|
Login
| About Us
| Contact Us
Computer and Information Science
Computer and Network Security
Web Services
Data and Information Security
Complexity
Sensor Technology
Radio Frequency Identification
Applications and Value-Added Services
Text and Graphics Recognition
Algorithms and Programs
P2P Networking and System
5G Technology
RFID and Tagging Technologies
Cognitive Radio
Mine Mechanization
Communication Protocols
Securing Information Technology
IP Multimedia Subsystem (IMS)
Control of Networks
Location and Tracking of Objects
Infrared Sensors
M2M
Internet and Online Services
New Business Models Built Around The Internet
Online Communities and Social Networks
Global Positioning Systems
IPv6
Internet of Things Network Infrastructures
Connection of Everyday Objects to the Internet
Mobile ad hoc Network (MANET) and Sensor Networks
Internet of Things Communication Systems
Neural-Based Agents in Computer Game Design
Social Media and Machine Learning
Laser Scanner
Home Networking
Stochastic Model for Cyber Security
Reinforcement Learning
Networking for Integrated Heterogeneous Wireless Ecosystem
Q-Learning Algorithm
Software Engineering Principles
Role of Gamification in Software Development Lifecycle
Cloud and Services Computing
Communications Network Technology
Security and Privacy Challenges in Cyber-Physical Systems
Semantic Technologies to Information Systems Development
Software‐Defined Optical Networking
Rehabilitation Robotics
Computer Networks
Security Approaches for Information-Centric Networking
Information Segmentation and Investing in Cybersecurity
Machine Learning Algorithm
Humanoid Robot
Intelligent Embedded Software: New Perspectives And Challenges
Firm AI Adoption Intensity And Marketing Performance
Intelligent System and Computing
Game Designing Processes
Shared and Transactional Memory
Simulation of Communication Systems
Medical Robot
Industrial Robotics
Digital Forensics and Cyber Crime Datamining
Mobile Robot
Information Security and the Theory of Unfaithful Information
Data Mining and Machine Learning for Software Engineering
Clustering Algorithm
Cyber Security Crimes
Audit Optimization Based on Computer Vision Technology
Determinants of Software as a Service (SaaS) Adoption
Computer Game Development
Cyber Terrorism
Challenges for Software Engineering in Automation
Autonomous Robot
Cyber Security in Vehicular Networks
Deep Learning-Based Code Refactoring
Cognitive Software Engineering
Agent Systems in Software Engineering
Core Technologies of Cyber Security
Working with Images and Multimedia
The Network Economy: Trends and Opportunities
Storage Management
Introduction to XML
PHP with MySQL
Protection and Security
Virtual Reality: An Overview
Using Application Programming Interfaces
Basics of HTML
Information Technology and Organization
Programming Constructs and Paradigms
Object-Oriented Design
Web Design Principles
Head Mounted Display
Enabling Technologies in Virtual Reality
Visual Interface Design
Language and Communication: User Interface Design
Games for Social and Health Purposes
Future of User Interface Design
Patterns as Tools for User Interface Design
Future of Virtual Reality
Challenges and Opportunities in User Interface Design
Virtual Reality vs. Augmented Reality
Games Hardware
Basic of JavaScript
User Interface Design for Programmers
Visual, Acoustic, and Haptic Perception in Virtual Reality
User Interface Design Bridging the Gap from User Requirements to Design
The User Interface: An Introduction and Overview
Theoretical Framework for Network Coding
Risks Issues and Security Challenges in Cloud Computing
Introduction to Internet of Things (IoT) Security and Its Open Challenges
Network Coding: Mobile Application
Network Coding: Applications and Challenges
Introduction to Social Network and Its Security Issues
Network Coding in Application Layer Multicast
IoT Architecture Security
Security against Adversarial Errors
Application Safety and Service Vulnerability in Cloud Network
Network Coding in Wireless System
An Introduction to Network Coding
Cyberspace Security in Digital Age
Cloud Computing Overview
Throughput Benefits of Network Coding
Security in Enabling Technologies
Mesh Terminology and Overview
Machine Learning In Biometric Signature Verification
Fingerprints Classification Using Machine Learning and Image Analysis
Countering the Presentation Attacks Recognition of Face, Iris, and Fingerprint
Artificial Intelligence in Biometrics
Recent Trends and Future Projections of Data Mining
Telecommunications Applications of Mesh
Biometric Detection Recognition Techniques
Physical Layer Technique
Medium Access Control Layer
Machine Learning for Biometrics
Fundamentals of Transport Layer
Application of Secure Data Mining in Fraud Detection
Soft Biometrics for Human Recognition
Mesh Networks of Wireless Sensor Networks (WSNs)
Application of Data Mining in Crime Detection
Eye Recognition Technique and its Characteristics
Classification Approaches in Data Mining
Data Mining in Telecommunication Industry
Fundamentals of Data Mining
Introduction to Network Layer
Basics of Wireless Mesh Networks
Symbol Segmentation and Representation
JavaScript Events
Java Script: Classes and Objects
Java Basics
Methods, Prcs, Lambdas, and Closure
Symbol Spotting
Mobile User Interface
Pattern Recognition, Signal and Image Processing
