Personal Information
Tags
computer science
algorithms and bioinformatics
software engineering
information technology
machine learning
3g networks
telecommunication
computer science and engineering
cluster head
genetic algorithm
cloud computing
security
female in stem
gender gap
web and internet computing
correlation
software
wireless
sensor networks
wsn
bioinformatics
5g networks
wi-fi
call admission control
lte
repositories
open source
preservation
digital data
signal
restoration
intelligent information & data
image
internet of things (iot)
audio
latex
due dates assignment
wireless sensor networks
framework
cloud manufacturing(c-mfg)
challenges
issues
security.
face detection
modeling and simulation
northwest nigeria
4g networks
network protocols
virus
cluster head sel
medical diagnosis
rfid technology
data processing
artificial intelligene
data mining
orientation
mathematicalformulas
cbt
facial expression recognition.
dsp
face recognition
scrapers
bot programs
hackers
captcha (completely automated public turing test t
cloud
search engines.
spammer
cloud.
development
platform
middleware
diabetic retinopathy
image compression
hard exudates
svm
automated detection.
fundus images
improved otsu thresholding
simulated annealing.
path planning
robotic
manet
clustering
dynamic k-means algorithm.
route optimization
arm9
opnet
nursing bed
embedded control system.
fitness function
dependent variables
repository
explanatory variables
malware
malware synthesis
machine to machine communications (m2m)
predictive
ubiquitous computing
wireless mesh network (wmn)
adaptive informant factor (aif)
optimized channel allocation (oca)
relay nodes (rns)
question-answering
neutral language processing
answer extraction
evaluation metrics.
vague rule
web usage mining
expression recognition.
feature extraction
classification
test data.
fingerprint recognition
pores
minutiae
vpn
singular points
dynamic software product lines
computing
dspl
state of the art
systematic review
firewall
markov model
security requirement
accident analysis technique.
dependability requirements
safety requirements
cyber-physical systems
kalman filtering
tutorial
clusters
matchmaking
semantic web service description
social networks.
complex networks
community detection methods
graph
quality function
underwater controller
detection system
sql.
hmi
subsea tree
biclustering
microarray data
genomic knowledge.
heuristic algorithms
mobile ad hoc network (manet)
survey.
security services
attacks on manet
facial expression recognition; color space; edge d
risk - aware
risk management
timing
microwav imaging; breast cancer; hybrid imaging ;
faulty modules
fault proneness
delay systems
fault
software metrics
mobile network
worms &trojon.
wireless network
product
measures
process
quality assurance
gqm.
cmmi
time series analysis
grid
scalability
virtualization
web service discovery
w3c standards
case based reasoning.
behaviour prediction
sentiment mining
social media behaviour
tardiness
flow time due date
total work content
scheduling rules
fault proneness.
empirical validation
object-oriented metrics
class
early software development
system validation
virtual prototyping
data carving
file carving tools
data recovery
digital forensics
multimedia file carving
medical image.
matlab program
tumors
gui program
business process management systems
business process management
m - commerce.
certificates
pki
wpki
operating system
formal verification
kernel.
browser extension
whitelist
heuristics
etc.
blacklist
jpeg
discrete cosine transform.
anti-phishing
motion capture
voice recognition.
motioned image
sign language converter
opinion mining
sentiments
internet of things
localization
blurring
360
mixed reality
indoor pos
languages
parts-of-speech tec
ma
course recommender
multiple regression
prediction model
academic performance
predictors
algorithms and data structure
artificial n
blurring & noise
security and information assur
networking and communications
multimedia systems and service
mobile and ubiquitous computin
it policy and business managem
applied cryptography
blockchain and distributed sys
database and system security
necropolitics
manufacturing as a service (ma
digital manufacturing
digital trust
risk assessment
cluster head selection algori
energy efficiency
leach
sensor node
parameters
digital transformations
digit
computer
science
ict
it
gender inequality
gender balance
education balance
gender bias
diversity
equal capabilities
sustainability
machine learning & application
machine learning; very large s
scheduli
big data machine learning &
risk-aware
business process m
dsp; face detection; face reco
algorithms and bioinformatic
analysis technique.
