forest
naive bayes
sentiment analysis
smart city
particle swarm optimization
computer network
database
quality of service
edge detection
congestion control
intelligent agents
social networks
arabic nlp
event-b
management
nosql
adoption
steganography
human computer interaction
query
ranking
jordan
similarity measure
down syndrome
formal verification
performance
virtual reality
project management
managing collaboration.
agribusiness management
serious game
sandpile model
die size
wsn
forecasting
e-learning
cloud security
authentication
mobile devices
grid computing
collaborative filtering
developing countries
soa
service
aodv
dsr
system dynamics
analytical hierarchy process
virtual machine
prediction model
fault tolerance
cmmi
gqm.
measures
database and data mining
evolution
cooperation
social networking
privacy
cryptography
recall
precision
reliability
processing time
image segmentation
face recognition
botnet attack
internet-of-things
1d-cnn
ai-enabled security
feature engineering-less
brain mr
brain tumor
sv
test library
complete cycle testing
regression testing
public cloud
testing as a service (taas)
confiscate
amend
release
issuance
business to business (b2b)
business to government(b2g)
saudi arabiamonetaryagency (sa
electronic letter of guarantee
letter of guarantee (lg)
ddos
dos
cyber-physical system
ehr modeling
hessenberg decomposition
e-health
arnold transform
tokenization
language processing algorithm
instagram
twitter
facebook
kdd
virtual process function
controller placement
software defined network
submodularity
fog architecture
bipartivity
eigenvector
theory vs. programming dispari
correlation coefficient
principal component analysis
spectral analysis
co
asia
e-commerce; pandemic
raspberry
smart road
new computing
4ir technology
intent classification
chatbot
decentralized stor
aud
beehive sound recognition
dat
compression
compact disc
digital divide
smart home
human monitoring
electronic white cane
cloud
security mechanisms
attacks
security requirements
raspberry pi
single-board computers
distributed computing
rumor detection
contextual exploration
misinformation
emission nexus
fd & co2
nardl approach
global warming
co2 emission
digital carbon footprint
the quorum systems
mobile ad hoc networks
mobility
formal specification
he
communication technology
information
student information system
n-modular redundancy
failure free
cloud consumer
employee safety
wfh
c-suite reset
work culture
innovation
surveillance security
prototype
security system
sms notification
smsecurity
iris security
iris patterns
bio-metric traits
quantization
virtual worker.
personal computer
network access server
virtual private network
wearable technology.
garmin forerunner
sports watch
running watch
gps
data analysis
stream processing
fog
edge computing
stereo vision
essential matrix
fundamental matrix
mobile device users’ security behaviour.
avoidance motivation
technology threat avoidance
security behavior
phishing attacks
materials.
static analysis.
nist
sdlc
information systems.
extended reality
immersive technologies
5g
name label switching.
ranking interfaces
ccn
bdp
ndn
justification of recommendation architecture for i
relevance of recommendations
weight of comments
justification of recommendations
iaas
bitcoinheist
bitcoin
ensemble learning
decision tree
ransomware
word-controlled breaker i.
machine-controlled door lock
fire alarm
mobile app
bt
esp 32
tracking attacks
contact tracing
non-interactive zero-knowledge proof
authentication protocol
bluetooth threat
bluetooth low energy
traceability.
transparency
blockchain technology
text mining.
documents analysis
cluster analysis
connected autonomous vehicles.
autonomous vehicles
security & privacy
task allocation
cloak-reduce
distributed processing
virtual tour
web scraping
computer test.
computer-based exams
online education
ecommerce
product sentiment
amazon
data augmentation
object as point
fabric defects detection
driver drowsiness
bluetooth low energy (ble)
vigilance monitoring
electroencephalogram (eeg)
brain computer interface
multilevel
knowledge
technology acceptance
model
mesh topology
partitioning
multicore
network-on-chip
and selective probability
ant colony optimization (aco)
university class scheduling problem (ucsp)
algorithms
visibility determination
computer games
field of vision (fov)
systems maturity
system quality
information quality
drop-ship
customer behavior
fuzziness measure.
shadowed fuzzy numbers
shadowed sets
intuitionistic fuzzy numbers
fuzzy numbers
frustration
emotion intensity
emotion recognition
emotion annotation
neural networks
smart camera
hacker
worms &trojon
virus
mobile network
wireless network
network protocols
3ds max
real time rendering
next generation sequencing.
early disease detection
single nucleotide polymorphism
microarray
multiple sclerosis
5g mobile network
network centralized storage
qr code
railway trackside safety
statistical package for the social sciences (spss)
lichen planopilaris (lpp)
histology
demographics
epidemiologic
clinical features
weighted graph and rb
traffic channel
aggregate offered traffic
mobile application.
smart parking
constraint-based modeling
student model
language tutoring systems
talend
cloudera
hdfs
transitive closure
entity resolution
rsa.
idea
xkms
saml
soap
process mining
knowledge discovery
data processing
requirements elicitation
requirements engineering
learners.
web-based learning
ewom
festival tourism
tourism
festival
multipath
outage probability
nakagami
equal gain combining (egc)
android mini game
multiplayer
mobile game testing
unity
interoperability
erp
nanotips.
lattice networks
carbon nanotubes
3d circuits and systems
deep learning & skin lesion image
u-net
k-means clustering
self-learning annotation scheme
tracking quality
recognition speed
camera calibration
marker creation
artoolkit
recommendation system.
association rules
cluster
intelligent information & database systems
angler phishing
identity theft
out of bag data
overfitting
k cross validation
maximum likelihood estimation
median imputation
random forest algorithm
logistic regression
simulated annealing algorithm.
multi-objective flexible job shop scheduling
object-oriented design
object-oriented manufacturing control
data analysts and data scientists.
analytical query
databases
automatic code generation
matbase
(elementary) mathematical data model
business rules
triggers and rules
data structures and algorithms for data management
integrity checking
non-relational constraints
relational constraints
database constraints theory
data modeling
curvature
polygonal mesh model
crest lines
3d gan
text-toimage synthesis
face manipulation
deepmasterprints
democracy
networks
election system
headgear
brainwave device
important-performance analysis
service performance
core services
home stay
secondary access
rural broadband enhancement
spectrum occupancy
e-shops.
online shopping
light and sound excitation of live creatures
synapse control
decoherence
coloured algebras
quantum biological computing
quantum computing architecture
e – commerce application.
agile
e – commerce
implicit path
time complexity
data structure
dijkstra algorithm
analytics
mobile network.