Special Purpose Systems
Sensor-node Architecture
Polymorphism in C Plus Plus
Information Technology Architecture
Retrieving Data
Mobile Ad-Hoc Networks
Medium Access Control Protocols for Wireless Sensor Networks
I/O Streams
Introduction to IP Security Architecture
Intelligence (AI) and Semantics
Gaming Technology and Tools
Elements of HTML
Symmetric Multiprocessing Architecture
Overview of the Operating System
Menu Bar and Dialog Boxes
Mobile Content Strategy
Security in Networks
Sketched Symbol Recognition
Mobile Game Play and Everyday Life
Software Testing and Integration
Setting Up and Administering a Cluster
Overview of Software Design
Memetic Algorithms
Spreadsheet Package
Software Design Representations
On-page Optimization
Removable and CD Media
Sketching
Symbol Recognition: Current Advances and Perspectives
Software Development and Engineering
Optical Memory
SEO Reporting
Spatial Light Modulators
SEO Marketing for Small Businesses
Networking for Clusters
Round-robin Scheduling
Security in Wireless Sensor Networks
Routing Security in Ad Hoc Wireless Networks
Power Supplies and Cases
Responsive Web Design
Non Linear Editing System
Software Testing and Quality
PHP Arrays
Representation and Description
Pipeline and Vector Processing
Ruby Object-Oriented Programming
PHP Language Basic
Introduction to PHP
Positioning Elements
Parallel Processing
Photorefractive Crystals
Operations in Python
Networking Issues
Number System and Conversion
Mobile Security
Message Sets for Vehicular Communications
Mobile Application Testing
Network Security
Relevant Tools, Standards, and/or Engineering Constraints
PHP: String
Online Gaming
Software Risk Management
SEO Research and Analysis
Ruby Basics
Modes of Data Transfer and Serial Communication
Microprocessor Architecture
OSI Model in Computer Network
Overview of E-security
PHP Function
Object-Oriented Programming and Design
Memory Management
Morphological Image Processing
Microsoft Windows
Medium Access Protocols
Multi Agent System
Network Protocols
Middleware for Wireless Sensor Network
Introduction to Python
Internetworking System
Introduction to Vehicular Ad Hoc Networks (VANETs)
Introduction of Image Computing
Introduction to Visual Basic
Implementing Conditional Logic
Introduction to Application Security
Localization in Vehicular Ad-Hoc Networks
Introduction to Evolutionary Computation
Introduction to Wireless and Sensor Systems
Introduction to Cluster Computing
Interfacing to Operating Systems
Managing Information Technology Outsourcing
Introduction to High Performance Computing
Mobile Application Development
Image Enhancement
Genetic Programming
Local Area Network/Wide Area Network
Introduction to Computers
HTML DOM
Intents and Services
Introduction to Mobile Computing
Delay-Tolerant Networks in VANETs
Data Mining and Data Visualization
Data Link Protocols
Debugger
Data Structure and Recursion
Control Statements and Tools
CSS Grid
Database and Data Mining Security
Data Modeling and Database Systems
Control Flow
Computational Intelligence
Cluster Technology for High Availability
Computer Memory Management
Combinational Logic Circuits
Computer in Business Commerce
Color Image Processing
Cluster Middleware
Computer Graphics
Collaborative Browser-Based Game Environment
Components of a PC
Computer Arithmetic
Charge Coupled Devices (CCD)
Computer Network and Distributed System
Computer Vision and Pattern Recognition
Commodity Cluster
Concept of Computer
Comparing Graph Similarity Measures for Graphical Recognition
Communications via Network and Web
Basics of C plus plus
3D Modeling and Compositing
Character Recognition
Basic Structure of Computers
Basics for SEO
3D Image Visualization
Central Processing Unit
Applications and Layered Architecture
Basics in Web Design
2D Graphics and Multimedia in Android
C Plus Plus Overloading (Function and Operator)
An Overview of Symbol Recognition
C Plus Plus Exception Handling
Cascading Style Sheets
Appearance of Cascading Style Sheets
An Overview of SQL
Basics of Software and Hardware
3D Optical Data Storage
Software Design and Architecture
Artificial Intelligence
Holographics
Information Security and Privacy (ISA)
HPC Architecture
Information, Systems and Management
GNU Privacy Guard (GPG)
HTML Forms
Image Pattern Classification
Event-Driven and Concurrent Programming
Designing Trusted Operating Systems
Input and Output Devices
Image Compression and Segmentation
Genetic Algorithm
Image Transforms
Graphic Symbol Recognition: An Overview
Executing the Debugging
Distributed Shared Memory
Designing and Debugging
Exceptions, Unit Testing and Comprehensions
Evolution of Computer Networks and Services
Desktop Publishing Software
Digital Image Processing
Functions of Information Technology
Electronic Data Interchange
Future Operating Systems
Electronic Payment System
Data Mining, Clustering and Intelligent Information Systems
Email Privacy and Security
Designing Levels and the Game Design Document
Evolutionary Algorithm
Device Management
Elementary Number Theory
Game Design Origins
Component- Level Design
Constraint Handling
Database Processing and Stored Procedural SQL
Cybersecurity
Data Types, Constants and Variables
Cryptography for E-security
Data Structure
Data Access
Database Management System
CSS Text: Typeface and Fonts