ai and information science business informatics diversity and social justice information theory data analytics information retrieval social computing community informatics digital humanities internet marketing knowledge representation archives data mining labor markets online machine learning visualization computational social science ontology libraries computational biology & bio-informatics bio-informatics accountability neural networks information access fairness transparency social informatics ethics human centered data deep learning robotics media literacy soft computing history of information preservation and argumentation computational biology information professionals artificial intelligence libraries and librarians curation and human centered data computer vision bioinformatics policy foundations pattern recognition values for information design and evaluation of information systems and s cultural informatics ethics and values for informat economics of information systems information practices bayesian network fuzzy logic education of information professionals big data economics of information syste cultural informatics and herit predictive learning reinforcement learning learning in knowledge-intensive systems organization of knowledge and information artificial & computational intelligence organization of knowledge information science preservation and arg learning problems supervised machine learning modeling and optimization cloud computing argumentation visuali parallel processing information practices and beha history of inform computational biology & bio-in natural language processing unsupervised machine learning text mining computer architecture signal & image processing fuzzy systems • information theory • automata theory • artificia preservation tran information practices and behaviors cultural informatics and heritage chaos synchronization chaos mobile networks education of information profe connectivity and networking knowledge processing social justice learning methods and analysis machine learning algorithms ethics and values for information sliding mode control adaptive control photonics network control theory automata theory data science information hiding curation and h image processing signal processing real time systems sentiment analysis ubiquitous computing segmentation internet of things clustering information & knowledge design system & algorithm mechatronics hidden markov model electroencephalogram brainwave artificial neural network linguistics causation curation and human centered da security nlp hybrid intelligent systems information extraction onto fpga based systems embedded blockchain chaotic systems nano computing mimo internet of things (iot) educational data mining automatic control semantics security and privacy for iot business intelligence corpus analysis iot secure cloud computing quantum cryptography information technology knowledge-based systems image segmentation information entropy vlsi design power optimization techniques review mining opinion mining software engineering decision making multimedia and visual software engineering quality management m-commerce image grid and scalable computing robotics & artificial intelligence recurrent neural network recognition short channel effects e-learning ofdm wimax preprocessing databases forecasting data management data mining applications cloud and iot resource provisioning nosql data stores bit information principle shannon information theory binary data matrix model physical theory of information electronics deployment scenarios experimental results entrepreneurship lexicology diversity signal processing for iot grammar privacy and authentication security management autonomy-oriented computing mobile cloud mobile computing qos network security health care software security data integrity authentication and non-repudia spoken language processing question answering linguistic resources lexical semantics semantic processing chunking/shallow parsing morphology phonology design and evaluation of infor intrusion detection system computer science data visualization ai algorithms optimization heightbalancepriority algorithm data mining query language (dmql) concept hierarchy attribute oriented induction (aoi) gray scale images multifocus images code book generation self organizing feature maps image fusion speech processing watermarking cmos-based rf vlsi design communication systems implementation & testing vlsi architecture design median snr psnr rf & microwave photonics analog communication morphological operations soñar adaptive thresholding subjectivity detection polarity analysis opinion analysis sentiment orientation least significant bit (lsb) stego-image pixel component pixel-value differencing steganography compression rate hidden markov models hall-sensor over-load pic12f675 microcontroller awgn wimax physical layer rs-cc code crc-cc code concatenated codes convolutional code (cc) reed-solomon code (rs) multi criteria decision making dbms selection fuzzy ahp ahp web-based education systems and learning applicati languages and formal methods software engineering atom3 model transformation region automata timed automata quadrotor lyapunov hyperchaotic qi system active control hyperchaos airlight map maize naive bayesian classifier ada-boost expert systems k-means hot spot svm-pso managing software projects web engineering software engineering practice just noticeable difference human visual system data hiding field programmable gate array gaussian noise impulse noise trimmed filters snake like sorting expected utility job search android 2.2 agents skin detection background subtraction hci average power spectrum fourier transform soft thresholding particle swam optimization speckle filters thresholding techniques sar images speckle noise curvelet ambtc