5g new radio (nr) network
low voltage (l.v.) switchboard
anti-theft system cloud based technology
tracker
emergency notification
real-time crash detection
smart helmet
risk
challenge
virtualization
nsl-kdd
kdd-99 cup
intrusion detection system
scheduling
operating systems
process
thread
task
distribution
data
web technologies
gsm
pir
raspberry-pi
thesis projects
teacher training
teacher education
digital tools
development-oriented
predictive models
ensemble learners
autism screening
fuzzy logic controller
obstacle avoidance
navigation
swarm robot
mobile robot
software-defined networking (sdn).
anomaly detectors
network monitoring
characterization
requirement modelling
data-driven requirement engineering
mobile application development
non-functional requirements
metamodeling.
enterprise risk management
security management
enterprise architecture
enterprise
websites.
teaching
learning
arabic language
monitoring student attendance
rfid
context awareness
recommendation system
change detection
concept drift
anti-detection
psnr
eight neighbour pixels
minimal distortion
information hiding
secure digital (sd) card.
graphically liquid crystal display (glcd)
wireless fidelity (wi-fi)
advanced risk machine microcontroller (arm) cortex
thick film transistor (tft)
retailing
rfm model
adoption.
factors
riyadh
saudi arabia
education
artificial neural networks (ann).
mfcc
plp
speech recognition
agile methods
nearshoring
distributed agile
agile distributed software development
aspects
crosscutting concerns
bip components
behavior-interaction-priority model
modularization
aspect orientation
aspect-oriented programming
experimental analysis.
answer analysis
automated scoring
multiple choice questions
learning skills.
reading skills
integrated environment
children literature
substitution of the least significant bits.
information encryption
steganographic scheme
aspect-based scoring
fuzzy controller
sending rate
link utilization
tfmcc
cheating detection
computer activities
remote access
lan
monitor restricted files or documents
impose penalties to machine
security awareness
security indicators
simulated training
computer security
finite storage and finite server
finite source
grade of service
loss system
it – project management.
communication processes
organizational management
geographic information system (gis)
information system (is)
return on investment (roi).
open source technology
open source software (oss)
mysql
apache internet information server (iis)
information and communication technology(ict)
inversion
substituend
bounded sequences
listing permutation
listing binary
parallel algorithms
open network operating system.
network topologies
software-defined networks
procedural justice.
legal technology
legal service online bangaldesh
search lawyer online
hire lawyer online
online legal serivce
power-delay product (pdp)
power consumption
flip-flop
dual edge-triggered (det)
single edge-triggered (set)
mobility aid systems
physically disabled people
kinect camera
fall detection
collaboration.
competitive advantage
transformer industry
japan
global
luoyang
china
urban tourism
tourist
organizational change.
organizational identity
operation innovation
taiwan's culture and education business
narrative approach
competitive strategies
operational strategies
japanese service industry
cboe
tfe
txo
taiex option return
jumping risk
activity-based classification
forecast
improvement of inventory control
performance indicators
student success
arduino.
android
plc control
tweet sentiment analysis
text blob
lstm
support vector machines
text analysis
& question answering
mobiles
search for answers
question answering
task scheduling.
task execution
resource pricing
resource management
maximal cliques
evolutionary centrality
mobile networks
network science
centrality
data conversion
power quality
java enterprise application
web-based solution
genemania
rma
alzheimer’s disease
dementia
gene-gene interaction
domain name frequency analysis & malicious dns
malicious domain names
dga
domain generated algorithm
energy-efficiency
dynamic estimation
context-aware system
mobile cloud computing
mobile cloud offloading
recognition system.
bayesian networks
curvelets
speech signals
sales prediction.
data mining performance
gradient boosted trees
neural network
rapidminer
fuzzy theory
decision making trial and evaluation laboratory
multiple regression analysis
importance-performance analysis
interviews
evaluation
dyslexia
automatic detection
zipf distribution
video popularity
hit ratio
cache update
iso25010.
metrics
software design
feature extraction (fe).
convolutional neural network (cnn)
recognition
iris
biometrics
assistive technologies and pwm.
android phone
microcontroller
wheelchair
k-nearest neighbour.
feed forward artificial neural networks
binary particle swarm optimization
dbscan
k-means
silhouette score value
healthcare data
dataset
prisoner’s dilemma.
segregation
predict topic from tweet
short text analyse
topic of tweet
social media interest generator
topic generation
tweet analyse
perceived effectiveness of ols
cultural dimensions
online learning systems (ols)
the duality feature
reduction
np complete problems
np problems
p problems
rbc.
giemsa blood sample
watershed segmentation
hsv segmentation
malaria
pattern recognition.
relationship extraction
gene ontology
inverted list
information sharing
social network services
software architecture
peer-to-peer computing
world wide web
social computing
rf.
disease prediction
clinical decision support system
hyper-threading.
amd phenom
intel core i7
multi-core processors
single-core processor
excess.
preflow
extended mixed network
maximum flow
wireless multimedia sensor networks
multipath routing protocol
network load balancing
flooding attack prevention
multi-path routing
s3
ec2
homomorphic token
cloud storage security
rule classification
mobile computing
transcript
permutation.
bernoulli mapping
algorithm of image encryption
satisfiability
smt solver
mignotte’s sequence
data security
throughput.
jitter
tcp new reno
tcp vegas
tcp sack
manet
construction project
progress monitoring
high resolution remote sensing image
hog feature
network object recognition
survey
systematic mapping study
smart contracts
user experience
obesity
mobile application
mean square error (mse).
method of moments (mom) algorithm
maximum likelihood estimation (mle) algorithm
cuckoo search optimization (cso) algorithm
direct search.
annealing
simulated
mutation
crossover
inbounded
logistic
hex-cell.
interconnection network
matrix multiplication
genetic interactive authentication 1
fuzzy system
secure routing
false vote injection attack
false report injection attack
word spotting
codebook
bag of visual words
word image segmentation
curvature feature
corner keypoints
point cloud library (pcl).
rgb-d camera
kinect v2.0 sensor
automated scanning system
iterative closest process
3d body scanning
wireless.
monitoring and control
interface circuit
agriculture
job education
classroom technology
it
public health
stability measures.
selection stability
feature selection algorithms
prediction
student performance
integrated system
optimized/reduced run length coding.
compaction using sparse
entropy coding
jpeg image compression
ecdsa
ecc
vanet
vehicle chatting
interest privacy
finding like-minded vehicle
base point
quality improvement
ci environment
development risk
iid
continuous integration
conceptual graph
concept map.
users’ satisfaction
mobile payment
materialized view
relational database management system (rdms)
master data vault
data warehouse (dw)
business data vault
data vault (dv)
enterprise data warehouse (edw)
schema evolution
data mart
master data management (mdm)
nosql.
metadata repository
data warehouse evolution
coffee beans
landscape coffee shops
analytic hierarchy process
false report injection attack.
network simulation
dynamic en-route filtering
rural community
wireless fidelity(wifi)
network architecture.
internet
wifi-based rural extension
data-driven scientific research.
map reduce
cyber infrastructure-as-a-service
usability problems
usability evaluation
academic portals.
multiple independent runs
parallelization
cpu.
evolutionary algorithms
gpu
video encoding
content adaptation
dsis
h.265
cloud gaming
video streaming
memory latency reduction and tolerance
processing in/near memory
memory-centric computing
animated assembly design
marker-based camera tracking
data compression
arabic text categorisation
cocomo
mmre
evolutionary computing
ssl.
security risks
e-payment
set
zero-width character.
arabic text
pointed characters
kashida
greedy route
dynamic routing
cluster head
cluster-based routing
transformation characteristics
molfpp
molfp
gödel
four-valued logic
hilbert’s program
incompleteness theorem
fractal
nist test suite
scrambling
chaotic function
grammar based data compression
adaptive automata
agro-ecological situation
ipm
decision-making
field scouting
air ticket sales
3c’s
m&g
7v’s
hsv
texture
image recapture detection
blurriness & cs-lbp
far
fingerprint recognition
fmr
ann
afis
localization technique.
iterative trilateration
dynamic fluctuation
smoothing algorithm
environmental factor
rssi (received signal strength indication)
nsga- ii algorithm
qualitative scenarios prioritizing
enterprise architecture evaluation
interoperability – hl7 fhir – hce - archetypes
risk matrix
software project risk assessment
efficiency.