smartphone technology
predict
co
wireless wireless mesh network
software system development li
computer architecture and real
anemia
non-invasive methods
ambient intelligence human wi
data warehousing
query proces
database architecture
locatio
computerscience
information technologies
indoor positioning
ethics in computer security
hardware-based attacks
internet of things (iot) secur
physical layer security
privacy and anonymity
security & network management
security of virtual machines
trust and privacy ch
software security
web security
ubiquitous computing security
worms
trojan protectio
programming languages
technological advancement
attendance system
attendance management
digital technologies
artificial
brain computer interface (bci)
wireless mesh network (wmn); a
feature engineeri
b
big data
mapreduce
hadoop
pig
netflow
network traffic
survivability
cost
capacity
optimization
wireless access network.
technology
games
routing protocols
algorithms
soft computing (
vision-based entomology
color features
shape feature
image processing
pattern recognition
multimedia
● database and data mining
● embedded system and software
adaptive map
boolean function
entered variable
k-map
partitioned variable
software system development life cyclesoftware eng
students
communication
collaboration
edge detection
mr
objects
tp rate
sharpeners
canny
sobel
laplace
prewitt
feature engineering
feature selection
pca
k nearest neighbour
logistic regression
compter
information technonlgy
automata theory
quantum computation
theoretical computer science and algebra
information
mearning learning
artificial intelligence
artificial neural networks
feed-forward backpropagation
convolutional neural network
diabetes
cardiovascular
cancer
malaria
and mental disorder
engineering
cybernetics
artificial neural network
back propagation
logic gates
human brain project (hbp)
cognitive warfare
biohacking
rfe
machine learning
bandwidth degradation
bandwidth reservation
survey
cac
• computer architect
• security and information assurance
• grid and scalable computing
computer architecture and real time systems
it policy and business management
• database and data mining
• mobile and ubiquitous computing
computing (ai
neural networks
fuzzy systems
etc.) • software engineering
• programming languages
• social computing
bigdata
soft computing
• multimedia systems and services
• networking and communications
compute
See more
Presentations
(1)Documents
(198)Likes
(1)International Journal of Computer Science and Engineering Survey (IJCSES)
IJCSES Journal
•
5 years ago
Personal Information
Tags
computer science
algorithms and bioinformatics
software engineering
information technology
machine learning
3g networks
telecommunication
computer science and engineering
cluster head
genetic algorithm
cloud computing
security
female in stem
gender gap
web and internet computing
correlation
software
wireless
sensor networks
wsn
bioinformatics
5g networks
wi-fi
call admission control
lte
repositories
open source
preservation
digital data
signal
restoration
intelligent information & data
image
internet of things (iot)
audio
latex
due dates assignment
wireless sensor networks
framework
cloud manufacturing(c-mfg)
challenges
issues
security.
face detection
modeling and simulation
northwest nigeria
4g networks
network protocols
virus
cluster head sel
medical diagnosis
rfid technology
data processing
artificial intelligene
data mining
orientation
mathematicalformulas
cbt
facial expression recognition.
dsp
face recognition
scrapers
bot programs
hackers
captcha (completely automated public turing test t
cloud
search engines.
spammer
cloud.
development
platform
middleware
diabetic retinopathy
image compression
hard exudates
svm
automated detection.
fundus images
improved otsu thresholding
simulated annealing.
path planning
robotic
manet
clustering
dynamic k-means algorithm.
route optimization
arm9
opnet
nursing bed
embedded control system.
fitness function
dependent variables
repository
explanatory variables
malware
malware synthesis
machine to machine communications (m2m)
predictive
ubiquitous computing
wireless mesh network (wmn)
adaptive informant factor (aif)
optimized channel allocation (oca)
relay nodes (rns)
question-answering
neutral language processing
answer extraction
evaluation metrics.
vague rule
web usage mining
expression recognition.
feature extraction
classification
test data.
fingerprint recognition
pores
minutiae
vpn
singular points
dynamic software product lines
computing
dspl
state of the art
systematic review
firewall
markov model
security requirement
accident analysis technique.
dependability requirements
safety requirements
cyber-physical systems
kalman filtering
tutorial
clusters
matchmaking
semantic web service description
social networks.
