Personal Information
Occupation
Computer science & Technology(IJFCST)
Industry
Technology / Software / Internet
Tags
algorithms
cryptography
cloud computing
computer science
artificial intelligence
database theory
novel data structures
● algorithms ● automata and formal languages ● nov
graphics and visualization ● other emerging applic
queuing methods
programming languages
computational complexity
software engineering
information technology
combinatorial games
computational number theory
data mining
genetic algorithm
computer security
quality of service
big data
natural language processing
cocomo
foundation of computer
automata and formal languages
clustering
graph
probabilistic methods
fuzzy relation
biochemistry
astrophysics
pareto frontier
wireless networks
component
linear optimization
energy consumption
mobility
field-effect transistor
wireless internet
network security
• algorithms
management system
computation biology
crowd management
technology
hajj
congestion
image classification
geography markup language
• cryptography
face recognition
biometric
automata
formal languages
database
pattern recognition and ld-bgp.
text based local descriptor
saudi arabia market
adaptive development process
• novel data structures
manets node
endoscopy capsule
artificial neural network.
fuzzy relational inequality
element sram
traffic splitting
fuzzy mixed metric
label switched path
traffic regulator.
test case prioritization
ant colony optimization.
regression testing
data bases
architecture
software cost estimation
security
knowledge discovery
sentiment analysis
aodv
fuzzy logic
optimization
wireless sensor networks
vanet
performance
networks & data communications
"computer networks
paper submission
design & communication"
mobile networks
next generation
networks & communications
word prediction
deleted interpolation
corpus
reviews
opinion mining
anaphora
stochastic model
n-gram
metaheuristics
gazetteer method
heuristics
live security competition
social network
cyber space
capture the flag
cyber security education
bilateral filter
machine learning
training accuracy
test accuracy
heart disease.
cbir
contourlet
semi - active replication protocol
geographic information system.
relational databases (rdb)
rdb to rdf mapping
semantic web
classification
feature extraction
business model
software architecture
requirements engineering
multi protocol label switching
routing
historic perspective.
visual cryptography (vc)
security goals
security issues
cloudsim
virtual machine (vm)
scheduling management
scheduling algorithms
circuits xor
optimal trajectory.
linear stochastic dynamic systems
optimal control problem
discourse
genetic algorithms
review
greedy
static variables.
epoch
pearson correlation
movie recommender system
collaborative filtering
context-aware
recommender system
location-based recommender
empirical-o
statistical bound
digital crime
parameterized complexity
optimization problems
bin packing problem
approximation algorithm
approximation ratio
probabilistic diffusion
association rule mining
frequent itemset mining
mapreduce.
digital evidence
link rewiring
cybercrime
network evolution
maximal clique size
poisson distribution
complex networks
random networks
digital crime investigation
small-world networks
one shot queries
continuous queries
mems
query optimization
decision tree
texture
event-driven architecture
edge tenacity
curvelet
e-learning
government schemes
website
agricultural-marketing
market-rate
path finding algorithm
path optimization.
network
client - centric model
distributed systems
consistency
data - centric model
random network graphs
early adopters
simulations.
multi-agent system
association rules
fdn
heterogeneity
intelligent agents
increment model
waterfall model
event query language, mobile systems.
uncertain data
deec
cuckoo optimization algorithm (coa)
event stream
internet of vehicles
ε-constraint
abms
rami al-jamarat ritual
decreasing of dimension of transistors
uwsn applications
multicasting
better fitness
uwsn
robotics
bioinformatics
medical
inflammatory
curvelet transform
architecture styles
eed
digital watermarking
mssim
quality management
bit plane
jellyfish attack
intelligent information & data
cuckoo optimization algorithm
internet & cloud computing
program semantics and logic
graph database
foundations
rdbms
nosql
cnn algorithm
data center
idle resources
migration
digital crime scene
program synthesis
software-as-a-service
harmony search
reliability cost.
software process
nsga-ii
tractable and intractable prob
elitism
framework
wireless sensor network (wsn
software industry
mobile systems
hindi language wordnet.
