genetic algorithm machine learning security problem solving support vector machine optimization computational science computer architecture decreasing of dimensions of transistor cryptography particle swarm optimization network analysis software engineering video streams video segmentation association rules algorithms and simulations scientific computing modeling segmentation wireless sensor network fruit recognition probability feature extraction video summarization software metrics software quality software testing software faults high performance computing frequent itemsets low-correlation data expert systems modelling uncertainty artificial intelligence nonnegative matrix factorization data cleaning pervasive computing analytical approach for modelling large scale scientific instruments nsga-ii coverage natural language processing hidden markov model data classification slow learner prediction floating factor classification. averaging factor classification routing cluster shadow detection background subtraction background removal cuckoo optimization algorithm (coa) random forest linear complementarity problem nonstationary asynchronous h−matrix. meta-heuristic algorithm algorithms information retrieval labview recommender systems opinion mining analytical approach to model technological process data mining reliability sentiment analysis augmented reality neural networks manet wsn interaction m- ambiguous words parikh matrix feature reduction vector machines fcm genetic operator ant colony optimization speeding up background mixture model.background subtraction background mixture model. background mixture model subword word line intelligence cas osga cloud computing; internetworking; grid computing; x.509 virtual organisation (vo) web log data smart work wsdl solar cells nanopillar-based photovoltaics nanowires (nws). gsi analytic hierarchy process(ahp) air volume computed tomography (ct) image volume rendering approach overlayers lung implanted-junction heterorectifiers decreasing of quantity of radiation defects matlab scripts fuzzy theory symmetric table addition method vulnerability persian/arabic document decreasing length of channel accounting mechanical stress; optimization the tec static analysis modelling of manufacture of a field-effect heterot website scanners sensitivity attack graph multimedia retrieval test–bed reverse social engineering attacks jpgvirus pyramidal image structure stuxnet worm document segmentation facebook application continuous optimization. online social networks ssh. flooding attack neural list penglish spams black list trainable. persian spams rc4 parallel rc4 parallel cryptography stream cipher scene recognition sift visual descriptor local binary pattern hindi language hindi reviews mumcut prioritization fault performance index stochastic simulation. uncertainty ant colony system vrptw credibility theory fuzzy sets underwater telerobotics. distributed architecture mixed reality key generation ant colony intelligence (aci) soft computing wind energy; weibull distribution; electricity pro replica management; mapreduce framework; hadoop cl drift heterobipolar transistor threats flood count. authentication design properties biometric images discrete wavelet transform (dwt) gaussian noise hot carrier effect(hce) n-channel mos (nmos). technology computer aided design(tcad) matlab/simulink photovoltaic module generalized model artificial neural network; i–v characteristics; equivalent circuit parameter gazetteer method anaphora centering approach discourse lappin leass approach best coach. fuzzy comprehensive evaluation(fce) topsis method wimax minimal mumcut multiemitter heterotransistor optimization of manufacturing of transistor eigen face partitioning aroundmedoids fisher face medoid k-medoids language model. stemming machine translation wireless interconnect network-on-chip on-chip antenna parallel transmission 1. introduction parallel buffer variance prediction function cassava hough transform canny edge detector vanishing point floor segmentation continuous optimization firefly algorithm (fa) artificial bee colony (abc) semantic web owl ontology computer networks prediction of traffic accidents classify by type of accident eigen vectors neural classifier chaincode fault localization pseudospectrum automotive fault diagnosis; sound signal processin selfish node attack. wap j2me xml parser molecular graph benzenoid and pi Π(g hexagonal trapezoid system x) polynomial omega Ω(g theta Θ(g normalized root mean squared error missing values normalized mean absolute error artificial neural network thyroid disease classification back propagation learning algorithm multi- layer perceptron qos analytic queing model lease abstraction pap preemption intergrid pm motor permanent magnet pole taguchi method test case prioritization regression testing fuzzy-based approach requirement prioritization inpainting evaluation evaluation inpainting model image inpainting embedded event detection video generation ids misbehavio prohibited zones economic dispatch simulated annealing. ramp rate limits fuzzy logic fuzzy set soft-computing. edge-labeling; vertex-coloring; complete graph network protocols public safety networks modeling call holding times a mixture of lognormal distributions em algorithm query processing (qp) information retrieval (ir). natural language processing (nlp) energy efficiency behaviour cih(computer interaction with humanity) social computing hci grid computing grid over internet. latest trends state of the art grid computational grid malware obfuscation deobfuscation oligomorphic etc. normalization mel-frequency cepstral coefficient (mfcc) gaussian mixture model (gmm). feed forward back propagation neural network (ffbn split protocol; protocol splitting; ddos; tribal f cloud computing bootstrap non-linear regression resources human intelligence natural intelligence dynamic time warping kernel least mean square speech enhancement least mean square signal to noise ratio online algorithm random permutation extended graph edge coloring software engineering applications optical model analysis keywords—ap ieee ftp wlan. bss survey. dag; task scheduling; noc interpolation comb pilot