Now showing items 1-681 of 681

      Subject
      'current [1]
      2ACK scheme [1]
      3D information acquisition [1]
      3D laser scanning [1]
      3D modelling [1]
      3D visualization [1]
      3D-QSAR [1]
      3DES [1]
      5G [1]
      Absolute moment block truncation coding [1]
      Access Point [1]
      Accuracy [3]
      Ad hoc [1]
      Ad hoc networks [1]
      Ad hoc on demand distance vector [1]
      Ad hoc on-demand distance vector routing (AODV) [1]
      Adaptive histogram equalization [1]
      AES [1]
      AES-SPIN [1]
      AESEP [1]
      Aldose reductase 2 inhibitors [1]
      Algorithmic trading [2]
      Algorithms [1]
      Ambtc [1]
      Analysis of performance [1]
      Ancient building reconstruction [1]
      Anti-phishing tools [1]
      Anti-phishing working groups [1]
      Antioxidants [1]
      AODV [10]
      AODV routing protocol [1]
      AODV-I [1]
      ARAN [1]
      Area under Curve (ROC) [1]
      ARP cache poisoning [1]
      Artificial intelligence [4]
      Artificial neural network [1]
      Artificial neural network (ANN) [1]
      ASEP [1]
      Asymmetric key [1]
      Authentication [1]
      Authentication scheme [1]
      Autism spectrum disorders [1]
      Autoencoder [1]
      Automated techniques [1]
      Automatic cephalometric analysis [1]
      AutoML [1]
      AutoSklearn [1]
      Avalanche effect [1]
      Average end-to-end delays [1]
      Average Throughput [1]
      Back-propagation neural networks [1]
      Backpropagation [1]
      Base stations [2]
      Battery power [1]
      Beer production [1]
      Behavior analysis [1]
      BERT [1]
      Big data [1]
      Bilingual news article similarity [1]
      Binarization [1]
      Binarization techniques [2]
      Bioenergetics [1]
      Bitcoin [1]
      Bitcoin price prediction [1]
      Blackhole [1]
      Block graphs [1]
      Block-chain [1]
      Blockchain [2]
      Boolean AND operator [1]
      Boosting [1]
      Botnet [1]
      Breast cancer [1]
      Brightness preservations [1]
      Budget control [1]
      C4.5 [1]
      Canny Edge [1]
      Carrier mobility [1]
      Carrier sensing [1]
      CBR [2]
      Celestial objects [1]
      Cephalometric images [1]
      Chatbots [1]
      CICDDoS2019 dataset [1]
      CLAHE [1]
      Classification [1]
      classification [1]
      Classification (of information) [3]
      Classification technique [2]
      classifiers [1]
      Clone detection approach [1]
      Cloud Computing [5]
      Cloud computing [3]
      Cluster Head [1]
      Cluster head [2]
      Clustering [5]
      CNN [2]
      Code clone [1]
      Code fragment [1]
      Code Smells [1]
      Code smells [2]
      code smells and deep learning [1]
      coefficient [1]
      Communication activities [1]
      Communication systems [1]
      Comparable Corpora [1]
      Comparative analysis [1]
      Comparative performance [1]
      Comparative studies [1]
      Computational methods [1]
      Computer crime [4]
      Computer networks [1]
      Computer system firewalls [1]
      Computing power [1]
      Confidentiality [1]
      Congestion [1]
      congestion [2]
      Congestion adaptive [1]
      Congestion Control [1]
      congestion control [1]
      Congestion control (communication) [1]
      Congestion control protocols [1]
      Content Distribution Network [1]
      contrast enhancement [1]
      Conversational agents [1]
      Conversational AI [1]
      Convolutional Neural Network [1]
      Convolutional neural network [1]
      convolutional neural network [2]
      Cosine similarity [1]
      Cost effectiveness [1]
      Cotton [1]
