computer science algorithms and bioinformatics software engineering information technology machine learning 3g networks telecommunication computer science and engineering cluster head genetic algorithm cloud computing security female in stem gender gap web and internet computing correlation software wireless sensor networks wsn bioinformatics 5g networks wi-fi call admission control lte repositories open source preservation digital data signal restoration intelligent information & data image internet of things (iot) audio latex due dates assignment wireless sensor networks framework cloud manufacturing(c-mfg) challenges issues security. face detection modeling and simulation northwest nigeria 4g networks network protocols virus cluster head sel medical diagnosis rfid technology data processing artificial intelligene data mining orientation mathematicalformulas cbt facial expression recognition. dsp face recognition scrapers bot programs hackers captcha (completely automated public turing test t cloud search engines. spammer cloud. development platform middleware diabetic retinopathy image compression hard exudates svm automated detection. fundus images improved otsu thresholding simulated annealing. path planning robotic manet clustering dynamic k-means algorithm. route optimization arm9 opnet nursing bed embedded control system. fitness function dependent variables repository explanatory variables malware malware synthesis machine to machine communications (m2m) predictive ubiquitous computing wireless mesh network (wmn) adaptive informant factor (aif) optimized channel allocation (oca) relay nodes (rns) question-answering neutral language processing answer extraction evaluation metrics. vague rule web usage mining expression recognition. feature extraction classification test data. fingerprint recognition pores minutiae vpn singular points dynamic software product lines computing dspl state of the art systematic review firewall markov model security requirement accident analysis technique. dependability requirements safety requirements cyber-physical systems kalman filtering tutorial clusters matchmaking semantic web service description social networks. complex networks community detection methods graph quality function underwater controller detection system sql. hmi subsea tree biclustering microarray data genomic knowledge. heuristic algorithms mobile ad hoc network (manet) survey. security services attacks on manet facial expression recognition; color space; edge d risk - aware risk management timing microwav imaging; breast cancer; hybrid imaging ; faulty modules fault proneness delay systems fault software metrics mobile network worms &trojon. wireless network product measures process quality assurance gqm. cmmi time series analysis grid scalability virtualization web service discovery w3c standards case based reasoning. behaviour prediction sentiment mining social media behaviour tardiness flow time due date total work content scheduling rules fault proneness. empirical validation object-oriented metrics class early software development system validation virtual prototyping data carving file carving tools data recovery digital forensics multimedia file carving medical image. matlab program tumors gui program business process management systems business process management m - commerce. certificates pki wpki operating system formal verification kernel. browser extension whitelist heuristics etc. blacklist jpeg discrete cosine transform. anti-phishing motion capture voice recognition. motioned image sign language converter opinion mining sentiments internet of things localization blurring 360 mixed reality indoor pos languages parts-of-speech tec ma course recommender multiple regression prediction model academic performance predictors algorithms and data structure artificial n blurring & noise security and information assur networking and communications multimedia systems and service mobile and ubiquitous computin it policy and business managem applied cryptography blockchain and distributed sys database and system security necropolitics manufacturing as a service (ma digital manufacturing digital trust risk assessment cluster head selection algori energy efficiency leach sensor node parameters digital transformations digit computer science ict it gender inequality gender balance education balance gender bias diversity equal capabilities sustainability machine learning & application machine learning; very large s scheduli big data  machine learning & risk-aware business process m dsp; face detection; face reco  algorithms and bioinformatic analysis technique. smartphone technology predict co wireless wireless mesh network software system development li computer architecture and real anemia non-invasive methods ambient intelligence human wi data warehousing query proces database architecture locatio computerscience information technologies indoor positioning ethics in computer security hardware-based attacks internet of things (iot) secur physical layer security privacy and anonymity security & network management security of virtual machines trust and privacy ch software security web security ubiquitous computing security worms trojan protectio programming languages technological advancement attendance system attendance management digital technologies artificial brain computer interface (bci) wireless mesh network (wmn); a feature engineeri b big data mapreduce hadoop pig netflow network traffic survivability cost capacity optimization wireless access network. technology games routing protocols algorithms soft computing ( vision-based entomology color features shape feature image processing pattern recognition multimedia ● database and data mining ● embedded system and software adaptive map boolean function entered variable k-map partitioned variable software system development life cyclesoftware eng students communication collaboration edge detection mr objects tp rate sharpeners canny sobel laplace prewitt feature engineering feature selection pca k nearest neighbour logistic regression compter information technonlgy automata theory quantum computation theoretical computer science and algebra information mearning learning artificial intelligence artificial neural networks feed-forward backpropagation convolutional neural network diabetes cardiovascular cancer malaria and mental disorder engineering cybernetics artificial neural network back propagation logic gates human brain project (hbp) cognitive warfare biohacking rfe  machine learning bandwidth degradation bandwidth reservation survey cac • computer architect • security and information assurance • grid and scalable computing computer architecture and real time systems it policy and business management • database and data mining • mobile and ubiquitous computing computing (ai neural networks fuzzy systems etc.) • software engineering • programming languages • social computing bigdata soft computing • multimedia systems and services • networking and communications compute
See more