decryption
speedup
digital image
encryption
pattern growth
utility mining
closed+ high-utility itemsets
dsm
mde
emf/ gmf
atl transformation
graphicaleditor&eclipse sirius framework
brms
model-driven software development (mdsd)
xtext
domain-specific language (dsl)
amazigh
pos tagging
crf
information security architecture's criteria
enterprise information security architecture (eisa
abstractive summarization
extractive summarization
text summarization
bee colony algorithm
harmony search algorithm
message passing interface
parallel programming
learnability
application software
discoverability
principles
gene
adaptive watermarking
speech processing
biometric
sms technology
mobile-government
electronic-government
time quantum
round robin
process scheduling
statistics
networking site
mobile social media
chatting
original text
friendship graph
friendship matrix
textual pl
triplets
candidate text
risk management & information security
configuration process
development context.
adaptive meta-model
guidance process
knowledge management (km)
riau province.
smart pls
staffs motivational
knowledge transfer behaviour (ktb)
pavelka-style completeness
fuzzy logic in narrow sense
first-order logic
hedge connective
usability testing
mobile devices.
human computer interaction (hci)
mobile applications
cognitive disability
intelligent university information system
library information system
adaptive e-learning system.
systolic grids.
reversibility
field emission
carbon nanotubes and nanotips
stock trends
intelligent transportation system
service innovation
ict enabled
dct clahe
ar
clahe etc.
2d dct
recognition rate
facerecognition
parallel algorithm
migration period
global optimization
architecture.
development
maintenance
oriented
erlang c
erlang b
computer simulation
banking regulation
queueing theory
banking system
economical informatics
basel.
data centre
educational management
item competence
semi-supervised
relation extraction
arabic language & web mining.
pattern extraction
matching under preference.
bipartite matching
stable marriage problem with ties and incomplete l
socially stable matching
two sided matching
the stable marriage problem
leader-member exchange (lmx)
translation protocol
factor analysis
validity
psychometric
leader-follower
tumor
k-means and binarization.
thresholding
mr image
fcm
gaussian function.
parameter learning
video categorization
unsupervised clustering
intrusion detection.
misuse detection
accuracy
nsl-kdd data set
smartphones.
malware
remote detection
confidentiality
database security framework
integrity
functional layer and runtime layer.
service oriented cloud_ computing
virtual working space
leap motion
gesture control
software tool
shamel exam
cloud computing.
bau
cloud service provider
multi-core
single-core
tlp
ilp
novabench & linpack.
flop
delay-tolerant network
social network
routing mechanism.
potholes
2d images
morphological image processing
geotagging
one
vanets
dtn
routing protocol
casaw.
vdtn
security event
security testing
tlspm.
event detection
enhancement
minimum filter
maximum filter
noise reduction
non-linear filters.
median filter
crawling
object oriented modeling
agent based information retrieval
unified modeling language
agent architecture
cipher
evolutionary algorithm
symmetric encryption
bionic algorithm
r-tree.
slanting correction
thinning
voronoi diagram
baseline detection
preprocessing
arabic text recognition
page segmentation
cosine similarity
latent dirichlet allocation
latent semantic analysis
form content and page content.
deep web
healthcare
naïve bayes classifier.
k-nearest neighbour
c4.5
academic advisory
predictive and statistical analyses
stochastic approach
nlp
dictionary entry
pos tagger
malayalam.
rule based approach
mse
encryption time
encryption- decryption
decryption time
double random matrix key
spatial data
temporal data
gis.
gazetteers
total order broadcast
reliable broadcast.
validation indices
dimensionality reduction
k-nearest neighbors
global checkpoint number.
checkpointing
formal methods
distributed transaction
local checkpoint number
formal specifications
project
pose estimation
ekf
robot navigation
stereo
multiple cameras
data management.
retrieval.
image recognition
copy-move forgery detection
local fractal dimension & structural similarity in
image forensics
dbms/datawarehouse.
mapreduceframeworks
parallel data processing tools
usage.
social networking sites
perceived social capital
classifier
symmetrical weight
subspace
expression recognition
gabor filter
least significant bit (lsb).
most significant bit (lsb)
cover image
hough transform
lane tracking
advanced driver assistance system
lane detection
lane departure warning
social interaction.
human robot interaction
average precision
information retrieval (ir) systems
sem
rbsm
computer science.
software development
software metrics
pkm
software measurement
software industry
pepe
bibliographic system
web service
computing field.
scientific review articles
accessibility and conversational agent.
electronic government
uci repository
diabetes
free space optics; bit error rate; q-factor; turbu
crystal square
density
feature size
design complexity.
number of transistors
moore’s law
wavelet networks; logistic regression; business fa
document clustering
email mining
clustering algorithm
corrosion control
environmental factors.
decision support system
corrosion
probabilistic modelling
texture features
wavelets
pre-processing
neural network.
instructor perspectives
critical success factor
m-learning
indexes correlation.
fuzzy c means
validity indexes
chatterbots
conversational agents
arabic language and english language.
prerequisite courses
flowchart.
time table
student information system (sis)
testability factors
testability measurement
testability
design phase
development life cycle.
hybrid wavelet transform
discrete kekre transform
home of keys
encryption key
block size.
symmetric
shared secret key
biometric identification
automatic segmentation
pattern recognition
iris recognition
transportation; network design; optimization; part
backup
data recovery
data protection
archive
data loss
html5; cross-platform; empirical study; phonegap;
elms : e-learning modules
hi: hearing impaired
d&p: drill & practice.
influence.
recreational activities
reconstruction
shape component
skeleton subsets
shape representation.
structuring element
usability characteristics
open source software usability
usability fuzzy model
and open source software usability model.
phlegmatic andmelancholic.
sanguine
choleric
temperament
intelligent tutoring systems
early intervention program
desire
first-order predicate logic.
bdi (belief
multi-agent system
information management system (ims)
intention) agent model
architectural design
nvidia fermi
ati radeon.
gpus
power
metaheuristcis
model predictive control
multiobjective optimization
flow reassembly
pipeline
traffic classification system
chaotic stream ciphers
digitally implemented bernoulli’s map
nist testes
fpga implementation.
techniques of interaction.
scientific visualization
virtual environments
matching
statistical trial for comparison
stagnography
least significant bit
text categorization
arabic text classification
lithography
poly silicon
resist
etching
transistor & wafer.
mirrors
advanced encryption standard aes
pipelining
dimension reduction
mammographic images.
there are subsets of genes that have similar behav
also called microarray data.
but behave independently under other subsets of co
it is of utmost importance to make a simultaneous
so we say that they coexpress
we make a new survey on clustering and biclusterin
heuristic algorithms are typically used to approxi
service-oriented architecture
variability modeling
customization modeling.
saas
soaml
project actuality
actuality of projects
systematic review.
systematic literature review; agile governance; in
segmentation enhancement
active contour
topological alignments.
cell tracking
flbra
rssi
rbf
routing.
text compression
lzw.
arabic texts
bwt
sas jmp software
knowledge discovery in database (kdd)
regression
classification algorithms
educational data mining
bayesian classification
circulant matrix
digital image watermarking
positive semi-definite matrix.
software project management; systematic literature
structural complexity
hardware complexity
density.
