A
-
Abstractive Summarization
XML ABSTRACTIVE SUMMARY APPROACH [Volume 16, Issue 4, 2016, Pages 89-97]
-
Accuracy of classification P300
A PROPOSED METHOD FOR INCREASE ACCURACY OF CLASSIFICATION P300 SPELLER [Volume 16, Issue 4, 2016, Pages 1-18]
-
Actionscript 3.00
USING ACTIONSCRIPT 3.00 TO DEVELOP AN ANDROID APPLICATION FOR MATHEMATICS COURSE [Volume 16, Issue 3, 2016, Pages 67-79]
-
ALL
A SYSTEM FOR ACUTE LEUKEMIA CELLS SEGMENTATION AND CLASSIFICATION [Volume 16, Issue 4, 2016, Pages 79-87]
-
Android
USING ACTIONSCRIPT 3.00 TO DEVELOP AN ANDROID APPLICATION FOR MATHEMATICS COURSE [Volume 16, Issue 3, 2016, Pages 67-79]
C
-
Change Detection
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
-
Characterization of Steganography Systems
VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN [Volume 16, Issue 1, 2016, Pages 89-98]
-
Clone Refactoring
AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES [Volume 16, Issue 3, 2016, Pages 81-93]
-
Clones Removing
AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES [Volume 16, Issue 3, 2016, Pages 81-93]
-
Cloud Computing
A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING [Volume 16, Issue 1, 2016, Pages 59-69]
-
Clustering
OPPONENT MODELS PREPROCESSING IN REAL-TIME STRATEGY GAMES [Volume 16, Issue 3, 2016, Pages 37-45]
-
Code Clones
AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES [Volume 16, Issue 3, 2016, Pages 81-93]
-
Code Smells
AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES [Volume 16, Issue 3, 2016, Pages 81-93]
-
Complete Ensemble Empirical Mode Decomposition
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
-
Convolutional deep neural networks
CLASSIFICATION OF LOW QUALITY IMAGES USING CONVOLUTIONAL NEURAL NETWORK AND DEEP BELIEF NETWORK [Volume 16, Issue 4, 2016, Pages 19-28]
-
C-Y color model
A SYSTEM FOR ACUTE LEUKEMIA CELLS SEGMENTATION AND CLASSIFICATION [Volume 16, Issue 4, 2016, Pages 79-87]
D
-
Data Management
A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING [Volume 16, Issue 1, 2016, Pages 59-69]
-
Deep Auto Encoder
REDUCING ERROR RATE OF DEEP LEARNING USING AUTO ENCODER AND GENETIC ALGORITHMS [Volume 16, Issue 4, 2016, Pages 41-53]
-
Deep belief network
CLASSIFICATION OF LOW QUALITY IMAGES USING CONVOLUTIONAL NEURAL NETWORK AND DEEP BELIEF NETWORK [Volume 16, Issue 4, 2016, Pages 19-28]
-
Deep learning
REDUCING ERROR RATE OF DEEP LEARNING USING AUTO ENCODER AND GENETIC ALGORITHMS [Volume 16, Issue 4, 2016, Pages 41-53]
-
Disease Ontology
FOORC: A FUZZY ONTOLOGY-BASED REPRESENTATION FOR OBESITY RELATED CANCER KNOWLEDGE [Volume 16, Issue 3, 2016, Pages 15-36]
-
Duplicated Code
AUTOMATIC DETECTING AND REMOVAL DUPLICATE CODES CLONES [Volume 16, Issue 3, 2016, Pages 81-93]
-
DWT
REGISTRATION OF REMOTE SENSING IMAGES BASED ON FEATURE FUSION TECHNIQUES [Volume 16, Issue 3, 2016, Pages 47-66]
E
-
Empirical mode decomposition
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
-
Event Detection
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
F
-
Facial Expression
FACIAL EXPRESSION RECOGNITION BASED ON PRINCIPAL COMPONENTS ANALYSIS [Volume 16, Issue 4, 2016, Pages 55-63]
-
Feature Extraction
FACIAL EXPRESSION RECOGNITION BASED ON PRINCIPAL COMPONENTS ANALYSIS [Volume 16, Issue 4, 2016, Pages 55-63]
-
Finger vein
ENHANCED FINGER VEIN BASED RECOGNITION SYSTEM [Volume 16, Issue 3, 2016, Pages 1-14]
