Toggle navigation
Login
Toggle navigation
Browsing Department of Computer Science and Technology by Subject
Knowledge Repository Home
School of Engineering & Technology
Department of Computer Science and Technology
Browsing Department of Computer Science and Technology by Subject
//
Knowledge Repository Home
//
School of Engineering & Technology
//
Department of Computer Science and Technology
// Browsing Department of Computer Science and Technology by Subject
JavaScript is disabled for your browser. Some features of this site may not work without it.
Search DSpace
This Community
Browse
Knowledge Repository
Schools & Collections
By Issue Date
Authors
Titles
Subjects
By Submit Date
This Community
By Issue Date
Authors
Titles
Subjects
By Submit Date
My Account
Login
Register
Browsing Department of Computer Science and Technology by Subject
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
0-9
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
Go
Order:
ascending
descending
Results:
5
10
20
40
60
80
100
Update
Now showing items 1-681 of 681
ascending
descending
5
10
20
40
60
80
100
Subject
'current
[1]
2ACK scheme
[1]
3D information acquisition
[1]
3D laser scanning
[1]
3D modelling
[1]
3D visualization
[1]
3D-QSAR
[1]
3DES
[1]
5G
[1]
Absolute moment block truncation coding
[1]
Access Point
[1]
Accuracy
[3]
Ad hoc
[1]
Ad hoc networks
[1]
Ad hoc on demand distance vector
[1]
Ad hoc on-demand distance vector routing (AODV)
[1]
Adaptive histogram equalization
[1]
AES
[1]
AES-SPIN
[1]
AESEP
[1]
Aldose reductase 2 inhibitors
[1]
Algorithmic trading
[2]
Algorithms
[1]
Ambtc
[1]
Analysis of performance
[1]
Ancient building reconstruction
[1]
Anti-phishing tools
[1]
Anti-phishing working groups
[1]
Antioxidants
[1]
AODV
[10]
AODV routing protocol
[1]
AODV-I
[1]
ARAN
[1]
Area under Curve (ROC)
[1]
ARP cache poisoning
[1]
Artificial intelligence
[4]
Artificial neural network
[1]
Artificial neural network (ANN)
[1]
ASEP
[1]
Asymmetric key
[1]
Authentication
[1]
Authentication scheme
[1]
Autism spectrum disorders
[1]
Autoencoder
[1]
Automated techniques
[1]
Automatic cephalometric analysis
[1]
AutoML
[1]
AutoSklearn
[1]
Avalanche effect
[1]
Average end-to-end delays
[1]
Average Throughput
[1]
Back-propagation neural networks
[1]
Backpropagation
[1]
Base stations
[2]
Battery power
[1]
Beer production
[1]
Behavior analysis
[1]
BERT
[1]
Big data
[1]
Bilingual news article similarity
[1]
Binarization
[1]
Binarization techniques
[2]
Bioenergetics
[1]
Bitcoin
[1]
Bitcoin price prediction
[1]
Blackhole
[1]
Block graphs
[1]
Block-chain
[1]
Blockchain
[2]
Boolean AND operator
[1]
Boosting
[1]
Botnet
[1]
Breast cancer
[1]
Brightness preservations
[1]
Budget control
[1]
C4.5
[1]
Canny Edge
[1]
Carrier mobility
[1]
Carrier sensing
[1]
CBR
[2]
Celestial objects
[1]
Cephalometric images
[1]
Chatbots
[1]
CICDDoS2019 dataset
[1]
CLAHE
[1]
Classification
[1]
classification
[1]
