segmentation security steganography feature extraction wavelet transform face recognition image processing classification dwt authentication artificial neural network encryption cryptography genetic algorithm ofdm svm mimo digital forensics denoising pattern recognition performance machine learning edge detection biometrics natural language processing fuzzy logic dct clustering information security data mining image compression watermarking vector quantization psnr neural network fusion object detection image registration pattern matching digital image processing network security cloud computing neural networks lattice reduction image fusion sift independent component analysis image segmentation fft robustness wimax computer vision gene expression routing deep learning principal component analysis fractional fourier transform hidden markov model prediction cbir compression wireless sensor networks sentiment analysis text mining speckle noise pca image processing. aodv image enhancement software engineering digital image watermarking ber hough transform multimodal adaptive filter reversible data hiding matlab k-means behavior analysis covid-19 contourlet transform decryption cognitive radio mse ids surf mobile computing privacy thresholding discrete wavelet transform biometric remote sensing image encryption histogram lms semantic web chattering phenomenon data hiding vanet iot feature selection ediscovery energy support vector machines speaker recognition fuzzy principle component analysis imperceptibility quality of service steganalysis simulation fuzzy inference system fuzzy sliding mode controller filtering corporate governance numerical simulation firm performance hierarchical clustering magnetic resonance imaging information hiding object tracking preprocessing trust bioinformatics transfer learning intrusion detection systems mobile security nlp user experience wavelet packet transform systematic literature review corpus linguistics speech support vector machine template matching molecular docking ann papr knowledge creation medical imaging spectrum sensing electroencephalogram (eeg) artificial intelligence motion estimation median filter simulink manet ontology gabor filter data cleaning digital evidence haar wavelet digital watermarking information extraction genetic algorithms modeling peak signal to noise ratio fingerprint grid computing discrete cosine transform image analysis attacks wlan point cloud complex k-best algorithm fuzzy c-means eeg adaptive threshold iris recognition image denoising som gaussian mixture model texture analysis interpolation entropy qos android detection bandwidth gpu phishing principal component analysis (pca) algorithm sliding mode controller sensors color image segmentation localization throughput gabor wavelet image clustering computer security canny compressive sensing mathematical morphology anova super-resolution channel estimation correlation speech enhancement dtcwt diligent drivers ssim image transform jpeg2000 agent drivers image rgb instantaneous frequency estimation agents read only memory (rom) simulink. hvs speckle digital phase locked loop (dpll) field programmable gate array (fpga) change detection threshold mobility patterns graph theory simulator svm. euclidian distance lossy compression facial expression image reconstruction lossless compression taxonomy effectiveness network performance car-following cpm ce-ofdm congestion fuzzy c-means clustering blind source separation adaptive filtering real time discrete cosine transform (dct) short message service evacuation time reversible watermarking computer networks reputation active shape model fir filter convolution code jpeg watershed transform sliding mode control computed tomography black hole attack iterative maodv odmrp adaptive method collaboration wiki performance analysis security issues voice affect aware systems smart and assisted living smart home affective states human computer interaction confidentiality msb mobile forensics distributed systems information technology radon transform filter bank luminance wireless data security access points corporate social responsibility (csr) face detection reverse engineering virtualization accuracy assessment wireless network hill cipher design drug discovery social media ocr distortion malware detection static analysis dynamic analysis grid security mobile devices huffman encoding wavelet big data kinect human computer interaction. continuous wavelet transform snr fuzzy logic control point cloud library adversarial attacks evasion attacks point data pre-processing. alert classification thin plate clahe comparison cloud synthesis digitization kambaata language. speaker identification stemming algorithm kfcg dft rule-based stemmer kambaata stemmer gaussian distribution. stego image applications cluster mfcc wavelet packet integrity bitcoin security protocol software quality usability scheduling mutual information participatory ergonomics gaussian noise process migration stereo matching cbr cycle spinning lms algorithm key management fuzzing teager energy operator thrsholding function walsh transform human factors artifacts statistical modeling multi-agent system signature verification wireless mesh networks signal classification chirp usability testing copyright protection video processing optical flow electroencephalogram brain computer interface multimodal biometrics internet network qos nlms similarity consistency artificial neural networks orientation internet of things image restoration verification dsp kit tms320c6713. functional magnetic resonance imaging scada breast cancer ecg correlation coefficient access control list firewall personality fourier transform data editing classification models airplane crashes south africa mobile learning recognition rate work organization graphical user interface ieee 802.11n ipt forwarding wireless backhaul networks knowledge loss knowledge sharing wavelet transformation agile software development serial elastic actuator mimo-ofdm bond graph optical character recognition (ocr) count-to-infinity network convergence network reliability adc spectral analysis offline signature verification ai superpixels gis information retrieval hybrid control identity linking email fraud noise cancellation facial expressions product code vector quantizers watermarking. ar model prediction. solar cell energy stenography optimization distributed algorithm standard arabic exascale computing cuda parallelism quicksort linear predictive coding singular value decomposition alert management corpus reduction of false positive alerts diffusion confusion dicom object recognition setswana survey morphological analyzer and generator. smes sequential constructive crossover phonetization traveling salesman problem bayesian networks spectrum sharing robot manipulator pitch spike sorting mri registration umts iterative soft decoding se enumeration. lesion modulation classification fcm infrastructure phonetic transcription data embedding mems evolutionary algorithm feedback embedded system iris patterns & brain waves electrodes lbs network scenarios covariance matrix electroencephalography (eeg) m-commerce parallel processing image registration. manets monitoring and surveillance image watermarking corner detection concrete it canny edge detection histogram equalization cloud security ipv4 ipv6 image contrast enhancement fast handover medical image compression character recognition precision and recall image retrieval feature space scm sequence video multicast molecular dynamics metrics hsv wavelets mobility management information quality supply chain metric vehicular ad hoc networks peak signal-to-noise ratio (psnr) voice activity detector image quality neuro image coding handwritten character recognition signal processing particle swarm optimization (pso) measurements real-time dsp congestion control k-nearest neighbor nearest neighbour pre-processing spatial domain security. productivity connectivity super resolution multi-hop autonomous driving performance evaluation network honeypot retrieval classification scoring analysis survey data histogram. malaria detection mobile ip handover latency link layer information noise reduction unscented kalman filter image quality assessment decision support lifting wavelet transform monitoring soft thresholding adaptive interpolation gprs gps embedded systems kernel fast fourier transform (fft) wsn search engine rbc classification wavelet analysis smmes target classification. stationary wavelet bicoherence sybil attacks similarity measure malicious node hos traditional turkish art music. histogram comparison bispectrum maximum likelihood estimation time-varying autoregressive model wax-kailath algorithm. music information retrieval dynamic key generation basis functions crud. data at rest security low-pass differentiator multi-phase power-clocked adiabatic circuits. finite-impulse response (fir) cfar image denosing fault attacks phased array radar digital beamforming jacobi symbol mobile platforms phase-shift hrv re-sampling radar anti-forensics electrocardiogram signal. dictionary learning. sparse representation phonetic database htk automatic segmentation. maus path tracing scheme ad hoc network sinkhole attacks