      Counterfeit Currency [1]
      Cover Text [1]
      CPU Utilization [1]
      Credit card fraud [1]
      Cross company defect prediction (CCDP) [1]
      Cryptocurrency [2]
      Cryptography [3]
      Customer satisfaction [1]
      Cyber Security [1]
      Cyber threat [1]
      Cyberbullying [1]
      D2D Communication [1]
      Dark web [1]
      Darknet [1]
      Data Center [1]
      Data Centre [1]
      Data fusion [1]
      Data handling [1]
      Data Integrity [2]
      Data mining [4]
      Data monitoring [1]
      Data security [1]
      Dataset [1]
      DCF [2]
      DDOS [2]
      DDoS Attack [1]
      DDoS-AT 2022 dataset [1]
      De-authentication attack [1]
      De-Obfuscation [1]
      Decryption process [1]
      Deep Learning [2]
      Deep learning [3]
      deep learning [1]
      Deep learning (DL) [1]
      Deep neural network [1]
      Deep web [1]
      deep-learning [1]
      Defect prediction [3]
      defective printed circuit boards [1]
      Defects [2]
      defects [1]
      Degraded [1]
      Degraded document images [2]
      Degraded documents [1]
      Delay [1]
      Density operators [1]
      DES [1]
      Digital Documents [1]
      Digital forensics [1]
      Digital image [1]
      Digital image watermarking [1]
      Digital signature algorithms [1]
      Digital signatures [2]
      Digital storage [2]
      Discrete wavelet transforms [1]
      Divide and Rule [1]
      Dollar cost averaging [1]
      Domain Name System [1]
      DOS [2]
      DoS attack [1]
      DRDOS [1]
      DSDV [3]
      DSR [2]
      DSR protocol [1]
      dual aromatase-sulphatase inhibitors (DASI's) [1]
      Dynamic analysis [1]
      Dynamic Load Balancing [1]
      Dynamic source routing (DSR) [1]
      E-SPIN [1]
      E2E Delay [1]
      EDAODV [1]
      Eigen faces [1]
      Electron transport chain [1]
      Electronic document identification systems [1]
      Electronic transaction [1]
      Embedding capacity [1]
      Embedding Process [1]
      End-user applications [1]
      Energy [1]
      Energy Consumption [3]
      Energy efficiency [1]
      Energy Efficient Routing [1]
      Energy efficient routing [1]
      Energy requirements [1]
      Energy-entropy [1]
      Ensemble classifier [1]
      Ensemble Learning [1]
      Ensemble learning [2]
      ensemble learning [1]
      entropy [2]
      Epigenetic modifications [1]
      Equalizers [1]
      Error rate [1]
      ESEP [1]
      Estimation methods [1]
      Ethereum [1]
      Euclidean distance [1]
      euler number [1]
      Extended Gradient Boosting Machine [1]
      Extraction process [1]
      Face detection [2]
      Fake news [1]
      Fake News Detection [1]
      False negative rate [2]
      False positive rates [2]
      Fast-flux Networks [1]
      Fault Tolerance [1]
      Fault-prone [1]
      Faults [1]
      Feature analysis [1]
      feature detection [1]
      Feature extraction [1]
      feature mapping [1]
      Feature Matching [2]
      feature matching [1]
      feature selection [1]
      Features Extraction [1]
      Fermentation [1]
      Fine KNN [1]
      Flavonoids [1]
      Forecasting [2]
      Forgery [1]
      Fraud detection [1]
      FTP [2]
      Functional magnetic resonance imaging [1]
      fuzzy histogram equalization [1]
      Gaussian field-based 3D-QSAR [1]
      Gaussian noise (electronic) [1]
      Genetic modulators [1]
      Geographic routing protocols [1]
      Global positioning system [1]
      GloMoSim-203 [1]
      Government sectors [1]
      GPSR [1]
      Gradient based [1]
      Graph Laplacian operators [1]
      Graphic methods [1]