Classification (of information)
[3]
Classification technique
[2]
classifiers
[1]
Clone detection approach
[1]
Cloud Computing
[5]
Cloud computing
[3]
Cluster Head
[1]
Cluster head
[2]
Clustering
[5]
CNN
[2]
Code clone
[1]
Code fragment
[1]
Code Smells
[1]
Code smells
[2]
code smells and deep learning
[1]
coefficient
[1]
Communication activities
[1]
Communication systems
[1]
Comparable Corpora
[1]
Comparative analysis
[1]
Comparative performance
[1]
Comparative studies
[1]
Computational methods
[1]
Computer crime
[4]
Computer networks
[1]
Computer system firewalls
[1]
Computing power
[1]
Confidentiality
[1]
Congestion
[1]
congestion
[2]
Congestion adaptive
[1]
Congestion Control
[1]
congestion control
[1]
Congestion control (communication)
[1]
Congestion control protocols
[1]
Content Distribution Network
[1]
contrast enhancement
[1]
Conversational agents
[1]
Conversational AI
[1]
Convolutional Neural Network
[1]
Convolutional neural network
[1]
convolutional neural network
[2]
Cosine similarity
[1]
Cost effectiveness
[1]
Cotton
[1]
Counterfeit Currency
[1]
Cover Text
[1]
CPU Utilization
[1]
Credit card fraud
[1]
Cross company defect prediction (CCDP)
[1]
Cryptocurrency
[2]
Cryptography
[3]
Customer satisfaction
[1]
Cyber Security
[1]
Cyber threat
[1]
Cyberbullying
[1]
D2D Communication
[1]
Dark web
[1]
Darknet
[1]
Data Center
[1]
Data Centre
[1]
Data fusion
[1]
Data handling
[1]
Data Integrity
[2]
Data mining
[4]
Data monitoring
[1]
Data security
[1]
Dataset
[1]
DCF
[2]
DDOS
[2]
DDoS Attack
[1]
DDoS-AT 2022 dataset
[1]
De-authentication attack
[1]
De-Obfuscation
[1]
Decryption process
[1]
Deep Learning
[2]
Deep learning
[3]
deep learning
[1]
Deep learning (DL)
[1]
Deep neural network
[1]
Deep web
[1]
deep-learning
[1]
Defect prediction
[3]
defective printed circuit boards
[1]
Defects
[2]
defects
[1]
Degraded
[1]
Degraded document images
[2]
Degraded documents
[1]
Delay
[1]
Density operators
[1]
DES
[1]
Digital Documents
[1]
Digital forensics
[1]
Digital image
[1]
Digital image watermarking
[1]
Digital signature algorithms
[1]
Digital signatures
[2]
Digital storage
[2]
Discrete wavelet transforms
[1]
Divide and Rule
[1]
Dollar cost averaging
[1]
Domain Name System
[1]
DOS
[2]
DoS attack
[1]
DRDOS
[1]
DSDV
[3]
DSR
[2]
DSR protocol
[1]
dual aromatase-sulphatase inhibitors (DASI's)
[1]
Dynamic analysis
[1]
Dynamic Load Balancing
[1]
Dynamic source routing (DSR)
[1]
E-SPIN
[1]
E2E Delay
[1]
EDAODV
[1]
Eigen faces
[1]
Electron transport chain
[1]
Electronic document identification systems
[1]
Electronic transaction
[1]
Embedding capacity
[1]
Embedding Process
[1]
End-user applications
[1]
Energy
[1]
Energy Consumption
[3]
Energy efficiency
[1]
Energy Efficient Routing
[1]
Energy efficient routing
[1]
Energy requirements
[1]
Energy-entropy
[1]
Ensemble classifier
[1]
Ensemble Learning
[1]
Ensemble learning
[2]
ensemble learning
[1]
entropy
[2]
Epigenetic modifications