model and software
s
privacy
mobile agent
secret sharing scheme
vi sual secret sharing scheme (vsss)
biometrics.
no. of solutions
data dissemination
fitness
fuzzy decision making
broadcast storm
pattern recogniti on
parkinson’s disease
brute force search algorithm
centering approach
backtracking algorithm
simulated annealing algorithm
lappin leass approach.
n queens problem
image
region of interest
watermarking.
cropping
dynamic walking
filtering
modelling
colored petri net
image processing
humanoid robots
trilateration
mopso
zigbee
localization
pso
wsn
lappin leass approach
real-time databases
transaction processing.
eventual consistency
human computer interaction; hand gesture recogniti
recognition.
icp
registration
pca
multipath
forwarder
routing.
wireless sensor network
tcp
ns2
protocols
packet flow
underwater images enhancement
homomorphic filter.
ffd firstfit decreasing
makespan
software development process
green computing
pvc
e-waste
watts-strogatz model
computer experiment
social graph
map reduce
mysql .
multi-agent systems
adaptive systems
systems evolution.
wordnet.
aspect
matlab
luminance condition.
number plate extraction
recognization
digital camera
consumer case
consumer protection act
indian legal domain
knowledge based system
rule based system.
rssi.
parity check matrix
solid bursts error
syndrome
exploratory research
graph colouring problem
discrete imperialist competitive algorithm
internet plus tools
service recovery
third party service monitor
prototype system
data recovery model
cardiovascular disease (cvd)
telecardiology.
; college english
english writing teaching
em based cluster
wind speed
continuous wavelet transform
s-transform
call log mining
mobile computing
logmin
magnitude histogram
orientation histogram
algorithms automata and formal
decre
benchmarking
performance evaluation
large language models (llms)
multiple intelligences theory
course evaluation
college english
internet-plus
mobile cloud computing
qol
multimedia content
qoe
user profile
application service providers
standardization and commoditization
virtualization
data centres
attac
reactive jammer
jamming isolation
jamming types
jamming detection
standard array
s&p 500
stock market
stock index
sentiwordnet.
routing mes
cross domain
fine-grained
real time routing
software - as - a - serv ice
saudi arabi
it investment
software industry .
b enefits .
cloud computer
e - government
uwsn; better fitness; multicas
ahp
prioritization
requirement
quality attributes
desirability
disagreement
inflammator
time
two-stage-approach
cropping algorithm
disguise image
modified-sift.
ocr
devnagari numerals
memetics
transliteration
ner
unknown words
performance metrics
iso/iec 7816
file management system
smart card operating systems
java card
vanets
zrp
dsdv
memetics; english writing teac
sumo
move
ns-2
regression
dataset
• database theory
• automata and formal languages
ffd (first- fit decreasing)
web engineering
managing software projects advanced topics in so
web engineering
software engineering practice
the software process
science
intermediate nodes
network lifetime.
internet
• probabilistic methods
• programming languages
• combinatorial games
modm (multi-objective decision making)
anylogic.
random graphs
degree
eigenvector centrality
precursor step.
graph isomorphism
simple additive weighting (saw)
multi-objective optimization problem (mop).
multi-objective optimization p
simple additive weighting (sa
anylogic
fuzzy compositions and t-norms
watts-strogatz model.
* network design and planning
data management issues
ad hoc networks of autonomous intelligent systems
software agents
wireless sensor network (wsn)
pattern recognition
parallel processing
information retrieval
automatic control
cad design & testing
increasing if density of ele- ments of sram
signal or image processing
vision recognition
neural networks
ai algorithms
computing
p2p
computer experiment.
• artificial intelligence
increasing of density of elements
optimization of technological process.