signal mapping. mmse estimation ofdm multipath fading channels corner detection perspective rectification. plane homography sobel operator multi-objective optimization visual sensor network performance metrics anaphora resolution named entities question answering systems web question answering systems i-mode language model (lm) mac protocol security threats security techniques. cloud security and artificial neural networks. data transformation magnetic lens focused ion beam hfss coupler power divide circulator microwave components rectangular waveguide siw text clustering ant-colony optimization latent semantic indexing bees algorithm vector space model leach ch’ betweenness routing local search health monitoring cfd. cross- ignition heat flux liquid fuel multi- burners one maxproblem quantum evolution algorithm knapsack problem. multiplicative update function ibk heart disease rbf network naive bayes adaboostm1 nnge bagging geolocation social media unauthorized device. insider scenario insider threat suspect image regularization image compression ransac snr blending entropy rc6 data collection a* heuristic search wsns gateway sub-cluster orphan nodes steganography peak signal-to- noise ratio (psnr). canny edge detection sobel edge detection mean square error (mse) kc1. ann cocomo sa anfis inhomogenous doping of channel field-effect heterotransistor approximation algorithm approximation ratio np-hard. bin packing problem time delay double inverted pendulum bat algorithm stability region head (rh) o-leach web page search engine world wide web web mining page ranking. reverberation echo stereo panning noise filtration audio effects musical signal processing png arrangement fractals jpeg formulation gif formulation mse psnr wavelets binary tournament selection. virtual reality visualization visual computer learning methods and analysis text mining • machine translation factorial experiments computer experiments parameterized complexity robustness average case complexity partition-sort video copy retrieval multimedia fingerprinting content-based fingerprinting video copy detection hyperchaotic chen system hyperchaotic systems hybrid synchronization hyperchaos linguistic resources chunking/shallow parsing information technology trust management • knowledge-based systems formal methods visual software computer science • quality management testing • web engineering decision making • search engines privacy • managing software projects • languages • multimedia software process programming i/o chaos synchronization adaptive control hardware and os issues compiler architectures and computation models computational sciences technology digital record ecr supports. supports machine vision dcnn bits qkd photons and qubits quantum cryptography phase detection awareness natural disaster roulette wheel selection memory system sliding mode control social tags hosvd tensors • network analysis • machine learning • scientific computing supervised learning age classification active learning entropy change algorithm computational complexity information entropy adaptive mutation non-revisiting function optimization moore-spiegel system nonlinear control metaio sdk vuforia sdk d’fusion sdk blob analysis sign board classification gaussian mixture model partial least squares support vector machine. mild cognitive impairment alzheimer’s disease forgery detection forgery image source identification tamper detection spoof attacks. wired network . tcp cbr ddos nam dos mobile database mobile transaction reference architecture mobile host public key cryptography parallel implementation. rsa algorithm lad tree classifier rep tree classifier. proficiency comparison credit risk forecast cseam model multimodal authentication. pca by svd lu factorization feature selection exponential kronecker product (ekp) tracking. artoolkit sdk ar sdk’s pattern vessel segmentation fundus retinal image classification. preprocessing crime and violence are inherent in our political a but also changing the way crime takes place all ov we present various measures being taken in order t the popularity of internet grows continuously with not only changing our views of life wan checkpointing lan vanet’s. san’s recovery distributesd system wavelet domain image recognition spectrum entropy wikitude sdk parkinson’s disease (pd) computer aided diagnosis (cad) statistical parametric mapping (spm) image analysis grain deformation motion detection deformation models template matching. missing observations precision of parameter estimates central composite designs predictive capability gsr result bvp model temperature microcontroller equation automatic diagnosis coronary heart disease hand geometry identification indexing palm print binning zbca. sleep deprivation attack intrusion detection system and compression ratio lz77 reference base non-repetition redundancy optimized exact repeat dna data tree induction data preprocessing data integration data quality act system mobile agent (ma) mobile network station (mns) fixed network station (fns) network station (ns) mobile node (mn) pearson correlation coefficient collaborative filtering content-based filtering location-based recommender crowding distance pareto-optimal solution task scheduling bi-objective independent task. cryptography algorithms. routing overhead routing protocols packet delivery ratio multiclass boost converter chaos bifurcation singular value decomposition deep learning regularization feature subset selection gradient vector flow active contour knowledge based constraints tumor detection graph cut method hepatic tumor multi layer perceptron. naïve bayes maximum entropy network on chip angle routing adaptive routing algorithm average delay concurrency control emotions binary optimization. data envelopment analysis (dea) multi-objective decision making (modm) web page clustering. entity name resolution personal name disambiguation lattices hash algorithm dna detecting k-mer index index model transistor-transistor logic optimization of manufacturing forced convection. homotopy perturbation method successive linearization method (slm) intelligent agents multi-agent system knowledge discovery nonlinear effect
See more