Keyword Index

A

  • ANFIS Sales Budget Forecasting and Revision by Adaptive Network Fuzzy Base Inference System and Optimization Methods [Volume 9, Issue 1, 2016, Pages 25-38]
  • ANFIS Use of the Improved Frog-Leaping Algorithm in Data Clustering [Volume 9, Issue 2, 2016, Pages 19-26]
  • Authentication MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security [Volume 9, Issue 1, 2016, Pages 1-11]

C

  • Cellular learning automata Cluster-Based Image Segmentation Using Fuzzy Markov Random Field [Volume 9, Issue 2, 2016, Pages 1-9]
  • Clustering Cluster-Based Image Segmentation Using Fuzzy Markov Random Field [Volume 9, Issue 2, 2016, Pages 1-9]
  • Conductance Overlapping Community Detection in Social Networks Based on Stochastic Simulation [Volume 9, Issue 1, 2016, Pages 61-68]

D

  • Disguised Face Recognition Disguised Face Recognition by Using Local Phase Quantization and Singular Value Decomposition [Volume 9, Issue 1, 2016, Pages 51-60]

E

F

  • Fourier transform Disguised Face Recognition by Using Local Phase Quantization and Singular Value Decomposition [Volume 9, Issue 1, 2016, Pages 51-60]
  • Fuzzy markov random field Cluster-Based Image Segmentation Using Fuzzy Markov Random Field [Volume 9, Issue 2, 2016, Pages 1-9]

G

  • Group key An Overview of Group Key Management Issues in IEEE 802.16e Networks [Volume 9, Issue 1, 2016, Pages 39-50]
  • Group key management An Overview of Group Key Management Issues in IEEE 802.16e Networks [Volume 9, Issue 1, 2016, Pages 39-50]

H

  • Hidden Markov Model MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security [Volume 9, Issue 1, 2016, Pages 1-11]

I

  • IEEE802.16 An Overview of Group Key Management Issues in IEEE 802.16e Networks [Volume 9, Issue 1, 2016, Pages 39-50]
  • IEEE 802.16e An Overview of Group Key Management Issues in IEEE 802.16e Networks [Volume 9, Issue 1, 2016, Pages 39-50]
  • Image segmentation Cluster-Based Image Segmentation Using Fuzzy Markov Random Field [Volume 9, Issue 2, 2016, Pages 1-9]
  • Interruptible Load Energy and Reserve Market Clearing to Consider Interruptible Loads [Volume 9, Issue 1, 2016, Pages 13-24]
  • Intrusion Detection MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security [Volume 9, Issue 1, 2016, Pages 1-11]

L

  • Liquid Optimization of Non-volatile Memory Cell and Energy Consumption in Robot Systems by Synthesized Silicon Nanoparticles via Electrical Discharge [Volume 9, Issue 2, 2016, Pages 43-50]
  • Local Phase Quantization Disguised Face Recognition by Using Local Phase Quantization and Singular Value Decomposition [Volume 9, Issue 1, 2016, Pages 51-60]

M

  • Manhattan and Euclidean Distance Disguised Face Recognition by Using Local Phase Quantization and Singular Value Decomposition [Volume 9, Issue 1, 2016, Pages 51-60]
  • Markov random field Cluster-Based Image Segmentation Using Fuzzy Markov Random Field [Volume 9, Issue 2, 2016, Pages 1-9]
  • Mobile ad-hoc Networks MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security [Volume 9, Issue 1, 2016, Pages 1-11]
  • Mobile WiMAX An Overview of Group Key Management Issues in IEEE 802.16e Networks [Volume 9, Issue 1, 2016, Pages 39-50]
  • Moduli Set An Improved RNS Reverse Converter in Three-Moduli Set [Volume 9, Issue 2, 2016, Pages 27-32]
  • Multicast A Novel Multicast Tree Construction Algorithm for Multi-Radio Multi-Channel Wireless Mesh Networks [Volume 9, Issue 2, 2016, Pages 33-41]
  • Multi objective genetic algorithm Feature Selection Using Multi Objective Genetic Algorithm with Support Vector Machine [Volume 9, Issue 2, 2016, Pages 11-17]

P

  • PSO & BPN methods Sales Budget Forecasting and Revision by Adaptive Network Fuzzy Base Inference System and Optimization Methods [Volume 9, Issue 1, 2016, Pages 25-38]
  • PSO & BPN methods Use of the Improved Frog-Leaping Algorithm in Data Clustering [Volume 9, Issue 2, 2016, Pages 19-26]

R

  • Rekeying An Overview of Group Key Management Issues in IEEE 802.16e Networks [Volume 9, Issue 1, 2016, Pages 39-50]
  • Residue Number System An Improved RNS Reverse Converter in Three-Moduli Set [Volume 9, Issue 2, 2016, Pages 27-32]
  • Reverse Converter An Improved RNS Reverse Converter in Three-Moduli Set [Volume 9, Issue 2, 2016, Pages 27-32]

S

  • Sales Forecast Sales Budget Forecasting and Revision by Adaptive Network Fuzzy Base Inference System and Optimization Methods [Volume 9, Issue 1, 2016, Pages 25-38]
  • Sales Forecast Use of the Improved Frog-Leaping Algorithm in Data Clustering [Volume 9, Issue 2, 2016, Pages 19-26]
  • Security MHIDCA: Multi Level Hybrid Intrusion Detection and Continuous Authentication for MANET Security [Volume 9, Issue 1, 2016, Pages 1-11]
  • Social networks Overlapping Community Detection in Social Networks Based on Stochastic Simulation [Volume 9, Issue 1, 2016, Pages 61-68]

T

  • Time Series Analysis Sales Budget Forecasting and Revision by Adaptive Network Fuzzy Base Inference System and Optimization Methods [Volume 9, Issue 1, 2016, Pages 25-38]
  • Time Series Analysis Use of the Improved Frog-Leaping Algorithm in Data Clustering [Volume 9, Issue 2, 2016, Pages 19-26]