resolution enhancement. earth mover’s distance locally synchronous (ls) undecimated double density wavelet transform digital filters. globally asynchronous locally synchronous (gals) image resolution elliptic curve digital signature algorithm (ecdsa) static adiabatic logic cryptography algorithms compressor carotid pulse non-invasive iir filter montgomery ladder b-spline modular exponentiation cepal (complementary energy path adiabatic logic) adaptive beamformer implementation 2d object filling object filling non subsampled conoturlet transform : face recognition (fr) radon transform (rt) ertu leaf area. leaf morphology perimeter yellow rust spiral band. dvorak technique elliptic fourier descriptors cyclone cloud intensity svm classifier. handwritten hindi text shape based features bayes classifier mrf. skin color detection neural networks. dpcm backpropagation daubechies wavelet situation assessment median with weight correlation distortion metrics additive noise nonlinear image restoration monochrome image denoising sfcm volumetric image compression cumulants indian scripts nonlinear mapping electronic nose radial basis functions multilayer perception regularization model validation inverse problems in image processing cross-validation protection neural network. noise removal dialation morphology morphology operation preferred color memory color multiple-kernal. gaussian kernal spectral reflectance reconstruction adaptive pseudo-inverse colorimetry. quadrature filter active contour linear structure tensor space technology satellite images electro-optical sensors. orthogonal transforms. key frame similarity measures color matching. bcc melanoma skin cancer scc tumor extraction level set method. co-clustering method object holes scaled conjugate gradient. sliding window amplitude feature contour feature transition feature low level visual features color categorization of objects to artificial and natura objects' super-class categorization local and global features frequency. cut-out style animation background replacement magnets. video compression. quad-tree normalized cross correlation flexible cystoscopy zero-mean normalized cross- correlation handling pattern. position tracking skin color model. skin tone seamless cloning poisson editing image inpainting spectral correlation matrix hyperspectral compression band regrouping multi-gene genetic algorithm teleradiology dual watermarking adaptive compression multiobjective fitness function froth flotation mean sum of absolute difference :maxima modulus maxima modulus chains. principal component analysis(pca) contourlet transform(ct) frequency localization color image watermarking flame photometer wiener filter medical equipment color embedding and retrival color to gray and back counterfeiting multicast. ecdlp dynamic byte substitution sub key groups. pseudo-random numbers least significant bit. embedding data sbr algo password security password utilization password management. spatio-temporal shape variation a priori knowledge scintigraphic sequences boosting survey. remote sensing images gray- scale morphological analysis structuring element fuzzy set ground truth bsd (berkeley segmentation database) area analysis rooftop detection otsu’s thresholding sparseness hessian evaluation ggvf anisotropic flow edge extraction active contours spatial convolution wavelet lifting scheme longest string correlation distance prcp moments lsrr minkowski distance indoor-outdoor image classification color correlated temperature color segmentation image-based fusion data fusion via non-linear convolution multi-senor data fusion skin color enhancement multiscale transformation colorization color space spatial domain embedding stegnography dominant point detection nonparametric non-heuristic error bound ellipse detection fluorescence microscopy bio-cell organelles edge sharpener color models evaluation metrics learning method fast discrete curvelet transform motion detection sobel image subtraction compressing image interpolation method svd method microarray human recognition key-points musculoskeletal injuries physiological risk 3-d radon transform linear discriminate analysis (lda) advanced encryption standard(aes) s-box dynamic s-box generation roaming handover component steganalysis distortion metric audio quality measures master node updated database secure architecture design semantic message addressing zrp dsr dymo fair share fair share scheduling resource allocation anti-phishing mechanism cch image clustering and retrieval biometric levels physiognomy psychometrics ophthalmogeometry gunas value at risk archimedean copula dependence weibull distribution wavelets transforms cosine transforms security system fingerprint matching image manipulation biometric watermarking edge block analysis template quality analysis biometric template security template invariability vancomycin resistant genes plasmodium sp. enterococci sp. sequence analysis giemsa falciparum vivax malariae mammograms speech compression network architecture one-class-in-one-network (ocon) all-class-in-one-network (acon) quality model quality metrics stakeholders quality assurance non-blocking approach fault tolerant co-ordinated checkpointing mobile computing system attack chained codes complexity audio watermarking multiple scrambling mobile communication devices watermark shape adaptive-discrete wavelet transform. visual model end user license agreements distributed software and license key management user datagram protocol packets packet loss mobile ip handover distributed denial of service email discreet wavelet transform (dwt) operating condition line support forces signature real time ids intruders network discovery underwater acoustic network protocol permutation entropy stuttering time series correlation dimension server node (sn) cluster head (ch) network lifetime wireless sensor network (wsn) embedding strength parameters wavelet fusion drive test mobile phones hand-offs lexisearch bound bottleneck traveling salesman alphabet table. multilayer perceptron and face recognition survey paper virtual instrument. labview field winding housing complexes pv-utility solar system oil price investment pricing policy user equilibrium managed lanes low-snr. spike classification principal-component analysis linear discriminant analysis drug discovery. inference network chemical databases molecular similarity searching np-complete spoofing telecommunication dynamic training electrical impedance tomography alopex algorithm divided electrode method equivalent circuit model query rewriting friction coefficient surface film partitioning design trotter profiling heat sink spice model peltier effect heat pump asynchronous adder vhdl simulation carry save adder synchronous adder unsteady and steady jet pulse jet flow separation vortex formation mass flow rate mixing enhancement er nonlinear permanent progressive wave steep water gravity waves adaptive observer nonlinear systems margin parameter variation ground effect cylindrical jet jet separation renewable energy minimal transversals image feature extraction hybrid classifier subcellular phenotype images classification geraniol cymbopogon citratus aldose reductase myrcene citral multi-resolution analysis signature identification dna microarray soft computing pathologist case-based reasoning clinical support system dna sequence index structure large database rdms indexing sequence transformation complex object uml-bd fingercode fingerprint recognition hyperline segment fuzzy neural network gaussian mixture model (gmm) electromyogram xml proteomics protein annotation database jevbase functional database svmprot japanese encephalitis prognosis heavy metals bioremediation biometrics identification minutiae points singular points face alignment query gene gene ontology top-down approach biclustering gene expression data clinical trial basic research data manipulation health management data monitorinh compression gain biological sequences chromosome cross chromosomal similarity identification multicast routing delay and cost. stream processing environment metrological data pki pmi kerberos an improved trust model x.509 standard framework kenya 3d face model nearest neighbor virtual images 3d shape bilinear pairing cdh problem multisignature scheme public key cryptography proxy signature scheme investor agent mfc super market user agent 1 user mobile agent 1 secure electronic transaction banker agent effectivenes arabic language weka jrip three dimensional database ecommerce dynamic web mutual exclusion token critical section computer crime internet security resource efficient fault tolerance byzantine faults pretty good privacy (pgp) secure socket layer (ssl) trusted third party (ttp) associative rule mining sequence derived features amino acid forensic investigation digital crime search & seizure image recognition weight matrix associative memory ant colony algorithms multimedia communication multicast tree information retrieval performance analysis hu-moments classifiers cross-validation. haralick knn rbf dermofit. oil pipeline leak detection pump failure. mass balance arrhythmia detection. aliasing heterodynes. reconstruction sampling extracellular recording. matlab® toolbox network