      GRE [1]
      Greedy forwarding [1]
      Greedy perimeter stateless routing [1]
      Green building energy consumption [1]
      Grid computing [6]
      group temporal key [1]
      Gurmukhi [1]
      Handover [1]
      Handwritten Urdu character recognition [1]
      Hashtags [1]
      Hate speech [1]
      Health monitoring [1]
      Heterogeneous network [1]
      Hindi language [1]
      histogram [1]
      Histogram equalizations [1]
      Histogram modification [1]
      Histogram shifting [1]
      Historical documents [2]
      hole 196 vulnerability [1]
      Hops [1]
      HTTP [1]
      Human computer interaction [1]
      Hybrid architecture [1]
      Hypervisor [3]
      IDS [1]
      IEEE [2]
      Illumination [1]
      Image analysis [1]
      Image classification [1]
      Image coding [1]
      Image compression [1]
      Image enhancement [1]
      Image fusion [1]
      Image histograms [1]
      Image Processing [1]
      Image processing [1]
      image processing [1]
      Image registration [1]
      image registration [1]
      Image Segmentation [1]
      image subtraction [1]
      Image subtraction and connected components [1]
      Image watermarking [1]
      IMEP [2]
      In-Band communication [1]
      Information dissemination [1]
      Information Hiding [1]
      Information security [1]
      Information systems [1]
      Information use [1]
      Infrastructure-less networks [1]
      Inspection equipment [1]
      Inspection system [1]
      Intelligent systems [1]
      Intelligent transport systems [1]
      Intelligent vehicle highway systems [1]
      Internet [1]
      Internet manet encapsulation protocols [1]
      Internet protocols [1]
      Intrinsic features [1]
      Intrusion detection [2]
      Intrusion Detection Systems [1]
      intuitionistic fuzzy sets [1]
      IP-Spoofing [1]
      Jaccard similarity [1]
      Jaro-Winkler [1]
      JRip [1]
      K-means clustering [2]
      k-NN [1]
      Kashmiri language [1]
      kFill filter [1]
      KNN [1]
      Knowledge management [1]
      Koshur [1]
      Laplace image [1]
      LBP [1]
      LEACH [3]
      Leach protocols [1]
      Leaching [1]
      Leaf disease [1]
      Learning systems [2]
      Lexical features [1]
      LGBM [1]
      Lifetime Optimization [1]
      ligand-based drug design [1]
      Light GBM [1]
      Light Gradient Boosting Machine [1]
      Limited energies [1]
      lncRNA [1]
      Load Balancing [1]
      Logistic regression [3]
      Long short term memory (LSTM) [1]
      Low energy adaptive clustering hierarchies (LEACH) [1]
      LRM [1]
      Luminance [1]
      MAC [5]
      MAC layer [1]
      Machine Learning [3]
      Machine learning [8]
      Machine Translation [1]
      Machine-learning [1]
      Magnetic resonance imaging [1]
      Malware [2]
      MANET [6]
      MANET routing protocols [1]
      MANET; AODV; [1]
      MANETs [4]
      Manets [1]
      Manhattan Grid [1]
      Manhattans [1]
      MAODV [1]
      Mean [1]
      Mean Intensity [1]
      mean square error [1]
      Median filter [1]
      Medium access control [1]
      MICC-F2000 [1]
      Military applications [2]
      Military photography [1]
      miRNA [1]
      Mitochondrial dysfunction [1]
      Mobile ad hoc networks [6]
      Mobile adhoc network (MANETs) [1]
      Mobile security [3]
      Mobile telecommunication systems [4]
      Mobility [3]
      Mobility Models [1]
      Mode of operations [1]
      Model research [1]
      molecular docking [1]
      molecular dynamics simulations [1]
      Morphological Processing [1]
      MRI Image [1]
      Multi layer perceptron [1]