btc bpp bitplane compression dichotomous data olingonucleotides hybridization dna computing bayesian classifier binary co-occurrence matrix texture classification thematic search connotative search cartography paradigms semantic navigation information visualization web page blocking content filtering pn sequence barker dsss cdma tdma 4g network wlan ieee 802.11 unnecessary handover time threshold mobile network handover failure satellite image denoising maximum d-distance improved bm3d image denoising knowledge engineering protégé tools cognitive science output regulation nonlinear control systems sprott-h system feedback control computer architecture and real time systems algorithms and bioinformatics database & information retrieval engineering cybernetics highly chaotic system stabilization lorenz-stenflo system synchronization multimedia & telecommunications network dynamics systems advanced control systems & strategies management & organization cybernetics  operation advanced control systems & strategies  robotics & reliable and autonomic computing • distributed and business and management • grid and cloud computing • advanced it bio/medical engineering • bioinforma cyber security enterprise integration application & system framework dual oxide thickness (dot) surrounding gate mosfet threshold voltage subthreshold swing phishing detection uwb localization tdoa manet headlight pairing headlight tracking bidirectional algorithm intelligent transportation system wireless sensor network query packet. cluster head sybil common mode radiation radiated emission interdigital capacitors (idc) handoff threshold hard handoff handoff delay double gate mosfet halo doping gaussian doping work function reverse saturation current tunnelling semantic relation knowledge based system domain ontology spectral analysis dual halo local histogram morphological operators foreground extraction patch antenna; dual-band; lte; wimax; mimo text to speech assistive device speech impaired voice synthesizer zc (zigbee coordinator) mcu (micro controller) frequent pattern mining power divider coupler circulator microwave components rectangular waveguide siw feed forward neural network concept keywords; document ranking; term frequency knowledge convergence km mapping visual analysis gis automation interactive system divide and conquer perceptrons back-propagation speech recognition feedforward neural networks mfcc ieee sui 802.16 fec cp phy filtering ocr offline. binarization handwritten base money and pos. atm cashless cashlite gray & color image cascaded-mask filter median based directional cascaded-mask median filter a modified directional weighte truth-telling and justice maleficence unfair subject selection in r paternalism racism informed consent edge detection nlp techniques neural languages and nlp peak signal to noise ratio (ps mean square error (mse) mpeg (moving picture experts g jpeg (joint photographic exper binary text lzw codes biomedical engineering punjabi speech corpora context-dependent acoustic mod consolidation virtualization pcwh compiler single-phase nlp and computational linguist nlp and machine learning fading channels cyclic redundancy check code hyperchaotic jha system cost function artificial bee colony multimedia data mining systems grid computing mysql jsp lossless watermarking ade-leap coullet systems hsv color model ambient intelligence conceptual modeling knowledge-intensive systems vision recognition technology digital record information system model ecr multimedia data mining infrastructures for big data big data security handover necessity estimation cfa image denoising ontologies web intelligence predictive prefetch information systems and servic srisuchinwong system shimizu-morioka systems qi system information retrieval and ai big data mining social networks file systems cloud business k-means algorithm access control aco algorithm mtbac iot applications and services iot-enabled innovation ict access of library resources library differently abled person sensors smart city data sources tools knowledge discovery e-voting e-health care mobile payment mobile security infrastructure as a service (i platform as a service(paas) software as a service (saas) sequences protocols brain mri crisis management procedure collaborative situation awaren safety model situation awareness human centered design safety and security life critical system human computer interaction testing modeling feature extraction analysis automatic speech recognition security and privacy behaviors e-commerce mcc practices and behaviors information systems countermeasure cyber attacks librarians data analysis sensor data heritage curation evaluation of information syst dbms database attacks threats system on chip(soc) risc microprocessors internet of things(iot) instruction set architecture big data analytics trust models and metrics blockchain foundations time variable replay video recording phishing shoulder surfing key logger dictionary brute force pattern based password method morphological analysis light stemmer gujarati stemming gujarati language unsupervised learning pervasive/ubiquitous computing security engineering coevolutionary algorithms blockchain in digital forensic hadoop threats of bigdata bigdata security bigdata architectural graph signal flow graph activation function ex-nor led (light emitting diode) rf (radio frequency) li-fi (light fidelity) security for grid computing cryptography and coding biometric security 3d visualization augmented reality 3d environment learning teaching multi-channel push notification gcm ontology and semantic web mobile and ubiquitous computin machine learning & application information technology trends android apps retrie semantic processing & nlp question answering (qa) machine learning problems key management data & system