analysis bio signal processing modulation recognition non-parametric. vertical box control chart rls benes network all-optical network (aon). optical network management optical cross connect (oxc) information retrieval systems diacritics cluster heads cloud architecture crossing number post-processing algorithm afis multi-bands wavelet semi blind watermark detection auto-flushing low operational power rfid module line follower robotic arm. mathematical model ebola virus disease. epidemiology infected epidemic sir recovered susceptible parametric stereo. mdct parametric audio coding sign language recognition height to width ratio ycrcb color space. pan sharpened multispectral image role based access control rbac caching technique business process management system bpms convergance diifferent variants adaptive step size dm5. multi agent system lunix read hat platform distributed secure system access write net non-ocr captcha2 ocr (optical character recognition) hijacking botnet peer-to-peer network embedded zerotree wavelet set partitioning in hierarchical trees cr cad metadata logistic regression medical dataset sensitivity analysis simple mail transfer protocol visualization knowledge discovery security framework security analysis computer attacks expert system anomaly detection distributed data mining wireless sensor network system reliability stochastic-flow network alert clustering false positive alert reduction tcp syn flood tcp header ip header three-way handshake rate-based detection lbg kmcg code vectors optimized multiple huffman tables omht performance analysis image encryption and compression concept mapping digital investigations case domain modeling classification accuracy security maturity model security self study maturity model security measure black box mirroring network backup system raid backup nir node our-nir svm classifier otsu thresholding symmetric encryption hash algorithm a symmetric encryption concurrent programming parallel programming matrix multiplication multi-core processors communication protocol parallel genetic algorithms job shop scheduling problem asymmetric key nonlinear system cryptographic algorithm data compression aco fake website association and classification technique payload facial recognition training image discriminate lda. audio- visual client recognition multi-model biometric system one time pad arithmetic coding hexadecimal network connectivity twin typographic multilingualism computing diacritical marks sparse random projection centralized defense source address entropy deployment traffic cluster entropy distributed defense ddos handicapped internet brwosing phased arrays. time dissemination bhattacharyya distance p-wave picking seismic data. seisming signal processing chaotic communication error probability sequences iterative soft decoding. k-best algorithm sparse recovery relaxation methods greedy algorithms lms approximation sub-nyquist rate. digital forensic investigations. data carving cloud storage forensics data remnants cloud application artifacts indian sign language category-level map-level image classification comparison. accuracy measures medical image contourlet transform. node path graph network friendship link online social network multifaceted text categorization arabic natural language processing hierarchical text categorization oromo language computational methods. lexical distance levenshtein algorithm oromo dialect ontology learning systems ontology engineering ontology learning ontology evaluation. weak signals similarity function. decision making process anticipative information bi-directional gpsr omnet++. sumo tiered storage. storage virtualization array signal processing calibration wavelet. sad. stereo vision robotic correspondence algorithm l0 sparsity blind deconvolution image restoration. directional filtering deblurring motion blur high dynamic range imaging ghosting artefacts single shot imaging. multiple exposure fusion face turn detection. eye blink alcoholic detection heartbeat passive detection. resampling image forgery golden section search. brightness preservation human visual system back propagation neural networks robust. imperceptible zernike moments contactless biometry sampled data circuits multivariate regression. eigenfeatures three-dimensional face shape shape from shading sine transform. fresnel transform cosine transform diffraction blood cell analysis. extreme learning machine (elm) smart phone discrete wavelet transform (dwt). cover image adaptive scaling lwt entropy. contour detection illegal sand mining color based segmentation. ebcot. spread spectrum (ss) watermarking technique quantization index modulation (qim) anaglyphic 3d images robust watermarking. feature extraction. content-based image retrieval semantics spatial filter cost benefits higher education cost estimate surveillance anomalous events detection foreground detection frame extraction background subtraction erp success factors erp enterprise resource planning saudi arabia residual coding redundancy. low rate wireless personal area network ieee 802.15.4 key management system. lr-wpan social networks. covert channels keylogger os (operating system) high performance computing [ chip multi-core software challenges microprocessor benchmark ping-pong effect cpu affinity tfc information system information-security measurement time complexity. grouping comparison sort merge sort sort quick sort task management browser web. guidelines revisit lookup table (lut) color management system (cms) paper check print. colorimetric reproduction inkjet color printer customer knowledge technology acceptance model. e-banking xor key sensitivity. digital signature. icn denial of service erasure coding forward error correction. data reliability coercion-resistance intra-operator agreement measurement error body dimensions inter-operator. job performance workforce requirements. future skills organizational skills intention organic food consumer behaviour. fault detection and isolation zero gravity control. eigenvector trajectory planning. free-configuration space motion planning formation. vtol flocking under-actuated customer mobile usability mobile transaction it innovation acceptance souq.com reference chain. joint encryption and error correction social media security cyber threats. xkeyscore heartbleed detection ssl beast attack crime attack tls rc4. mobile-learning model. adaptive of mobile learning cache poisoning dns dnssec dos dns hijacking. banking security chip and pin atm. gammachirp filter impulsive noise. nfc. e-payment electronic voting. hybrid encryption incoercible encryption receipt-freeness deniable encryption edge antimagic total labelling cycles fan graphs paths conversion relational schema into xml schema xsd schema transformation schema xml schema. multinomial specificity misclassifications. group re-test sensitivity educational assessment e-learning multiple choice questions generation unsupervised relation extraction biomedical domain. automatic assessment dynamic capabilities external competencies external environment. relationship capability optimism and overconfidence regulatory focus theory strategic key performance indicators. benchmarking procedure escalation and deescalation of commitment type inference algorithm principal type scheme types verbal protocols. think-aloud studies human computer interaction (hci) contextual design mobile apps. context aware user interface design mobile user interface guidelines context of use electrodermal and cardiac activities safety driving simulator cerebral time constraint mental strain traffic behavior. seat comfort index seat comfort modeling. efficient algorithms skip list web search. friendship graphs. wheels edge antimagic vertex labelling graph labeling region merging wire crossover majority gate. quantum dot cellular automata ode converter clock zones extraction and classification. qrs detection ecg biometric parallel computing toolbox matlabmpi. biclustering analysis high performance computing (hpc). openmp exaflops. opengl shading language opengl software product line feature model extraction method review classifying true positive alert based on their att security alert classification intrusion detection system zeus cryptosytem toolkits mitigation botnets botmaster super edge antimagic labelling service quality employee job satisfaction private hospital. commercial analysis. website technique heat affected zone (haz) brinell hardness number (bhn) metallography ultimate tensile strength (uts) weld factor. social engineering. radio frequency identification (rfid) electronic product code (epc). internet of things (iot) waste collection travelling salesman problem simulation-based optimization real-world case study. multi-scale urban analysis. urban growth land use change 2d variance. shot detection motion vector video segmentation social engineering wavelet shrinkage process. noise estimation trojan network monitoring morphological operation diseased fish images performance. measurement image steganography mean square error (mse). pixel value difference (pvd) privilege personal computer web links smart phones user interface. semi-restricted authentication. customer trust wap security dos attack ntp penetration