microprocessor design
transistor count
complexity
coverage
wireless mobile communications.
mobility model
services
services composition model (scm).
architectural pattern
services composition
multimedia education
emotional control.
rational emotive behavior therapy (rebt)
process capability
man-machine interface.
remote monitoring
real-time evaluation
traffic management.
vector sum.
pattern matching
likeness functions
image analysis
multilingual searching
language independent searching
qr factorization
vector space model.
unicode
performance criteria
performance appraisal
fuzz logic controller
employee evaluation
rating.
booking system
medical appointment
healthcare system.
nhis
emulation
design verification
scan-chain
sce-mi
fpga.
soc
computer vision
target tracking
moving edges
particle filter
robustness
learning outcome
remedial teaching
experimental research.
electronic textbook
health systems. etl
taxonomy
databases.
disease outbreak notification system
learning styles
deducing approaches
adaptive educational hypermedia systems.
quadraticdiscriminant analysis (qda)
linear discriminant analysis (lda)
mean square error (mse)
cross validation (cv)
relative error (re) and mean absolute percentage e
support vector machine (svm)
activity monitoring and analysis
avatars
virtual environment
lms integrated learning path
performance evaluation
wind turbine
distributed generation
performance analysis
asynchronous machine
distribution system.
gpgpu
centrality ranking
complex networks
cuda.
fatigue
drowsiness
automatic buzzer system.
heart rate detection
streaming and advanced vector extensions
data-parallel computations
vector instructions
matrix transpose
symmetric cipher model
virtualized resources
cloud services.
virtual machines
ptg.
workflow
dag
task scheduling
encryption.
ethernet
bandwidth
duresadducee
users’ acceptance
cashless economy
time distance
keystroke
predefined structure
dynamics
change management
software version control
scientific application
sanitization
sensitive transaction
restrictive patterns
cover
privacy preservation
personal networks
resource scheduling.
critical success factors (csf)
business intelligence (bi)
health and treatment sector
hasheminejad hospital.
business failure prediction; survival analysis; co
case-based explanation
decision support
artificial intelligence
case-based reasoning
mapping
network on chip
system on chip
3d architecture
cold start
recommender system
sparisty scalability
demographic filtering
cloud os
cloud kernel
web os
artificial intelligence and applications (ijscai)
2014 final manuscript due : june 15
2014 acceptance notification : june 10
international journal on soft computing
2014 publication date : determined b
citizen-centric e-government services delivery
grounded theory
jordan.
structural equation modeling
flowchart ; multimedia retrieval ; figures similar
employability
vocational education
dea services.
ham
spam
communications
emails
naïve bayes
information security risk analysis; quantitative r
virtual learning environment. agent migration.
distributed multi-agent system
information security
application mediation
bpm
esb
order fulfillment
filtering
precision agriculture
papaya
cbrp
manets
partialand whole regions
spatial reasoning
composition
cardinal directions
sports promotion strategy
national health care
3c theory
game theory
joint procurement
multi-agent
linear-time algorithm
grundy number
coloring of a graph.
password
internet sites
username.
e-mail
decision making
view cafés
dna-based computing
the set-partition problem
the np-hard problems.
the np-complete problems
user interface
image processing.
gesture recognition
ycbcr color model
migration
replication
wide-area network
vehicle license plate detection
multiscale sliding window
brazilian license plate.
histogram of oriented gradients
collaborative platforms.
social network analysis
team's communication evaluation
virtual teams
stock market analysis
continuous text queries
sliding window
mapreduce technique
fuzzy logic.
analog-to-digital converters (adcs)
discrete wavelet transforms (dwt)
effective number of bits (enob).
society
community
culture
humanism
art
humanistic
machine
learning management system
privaxy
virtual learning environment system
security mlearning
configuration
variability.
feature modeling
software product line design methodology
mixing class and feature concepts
class modeling
data in motion
decision support systems
data leak prevention
icap
adaptive genetic algorithm
language model
extended boolean model.
vector space model
diagnosis
coronary artery diseases
medical
experts system
monitoring
control
fundus images
mathematical morphology
microaneurysms
hemorrhages
radio modem &router
network protocol.
remote wireless communications
narrowband rf networks
round-trip time
data clustering
meta heuristics.
multiobjective evolutionary algorithms
multi-objective optimization problems
dependable
algorithms and bioinformatics
reliable and autonomic computing
computer architecture and real time systems
perceptual encryption and psnr
video encryption
infrared based detecting system
near to head area
vibro-tactile or sound
lower central periocular region and ocular biometr
periocular region
ambulance gps tracking system
human life
proximity sensors
ambulance
ambulance position
trigger
stock market
euro currency fluctuation
knowledge discovery in databases
prisoner’s dilemma
non-random pairing
static backpropagation (bp)
recurrent neural networks
system identification
effects of ict in education
integration of ict
developing country education
ict in education
division algorithm
fast bcd division
vedic division algorithm.
test
test flow
bisr
multi-memory
cellular automata
boundary conditions
diehard
linear feedback shift registers
timetabling. tabu search. diversification .graph .
temporal analysis
gesture analysis
systematic literature review
decision tree learning
access control
feistal algorithm
algebra
formal techniques.
lgspn
web services composition
biomedical text
acronym
f-factor
medline
stopwatch petri nets
time constraints
abs
feared scenarios
mechatronic systems
image denoising; orthonormal wavelet transform; wa
software quality. software as a service. quality m
lte.
handover
henb
henb policy function
macrocell
femtocell
cloud security threats and countermeasures
cloud service models
earliest due date
time duration
shortest processing time rule
heuristic technique
total elapsed time
time deviation
job sequencing
schedule
preemptive
sequencing rules
non-preemptive
coronary artery tree
angiography.
business intelligence.
multi-state modelling
gis-like frameworks
hyper-space modelling
evolutionary agents
bayesian network
elder people
barrier free
decomposition trees
fuzzy based rule model
transitive closure relation
java patterns
software reliability.
software classification
object oriented principles
integer factorization
brent’s implementation
pollard’s rho
discrete log problem
monte-carlo algorithm
shadow detection
intensity image
adaptive histogram equalization
tricolor attenuation model
requirements engineering; organizational semiotics
developing mobile agent model
aglets and intrusion detection
web service discovery and selection; bees algorith
news production
daily news
news consumption
social media news
news dissemination
loss-less image compression & compression ratio
huffman encoder
run length encoding
pixel size reduction
bits per pixel
predictive model
assistments platform dataset.
adaboost
e-business
security policy
security culture
information security awareness program
trojan
automated malware analysis
application analysis
social learning
collaborative tagging systems
multi-agent systems
web server
energy consumption
renewable energy
super-resolution
sparse representation.
optical network
laplace graph
hybrid network
openflow
See more
Presentations
(4)Documents
(483)Tags
cloud computing
big data
data mining
security
machine learning
internet of things
classification
wireless sensor networks
deep learning
blockchain
modeling
algorithm
artificial neural network
information retrieval
feature selection
svm
e-commerce
mapreduce
hadoop
machine learning.
feature extraction
sensors
singular value decomposition
wireless sensor network
software engineering
optimization
segmentation
image processing
covid-19
competitiveness
iot
social media
text mining
load balancing
multithreading
information extraction
usability
watermarking
computer design
parallel processing
fuzzy logic
simulation
technology acceptance model
trust
software quality
graphs
routing
ict
ontology
image encryption
web services
object oriented metrics
genetic algorithm
sustainability
digitalization
chaos cryptosystem.
discrete wavelet transform
medical image
pandemic
covid-19.
data analytics
e-commerce.