[1]
Equalizers
[1]
Error rate
[1]
ESEP
[1]
Estimation methods
[1]
Ethereum
[1]
Euclidean distance
[1]
euler number
[1]
Extended Gradient Boosting Machine
[1]
Extraction process
[1]
Face detection
[2]
Fake news
[1]
Fake News Detection
[1]
False negative rate
[2]
False positive rates
[2]
Fast-flux Networks
[1]
Fault Tolerance
[1]
Fault-prone
[1]
Faults
[1]
Feature analysis
[1]
feature detection
[1]
Feature extraction
[1]
feature mapping
[1]
Feature Matching
[2]
feature matching
[1]
feature selection
[1]
Features Extraction
[1]
Fermentation
[1]
Fine KNN
[1]
Flavonoids
[1]
Forecasting
[2]
Forgery
[1]
Fraud detection
[1]
FTP
[2]
Functional magnetic resonance imaging
[1]
fuzzy histogram equalization
[1]
Gaussian field-based 3D-QSAR
[1]
Gaussian noise (electronic)
[1]
Genetic modulators
[1]
Geographic routing protocols
[1]
Global positioning system
[1]
GloMoSim-203
[1]
Government sectors
[1]
GPSR
[1]
Gradient based
[1]
Graph Laplacian operators
[1]
Graphic methods
[1]
GRE
[1]
Greedy forwarding
[1]
Greedy perimeter stateless routing
[1]
Green building energy consumption
[1]
Grid computing
[6]
group temporal key
[1]
Gurmukhi
[1]
Handover
[1]
Handwritten Urdu character recognition
[1]
Hashtags
[1]
Hate speech
[1]
Health monitoring
[1]
Heterogeneous network
[1]
Hindi language
[1]
histogram
[1]
Histogram equalizations
[1]
Histogram modification
[1]
Histogram shifting
[1]
Historical documents
[2]
hole 196 vulnerability
[1]
Hops
[1]
HTTP
[1]
Human computer interaction
[1]
Hybrid architecture
[1]
Hypervisor
[3]
IDS
[1]
IEEE
[2]
Illumination
[1]
Image analysis
[1]
Image classification
[1]
Image coding
[1]
Image compression
[1]
Image enhancement
[1]
Image fusion
[1]
Image histograms
[1]
Image Processing
[1]
Image processing
[1]
image processing
[1]
Image registration
[1]
image registration
[1]
Image Segmentation
[1]
image subtraction
[1]
Image subtraction and connected components
[1]
Image watermarking
[1]
IMEP
[2]
In-Band communication
[1]
Information dissemination
[1]
Information Hiding
[1]
Information security
[1]
Information systems
[1]
Information use
[1]
Infrastructure-less networks
[1]
Inspection equipment
[1]
Inspection system
[1]
Intelligent systems
[1]
Intelligent transport systems
[1]
Intelligent vehicle highway systems
[1]
Internet
[1]
Internet manet encapsulation protocols
[1]
Internet protocols
[1]
Intrinsic features
[1]
Intrusion detection
[2]
Intrusion Detection Systems
[1]
intuitionistic fuzzy sets
[1]
IP-Spoofing
[1]
Jaccard similarity
[1]
Jaro-Winkler
[1]
JRip
[1]
K-means clustering
[2]
k-NN
[1]
Kashmiri language
[1]
kFill filter
[1]
KNN
[1]
Knowledge management
[1]
Koshur
[1]
Laplace image
[1]
LBP
[1]
LEACH
[3]
Leach protocols
[1]
Leaching
[1]
Leaf disease
[1]
Learning systems
[2]
Lexical features
[1]
LGBM
[1]
Lifetime Optimization
[1]
ligand-based drug design
[1]
Light GBM
[1]
Light Gradient Boosting Machine
[1]
Limited energies
[1]
lncRNA