testing icmp honey pot systems. packet loss. global position systems threshold value. data envelopment analysis constant return to scale super efficiency clbp forecast silica sand demand. algorithms mahalanobis technique. contact angle development length recycled steel reinforcement bars yield stree. load disturbance. pid control dc motor model closed loop speed control malaria classification. binary classification misclassification error rate (mer). gaussian bayes classifier outlier modification top de genes selection netflow bot botnet threat behavior analysis. nfsen nfdump rural employment social intent voluntarism technology implementation diffusion of innovation change management culture mathematics tangible manipulative membership function fuzzy number ? -cut and ? - level fuzzy midrange. fuzzy control charts statistical process control knowledge hoarding. model matching control. modulo adder residue number system multiplexer binary to residue conversion moore sequential s logic circuit connective semint specific parser propositional logic propositional variables compound proposition truth table worm computer crime. computer forensic digital forensic time stamp reversible. frequency domain watermark detection watermark embedding robust simulation. business continuity rpo disaster recovery rto deadline scheduler hyper threading. security alert management real-time security alert classification precise classifying true positive alerts. intrusion detection msldip (modified substitute last digit in pixel) enterprise. forensic namoelectronics nanotubes nanotechnology skewed economic growth discrete sine transform sub bands. image compression. mae hybrid transform zone blob boundary dilation centroid bounding box. script ultrasound imaging. despeckling image classification. xinjiang high morbidity of kazak esophageal cancer comprehensive feature shape from focus 3d shape recovery. multi-scale morphological sequence high spatial solution spectral - space characteristics tumor. cerebral mri images scene image. bayesian logistic regression bayesian network pose correction bpnn video features. audio features movie recommendation emotion recognition connotative features unsupervised learning image categorisation dimension reduction. fixed-language pre-processing techniques in character recognition training neural networks gabor filter. strokes obr recto braille eight-connectivity connected component labelling verso. object classification. steiner tree wavelet transform. image gradients eyes-free computing skewed barcode localization & scanning cloud computing. realtime background detection visual basic 6 assembly simulation modular fixtures solidworks api nuclear power iran load frequency control. interconnected powersystem modelling river sediment pbt ucs subgrade dcp shear wave velocity (vs) south of tehran liquefaction potential index (pl) standard penetration test (spt) liquefaction epon (onu hybrid fiber-wireless (fiwi) access networks onu-bs automated social engineering (ase) social networking sites (sns) wimax bs olt) direct torque control multiresolution texture map and principal component analysis. spectral transformations depth map rotation invariance cuda. key based scrambling scrambling discrete hartley. dst real fourier sinusoidal transforms quantitative segmentation evaluation automatic segmentation imagej. binarization quality assessment intensity thresholds lcp. cephalometry landmarks reeb graph maximum range block size (r max ) canonical classification minimum range block size (r min ) psnr (peak signal to noise ratio) affine transformation cr (compression ratio). histogram based thresholding object detection. blank background images spatially confined nmf. non-negative matrix factorization (nmf) partial face occlusion local nmf quality assessment pixel level high resolution satellite imagery. object level codebook rac fast-rnn microstructure. smsf gamma human vision hsb hsi light. standard deviation factor. pixel to noise ratio mean square error laplacian of gaussian half width factor least significant bit (lsb). receiver operating characteristics curve. fisher faces local binary pattern clustering. pedestrian counting j48 block matching feature vector target detection clutter rejection fuzzy clustering fuzzy gustafson-kessel (fgk). data normalization knn. tm wavelet decomposition chaos game representation hci. facs correspondence. stereo vision image matching algorithms mser local binary pattern (lbp) enamel dental radiograph dentine caries isef pulp rct dentistry. patterns. centre-pixel-weighed. exponential filter centre-pixel autonomous cars. traffic signs recognition m-pcnn. polsar nsst multi-spectral data fusion grey world assumption. skin detection white patch retinex color constancy gaussian distribution full-reference quality assessment perceptual weights. extreme learning machine. document segmentation discriminative classifier automatic image annotation bayesian networks. generative classifier one to one. conjugate symmetry mirror lip reading. 3-d dwt 2-d dwt dmey wavelet handwriting analysis invisible watermarking imperceptibility in watermarking intermediate significant bits (isb) alzheimer neuroinformatics. bilinear interpolation cerebral cortex brain imaging hyper chaotic system peak signal to noise ratio. digital watermarks self-reversible embedding encrypted image complexity. levenberg-marquardt training multilayer perceptron scaled conjugate gradient local keypoint descriptor sift descriptor. keypoint orientation keypoint matching artificial neural network (ann). thinned binary image (tbi) offline signature verification system (svs) freeman chain code (fcc) homomorphic filtering ct image template averaging pca features and svm classifier. cognitive biometrics power spectral density. dna sequencing de novo assembly olc assemblers overlap-layout-consensus overlap detection whole genome shotgun assembly. capture hypertext and hyperlinks document management storage vpki tpd crl iriscode cancelable biometrics bioencoding scheme data visualization applications of data mining business intelligence database systems estimation and planning agile methodology agile model confidentiality model privacy model message digest healthcare medical images isoflavone ochna squarrosa estrogen receptor biometric-data indexing index key generation. face identification mit/bih database. electrocardiogram classification individual patient recognition cartilage knee joint osteoarthritis constrained optimization. evolutionary algorithms genetic restoration arabidopsis thaliana heating into the fresh air. fire resistance antivenom drugs molecular docking. combinatorial screening sequence alignment superimposition studies phospholipase a2 curvelet transform key share clustering technique threshold cryptography misbehaving nodes trust count learning vector quantization true positive and false positive classification codons evolutionary tree mtdna short path routing network routing link cost encrypted vertical database regular patterns data streams resource monitoring scalability. l*a*b* colour model. malaria parasites knowledge building tools pedagogy constructivism. online learning environment blog vulnerability measurement and penetration test. security threats feature level information security model flooding based denial-of-service (ddos) attack data analysis data integration zero copy security/perofrmance tradeoff thorup adjacent node algorithm heuristic genetic algorithm single source shortest path problem dijkstra mcommerce applications smartphone location embedding algorithm threshold value expanding the near wall zone pressure flow combination of pressure and couette flow design phase machine leaning security vulnerabilities multiple paths mini-sink mobility overview image files current techniques adaptive steganography turbine-column combined device wind effects vent column natural ventilation surface inspection of ceramic tiles avis classification of tiles porous media forced convection heat transfer phase change material adaptive methodology fuzzy lookup table changed sliding mode controll fuzzy logic methodology poundo yam process plant manufacturing secured data text stream vehicle acoustical comfort index vibration sound quality vbration dos value naca 0012 airfoil flow control blowing amplitude and coefficient lift and drag coefficients. blowing ode45 disadvantages indirect matrix converter. active learning method reactive distillation ethyl acetate dynamic models percentage residual computed torque controller unstructured model uncertainties baseline tuning computed torque controller chattering free matlab/simulink puma 560 robot manipulator method nonlinear position control computed torque control cmos pdp csd multiplier stscl white-noise stochastic linearization hysteretic damper connected structures uncertainties robot arm nonlinear controller chattering free mathematical error-based tuning sl thermal buoyancy effects network. analog multiplexer automotive industry. ocb hr variables performance measurement power electronics converter control dynamic behavior. gene finding motif finding normalization quantile transformation frost filter fuzzy level set method cage 5'end mrna gene expression profiling