3d software
analysis
wavelet transform
business continuity management
vulnerability
exploit
penetration testing
hacking
compromised systems
rtt
blocking probability
smartphone
natural language processing
bluetooth
clustering
secret sharing
hybrid
3d reconstruction
3d printing
sensor
cloud e-learning
higher education
framework.
business intelligence
heuristic
augmented reality
machine learning algorithms.
etl
integration
data warehouse
memory-level parallelism
multicore processor
competitive cache misses
cache memory
hmm
controlled switching
random forest
naive bayes
sentiment analysis
smart city
particle swarm optimization
computer network
database
quality of service
edge detection
congestion control
intelligent agents
social networks
arabic nlp
event-b
management
nosql
adoption
steganography
human computer interaction
query
ranking
jordan
similarity measure
down syndrome
formal verification
performance
virtual reality
project management
managing collaboration.
agribusiness management
serious game
sandpile model
die size
wsn
forecasting
e-learning
cloud security
authentication
mobile devices
grid computing
collaborative filtering
developing countries
soa
service
aodv
dsr
system dynamics
analytical hierarchy process
virtual machine
prediction model
fault tolerance
cmmi
gqm.
measures
database and data mining
evolution
cooperation
social networking
privacy
cryptography
recall
precision
reliability
processing time
image segmentation
face recognition
botnet attack
internet-of-things
1d-cnn
ai-enabled security
feature engineering-less
brain mr
brain tumor
sv
test library
complete cycle testing
regression testing
public cloud
testing as a service (taas)
confiscate
amend
release
issuance
business to business (b2b)
business to government(b2g)
saudi arabiamonetaryagency (sa
electronic letter of guarantee
letter of guarantee (lg)
ddos
dos
cyber-physical system
ehr modeling
hessenberg decomposition
e-health
arnold transform
tokenization
language processing algorithm
instagram
twitter
facebook
kdd
virtual process function
controller placement
software defined network
submodularity
fog architecture
bipartivity
eigenvector
theory vs. programming dispari
correlation coefficient
principal component analysis
spectral analysis
co
asia
e-commerce; pandemic
raspberry
smart road
new computing
4ir technology
intent classification
chatbot
decentralized stor
aud
beehive sound recognition
dat
compression
compact disc
digital divide
smart home
human monitoring
electronic white cane
cloud
security mechanisms
attacks
security requirements
raspberry pi
single-board computers
distributed computing
rumor detection
contextual exploration
misinformation
emission nexus
fd & co2
nardl approach
global warming
co2 emission
digital carbon footprint
the quorum systems
mobile ad hoc networks
mobility
formal specification
he
communication technology
information
student information system
n-modular redundancy
failure free
cloud consumer
employee safety
wfh
c-suite reset
work culture
innovation
surveillance security
prototype
security system
sms notification
smsecurity
iris security
iris patterns
bio-metric traits
quantization
virtual worker.
personal computer
network access server
virtual private network
wearable technology.
garmin forerunner
sports watch
running watch
gps
data analysis
stream processing
fog
edge computing
stereo vision
essential matrix
fundamental matrix
mobile device users’ security behaviour.
avoidance motivation
technology threat avoidance
security behavior
phishing attacks
materials.
static analysis.
nist
sdlc
information systems.
extended reality
immersive technologies
5g
name label switching.
ranking interfaces
ccn
bdp
ndn
justification of recommendation architecture for i
relevance of recommendations
weight of comments
justification of recommendations
iaas
bitcoinheist
bitcoin
ensemble learning
decision tree
ransomware
word-controlled breaker i.
machine-controlled door lock
fire alarm
mobile app
bt
esp 32
tracking attacks
contact tracing
non-interactive zero-knowledge proof
authentication protocol
bluetooth threat
bluetooth low energy
traceability.
transparency
blockchain technology
text mining.
documents analysis
cluster analysis
connected autonomous vehicles.
autonomous vehicles
security & privacy
task allocation
cloak-reduce
distributed processing
virtual tour
web scraping
computer test.
computer-based exams
online education
ecommerce
product sentiment
amazon
data augmentation
object as point
fabric defects detection
driver drowsiness
bluetooth low energy (ble)
vigilance monitoring
electroencephalogram (eeg)
brain computer interface
multilevel
knowledge
technology acceptance
model
mesh topology
partitioning
multicore
network-on-chip
and selective probability
ant colony optimization (aco)
university class scheduling problem (ucsp)
algorithms
visibility determination
computer games
field of vision (fov)
systems maturity
system quality
information quality
drop-ship
customer behavior
fuzziness measure.
shadowed fuzzy numbers
shadowed sets
intuitionistic fuzzy numbers
fuzzy numbers
frustration
emotion intensity
emotion recognition
emotion annotation
neural networks
smart camera
hacker
worms &trojon
virus
mobile network
wireless network
network protocols
3ds max
real time rendering
next generation sequencing.
early disease detection
single nucleotide polymorphism
microarray
multiple sclerosis
5g mobile network
network centralized storage
qr code
railway trackside safety
statistical package for the social sciences (spss)
lichen planopilaris (lpp)
histology
demographics
epidemiologic
clinical features
weighted graph and rb
traffic channel
aggregate offered traffic
mobile application.
smart parking
constraint-based modeling
student model
language tutoring systems
talend
cloudera
hdfs
transitive closure
entity resolution
rsa.
idea
xkms
saml
soap
process mining
knowledge discovery
data processing
requirements elicitation
requirements engineering
learners.
web-based learning
ewom
festival tourism
tourism
festival
multipath
outage probability
nakagami
equal gain combining (egc)
android mini game
multiplayer
mobile game testing
unity
interoperability
erp
nanotips.
lattice networks
carbon nanotubes
3d circuits and systems
deep learning & skin lesion image
u-net
k-means clustering
self-learning annotation scheme
tracking quality
recognition speed
camera calibration
marker creation
artoolkit
recommendation system.
association rules
cluster
intelligent information & database systems
angler phishing
identity theft
out of bag data
overfitting
k cross validation
maximum likelihood estimation
median imputation
random forest algorithm
logistic regression
simulated annealing algorithm.
multi-objective flexible job shop scheduling
object-oriented design
object-oriented manufacturing control
data analysts and data scientists.
analytical query
databases
automatic code generation
matbase
(elementary) mathematical data model
business rules
triggers and rules
data structures and algorithms for data management
integrity checking
non-relational constraints
relational constraints
database constraints theory
data modeling
curvature
polygonal mesh model
crest lines
3d gan
text-toimage synthesis
face manipulation
deepmasterprints
democracy
networks
election system
headgear
brainwave device
important-performance analysis
service performance
core services
home stay
secondary access
rural broadband enhancement
spectrum occupancy
e-shops.
online shopping
light and sound excitation of live creatures
synapse control
decoherence
coloured algebras
quantum biological computing
quantum computing architecture
e – commerce application.
agile
e – commerce
implicit path
time complexity
data structure
dijkstra algorithm
analytics
mobile network.
