Toggle navigation
Login
Toggle navigation
Browsing Computer Science and Technology-Research Publications by Subject
Knowledge Repository Home
School of Engineering & Technology
Department of Computer Science and Technology
Computer Science and Technology-Research Publications
Browsing Computer Science and Technology-Research Publications by Subject
//
Knowledge Repository Home
//
School of Engineering & Technology
//
Department of Computer Science and Technology
//
Computer Science and Technology-Research Publications
// Browsing Computer Science and Technology-Research Publications by Subject
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search DSpace
This Collection
Browse
Knowledge Repository
Schools & Collections
By Issue Date
Authors
Titles
Subjects
By Submit Date
This Collection
By Issue Date
Authors
Titles
Subjects
By Submit Date
My Account
Login
Register
Browsing Computer Science and Technology-Research Publications by Subject
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Go
Order:
ascending
descending
Results:
5
10
20
40
60
80
100
Update
Now showing items 1-620 of 620
ascending
descending
5
10
20
40
60
80
100
Subject
'current
[1]
3D information acquisition
[1]
3D laser scanning
[1]
3D modelling
[1]
3D visualization
[1]
3D-QSAR
[1]
3DES
[1]
5G
[1]
Absolute moment block truncation coding
[1]
Access Point
[1]
Accuracy
[3]
Ad hoc
[1]
Ad hoc networks
[1]
Ad hoc on demand distance vector
[1]
Ad hoc on-demand distance vector routing (AODV)
[1]
Adaptive histogram equalization
[1]
AES
[1]
Aldose reductase 2 inhibitors
[1]
Algorithmic trading
[2]
Algorithms
[1]
Ambtc
[1]
Analysis of performance
[1]
Ancient building reconstruction
[1]
Anti-phishing tools
[1]
Anti-phishing working groups
[1]
Antioxidants
[1]
AODV
[5]
AODV routing protocol
[1]
Area under Curve (ROC)
[1]
ARP cache poisoning
[1]
Artificial intelligence
[4]
Artificial neural network
[1]
Artificial neural network (ANN)
[1]
ASEP
[1]
Asymmetric key
[1]
Authentication
[1]
Authentication scheme
[1]
Autism spectrum disorders
[1]
Autoencoder
[1]
Automated techniques
[1]
Automatic cephalometric analysis
[1]
AutoML
[1]
AutoSklearn
[1]
Avalanche effect
[1]
Average end-to-end delays
[1]
Back-propagation neural networks
[1]
Backpropagation
[1]
Base stations
[2]
Battery power
[1]
Beer production
[1]
Behavior analysis
[1]
BERT
[1]
Big data
[1]
Bilingual news article similarity
[1]
Binarization
[1]
Binarization techniques
[2]
Bioenergetics
[1]
Bitcoin
[1]
Bitcoin price prediction
[1]
Block graphs
[1]
Block-chain
[1]
Blockchain
[2]
Boolean AND operator
[1]
Boosting
[1]
Botnet
[1]
Breast cancer
[1]
Brightness preservations
[1]
Budget control
[1]
C4.5
[1]
Canny Edge
[1]
Carrier mobility
[1]
Carrier sensing
[1]
CBR
[1]
Celestial objects
[1]
Cephalometric images
[1]
Chatbots
[1]
CICDDoS2019 dataset
[1]
CLAHE
[1]
Classification
[1]
classification
[1]
Classification (of information)
[3]
Classification technique
[2]
classifiers
[1]
Clone detection approach
[1]
Cloud Computing
[2]
Cloud computing
[2]
Cluster head
[2]
Clustering
[4]
CNN
[2]
Code clone
[1]
Code fragment
[1]
Code Smells
[1]
Code smells
[2]
code smells and deep learning
[1]
coefficient
[1]
Communication activities
[1]
Communication systems
[1]
Comparable Corpora
[1]
Comparative analysis
[1]
Comparative performance
[1]
Comparative studies
[1]
Computational methods
[1]
Computer crime
[4]
Computer networks
[1]
Computer system firewalls
[1]
Computing power
[1]
Confidentiality
[1]
congestion
[2]
Congestion adaptive
[1]
congestion control
[1]
Congestion control (communication)
[1]
Congestion control protocols
[1]
Content Distribution Network
[1]
contrast enhancement
[1]
Conversational agents
[1]