complex networks
community detection methods
graph
quality function
underwater controller
detection system
sql.
hmi
subsea tree
biclustering
microarray data
genomic knowledge.
heuristic algorithms
mobile ad hoc network (manet)
survey.
security services
attacks on manet
facial expression recognition; color space; edge d
risk - aware
risk management
timing
microwav imaging; breast cancer; hybrid imaging ;
faulty modules
fault proneness
delay systems
fault
software metrics
mobile network
worms &trojon.
wireless network
product
measures
process
quality assurance
gqm.
cmmi
time series analysis
grid
scalability
virtualization
web service discovery
w3c standards
case based reasoning.
behaviour prediction
sentiment mining
social media behaviour
tardiness
flow time due date
total work content
scheduling rules
fault proneness.
empirical validation
object-oriented metrics
class
early software development
system validation
virtual prototyping
data carving
file carving tools
data recovery
digital forensics
multimedia file carving
medical image.
matlab program
tumors
gui program
business process management systems
business process management
m - commerce.
certificates
pki
wpki
operating system
formal verification
kernel.
browser extension
whitelist
heuristics
etc.
blacklist
jpeg
discrete cosine transform.
anti-phishing
motion capture
voice recognition.
motioned image
sign language converter
opinion mining
sentiments
internet of things
localization
blurring
360
mixed reality
indoor pos
languages
parts-of-speech tec
ma
course recommender
multiple regression
prediction model
academic performance
predictors
algorithms and data structure
artificial n
blurring & noise
security and information assur
networking and communications
multimedia systems and service
mobile and ubiquitous computin
it policy and business managem
applied cryptography
blockchain and distributed sys
database and system security
necropolitics
manufacturing as a service (ma
digital manufacturing
digital trust
risk assessment
cluster head selection algori
energy efficiency
leach
sensor node
parameters
digital transformations
digit
computer
science
ict
it
gender inequality
gender balance
education balance
gender bias
diversity
equal capabilities
sustainability
machine learning & application
machine learning; very large s
scheduli
big data machine learning &
risk-aware
business process m
dsp; face detection; face reco
algorithms and bioinformatic
analysis technique.
smartphone technology
predict
co
wireless wireless mesh network
software system development li
computer architecture and real
anemia
non-invasive methods
ambient intelligence human wi
data warehousing
query proces
database architecture
locatio
computerscience
information technologies
indoor positioning
ethics in computer security
hardware-based attacks
internet of things (iot) secur
physical layer security
privacy and anonymity
security & network management
security of virtual machines
trust and privacy ch
software security
web security
ubiquitous computing security
worms
trojan protectio
programming languages
technological advancement
attendance system
attendance management
digital technologies
artificial
brain computer interface (bci)
wireless mesh network (wmn); a
feature engineeri
b
big data
mapreduce
hadoop
pig
netflow
network traffic
survivability
cost
capacity
optimization
wireless access network.
technology
games
routing protocols
algorithms
soft computing (
vision-based entomology
color features
shape feature
image processing
pattern recognition
multimedia
● database and data mining
● embedded system and software
adaptive map
boolean function
entered variable
k-map
partitioned variable
software system development life cyclesoftware eng
students
communication
collaboration
edge detection
mr
objects
tp rate
sharpeners
canny
sobel
laplace
prewitt
feature engineering
feature selection
pca
k nearest neighbour
logistic regression
compter
information technonlgy
automata theory
quantum computation
theoretical computer science and algebra
information
mearning learning
artificial intelligence
artificial neural networks
feed-forward backpropagation
convolutional neural network
diabetes
cardiovascular
cancer
malaria
and mental disorder
engineering
cybernetics
artificial neural network
back propagation
logic gates
human brain project (hbp)
cognitive warfare
biohacking
rfe
machine learning
bandwidth degradation
bandwidth reservation
survey
cac
• computer architect
• security and information assurance
• grid and scalable computing
computer architecture and real time systems
it policy and business management
• database and data mining
• mobile and ubiquitous computing
computing (ai
neural networks
fuzzy systems
etc.) • software engineering
• programming languages
• social computing
bigdata
soft computing
• multimedia systems and services
• networking and communications
compute
See more