      Multi-objective programming [1]
      Multi-tenancy [2]
      Multi-timeframe analysis [1]
      Multilayer neural networks [1]
      Multisignature scheme [1]
      n-gram [1]
      Natural Language Processing [1]
      Natural language processing [1]
      Natural language processing (NLP) [1]
      Natural Language Toolkit [1]
      NAV [2]
      Na�ve Bayes [1]
      Nearest neighbor search [1]
      Negation handling [1]
      NetBeans [1]
      Network intrusion detection [1]
      Network routing [1]
      Network Security [3]
      Network security [4]
      Network simulator [1]
      Network-based [1]
      Network-security [1]
      Neural network [1]
      Neural networks [4]
      Neurodevelopmental disorder [1]
      NLP [1]
      Noise estimation [1]
      Non-spam emails [1]
      Nonlinear programming (NLP) [1]
      Nonlocal quantum game [1]
      Nonlocality [1]
      NS [1]
      NS2 [2]
      NSL-KDD dataset [2]
      NTP [1]
      Obfuscation [1]
      Object oriented metrics [3]
      Object oriented programming [2]
      Object recognition [1]
      Object-oriented metrics [1]
      OBM [1]
      OBU [1]
      Occlusion [1]
      Offensive language [1]
      On demand routing protocols [1]
      Opinion mining [1]
      Optical character recognition (OCR) [1]
      Optimization [1]
      Optimized link state routing (OlSR) [1]
      Out-Band communication [1]
      Overhead [1]
      Oxidative stress [1]
      Packet [1]
      Packet delivery ratio [1]
      Packet loss [1]
      Packet networks [1]
      Paper documents [1]
      Parallel Corpora [1]
      Parameters [1]
      Partially entangled states [1]
      Particle swarm optimization (PSO) [1]
      PCA [1]
      PCBs [1]
      PDR [1]
      peak signal to noise ratio [1]
      Peak Signal to Noise Ratio (PSNR) [1]
      Performance analysis [1]
      Personal assistants [1]
      Personal information [1]
      Personalized medicine [1]
      Pharmacophore [2]
      pharmacophore mapping [1]
      Phase correlation [1]
      Phishing [2]
      Phishing Detection [1]
      Phishing detections [1]
      Phishing websites [1]
      Planetary image [1]
      Plant diseases [1]
      Power management (telecommunication) [1]
      Precision [1]
      Precision agriculture [1]
      Preventive maintenance [1]
      Printed circuit boards [1]
      printed circuit boards [1]
      Project onion [1]
      PSNR [1]
      Public- auditing [1]
      Public- auditing. [1]
      QLA [1]
      QSVM [1]
      Quality control [1]
      Quality of service (QoS) [1]
      Quantum advantage [1]
      Quantum computing [1]
      Quantum correlations [1]
      Quantum entanglement [2]
      Quantum strategy [1]
      Query languages [1]
      quinoxalinone [1]
      Railway security [1]
      Random Direction [1]
      Random direction models [1]
      Random forest [1]
      Random under-sampling [1]
      Random waypoints [1]
      Ranking technique [2]
      Ransomeware [1]
      RCH-LEACH [1]
      Rdh [1]
      Reactive protocols [1]
      Recall [1]
      Receiver Operating Characteristic (ROC) curve [1]
      Reconstruction error [1]
      Recurrent neural network (RNN) [1]
      Refactoring [2]
      refactoring [1]
      Refactoring tools [1]
      Relay Node [1]
      Relay node [1]
      Reliability [1]
      Remote areas [1]
      Replay [1]
      resampling [1]
      Reversible data hiding [1]
      RLM [1]
      RoBERTa [1]
      Routers [1]
      Routing [3]
      routing misbehavior [1]
      Routing protocols [7]
      RPGM [2]
      RREP [1]
      RREQ [1]
      RWP [2]
      Salt and pepper noise [1]