Conversational AI
[1]
Convolutional Neural Network
[1]
Convolutional neural network
[1]
convolutional neural network
[2]
Cosine similarity
[1]
Cost effectiveness
[1]
Cotton
[1]
Counterfeit Currency
[1]
Cover Text
[1]
Credit card fraud
[1]
Cross company defect prediction (CCDP)
[1]
Cryptocurrency
[2]
Cryptography
[3]
Customer satisfaction
[1]
Cyber Security
[1]
Cyber threat
[1]
Cyberbullying
[1]
D2D Communication
[1]
Dark web
[1]
Darknet
[1]
Data Centre
[1]
Data fusion
[1]
Data handling
[1]
Data Integrity
[1]
Data mining
[4]
Data monitoring
[1]
Data security
[1]
Dataset
[1]
DCF
[1]
DDOS
[1]
DDoS-AT 2022 dataset
[1]
De-authentication attack
[1]
De-Obfuscation
[1]
Decryption process
[1]
Deep Learning
[2]
Deep learning
[3]
deep learning
[1]
Deep learning (DL)
[1]
Deep neural network
[1]
Deep web
[1]
deep-learning
[1]
Defect prediction
[3]
defective printed circuit boards
[1]
Defects
[2]
defects
[1]
Degraded
[1]
Degraded document images
[2]
Degraded documents
[1]
Density operators
[1]
DES
[1]
Digital Documents
[1]
Digital forensics
[1]
Digital image
[1]
Digital image watermarking
[1]
Digital signature algorithms
[1]
Digital signatures
[1]
Digital storage
[2]
Discrete wavelet transforms
[1]
Dollar cost averaging
[1]
Domain Name System
[1]
DOS
[2]
DoS attack
[1]
DRDOS
[1]
DSDV
[2]
DSR
[1]
dual aromatase-sulphatase inhibitors (DASI's)
[1]
Dynamic analysis
[1]
Dynamic source routing (DSR)
[1]
E2E Delay
[1]
Eigen faces
[1]
Electron transport chain
[1]
Electronic document identification systems
[1]
Electronic transaction
[1]
Embedding capacity
[1]
End-user applications
[1]
Energy Consumption
[1]
Energy efficiency
[1]
Energy efficient routing
[1]
Energy requirements
[1]
Energy-entropy
[1]
Ensemble classifier
[1]
Ensemble Learning
[1]
Ensemble learning
[2]
ensemble learning
[1]
entropy
[2]
Epigenetic modifications
[1]
Equalizers
[1]
Error rate
[1]
Estimation methods
[1]
Ethereum
[1]
Euclidean distance
[1]
euler number
[1]
Extended Gradient Boosting Machine
[1]
Face detection
[2]
Fake news
[1]
Fake News Detection
[1]
False negative rate
[2]
False positive rates
[2]
Fast-flux Networks
[1]
Fault-prone
[1]
Faults
[1]
Feature analysis
[1]
feature detection
[1]
Feature extraction
[1]
feature mapping
[1]
feature matching
[1]
feature selection
[1]
Features Extraction
[1]
Fermentation
[1]
Fine KNN
[1]
Flavonoids
[1]
Forecasting
[2]
Forgery
[1]
Fraud detection
[1]
FTP
[1]
Functional magnetic resonance imaging
[1]
fuzzy histogram equalization
[1]
Gaussian field-based 3D-QSAR
[1]
Gaussian noise (electronic)
[1]
Genetic modulators
[1]
Geographic routing protocols
[1]
Global positioning system
[1]
Government sectors
[1]
GPSR
[1]
Gradient based
[1]
Graph Laplacian operators
[1]
Graphic methods
[1]
GRE
[1]
Greedy forwarding
[1]
Greedy perimeter stateless routing
[1]
Green building energy consumption
[1]
Grid computing
[6]
group temporal key
[1]
Gurmukhi
[1]
Handover
[1]
Handwritten Urdu character recognition
[1]
Hashtags
[1]
Hate speech
[1]
Health monitoring
[1]
Heterogeneous network
[1]
Hindi language
[1]
histogram
[1]
Histogram equalizations
[1]
Histogram modification
[1]
Histogram shifting
[1]
Historical documents
[2]
hole 196 vulnerability
[1]
Hops
[1]
Human computer interaction
[1]
Hybrid architecture
[1]
Hypervisor
[2]
IEEE
[1]
Illumination
[1]
Image analysis
[1]
Image classification
[1]
Image coding
[1]
Image compression
[1]
Image enhancement
[1]
Image fusion
[1]
Image histograms
[1]
Image Processing
[1]
Image processing
[1]
image processing
[1]
Image registration
[1]
image registration
[1]
Image Segmentation
[1]
image subtraction
[1]
Image subtraction and connected components
[1]
Image watermarking
[1]
IMEP
[1]
In-Band communication