2university of georgia
stereo matching
rank transform
illumination
secure routing in manets
exposure.
radiometric variation
increasing if density of elements of sram
segmentation
connected components labeling
handwritten recognition.
multi-layer perceptron neural networks
integer programming.
cypher query language
e-commerce
mysql
neo4j
cassandra
mapping characteristic comparison
data model.
algorithms automata and formal languages novel dat
graphics and visualization other emerging applicat
cocomo.
estimation the cost of softwareprojects
multi-layerartificial neural network
local ternary pattern and deep neural network.
artificial neural networks (anns)
fuzzy compositions and t-norms.
probabilistic neural network (pnn)
disease and biocompatible
interface
connectors
components
backoff method.
attack
transform
task scheduling
intelligence test
comprehensive digital system
iq
wechsler’s intelligence theory.
question answering system
ga
usa
ms
1 jackson state university
antivirus system
nusmv
protection services
web usage data
graphics and visualization
personalization.
web mining
lower bound
ant colony system
α-nearness
minimum 1-tree
adaptive strategy.
geometric modeling
style
backoff method
pepa .
natural language
live security
(pnn)
probabilistic neural network
artificial neural networks (an
c loud s torage
h ig h availability
inverted repeats
contrast stretching
anfis
rmse
software effort estimation
mre.
ann
negation
optimization.
hadoop
lexicon
sentiment analysis.
nlp
modm (multi-objective decision
information security
owa operator
isms
aggregation function
fuzzy screening
soft computing
wireless communication
other emerging applications
kohonen's self-organizing map (ksofm)
kripke structure
verification
local ternary pattern
t
neural network
multi-layerartificial
estimation the cost of softwar
cryptography database theory
integer programming
r
increasing if density of elem
decreasing of dimension of tr
label switching
multi protocol
geographic information system
d ld-bgp
optimization of technological
software process model and software.
harmony search.
increasing of density of elem
bioinformatics.
secure routing in manet
software development
software testing
digital crime scene.
task scheduling.
direct repeats
complementary palindrome
acl. ano malies
deep neural network
c omponent based
object oriented
sat
random walk
satisfiability
d imensionality r eduction
manifold
automatic i mage a nnotation
genetic algorithm (ga).
distributed data sources
matlab and a comparison of algorithm
methodologies and applications of the ais.
normalized correlation (nc)
algorithmic complexity
homomorphic filtering
density based clustering
spatial data mining
spatial outlier detection.
outlier
geographic data mining
mapping characteristic comparison.
See more
Presentations
(6)Documents
(241)Personal Information
Occupation
Computer science & Technology(IJFCST)
Industry
Technology / Software / Internet
Tags
algorithms
cryptography
cloud computing
computer science
artificial intelligence
database theory
novel data structures
● algorithms ● automata and formal languages ● nov
graphics and visualization ● other emerging applic
queuing methods
programming languages
computational complexity
software engineering
information technology
combinatorial games
computational number theory
data mining
genetic algorithm
computer security
quality of service
big data
natural language processing
cocomo
foundation of computer
automata and formal languages
clustering
graph
probabilistic methods
fuzzy relation
biochemistry
astrophysics
pareto frontier
wireless networks
component
linear optimization
energy consumption
mobility
field-effect transistor
wireless internet
network security
• algorithms
management system
computation biology
crowd management
technology
hajj
congestion
image classification
geography markup language
• cryptography
face recognition
biometric
automata
formal languages
database
pattern recognition and ld-bgp.
text based local descriptor
saudi arabia market
adaptive development process
• novel data structures
manets node
endoscopy capsule
artificial neural network.
fuzzy relational inequality
element sram
traffic splitting
fuzzy mixed metric
label switched path
traffic regulator.
test case prioritization
ant colony optimization.
regression testing
data bases
architecture
software cost estimation
security
knowledge discovery
sentiment analysis
aodv
fuzzy logic
optimization
wireless sensor networks
vanet
performance
networks & data communications
"computer networks
paper submission
design & communication"
mobile networks
next generation
networks & communications
word prediction
deleted interpolation
corpus
reviews
opinion mining
anaphora
stochastic model
n-gram
metaheuristics
gazetteer method
heuristics
live security competition
social network
cyber space
capture the flag
cyber security education
bilateral filter
machine learning
training accuracy
test accuracy
heart disease.
cbir
contourlet
semi - active replication protocol
geographic information system.
relational databases (rdb)
rdb to rdf mapping
semantic web
classification
feature extraction
business model
software architecture
requirements engineering
multi protocol label switching
routing
historic perspective.