5g new radio (nr) network
low voltage (l.v.) switchboard
anti-theft system cloud based technology
tracker
emergency notification
real-time crash detection
smart helmet
risk
challenge
virtualization
nsl-kdd
kdd-99 cup
intrusion detection system
scheduling
operating systems
process
thread
task
distribution
data
web technologies
gsm
pir
raspberry-pi
thesis projects
teacher training
teacher education
digital tools
development-oriented
predictive models
ensemble learners
autism screening
fuzzy logic controller
obstacle avoidance
navigation
swarm robot
mobile robot
software-defined networking (sdn).
anomaly detectors
network monitoring
characterization
requirement modelling
data-driven requirement engineering
mobile application development
non-functional requirements
metamodeling.
enterprise risk management
security management
enterprise architecture
enterprise
websites.
teaching
learning
arabic language
monitoring student attendance
rfid
context awareness
recommendation system
change detection
concept drift
anti-detection
psnr
eight neighbour pixels
minimal distortion
information hiding
secure digital (sd) card.
graphically liquid crystal display (glcd)
wireless fidelity (wi-fi)
advanced risk machine microcontroller (arm) cortex
thick film transistor (tft)
retailing
rfm model
adoption.
factors
riyadh
saudi arabia
education
artificial neural networks (ann).
mfcc
plp
speech recognition
agile methods
nearshoring
distributed agile
agile distributed software development
aspects
crosscutting concerns
bip components
behavior-interaction-priority model
modularization
aspect orientation
aspect-oriented programming
experimental analysis.
answer analysis
automated scoring
multiple choice questions
learning skills.
reading skills
integrated environment
children literature
substitution of the least significant bits.
information encryption
steganographic scheme
aspect-based scoring
fuzzy controller
sending rate
link utilization
tfmcc
cheating detection
computer activities
remote access
lan
monitor restricted files or documents
impose penalties to machine
security awareness
security indicators
simulated training
computer security
finite storage and finite server
finite source
grade of service
loss system
it – project management.
communication processes
organizational management
geographic information system (gis)
information system (is)
return on investment (roi).
open source technology
open source software (oss)
mysql
apache internet information server (iis)
information and communication technology(ict)
inversion
substituend
bounded sequences
listing permutation
listing binary
parallel algorithms
open network operating system.
network topologies
software-defined networks
procedural justice.
legal technology
legal service online bangaldesh
search lawyer online
hire lawyer online
online legal serivce
power-delay product (pdp)
power consumption
flip-flop
dual edge-triggered (det)
single edge-triggered (set)
mobility aid systems
physically disabled people
kinect camera
fall detection
collaboration.
competitive advantage
transformer industry
japan
global
luoyang
china
urban tourism
tourist
organizational change.
organizational identity
operation innovation
taiwan's culture and education business
narrative approach
competitive strategies
operational strategies
japanese service industry
cboe
tfe
txo
taiex option return
jumping risk
activity-based classification
forecast
improvement of inventory control
performance indicators
student success
arduino.
android
plc control
tweet sentiment analysis
text blob
lstm
support vector machines
text analysis
& question answering
mobiles
search for answers
question answering
task scheduling.
task execution
resource pricing
resource management
maximal cliques
evolutionary centrality
mobile networks
network science
centrality
data conversion
power quality
java enterprise application
web-based solution
genemania
rma
alzheimer’s disease
dementia
gene-gene interaction
domain name frequency analysis & malicious dns
malicious domain names
dga
domain generated algorithm
energy-efficiency
dynamic estimation
context-aware system
mobile cloud computing
mobile cloud offloading
recognition system.
bayesian networks
curvelets
speech signals
sales prediction.
data mining performance
gradient boosted trees
neural network
rapidminer
fuzzy theory
decision making trial and evaluation laboratory
multiple regression analysis
importance-performance analysis
interviews
evaluation
dyslexia
automatic detection
zipf distribution
video popularity
hit ratio
cache update
iso25010.
metrics
software design
feature extraction (fe).
convolutional neural network (cnn)
recognition
iris
biometrics
assistive technologies and pwm.
android phone
microcontroller
wheelchair
k-nearest neighbour.
feed forward artificial neural networks
binary particle swarm optimization
dbscan
k-means
silhouette score value
healthcare data
dataset
prisoner’s dilemma.
segregation
predict topic from tweet
short text analyse
topic of tweet
social media interest generator
topic generation
tweet analyse
perceived effectiveness of ols
cultural dimensions
online learning systems (ols)
the duality feature
reduction
np complete problems
np problems
p problems
rbc.
giemsa blood sample
watershed segmentation
hsv segmentation
malaria
pattern recognition.
relationship extraction
gene ontology
inverted list
information sharing
social network services
software architecture
peer-to-peer computing
world wide web
social computing
rf.
disease prediction
clinical decision support system
hyper-threading.
amd phenom
intel core i7
multi-core processors
single-core processor
excess.
preflow
extended mixed network
maximum flow
wireless multimedia sensor networks
multipath routing protocol
network load balancing
flooding attack prevention
multi-path routing
s3
ec2
homomorphic token
cloud storage security
rule classification
mobile computing
transcript
permutation.
bernoulli mapping
algorithm of image encryption
satisfiability
smt solver
mignotte’s sequence
data security
throughput.
jitter
tcp new reno
tcp vegas
tcp sack
manet
construction project
progress monitoring
high resolution remote sensing image
hog feature
network object recognition
survey
systematic mapping study
smart contracts
user experience
obesity
mobile application
mean square error (mse).
method of moments (mom) algorithm
maximum likelihood estimation (mle) algorithm
cuckoo search optimization (cso) algorithm
direct search.
annealing
simulated
mutation
crossover
inbounded
logistic
hex-cell.
interconnection network
matrix multiplication
genetic interactive authentication 1
fuzzy system
secure routing
false vote injection attack
false report injection attack
word spotting
codebook
bag of visual words
word image segmentation
curvature feature
corner keypoints
point cloud library (pcl).
rgb-d camera
kinect v2.0 sensor
automated scanning system
iterative closest process
3d body scanning
wireless.
monitoring and control
interface circuit
agriculture
job education
classroom technology
it
public health
stability measures.
selection stability
feature selection algorithms
prediction
student performance
integrated system
optimized/reduced run length coding.
compaction using sparse
entropy coding
jpeg image compression
ecdsa
ecc
vanet
vehicle chatting
interest privacy
finding like-minded vehicle
base point
quality improvement
ci environment
development risk
iid
continuous integration
conceptual graph
concept map.
users’ satisfaction
mobile payment
materialized view
relational database management system (rdms)
master data vault
data warehouse (dw)
business data vault
data vault (dv)
enterprise data warehouse (edw)
schema evolution
data mart
master data management (mdm)
nosql.
metadata repository
data warehouse evolution
coffee beans
landscape coffee shops
analytic hierarchy process
false report injection attack.
network simulation
dynamic en-route filtering
rural community
wireless fidelity(wifi)
network architecture.
internet
wifi-based rural extension
data-driven scientific research.
map reduce
cyber infrastructure-as-a-service
usability problems
usability evaluation
academic portals.
multiple independent runs
parallelization
cpu.
evolutionary algorithms
gpu
video encoding
content adaptation
dsis
h.265
cloud gaming
video streaming
memory latency reduction and tolerance
processing in/near memory
memory-centric computing
animated assembly design
marker-based camera tracking
data compression
arabic text categorisation
cocomo
mmre
evolutionary computing
ssl.
security risks
e-payment
set
zero-width character.