-
Framework
A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS [Volume 16, Issue 1, 2016, Pages 37-47]
-
Functional Dependancy
XML ABSTRACTIVE SUMMARY APPROACH [Volume 16, Issue 4, 2016, Pages 89-97]
-
Fuzzy Ontology
FOORC: A FUZZY ONTOLOGY-BASED REPRESENTATION FOR OBESITY RELATED CANCER KNOWLEDGE [Volume 16, Issue 3, 2016, Pages 15-36]
G
-
Gabor
ENHANCED FINGER VEIN BASED RECOGNITION SYSTEM [Volume 16, Issue 3, 2016, Pages 1-14]
-
Gap-fill
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
-
GCPs
REGISTRATION OF REMOTE SENSING IMAGES BASED ON FEATURE FUSION TECHNIQUES [Volume 16, Issue 3, 2016, Pages 47-66]
-
General Steganography System
VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN [Volume 16, Issue 1, 2016, Pages 89-98]
-
Genetic Algorithm
REDUCING ERROR RATE OF DEEP LEARNING USING AUTO ENCODER AND GENETIC ALGORITHMS [Volume 16, Issue 4, 2016, Pages 41-53]
-
Geometric correction
REGISTRATION OF REMOTE SENSING IMAGES BASED ON FEATURE FUSION TECHNIQUES [Volume 16, Issue 3, 2016, Pages 47-66]
-
GIS
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
-
Grade Diffusion
FAULT NODE RECOVERY ALGORITHM FOR ENHANCINGTHE LIFETIME OF AWIRELESS SENSOR NETWORK [Volume 16, Issue 4, 2016, Pages 65-78]
H
-
Hacking
A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS [Volume 16, Issue 1, 2016, Pages 37-47]
-
Histogram of Gradient HOG
ENHANCED FINGER VEIN BASED RECOGNITION SYSTEM [Volume 16, Issue 3, 2016, Pages 1-14]
I
-
Internet of Things
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
-
ITS
OPPONENT MODELS PREPROCESSING IN REAL-TIME STRATEGY GAMES [Volume 16, Issue 3, 2016, Pages 37-45]
J
-
JAFFE Face Dataset
FACIAL EXPRESSION RECOGNITION BASED ON PRINCIPAL COMPONENTS ANALYSIS [Volume 16, Issue 4, 2016, Pages 55-63]
K
-
Knowledge Representation
FOORC: A FUZZY ONTOLOGY-BASED REPRESENTATION FOR OBESITY RELATED CANCER KNOWLEDGE [Volume 16, Issue 3, 2016, Pages 15-36]
L
-
Land cover
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
-
Learning Vector Quantization
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
-
Link Prediction
REDUCING ATTRIBUTES of FACEBOOK USERS USING ROUGH SET THEORY [Volume 16, Issue 4, 2016, Pages 29-40]
-
Low quality images
CLASSIFICATION OF LOW QUALITY IMAGES USING CONVOLUTIONAL NEURAL NETWORK AND DEEP BELIEF NETWORK [Volume 16, Issue 4, 2016, Pages 19-28]
M
-
Machine Learning
REDUCING ERROR RATE OF DEEP LEARNING USING AUTO ENCODER AND GENETIC ALGORITHMS [Volume 16, Issue 4, 2016, Pages 41-53]
-
Mathematics Course
USING ACTIONSCRIPT 3.00 TO DEVELOP AN ANDROID APPLICATION FOR MATHEMATICS COURSE [Volume 16, Issue 3, 2016, Pages 67-79]
-
M-learning
USING ACTIONSCRIPT 3.00 TO DEVELOP AN ANDROID APPLICATION FOR MATHEMATICS COURSE [Volume 16, Issue 3, 2016, Pages 67-79]
-
MLP
A SYSTEM FOR ACUTE LEUKEMIA CELLS SEGMENTATION AND CLASSIFICATION [Volume 16, Issue 4, 2016, Pages 79-87]
-
MNDWI
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
-
Mobile agent
SECURE MOBILE AGENT TRADER SYSTEM [Volume 16, Issue 1, 2016, Pages 71-88]
N
-
Named entity recognition
MULTITHREAD IN NAMED ENTITY RECOGNITION [Volume 16, Issue 3, 2016, Pages 95-103]
-
NDVI
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
O
-
Obesity Related Cancer
FOORC: A FUZZY ONTOLOGY-BASED REPRESENTATION FOR OBESITY RELATED CANCER KNOWLEDGE [Volume 16, Issue 3, 2016, Pages 15-36]