[1]
Load Balancing
[1]
Logistic regression
[3]
Long short term memory (LSTM)
[1]
Low energy adaptive clustering hierarchies (LEACH)
[1]
LRM
[1]
Luminance
[1]
MAC
[5]
MAC layer
[1]
Machine Learning
[3]
Machine learning
[8]
Machine Translation
[1]
Machine-learning
[1]
Magnetic resonance imaging
[1]
Malware
[2]
MANET
[6]
MANET routing protocols
[1]
MANET; AODV;
[1]
MANETs
[4]
Manets
[1]
Manhattan Grid
[1]
Manhattans
[1]
MAODV
[1]
Mean
[1]
Mean Intensity
[1]
mean square error
[1]
Median filter
[1]
Medium access control
[1]
MICC-F2000
[1]
Military applications
[2]
Military photography
[1]
miRNA
[1]
Mitochondrial dysfunction
[1]
Mobile ad hoc networks
[6]
Mobile adhoc network (MANETs)
[1]
Mobile security
[3]
Mobile telecommunication systems
[4]
Mobility
[3]
Mobility Models
[1]
Mode of operations
[1]
Model research
[1]
molecular docking
[1]
molecular dynamics simulations
[1]
Morphological Processing
[1]
MRI Image
[1]
Multi layer perceptron
[1]
Multi-objective programming
[1]
Multi-tenancy
[2]
Multi-timeframe analysis
[1]
Multilayer neural networks
[1]
Multisignature scheme
[1]
n-gram
[1]
Natural Language Processing
[1]
Natural language processing
[1]
Natural language processing (NLP)
[1]
Natural Language Toolkit
[1]
NAV
[2]
Na�ve Bayes
[1]
Nearest neighbor search
[1]
Negation handling
[1]
NetBeans
[1]
Network intrusion detection
[1]
Network routing
[1]
Network Security
[3]
Network security
[4]
Network simulator
[1]
Network-based
[1]
Network-security
[1]
Neural network
[1]
Neural networks
[4]
Neurodevelopmental disorder
[1]
NLP
[1]
Noise estimation
[1]
Non-spam emails
[1]
Nonlinear programming (NLP)
[1]
Nonlocal quantum game
[1]
Nonlocality
[1]
NS
[1]
NS2
[2]
NSL-KDD dataset
[2]
NTP
[1]
Obfuscation
[1]
Object oriented metrics
[3]
Object oriented programming
[2]
Object recognition
[1]
Object-oriented metrics
[1]
OBM
[1]
OBU
[1]
Occlusion
[1]
Offensive language
[1]
On demand routing protocols
[1]
Opinion mining
[1]
Optical character recognition (OCR)
[1]
Optimization
[1]
Optimized link state routing (OlSR)
[1]
Out-Band communication
[1]
Overhead
[1]
Oxidative stress
[1]
Packet
[1]
Packet delivery ratio
[1]
Packet loss
[1]
Packet networks
[1]
Paper documents
[1]
Parallel Corpora
[1]
Parameters
[1]
Partially entangled states
[1]
Particle swarm optimization (PSO)
[1]
PCA
[1]
PCBs
[1]
PDR
[1]
peak signal to noise ratio
[1]
Peak Signal to Noise Ratio (PSNR)
[1]
Performance analysis
[1]
Personal assistants
[1]
Personal information
[1]
Personalized medicine
[1]
Pharmacophore
[2]
pharmacophore mapping
[1]
Phase correlation
[1]
Phishing
[2]
Phishing Detection
[1]
Phishing detections
[1]
Phishing websites
[1]
Planetary image
[1]
Plant diseases
[1]
Power management (telecommunication)
[1]
Precision
[1]
Precision agriculture
[1]
Preventive maintenance
[1]
Printed circuit boards
[1]
printed circuit boards
[1]
Project onion
[1]
PSNR
[1]
Public- auditing
[1]
Public- auditing.