[1]
Information dissemination
[1]
Information Hiding
[1]
Information security
[1]
Information systems
[1]
Information use
[1]
Infrastructure-less networks
[1]
Inspection equipment
[1]
Inspection system
[1]
Intelligent systems
[1]
Intelligent transport systems
[1]
Intelligent vehicle highway systems
[1]
Internet
[1]
Internet manet encapsulation protocols
[1]
Internet protocols
[1]
Intrinsic features
[1]
Intrusion detection
[2]
Intrusion Detection Systems
[1]
intuitionistic fuzzy sets
[1]
Jaccard similarity
[1]
JRip
[1]
K-means clustering
[2]
k-NN
[1]
Kashmiri language
[1]
kFill filter
[1]
KNN
[1]
Knowledge management
[1]
Koshur
[1]
Laplace image
[1]
LBP
[1]
LEACH
[1]
Leach protocols
[1]
Leaching
[1]
Leaf disease
[1]
Learning systems
[2]
Lexical features
[1]
LGBM
[1]
ligand-based drug design
[1]
Light GBM
[1]
Light Gradient Boosting Machine
[1]
Limited energies
[1]
lncRNA
[1]
Logistic regression
[3]
Long short term memory (LSTM)
[1]
Low energy adaptive clustering hierarchies (LEACH)
[1]
Luminance
[1]
MAC
[2]
MAC layer
[1]
Machine Learning
[3]
Machine learning
[8]
Machine Translation
[1]
Machine-learning
[1]
Magnetic resonance imaging
[1]
Malware
[2]
MANET
[3]
MANET routing protocols
[1]
MANET; AODV;
[1]
MANETs
[3]
Manhattan Grid
[1]
Manhattans
[1]
MAODV
[1]
Mean
[1]
Mean Intensity
[1]
mean square error
[1]
Median filter
[1]
Medium access control
[1]
MICC-F2000
[1]
Military applications
[2]
Military photography
[1]
miRNA
[1]
Mitochondrial dysfunction
[1]
Mobile ad hoc networks
[6]
Mobile adhoc network (MANETs)
[1]
Mobile security
[3]
Mobile telecommunication systems
[4]
Mobility
[2]
Mode of operations
[1]
Model research
[1]
molecular docking
[1]
molecular dynamics simulations
[1]
Morphological Processing
[1]
MRI Image
[1]
Multi layer perceptron
[1]
Multi-objective programming
[1]
Multi-tenancy
[1]
Multi-timeframe analysis
[1]
Multilayer neural networks
[1]
Multisignature scheme
[1]
n-gram
[1]
Natural Language Processing
[1]
Natural language processing
[1]
Natural language processing (NLP)
[1]
Natural Language Toolkit
[1]
NAV
[1]
Na�ve Bayes
[1]
Nearest neighbor search
[1]
Negation handling
[1]
Network intrusion detection
[1]
Network routing
[1]
Network Security
[2]
Network security
[4]
Network simulator
[1]
Network-based
[1]
Network-security
[1]
Neural network
[1]
Neural networks
[4]
Neurodevelopmental disorder
[1]
NLP
[1]
Noise estimation
[1]
Non-spam emails
[1]
Nonlinear programming (NLP)
[1]
Nonlocal quantum game
[1]
Nonlocality
[1]
NS2
[1]
NSL-KDD dataset
[2]
NTP
[1]
Obfuscation
[1]
Object oriented metrics
[3]
Object oriented programming
[2]
Object recognition
[1]
Object-oriented metrics
[1]
OBM
[1]
OBU
[1]
Occlusion
[1]
Offensive language
[1]
On demand routing protocols
[1]
Opinion mining
[1]
Optical character recognition (OCR)
[1]
Optimization
[1]
Optimized link state routing (OlSR)
[1]
Out-Band communication
[1]
Overhead
[1]
Oxidative stress
[1]
Packet
[1]
Packet delivery ratio
[1]
Packet loss
[1]
Packet networks
[1]
Paper documents
[1]
Parallel Corpora
[1]
Parameters
[1]
Partially entangled states
[1]
Particle swarm optimization (PSO)
[1]
PCA
[1]
PCBs
[1]
peak signal to noise ratio
[1]
Peak Signal to Noise Ratio (PSNR)
[1]
Performance analysis
[1]
Personal assistants
[1]
Personal information
[1]
Personalized medicine
[1]
pharmacophore mapping
[1]
Phase correlation
[1]
Phishing
[2]
Phishing Detection
[1]
Phishing detections
[1]
Phishing websites
[1]
Planetary image
[1]
Plant diseases
[1]
Power management (telecommunication)
[1]
Precision
[1]
Precision agriculture
[1]
Preventive maintenance
[1]
Printed circuit boards
[1]
printed circuit boards
[1]
Project onion
[1]
PSNR
[1]
Public- auditing.