      Secret data [1]
      Security [1]
      Security and privacy [1]
      Security threats [1]
      Selection techniques [1]
      selfish node [1]
      Sensor nodes [3]
      Sentiment analysis [2]
      SEP [2]
      Set partitioning in hierarchical tree [1]
      Signal reconstruction [1]
      Signal to noise ratio [1]
      Similarity measurement with LDA cosine similarity [1]
      similarity structural index measure [1]
      Simulator [1]
      Sink [1]
      Sink nodes [1]
      SLA [2]
      Smart agriculture [1]
      Smart farming [1]
      Smiles [2]
      SMNP [1]
      Software defects [2]
      Software engineering [2]
      Software maintenance [1]
      Software quality maintenance [1]
      Space explorations [1]
      Space Ratio [1]
      Space research [1]
      Space technologies [1]
      Spam detection [1]
      Spam Email [1]
      Spam labeling [1]
      Spam labelling [1]
      SPIN [2]
      SQL injection [1]
      standard deviation [1]
      Star graphs [1]
      Stars [1]
      Static analysis [1]
      Statistical Machine Translation [1]
      Statistical tests [4]
      Stealth Man-In-The-Middle attack [1]
      Stego image [1]
      Stego Text [1]
      Stego-Key [1]
      Stemming [1]
      Stock market [1]
      Storage capacity [1]
      Stroke width transform [1]
      Structural magnetic resonance imaging [1]
      Structure similarity [1]
      Support vector machine [1]
      Support vector machines [2]
      Supremacy [1]
      Surveillance system [1]
      Surveys [1]
      SVM [2]
      Sybil Attack [1]
      Symmetric encryption [1]
      Technical indicators [1]
      Technology advances [1]
      TEEN [1]
      Telecommunication links [1]
      Telecommunication networks [2]
      Telecommunication traffic [1]
      TELNET [1]
      Temporally ordered routing algorithms [1]
      text identification [1]
      text independent [1]
      Text mining [1]
      Text processing [1]
      Text Stenography [1]
      TextBlob [1]
      Texture [1]
      Third Party Auditor [1]
      Third Party Auditor [1]
      Thresholding [1]
      Throughput [3]
      Thyroid carcinoma [1]
      Tilt photogrammetry [1]
      Time requirements [2]
      Topic modeling using LDA [1]
      Topology [1]
      Tor [1]
      TORA [2]
      Total phenolics [1]
      TPOT [1]
      Trading strategy [1]
      Traffic characterization [1]
      Traffic control [1]
      Transmission quality [1]
      triazole [1]
      True negative rates [2]
      True positive rates [2]
      Tunnel [3]
      Tweets [4]
      Twitter [2]
      Uck [1]
      Uck. [1]
      UDP [1]
      Unicode [1]
      Unmanned aerial vehicles (UAV) [1]
      Urdu characters [1]
      Urdu OCR [1]
      VADER [1]
      VANET [2]
      Vehicular ad hoc networks [1]
      Vehicular Adhoc Network (VANET) [1]
      Vibration measurement [1]
      Vibration signal processing [1]
      Virtual Machine [1]
      Virtual Machine Migration [1]
      Virtualization [4]
      VPN [1]
      VPN and non-VPN traffic classification [1]
      Water scarcity [1]
      Watermarked frames [1]
      Watermarking [1]
      Watermarking algorithms [1]
      Wavelet analysis [1]
      web security [1]
      Websites [2]
      WEKA [5]
      Weka [2]
      Weka tool [1]
      Wi-Fi [2]
      WiMAX [1]
      Wireless ad hoc networks [1]
      Wireless connectivity [1]
      wireless local area network [1]
      Wireless Sensor Networks [1]
      Wireless sensor networks [3]
      WLAN [1]
      WLAN security [1]
      Wormhole [1]
      Wormhole Attack [2]
      Wormhole attack [1]
      WSN [4]
      XGBM [1]
      � Android Adware Detection [1]