visual cryptography (vc)
security goals
security issues
cloudsim
virtual machine (vm)
scheduling management
scheduling algorithms
circuits xor
optimal trajectory.
linear stochastic dynamic systems
optimal control problem
discourse
genetic algorithms
review
greedy
static variables.
epoch
pearson correlation
movie recommender system
collaborative filtering
context-aware
recommender system
location-based recommender
empirical-o
statistical bound
digital crime
parameterized complexity
optimization problems
bin packing problem
approximation algorithm
approximation ratio
probabilistic diffusion
association rule mining
frequent itemset mining
mapreduce.
digital evidence
link rewiring
cybercrime
network evolution
maximal clique size
poisson distribution
complex networks
random networks
digital crime investigation
small-world networks
one shot queries
continuous queries
mems
query optimization
decision tree
texture
event-driven architecture
edge tenacity
curvelet
e-learning
government schemes
website
agricultural-marketing
market-rate
path finding algorithm
path optimization.
network
client - centric model
distributed systems
consistency
data - centric model
random network graphs
early adopters
simulations.
multi-agent system
association rules
fdn
heterogeneity
intelligent agents
increment model
waterfall model
event query language, mobile systems.
uncertain data
deec
cuckoo optimization algorithm (coa)
event stream
internet of vehicles
ε-constraint
abms
rami al-jamarat ritual
decreasing of dimension of transistors
uwsn applications
multicasting
better fitness
uwsn
robotics
bioinformatics
medical
inflammatory
curvelet transform
architecture styles
eed
digital watermarking
mssim
quality management
bit plane
jellyfish attack
intelligent information & data
cuckoo optimization algorithm
internet & cloud computing
program semantics and logic
graph database
foundations
rdbms
nosql
cnn algorithm
data center
idle resources
migration
digital crime scene
program synthesis
software-as-a-service
harmony search
reliability cost.
software process
nsga-ii
tractable and intractable prob
elitism
framework
wireless sensor network (wsn
software industry
mobile systems
hindi language wordnet.
model and software
s
privacy
mobile agent
secret sharing scheme
vi sual secret sharing scheme (vsss)
biometrics.
no. of solutions
data dissemination
fitness
fuzzy decision making
broadcast storm
pattern recogniti on
parkinson’s disease
brute force search algorithm
centering approach
backtracking algorithm
simulated annealing algorithm
lappin leass approach.
n queens problem
image
region of interest
watermarking.
cropping
dynamic walking
filtering
modelling
colored petri net
image processing
humanoid robots
trilateration
mopso
zigbee
localization
pso
wsn
lappin leass approach
real-time databases
transaction processing.
eventual consistency
human computer interaction; hand gesture recogniti
recognition.
icp
registration
pca
multipath
forwarder
routing.
wireless sensor network
tcp
ns2
protocols
packet flow
underwater images enhancement
homomorphic filter.
ffd firstfit decreasing
makespan
software development process
green computing
pvc
e-waste
watts-strogatz model
computer experiment
social graph
map reduce
mysql .
multi-agent systems
adaptive systems
systems evolution.
wordnet.
aspect
matlab
luminance condition.
number plate extraction
recognization
digital camera
consumer case
consumer protection act
indian legal domain
knowledge based system
rule based system.
rssi.
parity check matrix
solid bursts error
syndrome
exploratory research
graph colouring problem
discrete imperialist competitive algorithm
internet plus tools
service recovery
third party service monitor
prototype system
data recovery model
cardiovascular disease (cvd)
telecardiology.
