A
-
AOMDV
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Authentication
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
B
-
Banking
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
C
-
Cepstral coefficients
Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
-
Classification
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
-
Congestion control
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
CRM
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Customer credit risk
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
E
-
Echo hiding
Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
-
Email spam detection
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Embedded operating system
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Energy Consumption
A Heuristic Method for Node Management in Large-Scale Wireless Sensor Network Considering Connectivity and Energy Consumption [Volume 2, Issue 1, 2019, Pages 53-62]
-
Evolutionary algorithm
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Extended Morphological Profiles
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
F
-
Fault injection
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Feature extraction
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Feature selection
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Fraud
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Fraud detection
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Fruit fly optimization
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Fuzzy logic
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
-
Fuzzy system
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
G
-
Guided Filter
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
H
-
Hyperspectral
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
I
-
Incremental Mining
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Intelligent traffic control system
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
K
-
Key agreement
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
L
-
Load balancing
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
M
-
MANET
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
O
-
OpenFlow Controllers
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
P
-
Particle swarm optimization
A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
-
Performance Evaluation
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Pre-large Itemsets
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Principal Components Analysis
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
Q
-
Quality of Service
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
R
-
Reactive Routing
Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
-
Risk Assessment
Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
-
Robustness level assessment
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Robustness testing
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
S
-
Safety-critical systems
A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
-
Security
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Semi-supervised learning
SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
-
Session key
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Smart grids
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Software-Defined Networking (SDN)
Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
-
Substation
A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
-
Support vector machine
Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
T
-
Temporal Database
PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
-
Traffic density
Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
Your query does not match with any item