transcription start sites gene regulation next generation sequencing reference assembly colour space code smith-waterman parrots fingerprinting filing ridges conservation age estimation turbine ventilator engineering de reduced pin count area-time2 serial multiplication risk prioritization risk priority number failure modes risk factors statistical analysis pakistan. energy policy barriers industrial energy efficiency drivers wind energy self excitation frequency regulation. induction generators voltage regulation okumura-hata. path loss friis radio wave models data acquisition and logging pic microcontroller coordination digital supply chain sustainable business model. open business model business model innovation business model polygonal approximation canny edge computer vision.. open cv license plates lapi roc.. photogrammetry unmanned aerial vehicles drone aerial images.. borderless piece.. jigsaw puzzle square piece default mode network.. mild cognitive impairment alzheimer's disease digital data compression rate data security.. compression techniques operators.. classroom performance dynamic sitting desk university students cobalt alloys gmaw cold wire client forensics. cloud storage services cloud forensics stresser dos exemplar dos similarity score denial of service flow comparison adaptive sorting. sorting and one-site coach. development cycle one-site customer extreme programming morphological analysis arabic verb forms finite-state computational morphology word correspondence alignment. afaan oromo language statistical machine translation morphological alignment. tokenisation pos-tagging arabic setswana noun morphology innovation strategy. idea management innovation capability collaboration. standing desk public sector. learning goal generational diversity engagement baby boomers gen xers millennials business process bpmn knowledge base. meta-model patterns recovery design patterns gang of four architecture saas software customization multi-layred process algebra navigation mobile robot path planning computer supported collaborative work collaborative augmented reality sense augmentation distributed augmented reality shellsort circlesort heapsort introsort modified diminishing increment sorting internal component distributed cooperative system fault detection robot system awareness semantic technologies conceptual product design hidden markov models. speech segmentation probabilistic neural networks filter bank energy hand gesturing arabic sign language candescent data integrity.. rule-based. physical restraints production management.. theory of constraints labor productivity marketing theory transaction marketing relationship marketing emotional exhaustion emotional intelligence emotional labour organizational behavior service industry performance prove performance avoid job crafting crossover adaptive mutation multi objective fitness function confidence support association rule mining existence-uniqueness conditions finite impulse-response filters image super-resolution reversible data embedding visual quality hvs characteristics reversible enhancement block matching 3d collaborative filter (bm3d) bayesian least squares gaussian scale mixtures (bl non-local means (nlm) approximate message passing (d-amp) compressive sampling matching pursuit (cosamp) basis pursuit (bp) data integrity operating systems vulnerabilities polymorphic malware optimization problem operators rule-based tweet twitter multi dialect phonological variations dialectal arabic easy maintenance coding xml framework extension xml programming developer productivity cloud service discover word sense disambiguation semantic search query composition cloud ontology topography apriori algorithm biometric fingerprint rsa public encryption algorithms information android forensics md5 cat map 2d-stcm user experience. motor imagery signal classification for bci eeg signal classification motor imagery bci cross validation robust classification linear discriminant classifiers classifier ensemble classifier space feature fusion hog descriptors hybrid water marking workers safety and working conditions missing value imputation methods categorical variable edge preservation ultrasound images image frequency noise density image noise interactive image segmentation suitability level sets localized region based active contours sparse field matrix multi-kernel sift volume estimation magnetic resonance imaging (mri) brain tumor pixel value indicator. lsb segmentation. peripheral blood pixels leukocytes convolution neural network. musculoskeletal disorders. workshop work system design ergonomic analysis. solidarity economy cavitations erosion ohs csr stakeholders' roles rmg sector sales promotions technology adaptation e-coupon innovation behavior competitive advantage shared values corporate culture buyer performance complementary assets adaptation steel constructor h-beam bim energy-saving efficiency micro-vertical farm sheet mental housing green-roof adaptive constant false alarm rate (acfar) time-frequency domain multi-frame acoustic signal processing target spectrum signature detection k-best decoder generalized spatial modulation affective state context-awareness purchase-decision involvement re-imputation accuracy rate bottle neck glass ceiling ethnic minorities testing dependency structures test case prioritization branch coverage. behavior-based intrusion detection. learning classifier. ucs. fibre channel over ethernet data centre fibre channel storage area network attack graphs network security. vulnerability analysis co-channel interference minimum mean-square error wigner distribution. multimodal. multiclass tumor multiple kernel learning cerebral mri fisher face dct coefficients selection cosine similarity. ar 2d dct model checking sql. relational algebra atl web services think-aloud protocol personality dimensions. point-placement turnpike problem experimental algorithms. computational geometry second language acquisition introverts extroverts. image pyramids image blending. semantic concept based video retrieval glcm texture. key-frame extraction hsv histogram usability evaluation. machine intelligence software interface user interface user interface evaluation musculoskeletal symptoms psychosocial aspects. ergonomics interventions diversity diverse culture. recruitment policy occlusion. session queue multirate multicast network virtualization service-oriented architecture network service green computing server cluster energy proportional ieee 802.11 service time statistics dcf overlay networks ip multicast bandwidth analysis end-to-end delay end-system multicasting rstp opc da web maximum flow shortest path multi paths delay tolerant networks intermittent network connectivity dtn fuzzy logic system cross-layer design ad hoc dynamic network network clustering ransac normals graph-based segmentation surface detection rigid transformation image mosaicking harris corner detector correspondence point filter radial distortion ahe. he urban macro. urban micro mu-mimo otsu digital investigation formal model. onsite triage process model on-scene examination meanshift stereo vision. vlsi architecture. se enumeration satellite network vulnerabilities satellite communications satellite hacking. satellite security analysis satellite network security satellite network treats satellite network heterogeneous homogeneity.. patches fractional order wart atopic dermatitis.. skin disease sfinge synthetic fingerprint 3-d image features 3-d image segmentation lung nodule classifier.. volume growth hexagonal grid edge detection.. top-hat transform mr images automatic detection. femoral cartilage pathology type-iv crater lesions edge directed bicubic image zooming pde. totalvariation method. nesterov’s first order method low-dose cbct split bregman method fisher criterion dimensionality reduction. single image super resolution (sisr) swar hindi authorship transcription rules pronunciation dictionaries opinion mining fit of equation phonemes allophones statistical studies syllables allosyllables ranked frequency distribution setswana verb morphology multi-agent coverage. unmanned systems mobile sinks sound speed profile interleaving undersea links coding constraint length clutter radar.. dwt-huffman lpcdh technique.. lpc-huffman supraventricular tachycardia (svt).. mmse normal sinus rhythm (nsr) single image semi coupled dictionary learning (si- encryption and decryption rsa-crt 1024 bit and 4096 bit. gaussian smoothing. image edge detection uncertain trajectory data trajectory querying applications of trajectory data mining trajectory data mining trajectory clustering implicit authentication behavioral modeling java reflection decompiler. byte code software obfuscation http protocol. wsdl soa stub skeleton cobra rmi soap protocol distributed system dynamic load balancing algorithms. data loss prevention networking virtual testbed distributed networks normalized correlation. quantization sum of absolute differences approximation stereo corresponding disparity edges in color images statistical learning morphological gradient operators gaussian filter multi-scale transformation edge detection algorithms algorithm evaluation rbf-nn method active and reactive performance