Jimma University Open access Institutional Repository
Filter by: Subject
Login
Institutional Repository Home
→
Jimma Institute of Technology
→
Computing Science
→
Filter by: Subject
JavaScript is disabled for your browser. Some features of this site may not work without it.
Filter by: Subject
Results Per Page:
5
10
20
40
60
80
100
Now showing items 51-150 of 138
Previous Page
Next Page
Babelnet (1)
Basic Safety Message (1)
Basic safety message (1)
Bayesian Network (1)
Beam Search Decoder (1)
BERT (1)
best path (1)
Big Data (1)
Big Data analytics (1)
Black hole attack (1)
BLSTM (1)
Botnet, P2P, deep learning, Deep Neural Network, GAN, Autoencoder, Convolutional Neural Network (1)
Broadcast (1)
Broadcasting News Speech (1)
Buffer clearing (1)
buffer management (1)
Buffer Management Forwarding Policy (1)
Case-based reasoning, Diabetes mellitus type 2, Diet, Drugs, Personalized medicine, personalized medical care (1)
CBRP (1)
CC (1)
Cellular Network Fault (1)
Cellular Network Fault, Machine Learning, Naïve Bayes, Bayesian Network, drive test, Node B, Predictive model (1)
Cervical cancer, classification, risk analysis, transfer learning, Vgg16, ReseNet50, machine learning, random forest, multimodal learning (1)
CH (1)
Chi-square (1)
chronic diseases. (1)
Classification (1)
classification (1)
Clone attack (1)
Cloud Computing (1)
Cloud computing (1)
Cloud computing (CC) (1)
Cloud service provider (CSP) (1)
Cluster formation (1)
Cluster Member (1)
Cluster-based forwarding scheme (1)
clustering (1)
COAOMDV (1)
coffee (1)
Cold start Problem (1)
Comments (1)
comments (1)
Communication (1)
communication congestion (1)
communication range (1)
Community Head (1)
community recognition (1)
Computer-aided diagnosis (CAD) (1)
Conditional Observation (1)
Congestion control in VANET (1)
Congestion overcome (1)
Constrained Network (1)
Contact Duration (1)
context information for hate speech (1)
Contiki (1)
Contiki OS (1)
COVID-19, Natural Language Processing, Sentiment Analysis, Subjectivity Detection, TF-IDF, SVM, RFC. (1)
Data mining (1)
data redaction (1)
data redundancy (1)
Data Replication (1)
Data Visualization (1)
data-driven decision-making (1)
DDoS attack (1)
Decision Tree (1)
decision tree (1)
decoder (1)
Deep leaning (1)
Deep learning, neural networks, Amharic text dataset, Natural language processing (NLP) (1)
Deep-Learning, Skin Diseases, Convolutional Neural Network, ResNet50, DenseNet201, MobileNetV2, and MobileNetV3. (1)
Delay (1)
delay (1)
Delay Tolerant (1)
Delay tolerant networking, disaster response, energy constraint, multi metrics, utility, priority and direction of destination location. (1)
Delay tolerant networks (1)
Delay Tolerant Networks,Routing, Buffer management (1)
denial of service (1)
Dependency parsing (1)
Detecting Hate Speech and Offensive Language (1)
Diabetes Mellitus (1)
disruption tolerant networks (1)
DL (1)
Document frequency (1)
drive test (1)
dropping (1)
Drought Prediction (1)
Drug Interactions (1)
Dry Eye Disease (1)
DTN (1)
Duty-cycle and Contention window (1)
e-commerce (1)
E-LEACH (1)
Efficient data dissemination, OSM, and LB-OLSR (1)
EL (1)
ellyfish attack (1)
ellyfish attack, holding period, denial of service, MANET, AODV, delay, network simulation. (1)
Emergency (1)
Emergency dissemination broadcasting (1)
Emergency Message Dissemination (1)
Emergency messages (1)
Now showing items 51-150 of 138
Previous Page
Next Page
Search IR
Search IR
This Collection
Browse
All of IR
Communities & Collections
By Issue Date
Authors
Titles
Subjects
This Collection
By Issue Date
Authors
Titles
Subjects
My Account
Login
Register