Keyword Index

A

  • AOMDV Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • Authentication A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]

B

  • Banking Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]

C

  • Cepstral coefficients Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
  • Classification Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]
  • Congestion control Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • CRM PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Customer credit risk Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]

E

  • Echo hiding Presenting a Method for Improving Echo Hiding [Volume 2, Issue 1, 2019, Pages 11-24]
  • Email spam detection A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Embedded operating system A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Energy Consumption A Heuristic Method for Node Management in Large-Scale Wireless Sensor Network Considering Connectivity and Energy Consumption [Volume 2, Issue 1, 2019, Pages 53-62]
  • Evolutionary algorithm SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Extended Morphological Profiles Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

F

  • Fault injection A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Feature extraction SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Feature selection A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Fraud SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Fraud detection SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Fruit fly optimization A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Fuzzy logic Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]
  • Fuzzy system Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]

G

  • Guided Filter Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

H

  • Hyperspectral Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

I

  • Incremental Mining PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Intelligent traffic control system Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]

K

  • Key agreement A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]

L

  • Load balancing Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]

M

  • MANET Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]

O

  • OpenFlow Controllers Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]

P

  • Particle swarm optimization A New Feature Selection in Email Spam Detection by Particle Swarm Optimization and Fruit Fly Optimization Algorithms [Volume 2, Issue 2, 2019, Pages 49-62]
  • Performance Evaluation Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
  • Pre-large Itemsets PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Principal Components Analysis Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

Q

  • Quality of Service Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]

R

  • Reactive Routing Increasing the Performance of Reactive Routing Protocol using the Load Balancing and Congestion Control Mechanism in MANET [Volume 2, Issue 1, 2019, Pages 33-42]
  • Risk Assessment Assessment of Customer Credit Risk using an Adaptive Neuro-Fuzzy System [Volume 2, Issue 2, 2019, Pages 19-28]
  • Robustness level assessment A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Robustness testing A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]

S

  • Safety-critical systems A State-aware Approach for Robustness Testing of Embedded Real-Time Operating Systems [Volume 2, Issue 1, 2019, Pages 43-52]
  • Security A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Semi-supervised learning SSLBM: A New Fraud Detection Method Based on Semi- Supervised Learning [Volume 2, Issue 2, 2019, Pages 10-18]
  • Session key A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Smart grids A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Software-Defined Networking (SDN) Performance Evaluation of Software-Defined Networking Controllers: A Comparative Study [Volume 2, Issue 2, 2019, Pages 63-73]
  • Substation A Key Management Schema Based on ECC to Secure the Substation and Control Center Communications in Smart Grids [Volume 2, Issue 1, 2019, Pages 25-32]
  • Support vector machine Spatial-Spectral Classification of Hyperspectral Images Based on Extended Morphological Profiles and Guided Filter [Volume 2, Issue 2, 2019, Pages 2-8]

T

  • Temporal Database PLI-X: Temporal Association Rules Mining in Customer Relationship Management Systems [Volume 2, Issue 2, 2019, Pages 29-48]
  • Traffic density Fuzzy Q-Learning Traffic Light Control based on Traffic Flow and Pedestrian Number Estimated from Visual Information [Volume 2, Issue 1, 2019, Pages 1-10]