indices contingency analysis analytical method ranking . top de genes selection for patient clustering. inverse problem of covariance matrix patient clustering multi biometrics perceptron support vectors ensemble probability. plasmodium falciparum microscopic imagery sauvola thresholding malaria rsa scaled coverage measure publication research management open governance crowdsourcing public value new public governance public innovation informal sector economic factors residential mortgage italy fragile five countries financial crises topsis method soundness of financial institutions financial fragility software projects project success requirements engineering practices gulf cooperation council requirements engineering relational grammar link grammar syntactic analysis greek language cost-effective power equipment industrial voltage sag security camera robotics live streaming video surveillance facial component detection hog features facial expression recognition support vector machine (svm) histogram of oriented gradients (hog) component complementary pair insertion substitution evidence management electronically stored information (esi) data predictive data mining hiv genetic evolutionary algorithms leaf parent aggregation gain aggregation time online transactions fraud detection spelling correction dutch inclusion covid19 digital transformation living and working environments thematic analysis tracking. connected component labeling keyboard design. rsi trinity design msd ergonomic keyboard nitrile. latex glove fit donning medical examination gloves model transformation. multidimensional design pattern multidimensional canonical partitioning model driven engineering function point analysis. cyber physical systems secure tropos software reliability organizational practices. technical practices cybersecurity data breach crack detection. convolutional neural network modern greek. food and beverage sector aspect-level pronouns. linking verbs concordances optical flow technique faster r-cnn. ssd cyclist detection pedestrian detection image degradation dynamic and hybrid detection. static secondary school. teacher principal capacity building economic modeling. aicc bic aic elastic net ridge lasso penalized regression stochastic approximation. hilbert space linear monotone operator decision tree. smart grid malware cyberattack kalman filter. gaussian mixture child monitoring gpgpu reusability extensibility modularity modifiability maintainability mvc architecture supply chain. pharmaceutical industries network optimization models critical infrastructure business institutional communication. crisis management young adults topic fatigue vaccination hesitancy government information behavior small and medium sized dairy processing firms. strategic learning cash flow cash flow statement business decision making determinants firm autonomy mncs usage plastic bags cape metropole profitability sin tax digital technologies empirical studies. object-oriented modelling conceptual design sdlc software design unified modelling language (uml) function modelling information presentation wearable augmented reality transfer of care latency. internet protocol television (iptv) multiple-access edge computing (mec) software-defined networking (sdn) voice over ip (voip). sip security session initiation protocol (sip) implicit least squares. direct computation method high precision carrier phase double differencing cerebral small vessel disease. vessel enhancement signal-to-noise ratio time-of-flight magnetic resonance angiography cerebrovascular segmentation security testing. grammar analysis software testing testability. flexibility museums django framework lstm audit quality and governance risks social environment women on boards board dynamics environmental protection stock market index economy naive bayes classifier sentimental analysis network forensics network attack detection supervised learning accounts apology crisis communication trust repair microaneurysms diabetic retinopathy mathematical morphological operation retina optic disc retina image materials benchmarks technologies fet arrangement mjpeg obstacle avoidance stress working hours delphi method qualitative prediction w&b dhc-6 seaplanes mobile java tfidf plagiarism approximate interferon sars gene set enrichment analysis meta-analysis pathway activity poisson distribution machine-learning sport football legal analytics digital forensic analytics electronic stored information technical english teaching multi-word lexical units (mwlus) lexical competencies risk assessment models risk assessment byod varying psf richardson-lucy deconvolution user interest semantic gap multiple query content based image retrieval elderly people efficiency electronic round intermediary objects security guard private security thin films local pressure dissipative particle dynamics mdpd ieee 802.11ac traffic channel call drop rate call setup time call setup success rate key performance indicators statistical language model arabic part-of-speech tagger corpus-based approach the qur'an annotation euphemism lebanon obstacles joint kinematics video gaming mathematics education rich tasks co-operative work education ergonomics decibels radiologist steganographic coop. co-op co-operatives agriculture cooperatives social engineering solutions social engineering tools security policies social engineering measures social engineering threats incident forensics electronic stored information (esi) electronic discovery reference model (edrm) weighted features tags low-level features image concept detection imbalanced dataset deep features multi-label classification cnn semantic concept detection women in business control points distance rtk particle filter hog feature robust tracking video surveillance system communication hide binary imo viber wechat whatsapp android app file input quality techniques mutation generation grammar-based impulse noise 2d gaussian blur jaccard similarity coefficient trust-region algorithm emotion modeling emotional state incident response team cognitive security security operation center smartphone forensics nova-pca companies heat transfer enhancement circular tube al2o3 nanoparticles super vector machine random forest academic performance motivating environment personal goals focus positive-thinking individual-interest self-efficacy self-confidence poisoning attacks malware classification genetic transfer learning vertical accuracy height measurement alos srtm aster lidar dems total electron content elevation angle multi station ibs dcbs scale factor ldp arima time series forecasting software defects shell scripting interactive shell command-line console bash adaptive learning real-time systems perclos healthcare workers musculoskeletal disorders architectural maturity model legacy code software erosion software maintenance architecture erosion software architecture technology and trust risk direct voice input smart contracts. blockchain smart car. misbehavior detection systems cooperative intelligent transportation systems dram. sram flash memory solid-state drives (ssd) computer linguistics organizational culture. emergency culture shock acculturation process model. society regulations decision makers hash function. authentication system laplace mask iris features fuzzy clustering neural networks. student performance speed tracking car plate recognition variational mode decomposition (vmd) non-stationary culling blind source separation (bss) global positioning system interferer rapid application model agile big bang v-model spiral waterfall fbprophet maodv protocol. roughness wrinkle combination icloud cloudiot taint analysis binary analysis concolic execution concrete execution symbolic execution association rules solar flares reasoning transportation proximity smart city bovw encoding methods deep learning models shallow models interdisciplinary leadership business communication business transformation complex theories management innovation robust optimal control robotic manipulator particle swarm optimization method super twisting control firefly algorithm electromyography (emg) muscle activity aodv protocol wireless network(vanets) association algorithms confusion matrices arabic corpus analysis tools arabic corpus resources mobile chatting. yoruba language english language rule-based machine translation corpus-based machine translation computational linguistics semantic similarity measures. concept context arabic semantic relation extraction arabic nlp relation extraction specific domain corpus. arabic term extraction concept extraction arabic language processing arabic ontology ontology construction hurricane. principle component regression (pcr) precipitable water vapor (pwv) gnss meteorology thresholding surface gradient minimization active surface line tracking supervised classifiers zernike moment digital elevation map(dem) topographic map moore neighborhood tracing contour line haar transform kekre’s transform fractional coefficients rms ultrasound ionizing radiations daubechies wavelet transform multi-layer perceptron and face recognition thermal image haar wavelet transform local histogram earth mover’s distance. bilateral filtering binary tree classifier script