-
Opponent modeling
OPPONENT MODELS PREPROCESSING IN REAL-TIME STRATEGY GAMES [Volume 16, Issue 3, 2016, Pages 37-45]
-
OWL 2
FOORC: A FUZZY ONTOLOGY-BASED REPRESENTATION FOR OBESITY RELATED CANCER KNOWLEDGE [Volume 16, Issue 3, 2016, Pages 15-36]
P
-
P300 speller
A PROPOSED METHOD FOR INCREASE ACCURACY OF CLASSIFICATION P300 SPELLER [Volume 16, Issue 4, 2016, Pages 1-18]
-
PCA
FACIAL EXPRESSION RECOGNITION BASED ON PRINCIPAL COMPONENTS ANALYSIS [Volume 16, Issue 4, 2016, Pages 55-63]
R
-
Ranking
XML ABSTRACTIVE SUMMARY APPROACH [Volume 16, Issue 4, 2016, Pages 89-97]
-
Real-time Signal Detrending
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
-
Recognition System
ENHANCED FINGER VEIN BASED RECOGNITION SYSTEM [Volume 16, Issue 3, 2016, Pages 1-14]
-
Remote Sensing
USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES USING VISUAL TECHNIQUES TO DETERMINE THE CHANGES [Volume 16, Issue 1, 2016, Pages 19-36]
-
RGB
A SYSTEM FOR ACUTE LEUKEMIA CELLS SEGMENTATION AND CLASSIFICATION [Volume 16, Issue 4, 2016, Pages 79-87]
-
Rich Semantic Graph
XML ABSTRACTIVE SUMMARY APPROACH [Volume 16, Issue 4, 2016, Pages 89-97]
-
Rough Sets
OPPONENT MODELS PREPROCESSING IN REAL-TIME STRATEGY GAMES [Volume 16, Issue 3, 2016, Pages 37-45]
-
Rough set theory
REDUCING ATTRIBUTES of FACEBOOK USERS USING ROUGH SET THEORY [Volume 16, Issue 4, 2016, Pages 29-40]
S
-
Security Model
A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING [Volume 16, Issue 1, 2016, Pages 59-69]
-
Self-Organization Map
REDUCING ATTRIBUTES of FACEBOOK USERS USING ROUGH SET THEORY [Volume 16, Issue 4, 2016, Pages 29-40]
-
SIFT
REGISTRATION OF REMOTE SENSING IMAGES BASED ON FEATURE FUSION TECHNIQUES [Volume 16, Issue 3, 2016, Pages 47-66]
-
Signal Denoising
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
-
Simulation
A NOVEL SECURITY MODEL FOR DATA MANAGEMENT IN CLOUD COMPUTING [Volume 16, Issue 1, 2016, Pages 59-69]
-
Social networks
REDUCING ATTRIBUTES of FACEBOOK USERS USING ROUGH SET THEORY [Volume 16, Issue 4, 2016, Pages 29-40]
-
Support Vector Machine SVM
ENHANCED FINGER VEIN BASED RECOGNITION SYSTEM [Volume 16, Issue 3, 2016, Pages 1-14]
-
SURF
REGISTRATION OF REMOTE SENSING IMAGES BASED ON FEATURE FUSION TECHNIQUES [Volume 16, Issue 3, 2016, Pages 47-66]
-
SVM
FACIAL EXPRESSION RECOGNITION BASED ON PRINCIPAL COMPONENTS ANALYSIS [Volume 16, Issue 4, 2016, Pages 55-63]
T
-
Thresholding
COMPLETE ENSEMBLE EMPIRICAL MODE DECOMPOSITION (CEEMD) FOR REAL-TIME SIGNAL DETRENDING IN IOT APPLICATIONS [Volume 16, Issue 1, 2016, Pages 1-17]
V
-
Video Steganography
VIDEO STEGANOGRAPHY USING LEAST SIGNIFICANT BIT IN FREQUENCY DOMAIN [Volume 16, Issue 1, 2016, Pages 89-98]
W
-
Web server
A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS [Volume 16, Issue 1, 2016, Pages 37-47]
-
Website
A PROPOSED LOGICAL FRAMEWORK FOR ENHANCE WEBSITE'S SECURITY FROMTHE ATTACKS [Volume 16, Issue 1, 2016, Pages 37-47]
-
WSNs
FAULT NODE RECOVERY ALGORITHM FOR ENHANCINGTHE LIFETIME OF AWIRELESS SENSOR NETWORK [Volume 16, Issue 4, 2016, Pages 65-78]
X
-
X.509 certificate
SECURE MOBILE AGENT TRADER SYSTEM [Volume 16, Issue 1, 2016, Pages 71-88]
-
XML Summarization
XML ABSTRACTIVE SUMMARY APPROACH [Volume 16, Issue 4, 2016, Pages 89-97]
Your query does not match with any item