[1]
QLA
[1]
QSVM
[1]
Quality control
[1]
Quality of service (QoS)
[1]
Quantum advantage
[1]
Quantum computing
[1]
Quantum correlations
[1]
Quantum entanglement
[2]
Quantum strategy
[1]
Query languages
[1]
quinoxalinone
[1]
Railway security
[1]
Random Direction
[1]
Random direction models
[1]
Random forest
[1]
Random under-sampling
[1]
Random waypoints
[1]
Ranking technique
[2]
Ransomeware
[1]
RCH-LEACH
[1]
Rdh
[1]
Reactive protocols
[1]
Recall
[1]
Receiver Operating Characteristic (ROC) curve
[1]
Reconstruction error
[1]
Recurrent neural network (RNN)
[1]
Refactoring
[2]
refactoring
[1]
Refactoring tools
[1]
Relay Node
[1]
Relay node
[1]
Reliability
[1]
Remote areas
[1]
Replay
[1]
resampling
[1]
Reversible data hiding
[1]
RLM
[1]
RoBERTa
[1]
Routers
[1]
Routing
[3]
routing misbehavior
[1]
Routing protocols
[7]
RPGM
[2]
RREP
[1]
RREQ
[1]
RWP
[2]
Salt and pepper noise
[1]
Secret data
[1]
Security
[1]
Security and privacy
[1]
Security threats
[1]
Selection techniques
[1]
selfish node
[1]
Sensor nodes
[3]
Sentiment analysis
[2]
SEP
[2]
Set partitioning in hierarchical tree
[1]
Signal reconstruction
[1]
Signal to noise ratio
[1]
Similarity measurement with LDA cosine similarity
[1]
similarity structural index measure
[1]
Simulator
[1]
Sink
[1]
Sink nodes
[1]
SLA
[2]
Smart agriculture
[1]
Smart farming
[1]
Smiles
[2]
SMNP
[1]
Software defects
[2]
Software engineering
[2]
Software maintenance
[1]
Software quality maintenance
[1]
Space explorations
[1]
Space Ratio
[1]
Space research
[1]
Space technologies
[1]
Spam detection
[1]
Spam Email
[1]
Spam labeling
[1]
Spam labelling
[1]
SPIN
[2]
SQL injection
[1]
standard deviation
[1]
Star graphs
[1]
Stars
[1]
Static analysis
[1]
Statistical Machine Translation
[1]
Statistical tests
[4]
Stealth Man-In-The-Middle attack
[1]
Stego image
[1]
Stego Text
[1]
Stego-Key
[1]
Stemming
[1]
Stock market
[1]
Storage capacity
[1]
Stroke width transform
[1]
Structural magnetic resonance imaging
[1]
Structure similarity
[1]
Support vector machine
[1]
Support vector machines
[2]
Supremacy
[1]
Surveillance system
[1]
Surveys
[1]
SVM
[2]
Sybil Attack
[1]
Symmetric encryption
[1]
Technical indicators
[1]
Technology advances
[1]
TEEN
[1]
Telecommunication links
[1]
Telecommunication networks
[2]
Telecommunication traffic
[1]
TELNET
[1]
Temporally ordered routing algorithms
[1]
text identification
[1]
text independent
[1]
Text mining
[1]
Text processing
[1]
Text Stenography
[1]
TextBlob
[1]
Texture
[1]
Third Party Auditor
[1]
Third Party Auditor
[1]
Thresholding
[1]
Throughput
[3]
Thyroid carcinoma
[1]
Tilt photogrammetry
[1]
Time requirements
[2]
Topic modeling using LDA
[1]
Topology
[1]
Tor
[1]
TORA
[2]
Total phenolics
[1]
TPOT
[1]
Trading strategy
[1]
Traffic characterization
[1]
Traffic control
[1]
Transmission quality
[1]
triazole
[1]
True negative rates
[2]
True positive rates
[2]
Tunnel
[3]
Tweets
[4]
Twitter
[2]
Uck
[1]
Uck.
[1]
UDP
[1]
Unicode
[1]
Unmanned aerial vehicles (UAV)
[1]
Urdu characters
[1]
Urdu OCR
[1]
VADER
[1]
VANET
[2]
Vehicular ad hoc networks
[1]
Vehicular Adhoc Network (VANET)
[1]
Vibration measurement
[1]
Vibration signal processing
[1]
Virtual Machine
[1]
Virtual Machine Migration
[1]
Virtualization
[4]
VPN
[1]
VPN and non-VPN traffic classification
[1]
Water scarcity
[1]
Watermarked frames
[1]
Watermarking
[1]
Watermarking algorithms
[1]
Wavelet analysis
[1]
web security
[1]
Websites
[2]
WEKA
[5]
Weka
[2]
Weka tool
[1]
Wi-Fi
[2]
WiMAX
[1]
Wireless ad hoc networks
[1]
Wireless connectivity
[1]
wireless local area network
[1]
Wireless Sensor Networks
[1]
Wireless sensor networks
[3]
WLAN
[1]
WLAN security
[1]
Wormhole
[1]
Wormhole Attack
[2]
Wormhole attack
[1]
WSN
[4]
XGBM
[1]
� Android Adware Detection
[1]