identification multi-lingual document processing bss dewatermarking bfgs mixing matrix script identification. document processing visual surveillance object classification smart network art hide data bmp image local features anisotropic diffusion directional diffusion occlusion depth perception parallax method disparity map 3d model stereo pair flawed biscuits detection euclidean distance fuzzy moment descriptors eucledian distance kekre's algorithm the human visual system insertion force processing elements reconfigurable hardware virtual reconfigurable circuit wave atom shrinkage rician noise magnetic resonance images de-noising script separation horizontal profiles indian script bilingual (english-oriya) ocr nsct geometric feature optical character recognition fuzzy hidden markov markov chains bayesian image classification cranial malformations crest lines elliptical fourier descriptors sign language curvelets transform gaussian filtering lung nodule computer assisted diagnostic chest radiography indexing video clip key frames extraction video coding ramanujan ordered number dct multiplierless dct wavelet shrinkage high noise environments thresholding neural networks context modeling zero shifting resolution scalability 2d spiht difference expansion ssim index adaptive quantization region of interest coding image representation transform domain regression multispectral vegetation analyses atmospheric correction genetic algorithm(ga) probabilistic neural network(pnn). spatial gray level dependence method (sgldm) discrete wavelet transform(dwt) receiver operating characteristic (roc) analysis biomedical image processing image processing application in agriculture scienc coading analysis and recognition chain code recognition line drawing intersections recognition path information table (pit) topology preservation local condition minimum spanning forest flooding path-cost minimization morphological operator spot segmentation fuzzy k-means genes microarray image enhanced fuzzy c-means clustering (efcm). hand written farsi characters decision tree virtual pointer detection modeling and simulation decomposition strategies empirical evaluation semantic audiovisual multidimensional rician fading channel image transmission multiple descriptions coding noise road signs lesh validity index clustering metric content description semantic clustering network comparison segmentation quality segmentation accuracy quantitative analysis vessel segmentation pca/lda/ica statistical models distance measure methods image matching trademarks skin segmentation face tracking text recognition text extraction source symbols reduction lossless image compression artificial neural networks (ann) license plate recognition (lpr) shoe mark look-up tables nearest neighbor search robust detectors pca-sift summary and highlight text detection finite state machine binarization lbg algorithm euclidean distance classifier laplacian of gaussian ( log principle component analysis (pca) independent component analysis (ica) mahalanobis distance classifier. derivative filter edge finding recognition system chain code creation training system morphology geomatrical constraints ladder domain description huma action detection audivisual screen pointing device e-comic laplacian edge detection super resolution reconstruction object based image classification radial basis functions neural network. vq feed-through show-through background removing scanned documents processing geometric distortion image archives camera based ocr dominant and additional features selection. one frequency face sketch new dimension natural grouping. region growing bamboo boundary symmetry-curvature duality merging point protrusion walshlet dct wavelet phase unwrapping gaussian scale mixtures interferogram quantitative sbp analytical fbp manga edges gender recognition ramanujan ordered number high-speed evaluation cosine approximation rule discovery decision tree induction fuzzy c means uep eep jscc puncturing image processing and understanding omnidirectional system trespasser detection thermal imaging system faint detection monitoring system fall detection shape signature enhancement shape representation secret sharing qr code barcode hotelling transform gesture recognition image segmentation. hsv color model brightness calculation buckling pressure internal pressure four-centered ellipse method fgm plates variable thickness plate higher order plate theories thermal buckling concrete mix proportions concrete behavior cement type voltage stability limit power system synchronism power (angle) stability limit supply chain management operations management production scheduling circulation control lift augmentation drag reduction ultrasonic pulse velocity fibers zero current switching dc dc boost converter zero voltage switching fluid mechanics cfd sudden expansion mean square error. back-propagation backstepping controller hvac sea water stress shielding finite element analysis hybrid composite material bone resorption 316l grade stainless steel implant total knee arthroplasty iso 9001 quality management small and medium sized enterprises cooling enhancement electrical synchronous engine convective heat transfer abrasive wear wear resistance carburized digger tooth steel model analytic seated human body model biodynamic response regeneration gas turbine sailing speed thermal efficiency fuel consumption fuzzification heterogeneous wireless network z-n cstr anfis imperialist competitive algorithm torispherical backstepping on-line tune fuzzy sliding mode cont broadband connection operating system microkernel monolithic-kernel discrete-time modeling switched systems one cycle-averaging sampled data model pulse-width modulation (pwm) prediction equation hand tools industrial worker hand anthropometric measurements web mining unstructured data network’s decomposition real time carpooling distributed dynamic graph modeling bridges corrosion fem analysis remaining strength multiple sub filters aec finite element modeling bolted momentconnections beam column column bases wear particles dry sliding wear oil type optical burst sitching network contention resolution blocking probability computer aided design couplings equations couplingcad inverse dynamic control adaptive fuzzy sliding mode inverse dynamic like fuzzy estimator sliding mode control sliding mode algorithm grating length number of grids bragg wavelength reflection fiber bragg grating database engineering real time systems expert systems computer systems information management nonliner controller part chattering free adaptive sliding mode fuzzy cont adaptive fuzzy sliding mode algorithm adaptive mimo fuzzy compensate fuzzy sliding mode fuzzy logic controller lyapunov based adaptive law internal combustion engine chattering control base station gait signature machine condition monitoring system quaternion neuro fuzzy system image processing applications thresholding. sar images image coding side match spatial histograms local gabor phase pattern gabor wavelets adaptive binning global gabor phase pattern hosvd multilinear discriminant analysis subspace learning multilinear principal component analysis dimensionality reduction point of interest wavelet coefficients fabric textile defect detection lirs and lsrr sum of absolute difference statistical measures mobile network even-odd method distance measures lsb embedding glcm perfect reconstruction image capturing snow cover estimation resourcesat -1 awifs development of automated algorithm wireless video image enhancement adaptive noise filter image enhencement blockiness and blurriness measurement full reference nano-particles characterization tem image scaning particle swarm optimization palmprint authentication similarity measurement sliding window method complex gabor wavelet image alignment image transformation objective metrics color perception haar walsh kekre intensity inhomogeneity correction brain extraction mri segmentation image quality score m-svd spectral feature extraction two-dimensional fourier transform palm-print recognition quadrature mirror filter aerothermochemistry thermal protection system aeroheating atmospheric reentry nonequilibirum hypersonic flow thermal/vortex blobs buoyant plume/body interaction brinkman domain embedding selection rating simulation software input current waveshaping harmonics ac-dc converter water heater laboratory apparatus heat pump pdc continuous t-s systems observer based controller power planning forecasting power load demand micro-fluidics laminar flow high zeta-potentials fully developed analytical solutions parallel-plate micro-channels sahl-hasheesh economical study sub-band coding psnr(peak signal to noise ratio) mse(mean square error) recognition rate (rr) false acceptance rate (far) hidden markov model (hmm) face recognition (fr) augmented reality least squares method chessboard corners detection pinhole model ternary fly ash strength curing silica fume wire mesh jacket ferrocement beams retrofitting accident atmospheric plasma non-thermal dielectric barrier discharge coding scheme tcp link adaptation electrostatic electromagnetic dac data transmission hierarchical networks neural fuzzy petri net phoneme recognition brain-computer interface