genetic algorithm machine learning security problem solving computational science computer architecture optimization support vector machine network analysis software engineering video streams video segmentation algorithms and simulations scientific computing modeling association rules decreasing of dimensions of transistor cryptography particle swarm optimization segmentation wireless sensor network algorithms large scale scientific instruments low-correlation data frequent itemsets high performance computing software faults software testing software quality software metrics video summarization probability fruit recognition h−matrix. asynchronous nonstationary linear complementarity problem averaging factor classification floating factor classification. slow learner prediction data classification information retrieval recommender systems analytical approach for modelling nonnegative matrix factorization feature extraction augmented reality sentiment analysis opinion mining analytical approach to model technological process cluster shadow detection background subtraction background removal cuckoo optimization algorithm (coa) modelling uncertainty pervasive computing labview neural networks wsn data cleaning artificial intelligence expert systems nsga-ii coverage natural language processing hidden markov model random forest meta-heuristic algorithm data mining manet reliability routing linguistic resources chunking/shallow parsing information technology trust management • knowledge-based systems formal methods visual software computer science • quality management testing • web engineering decision making • search engines privacy • managing software projects • languages • multimedia software process programming i/o memory system virtual reality visualization visual computer learning methods and analysis text mining • machine translation factorial experiments computer experiments parameterized complexity robustness average case complexity partition-sort video copy retrieval multimedia fingerprinting content-based fingerprinting video copy detection hyperchaotic chen system hyperchaotic systems hybrid synchronization hyperchaos sliding mode control social tags hosvd tensors • network analysis • machine learning • scientific computing supervised learning age classification active learning entropy change algorithm computational complexity information entropy adaptive mutation non-revisiting function optimization moore-spiegel system nonlinear control act system chaos synchronization adaptive control hardware and os issues compiler architectures and computation models computational sciences technology digital record ecr supports. supports machine vision dcnn bits qkd photons and qubits quantum cryptography phase detection awareness natural disaster geolocation social media unauthorized device. insider scenario insider threat suspect image regularization image compression ransac snr blending entropy rc6 data collection a* heuristic search wsns gateway sub-cluster orphan nodes o-leach leach ch’ betweenness routing local search health monitoring cfd. cross- ignition heat flux liquid fuel multi- burners one maxproblem quantum evolution algorithm knapsack problem. multiplicative update function ibk heart disease rbf network naive bayes adaboostm1 nnge bagging web page search engine world wide web web mining page ranking. reverberation echo stereo panning noise filtration audio effects musical signal processing png arrangement fractals jpeg formulation gif formulation mse psnr wavelets binary tournament selection. roulette wheel selection steganography peak signal-to- noise ratio (psnr). canny edge detection sobel edge detection mean square error (mse) kc1. ann cocomo sa anfis inhomogenous doping of channel field-effect heterotransistor approximation algorithm approximation ratio np-hard. bin packing problem time delay double inverted pendulum bat algorithm stability region head (rh) mobile agent (ma) mobile network station (mns) fixed network station (fns) network station (ns) mobile node (mn) pearson correlation coefficient collaborative filtering content-based filtering location-based recommender crowding distance pareto-optimal solution task scheduling bi-objective independent task. cryptography algorithms. routing overhead routing protocols packet delivery ratio multiclass binary automatic diagnosis coronary heart disease hand geometry identification indexing palm print binning zbca. sleep deprivation attack intrusion detection system and compression ratio lz77 reference base non-repetition redundancy optimized exact repeat dna data tree induction data preprocessing data integration data quality optimization. data envelopment analysis (dea) multi-objective decision making (modm) web page clustering. entity name resolution personal name disambiguation lattices hash algorithm dna detecting k-mer index index model transistor-transistor logic optimization of manufacturing forced convection. homotopy perturbation method successive linearization method (slm) intelligent agents multi-agent system knowledge discovery nonlinear effect boost converter chaos bifurcation singular value decomposition deep learning regularization feature subset selection gradient vector flow active contour knowledge based constraints tumor detection graph cut method hepatic tumor multi layer perceptron. naïve bayes maximum entropy network on chip angle routing adaptive routing algorithm average delay concurrency control mobile database mobile transaction reference architecture mobile host public key cryptography parallel implementation. rsa algorithm lad tree classifier rep tree classifier. proficiency comparison credit risk forecast cseam model multimodal authentication. pca by svd lu factorization feature selection exponential kronecker product (ekp) tracking. artoolkit sdk ar sdk’s wikitude sdk metaio sdk vuforia sdk d’fusion sdk blob analysis sign board classification gaussian mixture model partial least squares support vector machine. mild cognitive impairment alzheimer’s disease forgery detection forgery image source identification tamper detection spoof attacks. wired network . tcp cbr ddos nam dos parkinson’s disease (pd) computer aided diagnosis (cad) statistical parametric mapping (spm) image analysis grain deformation motion detection deformation models template matching. missing observations precision of parameter estimates central composite designs predictive capability gsr result bvp model temperature microcontroller equation emotions pattern vessel segmentation fundus retinal image classification. preprocessing crime and violence are inherent in our political a but also changing the way crime takes place all ov we present various measures being taken in order t the popularity of internet grows continuously with not only changing our views of life wan checkpointing lan vanet’s. san’s recovery distributesd system wavelet domain image recognition spectrum entropy stochastic simulation. uncertainty ant colony system vrptw credibility theory fuzzy sets underwater telerobotics. distributed architecture mixed reality key generation ant colony intelligence (aci) soft computing wind energy; weibull distribution; electricity pro replica management; mapreduce framework; hadoop cl drift heterobipolar transistor threats flood count. authentication wimax flooding attack neural list penglish spams black list trainable. persian spams rc4 parallel rc4 parallel cryptography stream cipher scene recognition sift visual descriptor local binary pattern hindi language hindi reviews mumcut prioritization fault performance index minimal mumcut multiemitter heterotransistor optimization of manufacturing of transistor eigen face partitioning aroundmedoids fisher face medoid k-medoids language model. stemming machine translation wireless interconnect network-on-chip on-chip antenna parallel transmission 1. introduction parallel buffer variance prediction function cassava bootstrap non-linear regression design properties biometric images discrete wavelet transform (dwt) gaussian noise hot carrier effect(hce) n-channel mos (nmos). technology computer aided design(tcad) matlab/simulink photovoltaic module generalized model artificial neural network; i–v characteristics; equivalent circuit parameter gazetteer method anaphora centering approach discourse lappin leass approach best coach. fuzzy comprehensive evaluation(fce) topsis method analytic hierarchy process(ahp) nanowires (nws). nanopillar-based photovoltaics solar cells web log data feature reduction vector machines fcm genetic operator ant colony optimization speeding up background mixture model.background subtraction background mixture model. background mixture model continuous optimization. multimedia retrieval fuzzy theory decreasing of quantity of radiation defects implanted-junction heterorectifiers overlayers volume rendering approach computed tomography (ct) image air volume lung matlab scripts symmetric table addition method vulnerability static analysis scanners attack graph test–bed reverse social engineering attacks jpgvirus stuxnet worm facebook application online social networks word line subword parikh matrix m- ambiguous words cas osga x.509 virtual organisation (vo) wsdl gsi ssh. cloud computing; internetworking; grid computing; document segmentation pyramidal image structure persian/arabic document decreasing length of channel accounting mechanical stress; optimization the tec modelling of manufacture of a field-effect heterot website sensitivity interaction intelligence smart work resources human intelligence natural intelligence dynamic time warping kernel least mean square speech enhancement least mean square signal to noise ratio online algorithm random permutation extended graph edge coloring software engineering applications optical model analysis keywords—ap ieee ftp wlan. bss survey. mac protocol energy efficiency behaviour cih(computer interaction with humanity) social computing hci grid computing grid over internet. latest trends state of the art grid computational grid malware obfuscation deobfuscation oligomorphic etc. normalization mel-frequency cepstral coefficient (mfcc) gaussian mixture model (gmm). feed forward back propagation neural network (ffbn split protocol; protocol splitting; ddos; tribal f cloud computing security threats security techniques. cloud security and artificial neural networks. data transformation magnetic lens focused ion beam hfss coupler power divide circulator microwave components rectangular waveguide siw text clustering ant-colony optimization latent semantic indexing bees algorithm vector space model dag; task scheduling; noc interpolation comb pilot signal mapping. mmse estimation ofdm multipath fading channels corner detection perspective rectification. plane homography sobel operator multi-objective optimization visual sensor network performance metrics anaphora resolution named entities question answering systems web question answering systems i-mode wap j2me xml parser molecular graph benzenoid and pi Π(g hexagonal trapezoid system x) polynomial omega Ω(g theta Θ(g normalized root mean squared error missing values normalized mean absolute error artificial neural network thyroid disease classification back propagation learning algorithm multi- layer perceptron video generation hough transform canny edge detector vanishing point floor segmentation continuous optimization firefly algorithm (fa) artificial bee colony (abc) semantic web owl ontology computer networks prediction of traffic accidents classify by type of accident eigen vectors neural classifier chaincode fault localization pseudospectrum automotive fault diagnosis; sound signal processin selfish node attack. ids misbehavio prohibited zones economic dispatch simulated annealing. ramp rate limits fuzzy logic fuzzy set soft-computing. edge-labeling; vertex-coloring; complete graph network protocols public safety networks modeling call holding times a mixture of lognormal distributions em algorithm query processing (qp) information retrieval (ir). natural language processing (nlp) language model (lm) qos analytic queing model lease abstraction pap preemption intergrid pm motor permanent magnet pole taguchi method test case prioritization regression testing fuzzy-based approach requirement prioritization inpainting evaluation evaluation inpainting model image inpainting embedded event detection
Mehr anzeigen