arabic text
pointed characters
kashida
greedy route
dynamic routing
cluster head
cluster-based routing
transformation characteristics
molfpp
molfp
gödel
four-valued logic
hilbert’s program
incompleteness theorem
fractal
nist test suite
scrambling
chaotic function
grammar based data compression
adaptive automata
agro-ecological situation
ipm
decision-making
field scouting
air ticket sales
3c’s
m&g
7v’s
hsv
texture
image recapture detection
blurriness & cs-lbp
far
fingerprint recognition
fmr
ann
afis
localization technique.
iterative trilateration
dynamic fluctuation
smoothing algorithm
environmental factor
rssi (received signal strength indication)
nsga- ii algorithm
qualitative scenarios prioritizing
enterprise architecture evaluation
interoperability – hl7 fhir – hce - archetypes
risk matrix
software project risk assessment
efficiency.
decryption
speedup
digital image
encryption
pattern growth
utility mining
closed+ high-utility itemsets
dsm
mde
emf/ gmf
atl transformation
graphicaleditor&eclipse sirius framework
brms
model-driven software development (mdsd)
xtext
domain-specific language (dsl)
amazigh
pos tagging
crf
information security architecture's criteria
enterprise information security architecture (eisa
abstractive summarization
extractive summarization
text summarization
bee colony algorithm
harmony search algorithm
message passing interface
parallel programming
learnability
application software
discoverability
principles
gene
adaptive watermarking
speech processing
biometric
sms technology
mobile-government
electronic-government
time quantum
round robin
process scheduling
statistics
networking site
mobile social media
chatting
original text
friendship graph
friendship matrix
textual pl
triplets
candidate text
risk management & information security
configuration process
development context.
adaptive meta-model
guidance process
knowledge management (km)
riau province.
smart pls
staffs motivational
knowledge transfer behaviour (ktb)
pavelka-style completeness
fuzzy logic in narrow sense
first-order logic
hedge connective
usability testing
mobile devices.
human computer interaction (hci)
mobile applications
cognitive disability
intelligent university information system
library information system
adaptive e-learning system.
systolic grids.
reversibility
field emission
carbon nanotubes and nanotips
stock trends
intelligent transportation system
service innovation
ict enabled
dct clahe
ar
clahe etc.
2d dct
recognition rate
facerecognition
parallel algorithm
migration period
global optimization
architecture.
development
maintenance
oriented
erlang c
erlang b
computer simulation
banking regulation
queueing theory
banking system
economical informatics
basel.
data centre
educational management
item competence
semi-supervised
relation extraction
arabic language & web mining.
pattern extraction
matching under preference.
bipartite matching
stable marriage problem with ties and incomplete l
socially stable matching
two sided matching
the stable marriage problem
leader-member exchange (lmx)
translation protocol
factor analysis
validity
psychometric
leader-follower
tumor
k-means and binarization.
thresholding
mr image
fcm
gaussian function.
parameter learning
video categorization
unsupervised clustering
intrusion detection.
misuse detection
accuracy
nsl-kdd data set
smartphones.
malware
remote detection
confidentiality
database security framework
integrity
functional layer and runtime layer.
service oriented cloud_ computing
virtual working space
leap motion
gesture control
software tool
shamel exam
cloud computing.
bau
cloud service provider
multi-core
single-core
tlp
ilp
novabench & linpack.
flop
delay-tolerant network
social network
routing mechanism.
potholes
2d images
morphological image processing
geotagging
one
vanets
dtn
routing protocol
casaw.
vdtn
security event
security testing
tlspm.
event detection
enhancement
minimum filter
maximum filter
noise reduction
non-linear filters.
median filter
crawling
object oriented modeling
agent based information retrieval
unified modeling language
agent architecture
cipher
evolutionary algorithm
symmetric encryption
bionic algorithm
r-tree.
slanting correction
thinning
voronoi diagram
baseline detection
preprocessing
arabic text recognition
page segmentation
cosine similarity
latent dirichlet allocation
latent semantic analysis
form content and page content.
deep web
healthcare
naïve bayes classifier.
k-nearest neighbour
c4.5
academic advisory
predictive and statistical analyses
stochastic approach
nlp
dictionary entry
pos tagger
malayalam.
rule based approach
mse
encryption time
encryption- decryption
decryption time
double random matrix key
spatial data
temporal data
gis.
gazetteers
total order broadcast
reliable broadcast.
validation indices
dimensionality reduction
k-nearest neighbors
global checkpoint number.
checkpointing
formal methods
distributed transaction
local checkpoint number
formal specifications
project
pose estimation
ekf
robot navigation
stereo
multiple cameras
data management.
retrieval.
image recognition
copy-move forgery detection
local fractal dimension & structural similarity in
image forensics
dbms/datawarehouse.
mapreduceframeworks
parallel data processing tools
usage.
social networking sites
perceived social capital
classifier
symmetrical weight
subspace
expression recognition
gabor filter
least significant bit (lsb).
most significant bit (lsb)
cover image
hough transform
lane tracking
advanced driver assistance system
lane detection
lane departure warning
social interaction.
human robot interaction
average precision
information retrieval (ir) systems
sem
rbsm
computer science.
software development
software metrics
pkm
software measurement
software industry
pepe
bibliographic system
web service
computing field.
scientific review articles
accessibility and conversational agent.
electronic government
uci repository
diabetes
free space optics; bit error rate; q-factor; turbu
crystal square
density
feature size
design complexity.
number of transistors
moore’s law
wavelet networks; logistic regression; business fa
document clustering
email mining
clustering algorithm
corrosion control
environmental factors.
decision support system
corrosion
probabilistic modelling
texture features
wavelets
pre-processing
neural network.
instructor perspectives
critical success factor
m-learning
indexes correlation.
fuzzy c means
validity indexes
chatterbots
conversational agents
arabic language and english language.
prerequisite courses
flowchart.
time table
student information system (sis)
testability factors
testability measurement
testability
design phase
development life cycle.
hybrid wavelet transform
discrete kekre transform
home of keys
encryption key
block size.
symmetric
shared secret key
biometric identification
automatic segmentation
pattern recognition
iris recognition
transportation; network design; optimization; part
backup
data recovery
data protection
archive
data loss
html5; cross-platform; empirical study; phonegap;
elms : e-learning modules
hi: hearing impaired
d&p: drill & practice.
influence.
recreational activities
reconstruction
shape component
skeleton subsets
shape representation.
structuring element
usability characteristics
open source software usability
usability fuzzy model
and open source software usability model.
phlegmatic andmelancholic.
sanguine
choleric
temperament
intelligent tutoring systems
early intervention program
desire
first-order predicate logic.
bdi (belief
multi-agent system
information management system (ims)
intention) agent model
architectural design
nvidia fermi
ati radeon.
gpus
power
metaheuristcis
model predictive control
multiobjective optimization
flow reassembly
pipeline
traffic classification system
chaotic stream ciphers
digitally implemented bernoulli’s map
nist testes
fpga implementation.
techniques of interaction.
scientific visualization
virtual environments
matching
statistical trial for comparison
stagnography
least significant bit
text categorization
arabic text classification
lithography
poly silicon
resist
etching
transistor & wafer.
mirrors
advanced encryption standard aes
pipelining
dimension reduction
mammographic images.
there are subsets of genes that have similar behav
also called microarray data.