extracted parameter detection rate. neural classifier wavelet transforms voicing detection multi-scale automatic modulation recognition constellation diagram multifractal dimension hölder exponent wtmm earth radiation budget sattelite(erbs) singularity spectrum full text available (484.48kb) this is an open lmmse svd mutual coupling beam-forming extreme value theory bursts linear predictive coefficients voice banking line spectral frequencies eigenvalues spectral subtraction singular values decomposition noise power estimation heuristic algorithm. secondary users. licensed users non-financial performance smes. accounting information system alignment ims sip handoff heterogeneous. eap-aka lte random numbers logic audio compression speech synthesis phones prosody standard malay personality knowledge five factor theory antenna array sidelobe cancellation ecg compression wavelet coding data glove euclidean distance. noise vibration harshness (in car) code book generation hybrid vector quantizers hidden markov models artifact adaptive modulation gaussian modeling auditory model distributed sensors sensor fusion. fading distribution rayleigh fading trained symbol nakagami-m channel sample rate converter upsample-downsample filter wireless communication hrtf model hrir model principal components analysis modified haar modified daubechies dwdm system mimo-ofdm system space time coding least pth norm filter banks signalogic digital signal processor scrambler 56kbps modem cognitive radio (cr) orthogonal frequency division multiplexing (ofdm) ultra wideband (uwb) wavelet packet based mcm (wpmcm) hybrid algorithm maximum entropy principle (mep) multicarrier modulation dt-cwt wpt fiber radio networks orthogonal frequency division multiplexing (ofdm). multimode optical fiber (mmof) quantum neural network ica probabilistic data association algorithm target tracking kalman filter data association digital phase-locked loop (dpll) numerically-controlled oscillator (nco) accent command f0 contour fujisaki parameters phrase command arabic tts least mean square (lms) motion artifact power line interference block lms (blms) normalized lms (nlms) cramer rao lower bound cepstrum unbiasedness convergence immune algorithm digital filters spectro-temporal domain simulation study transition probability matrix queuing three two one greedy position based routing ebgr revival mobility model active network reconfiguration network processor dynamically adapting processor runtime adaptation scalability network protocols information efficiency time delay agent proactive mechanism routing instability failure recovery re-convergence node-to-node communication modulator networking techniques bottleneck load balancing cross layer interaction ad hoc networks sensor network sdc emulator opportunistic networks bpsk msk queue size qam_64 bundle routing game nash equilibrium game theory probabilistic routing protocol using history of en kakutani’s theorem delay and disruption tolerant networking esprit music adaptive array active queue management wdm networks hybrid topology vlan metro ethernet spanning tree cache location management call delivery location registration fixed local anchor space-division switch reaching probabilities markov chain model cross-bar technology ad-hoc network multi-protocol label switching traffic engineering n jobs m machine job sequencing technique packet format qos architecture aggregation data dissemination rfid web applications tcp/ip scada (supervisory control and data acquisition) security attack/issues. prevention and detecteion system traffic characteristics. rule ordering packet filter wdm p-cycle integer linear programming (ilp) distributed cycle pre- configuration (dcpc) and sp firewall policy. firewall configuration mobile wireless sensor network time bounded essential localization markov decision process gps and gis. antenna radio interference tdma time slot assignment ieee 802.16j media traffic tfrc iptv network analytical model tcp congestion control algorithms loose coupling integration heterogeneous networks tight coupling integration umts-wlan integration vertical handoff network scalability rstp compatibility frame flooding ring flushing traffic modeling ieee 802.11a interference characterization. average packet delay stable route fuzzy controller route lifetime network planning mac address arp protocol ip protocol ethernet traffic identification internet traffic flow classification constraint based routing mpls-te enforcement of security people policy dimensions of security authentification cdma security practices non-operating system software users’ security management hispanic antivirus software software update identity theft medical security 3g mobile network security shuffling advanced encryption standard patent protection quadtree genetic algorithm (ga) facial feature extraction license plate recognition surface coils peak signal-to-noise ratio contrast-to-noise ratio single-scale retinex multiscale retinex object oriented urban morphology. spatial information touching characters dna profiles identification problems godfried williams adnan full text available (212.48kb) this is an open m. safa pages - 36 - 47 | revised - 05-08-2 a.w.m lung computer forensics disks fraud separation of duty constraints location hierarchy schemas. c-rbac manats multi-biometric vein parallel multipliers crypto hardware elliptic curve cryptography cryptography hardware jacobian projective coordinates modulo multipliers coefficient multicasting trust management system lsb method two dimensional discrete fourier transform modularization dominant spectral feature adoption smart card security upper zone video transcoding backward repeat global feature biometric technology local feature optical security double random phase cover-image data-hiding stego-image emd opening closing shape representation optimal thresholding complex discrete wavelet transform (cdwt) shift invariance dual-tree peak-signal-tonoise- ratio (psnr) image enhancement (ie) fuzzy logic (fl) digital image processing (dip) low resolution natural scene image texture features text region extraction medical image processing adaptive resonance theory mammography shared memory multi-core middle zone character segmentation lower zone interface mahii stroke multi-domain heuristics. cerebrospinal fluid (csf) gray matter (gm) white matter (wm) unsupervised expectation maximization imaging surveillance consistency subset evaluator gradient vector flow field color saliency local descriptors echo state neural network intelligent segmentation back-propagation algorithm jnd histogram just noticeable difference water body multi-resolution satellite image coefficient-bias approach min-max algorithm iwt face hallucination eigen transformation frame rate video transcoding forward repeat fpga frequency estimator maneuvering tracking syllable classification dynamic time warping utterance syllabification automatic meter detection poetries catagorization cepstral coefficients h statistic linear prediction coefficients f statistic hard thresholding electrocardiogram r-wave detection spurious free dynamic range (sfdr) software defined radio (sfdr) cross correlation kalman gain mode-selection empirical mode decomposition fundamental frequency spectral noise belbic classification of ecg arrhythmias plc mel frequency cepstral coefficients (mfcc) wavelet filterbank. amplitude modulation (am) probability of detection newton's method maximum entropy density (maxent density) lagrangian multiplier zak transform amr fir coefficient segmentation power reduction steepest decent spt singular value periodogram a nonuniform sampled data iterative adaptive approach least-squares method volume zero cross rating end point detection voice activity detection robust speech recognition distributed speech recognition late integration reliability-ratio based weight optimization audio-visual speech recognition tonal components detection psychoacoustic modeling recurrent spiking som self-organizing spiking neurons kohonen map word recognition leaky integrators neurons qostbc bwa nc-ofdm zero crossing speech recognition adaptive equalization evolutionary programming modified kaiser window bandpass filtering multirate processing spectral output net input samples decimation clusters real time system security services information privacy tlc-pp manual privacy management (mpm) community observed privacy (cop) evaluator module (pem) self-invertible matrix. time complexity umts (universal mobile telecommunication system) gsm (global system for mobile communication) encoding decoding communications and data security virtual organization policy mappings policy based authorization authorization m-psk social capital cameras electronic eye coding techniques rin optical fractional moments ambiguity function wireless communications dispersive channel babai's algorithm finite wordlength coefficients closest vector problem fir filter design lll algorithm hmm tts mel frequency cepstral coefficients cepstral mean subtraction gender classification partitioned convolution overlap save method crosstalk cancellation mixed filtering convolution teo energy separation algorithm fm signal mixer instantaneous frequency huffman coding
See more