; college english
english writing teaching
em based cluster
wind speed
continuous wavelet transform
s-transform
call log mining
mobile computing
logmin
magnitude histogram
orientation histogram
algorithms automata and formal
decre
benchmarking
performance evaluation
large language models (llms)
multiple intelligences theory
course evaluation
college english
internet-plus
mobile cloud computing
qol
multimedia content
qoe
user profile
application service providers
standardization and commoditization
virtualization
data centres
attac
reactive jammer
jamming isolation
jamming types
jamming detection
standard array
s&p 500
stock market
stock index
sentiwordnet.
routing mes
cross domain
fine-grained
real time routing
software - as - a - serv ice
saudi arabi
it investment
software industry .
b enefits .
cloud computer
e - government
uwsn; better fitness; multicas
ahp
prioritization
requirement
quality attributes
desirability
disagreement
inflammator
time
two-stage-approach
cropping algorithm
disguise image
modified-sift.
ocr
devnagari numerals
memetics
transliteration
ner
unknown words
performance metrics
iso/iec 7816
file management system
smart card operating systems
java card
vanets
zrp
dsdv
memetics; english writing teac
sumo
move
ns-2
regression
dataset
• database theory
• automata and formal languages
ffd (first- fit decreasing)
web engineering
managing software projects advanced topics in so
web engineering
software engineering practice
the software process
science
intermediate nodes
network lifetime.
internet
• probabilistic methods
• programming languages
• combinatorial games
modm (multi-objective decision making)
anylogic.
random graphs
degree
eigenvector centrality
precursor step.
graph isomorphism
simple additive weighting (saw)
multi-objective optimization problem (mop).
multi-objective optimization p
simple additive weighting (sa
anylogic
fuzzy compositions and t-norms
watts-strogatz model.
* network design and planning
data management issues
ad hoc networks of autonomous intelligent systems
software agents
wireless sensor network (wsn)
pattern recognition
parallel processing
information retrieval
automatic control
cad design & testing
increasing if density of ele- ments of sram
signal or image processing
vision recognition
neural networks
ai algorithms
computing
p2p
computer experiment.
• artificial intelligence
increasing of density of elements
optimization of technological process.
2university of georgia
stereo matching
rank transform
illumination
secure routing in manets
exposure.
radiometric variation
increasing if density of elements of sram
segmentation
connected components labeling
handwritten recognition.
multi-layer perceptron neural networks
integer programming.
cypher query language
e-commerce
mysql
neo4j
cassandra
mapping characteristic comparison
data model.
algorithms automata and formal languages novel dat
graphics and visualization other emerging applicat
cocomo.
estimation the cost of softwareprojects
multi-layerartificial neural network
local ternary pattern and deep neural network.
artificial neural networks (anns)
fuzzy compositions and t-norms.
probabilistic neural network (pnn)
disease and biocompatible
interface
connectors
components
backoff method.
attack
transform
task scheduling
intelligence test
comprehensive digital system
iq
wechsler’s intelligence theory.
question answering system
ga
usa
ms
1 jackson state university
antivirus system
nusmv
protection services
web usage data
graphics and visualization
personalization.
web mining
lower bound
ant colony system
α-nearness
minimum 1-tree
adaptive strategy.
geometric modeling
style
backoff method
pepa .
natural language
live security
(pnn)
probabilistic neural network
artificial neural networks (an
c loud s torage
h ig h availability
inverted repeats
contrast stretching
anfis
rmse
software effort estimation
mre.
ann
negation
optimization.
hadoop
lexicon
sentiment analysis.
nlp
modm (multi-objective decision
information security
owa operator
isms
aggregation function
fuzzy screening
soft computing
wireless communication
other emerging applications
kohonen's self-organizing map (ksofm)
kripke structure
verification
local ternary pattern
t
neural network
multi-layerartificial
estimation the cost of softwar
cryptography database theory
integer programming
r
increasing if density of elem
decreasing of dimension of tr
label switching
multi protocol
geographic information system
d ld-bgp
optimization of technological
software process model and software.
harmony search.
increasing of density of elem
bioinformatics.
secure routing in manet
software development
software testing
digital crime scene.
task scheduling.
direct repeats
complementary palindrome
acl. ano malies
deep neural network
c omponent based
object oriented
sat
random walk
satisfiability
d imensionality r eduction
manifold
automatic i mage a nnotation
genetic algorithm (ga).
distributed data sources
matlab and a comparison of algorithm
methodologies and applications of the ais.
normalized correlation (nc)
algorithmic complexity
homomorphic filtering
density based clustering
spatial data mining
spatial outlier detection.
outlier
geographic data mining
mapping characteristic comparison.
See more