internet of things ontology natural language processing classification machine learning brute force attack visualization entropy deep learning multilingual watermark coefficient pearson correlation extraction embedding speed-up robust features discrete cosine transform mcfarlan’s strategic grid it planning gartner’s time model management application portfolio application assessment telnet exploits samba exploits kali linux ethical hacking morphology cow convolutional neural networks mask region-based dairy cattle canny optimization integer programming branch and bound bakery transformer sentiment analysis irony encoder memory bidirectional long-short term public satisfaction public behavior intention leadership quality expectation confirmation model e-government quality transfer learning sea turtle ensemble deep learning stack overflow react question empirical study system vulnerabilities of biometric software based face anti-spoofing system metrics for face face spoof detection anti-spoofing methods classification of face tourism smart poster near field communication sign language translator opencv object detection model garden long short-term memory kinect verification elliptic curve cryptosystem columnar transposition cipher block chaining mode bit modification authenticated encryption system prototyping rapid application development model-driven architecture transformation automatic model physical properties near infrared firmness chemometrics agro-product skincare classification deep learning multi-class text dermatology fuzzy logic fuzzy fca formal concept analysis publication production genetic algorithm fuzzy system genetic algorithm fuzzy inference system fuzzy inference system expert wi-fi fingerprinting floor detection feature adaptive scaling machine autoencoder extreme learning malicious domain names algorithm detection domain generation botnet detection map reduce hadoop distributed file system data warehouse data lake advertising and publishing advertising substrate integrated waveguide self-quadplexing antenna isolation gain frequency tunability transceiver station battery monitoring in base battery base transceiver station frequency analysis diffusion cryptanalysis confusion wireless communication smart devices mobile ad-hoc networks cloud computing wireless remote control home appliances' gsm dtmf digital comparator selective mapping peak average to power ratio partial transport sequencing multiplexing orthogonal frequency division multiple access multi carrier-code division sam reversible gates misr bist bilbo virtual channel sharing power reduction network-on-chip high performance framework tree-map sense making algorithm virtual assistant tract infection natural language indonesian medical domain e-health support vector machine digital mammography features extraction cut the largest possible squar breast cancer signal processing qrs detection noise removal ecg automatic recognition swarm intelligence malware recognition hancitor malware gray wolves optimization artificial bee colony algorith artificial intelligent techniq wi-fi-module ultrasonic sensor smart parking raspberry pi4 led display trng key generator entropy keys deterministic cryptography micropython lua freertos esp8266 c tropical peatland sensor networks groundwater level communication system single diode model module temperature module irradiance least square method i-v characteristics unity-gain frequency telescopic operating amplifier slow rate phase margin output swing protege wsn wormhole attacks sensor node manet ids feature extraction facial features facial datasets expression classification s-box p-box floating frequency correlation coefficient blowfish raman amplifier fiber bragg grating encryption decryption zone scheduling route planning emergence evacuation contra flow spherical coordinates iris recognition iris normalization histogram equalization biometrics wheelchairs robotic arms head gyro sensor user-friendly interface human–computer interaction gesture recognition predictive analysis artery disease genes gene expression coronary cuckoo search coronary artery disease computer intelligence non-control data attack modification memory security control data attack computer security iot nodes fog computing blockchains technology 5g networks supervised learning social net- works insult detection version control file replication file fragmentation cloud security auto update mechanism taxonomy data visualization switching space division multiplexing resource allocation network sharing methodology supple architecture multitenancy multi-tenant placement in-memory database best-fit greedy algorithm solenoid valve sensor relay 4 channel android surface roughness series resistance mosfet mobility modeling mobility degradation id-vg characteristic smart home smart cities mobile apps arduino social engineering email phishing confusion metrics classification report
Tout plus