Advances in Computational Research

Editor-in-Chief :
Publisher : Bioinfo Publications
ISSN : 0975-3273 (Print)     E-ISSN : 0975-9085 (Online)     Frequency : Yearly
Index Copernicus Value (ICV) :       CODEN : ACR
DOI : 10.9735/0975-3273       Abbreviation : Adv Comput Res
Subject : Computer Science & Technology

Keyword Index

Algorithm analysis, Sorting algorithm, Empirical Analysis Computational Complexity notations. Remote Sensing, Geographic Information system, urbanization, land use, Land cover, town planning Assignment Problem, Multi-criteria decision making, Linear membership function, Non-linear membership function Reliability, Fuzzy numbers, Trapezoidal membership function, Functions of fuzzy numbers Statistical Methods, Probability distributions, Non-parametric test Evolutionary Algorithms, Bounded diameter spanning trees, greedy heuristic Genetic Algorithms, Tries, Performance OCR, Handwritten Numeral Recognition, k-NN, Structural feature, and Indian script OCR, Indian Language, Kannada Vowels, Moment inva riants Multi-criteria decision making, Grey theory, Fuzzy membership function, Ranking ICA, ISA, MICA, MFT-ICA Solid transportation problem, Fuzzy programming, Linear and nonlinear membership functions, Multiple criteria programming Data Mining, 3D space feature plot, Remote sensing, Visualization Linear Discriminant Analysis (LDA); Engine ignition System; Zinc Oxide Thick film sensor; Driving under the influence (DUI); Virtual Instrumentation sequrity, Digital watermarking, information Hiding, watermarking Ambulatory ECG; Adaptive filter; Virtual Instrumentation; Artifacts; Cardiac Disease; Arrhythmia; Bradycardia; Tachycardia; Left and Right Hypertrophy Memory management, garbage collection techniques, scheduling, real time system Minimum Distance, Simulated Annealing, Proposed Simulated Annealing, Degenerated States System (DSS), Non Degenerated States System (NDSS), Perturbation, Linear Error Correcting Codes, BCH Codes, QR Codes Confusion matrix, Data Mining, Decision tree, Neural Network, stacking ensemble, voted perceptron Islamic University, Comprehensive Framework, innovation, economical development Biometric, Iris recognition, Preprocessing, Feature extraction, Neural Network Open Source Databases, Virtualization technology Language, Accent identification, MFCC RSA algorithm, Elliptical Curve Biometric, Image Processing, iris, pre-processing, localization, normalization, Feature Extraction cyber crime, hacking, cyber law Algorithm, Time Complexity Sorting, Insertion Sort, Run-time Analysis Breast cancer, Diagnosis, Data Mining, Classification, See5, Decision Tree Software Development Life Cycle (SDLC), Traditional Software Development, Agile Software Development SAP HANA database, Main Memory, Data replication Inherence authentication, Biometric Encryption, Biometric Encryption Algorithm, Face Recognition, Face Detection, Face Detection Using Biometric Cloud Computing, Data Security, Privacy and key issues Cyber Security, Computer crime, cybercrime, e-crime, hi-tech crime, legal aspects Dalit, Sentiment analysis, Opinion Mining, Part-of-Speech (POS), Opinion Word Extraction, Polarity Identification, Summary Generation MVC Framework, Responsive websites, Web Architecture Cyber Security, Digital Forensics, India Biometrics, Recognition, Verification, Identification Data mining, Educational Data Mining, Classification, Clustering Natural Language Processing, Natural Language Interface Coregistration, estimation, fMRI, realignment, segmentation, smoothing, SPM NLP, Question Answering Data Compression Application-level web Security, Cross-site scripting, Computer Security, Security vulnerabilities computer virus, detection techniques, threats, anti-virus Naive bayes, Classification, Decision Tree, Data Mining Cloud computing, Services, security, cryptography algorithm. Productivity, productivity analysis, Software Project management Pollard’s Rho, Pollard’s P-1, Quadratic sieve Confusion matrix, Data Mining, Decision tree, Neural Network, stacking ensemble, voted perceptron cyber law, cyber crime, cyber cell, control, consequences Naïve Bayes Classifier, Opinion Mining Function Point Analysis, Software Projects, Software Estimation Techniques, Software Size Quantification, Severity, Hue Saturation Intensity, Hue Saturation Value, Ratio of Infected Area Symmetric cryptosystem, Asymmetric cryptosystem, Substitution cipher Android OS, Stored OS, Redmi 1S, Smartphone, Security, E-Users Knowledge Management, Data Mining Applications, Knowledge Discovery in Healthcare, Knowledge Discovery in Databases Software Testing, Manual Testing, Automation Testing, QTP, Selenium Fingerprint, Biometric Cryptography, Encryption key, algorithm Face recognition, general difficulties, Iris recognition, Multimodal Biometric QA system, linguistic approach, statistical approach, pattern based approach Image enhancement, histogram, histogram equilization, BBHE, DSIHE, MMBEBHE,BPDHE, WMSHE,RMSHE RPC, RMI, Java, LAN, Security, Java compiler, Monitoring, Controlling Fuzzy inventory, Crisp model, Hyperbolic Inverse membership function. TD, MFCC, DTW, GMM, HMM Natural Language Processing, Question Answering, Marathi Database Controllers, magnetometer, obstacle detection, path tracing, ultrasonic sensors Landmark, Burst, Voicing Onset Time, Stop, Detection