[1]
QLA
[1]
QSVM
[1]
Quality control
[1]
Quality of service (QoS)
[1]
Quantum advantage
[1]
Quantum computing
[1]
Quantum correlations
[1]
Quantum entanglement
[2]
Quantum strategy
[1]
Query languages
[1]
quinoxalinone
[1]
Railway security
[1]
Random Direction
[1]
Random direction models
[1]
Random forest
[1]
Random under-sampling
[1]
Random waypoints
[1]
Ranking technique
[2]
Ransomeware
[1]
Rdh
[1]
Reactive protocols
[1]
Recall
[1]
Receiver Operating Characteristic (ROC) curve
[1]
Reconstruction error
[1]
Recurrent neural network (RNN)
[1]
Refactoring
[2]
refactoring
[1]
Refactoring tools
[1]
Relay node
[1]
Reliability
[1]
Remote areas
[1]
Replay
[1]
resampling
[1]
Reversible data hiding
[1]
RoBERTa
[1]
Routers
[1]
Routing
[3]
Routing protocols
[7]
RPGM
[1]
RREP
[1]
RREQ
[1]
RWP
[1]
Salt and pepper noise
[1]
Secret data
[1]
Security and privacy
[1]
Security threats
[1]
Selection techniques
[1]
Sensor nodes
[3]
Sentiment analysis
[2]
SEP
[1]
Set partitioning in hierarchical tree
[1]
Signal reconstruction
[1]
Signal to noise ratio
[1]
Similarity measurement with LDA cosine similarity
[1]
similarity structural index measure
[1]
Sink nodes
[1]
SLA
[1]
Smart agriculture
[1]
Smart farming
[1]
SMNP
[1]
Software defects
[2]
Software engineering
[2]
Software maintenance
[1]
Software quality maintenance
[1]
Space explorations
[1]
Space research
[1]
Space technologies
[1]
Spam detection
[1]
Spam Email
[1]
Spam labeling
[1]
Spam labelling
[1]
SPIN
[1]
SQL injection
[1]
standard deviation
[1]
Star graphs
[1]
Stars
[1]
Static analysis
[1]
Statistical Machine Translation
[1]
Statistical tests
[4]
Stealth Man-In-The-Middle attack
[1]
Stego image
[1]
Stego Text
[1]
Stemming
[1]
Stock market
[1]
Storage capacity
[1]
Stroke width transform
[1]
Structural magnetic resonance imaging
[1]
Structure similarity
[1]
Support vector machine
[1]
Support vector machines
[2]
Supremacy
[1]
Surveillance system
[1]
Surveys
[1]
SVM
[2]
Symmetric encryption
[1]
Technical indicators
[1]
Technology advances
[1]
TEEN
[1]
Telecommunication links
[1]
Telecommunication networks
[2]
Telecommunication traffic
[1]
Temporally ordered routing algorithms
[1]
text identification
[1]
text independent
[1]
Text mining
[1]
Text processing
[1]
Text Stenography
[1]
TextBlob
[1]
Texture
[1]
Third Party Auditor
[1]
Thresholding
[1]
Throughput
[3]
Thyroid carcinoma
[1]
Tilt photogrammetry
[1]
Time requirements
[2]
Topic modeling using LDA
[1]
Topology
[1]
Tor
[1]
TORA
[1]
Total phenolics
[1]
TPOT
[1]
Trading strategy
[1]
Traffic characterization
[1]
Traffic control
[1]
Transmission quality
[1]
triazole
[1]
True negative rates
[2]
True positive rates
[2]
Tunnel
[2]
Tweets
[4]
Twitter
[2]
Unicode
[1]
Unmanned aerial vehicles (UAV)
[1]
Urdu characters
[1]
Urdu OCR
[1]
VADER
[1]
VANET
[2]
Vehicular ad hoc networks
[1]
Vehicular Adhoc Network (VANET)
[1]
Vibration measurement
[1]
Vibration signal processing
[1]
Virtual Machine
[1]
Virtualization
[2]
VPN
[1]
VPN and non-VPN traffic classification
[1]
Water scarcity
[1]
Watermarked frames
[1]
Watermarking
[1]
Watermarking algorithms
[1]
Wavelet analysis
[1]
web security
[1]
Websites
[2]
WEKA
[5]
Weka
[2]
Weka tool
[1]
Wi-Fi
[2]
WiMAX
[1]
Wireless ad hoc networks
[1]
Wireless connectivity
[1]
wireless local area network
[1]
Wireless sensor networks
[3]
WLAN
[1]
WLAN security
[1]
Wormhole Attack
[1]
Wormhole attack
[1]
WSN
[2]
XGBM
[1]
� Android Adware Detection
[1]