but behave independently under other subsets of co
it is of utmost importance to make a simultaneous
so we say that they coexpress
we make a new survey on clustering and biclusterin
heuristic algorithms are typically used to approxi
service-oriented architecture
variability modeling
customization modeling.
saas
soaml
project actuality
actuality of projects
systematic review.
systematic literature review; agile governance; in
segmentation enhancement
active contour
topological alignments.
cell tracking
flbra
rssi
rbf
routing.
text compression
lzw.
arabic texts
bwt
sas jmp software
knowledge discovery in database (kdd)
regression
classification algorithms
educational data mining
bayesian classification
circulant matrix
digital image watermarking
positive semi-definite matrix.
software project management; systematic literature
structural complexity
hardware complexity
density.
microprocessor design
transistor count
complexity
coverage
wireless mobile communications.
mobility model
services
services composition model (scm).
architectural pattern
services composition
multimedia education
emotional control.
rational emotive behavior therapy (rebt)
process capability
man-machine interface.
remote monitoring
real-time evaluation
traffic management.
vector sum.
pattern matching
likeness functions
image analysis
multilingual searching
language independent searching
qr factorization
vector space model.
unicode
performance criteria
performance appraisal
fuzz logic controller
employee evaluation
rating.
booking system
medical appointment
healthcare system.
nhis
emulation
design verification
scan-chain
sce-mi
fpga.
soc
computer vision
target tracking
moving edges
particle filter
robustness
learning outcome
remedial teaching
experimental research.
electronic textbook
health systems. etl
taxonomy
databases.
disease outbreak notification system
learning styles
deducing approaches
adaptive educational hypermedia systems.
quadraticdiscriminant analysis (qda)
linear discriminant analysis (lda)
mean square error (mse)
cross validation (cv)
relative error (re) and mean absolute percentage e
support vector machine (svm)
activity monitoring and analysis
avatars
virtual environment
lms integrated learning path
performance evaluation
wind turbine
distributed generation
performance analysis
asynchronous machine
distribution system.
gpgpu
centrality ranking
complex networks
cuda.
fatigue
drowsiness
automatic buzzer system.
heart rate detection
streaming and advanced vector extensions
data-parallel computations
vector instructions
matrix transpose
symmetric cipher model
virtualized resources
cloud services.
virtual machines
ptg.
workflow
dag
task scheduling
encryption.
ethernet
bandwidth
duresadducee
users’ acceptance
cashless economy
time distance
keystroke
predefined structure
dynamics
change management
software version control
scientific application
sanitization
sensitive transaction
restrictive patterns
cover
privacy preservation
personal networks
resource scheduling.
critical success factors (csf)
business intelligence (bi)
health and treatment sector
hasheminejad hospital.
business failure prediction; survival analysis; co
case-based explanation
decision support
artificial intelligence
case-based reasoning
mapping
network on chip
system on chip
3d architecture
cold start
recommender system
sparisty scalability
demographic filtering
cloud os
cloud kernel
web os
artificial intelligence and applications (ijscai)
2014 final manuscript due : june 15
2014 acceptance notification : june 10
international journal on soft computing
2014 publication date : determined b
citizen-centric e-government services delivery
grounded theory
jordan.
structural equation modeling
flowchart ; multimedia retrieval ; figures similar
employability
vocational education
dea services.
ham
spam
communications
emails
naïve bayes
information security risk analysis; quantitative r
virtual learning environment. agent migration.
distributed multi-agent system
information security
application mediation
bpm
esb
order fulfillment
filtering
precision agriculture
papaya
cbrp
manets
partialand whole regions
spatial reasoning
composition
cardinal directions
sports promotion strategy
national health care
3c theory
game theory
joint procurement
multi-agent
linear-time algorithm
grundy number
coloring of a graph.
password
internet sites
username.
e-mail
decision making
view cafés
dna-based computing
the set-partition problem
the np-hard problems.
the np-complete problems
user interface
image processing.
gesture recognition
ycbcr color model
migration
replication
wide-area network
vehicle license plate detection
multiscale sliding window
brazilian license plate.
histogram of oriented gradients
collaborative platforms.
social network analysis
team's communication evaluation
virtual teams
stock market analysis
continuous text queries
sliding window
mapreduce technique
fuzzy logic.
analog-to-digital converters (adcs)
discrete wavelet transforms (dwt)
effective number of bits (enob).
society
community
culture
humanism
art
humanistic
machine
learning management system
privaxy
virtual learning environment system
security mlearning
configuration
variability.
feature modeling
software product line design methodology
mixing class and feature concepts
class modeling
data in motion
decision support systems
data leak prevention
icap
adaptive genetic algorithm
language model
extended boolean model.
vector space model
diagnosis
coronary artery diseases
medical
experts system
monitoring
control
fundus images
mathematical morphology
microaneurysms
hemorrhages
radio modem &router
network protocol.
remote wireless communications
narrowband rf networks
round-trip time
data clustering
meta heuristics.
multiobjective evolutionary algorithms
multi-objective optimization problems
dependable
algorithms and bioinformatics
reliable and autonomic computing
computer architecture and real time systems
perceptual encryption and psnr
video encryption
infrared based detecting system
near to head area
vibro-tactile or sound
lower central periocular region and ocular biometr
periocular region
ambulance gps tracking system
human life
proximity sensors
ambulance
ambulance position
trigger
stock market
euro currency fluctuation
knowledge discovery in databases
prisoner’s dilemma
non-random pairing
static backpropagation (bp)
recurrent neural networks
system identification
effects of ict in education
integration of ict
developing country education
ict in education
division algorithm
fast bcd division
vedic division algorithm.
test
test flow
bisr
multi-memory
cellular automata
boundary conditions
diehard
linear feedback shift registers
timetabling. tabu search. diversification .graph .
temporal analysis
gesture analysis
systematic literature review
decision tree learning
access control
feistal algorithm
algebra
formal techniques.
lgspn
web services composition
biomedical text
acronym
f-factor
medline
stopwatch petri nets
time constraints
abs
feared scenarios
mechatronic systems
image denoising; orthonormal wavelet transform; wa
software quality. software as a service. quality m
lte.
handover
henb
henb policy function
macrocell
femtocell
cloud security threats and countermeasures
cloud service models
earliest due date
time duration
shortest processing time rule
heuristic technique
total elapsed time
time deviation
job sequencing
schedule
preemptive
sequencing rules
non-preemptive
coronary artery tree
angiography.
business intelligence.
multi-state modelling
gis-like frameworks
hyper-space modelling
evolutionary agents
bayesian network
elder people
barrier free
decomposition trees
fuzzy based rule model
transitive closure relation
java patterns
software reliability.
software classification
object oriented principles
integer factorization
brent’s implementation
pollard’s rho
discrete log problem
monte-carlo algorithm
shadow detection
intensity image
adaptive histogram equalization
tricolor attenuation model
requirements engineering; organizational semiotics
developing mobile agent model
aglets and intrusion detection
web service discovery and selection; bees algorith
news production
daily news
news consumption
social media news
news dissemination
loss-less image compression & compression ratio
huffman encoder
run length encoding
pixel size reduction
bits per pixel
predictive model
assistments platform dataset.
adaboost
e-business
security policy
security culture
information security awareness program
trojan
automated malware analysis
application analysis
social learning
collaborative tagging systems
multi-agent systems
web server
energy consumption
renewable energy
super-resolution
sparse representation.
optical network
laplace graph
hybrid network
openflow
See more