integrity association classification computer education vulnerability web security web application attacks hadoop framework morphic computing trust management blockchain privacy pay-per-use model digital india maximum entropy conditional random field support vector machine named entity recognition edtech platform as a services (paas) infrastructure as a services software as a services (saas) m-learning triplet algorithm classification based associati ontology based information ext instant messengers video surveillance and monitor remote sensing multi-view geometry motion detection array signal processing 3d and stereo imaging pattern recognition and analys fcm sub-pixel detection hyperspectral image segmentati gsm (global system for mobile dialog systems machine translation paraphrasing/entailment/genera discourse pos tagging statistical and knowledge base parsing/grammatical formalisms natural language computing split plane electromagnetic interference ( surface potential gate misalignment short channel effect (sce) mosfet triple material double gate (t pulse width modulation geostationary earth orbit space solar power wireless power transmission firewall blacklisting wireless sensor networks airgo tiremaax ctis automobile evolutionary computing ai in cyber security dataset tracking human detection infrared video distribution gaussian drain current performance cad design & testing ifft oob papr performance evaluation ptz camera storage and retrieval internet of things technology digital image processing hyperspectral image lte patch antenna parabolic approximation method triple material surrounding ga signal or image processing microcontroller gps diffusion hydrogen sulphide sensor wireless module force sensitive resistor simulation receiver transmitter stethoscope infrared sensor learning methods reasoning and evolution apriori algorithm hfss back propagation neural netwo quantitative structure activit cognitive structures term frequency weighting document ranking bpr el suffix arra web intelligence applications & search soft computing theory and applications c4.5 classifier. microcontroller. patient temperature and data logg binary sensors c4.5 classifier insertion loss (il) return loss (rl) wilkinson power divider (wpd) leakage cancellation circuit (lcc) gysel power divider (gpd) advanced design system software (2009) (ads) ambient networks. local preference mpls bgp traffic engineering named entities performance metrics ner accuracy hmm digital communication satellite communication fpga architecture dsp single board computer systems information processing ann phoneme recognition zerocrossing intervals discrete cosine transform transform domain full counter propagation network video processing rsa. plaintext nist aes des cryptography bin size. hla surface expression mutual information neuro model and fuzzy model. genetic algorithm (ga) arx statistical model of identification(smi) process reaction curve(prc) non-interacting process interacting inverse radon transformation radon transformation mit eit biomedical imaging stbc ber eb/no m-ary psk m-ary qam mri svm pca texture intensity shape braintumor linear discriminant analysis gray & color image. median based directional cascaded-mask filter (mbd a modified directional weighted cascaded-mask medi edge detection. knowledge-based systems and formal methods mean square error (mse) and peak signal to noise r mpeg (moving picture experts group) jpeg (joint photographic experts group) lzw codes and binary text. punjabi speech corpora. context-dependent acoustic modeling single-phase and pcwh compiler fading channels. cyclic redundancy check code (crc) hyperchaotic jha system. cost function. artificial bee colony optimization jsp and mysql the software process lossless watermarking. jade-leap coullet systems. hsv color model. ecr - model - information system - digital record handover necessity estimation hne machine learning & applications neural networks & fuzzy system sociocybernetics cfa image denoising. genetic algorithm ontologies. distributed and parallel systems & algorithms dsp/image processing/pattern recognition/multimedi database and data mining predictive prefetch and neural networks. decision support system risk management image signal processing networks & fuzzy system srisuchinwong system. service-oriented architecture in cloud computing cloud applications in vertical industries virtualization in the context of cloud computing p virtualization on platforms in the cloud design tool for cloud computing infrastructure and platforms cloud application shimizu-morioka systems. qi system. reliable and autonomic computing distributed and p algorithms and bioinformatics computer architectur biocybernetics synthetic biology medical cybernetics hybrid systems complex adaptive system and theory tracking and stereo vision • biometrics • machine • machine vision • image processing and formation etc.) • software engineering • theoretical compute • algorithms and bioinformatics • big data • block enterprise information systems and e-government e-business etc.) • software engineering • web and internet co • algorithms and bioinformatics • computer archite c++ c pseudocode compiler pseudocode to source code compiler computational intelligence • artificial • automata theory • information theory soa short channel effects. nstant messengers ontology ba sed information extraction (obie) split plane. electromagnetic interference (emi) drain current performance. information extraction. hyperspectral image segmentation sub-pixel detection and fcm. triple material surrounding gate parabolic approximation method. ptz camera. gsm (global system for mobile communication). apriori algorithm. hfss. back propagation neural network quantitative structure a ctivity relationship bpr. image. suffix array.
Mehr anzeigen