Colección: TEMAS
Temas | Cantidad |
---|---|
(OFDM) Orthogonal Frequency Division Multiplexing; (DAB) Digital Audio Broadcasting; (CDD) Cyclic Delay Diversity; (DSDD) Diagonal Shift Delay Diversity | 1 |
; mobile banking; internet banking; Bangladesh | 1 |
AQM, Lambert W function, congestion control | 1 |
ARM controller; Circuit based drivers; MAX 232; Sensor based ultrasonic detection; Motor (DC); Web cam; Image processing tool box; Automation; Pattern recognition;Module analysis | 1 |
AWGN;BER;OFDM;WiMAX | 1 |
Accountability; Cloud; JAR; Security; Service | 1 |
Ad-hoc Networks | 1 |
Adaptive Decision Feedback Equalizer (ADFE); Equalization to Remove ISI; Adaptive Equalization | 1 |
Amplitude modulation; Simple oscillator; GPS-referenced frequency-synchronizer | 1 |
Anonymity applications; cell counting; Tor; Onion router | 1 |
Anonymizing Communications; Hacking Users; Nimble; Blacklisting | 1 |
Aspect Oriented Security; Data Based Mining; Privacy Control; Data Authentication; and Security Oriented Analysis; Slicing Approach Respectively | 1 |
Assured deletion of the file oriented policy aspect; Storage of the cloud; Implementation of the prototype respectively | 1 |
Automated Vocabulary Discovery (AVD); TF-IDF; Direct Association;Relevance Strength | 1 |
Automatic Image Registration; HAIRIS; Relaxation Parameter; Sub Pixel; Segmentations; Objects; Spectral Content | 1 |
Balanced Voltage; Computational Vector; Multilevel Cascading; STATCOM; Data Coupling; Synchronous Data | 1 |
Black hole attack; DOS; MANET; Routing; Security | 1 |
Bubble sort; Selection sort; Insertion sort; Shell sort; Comb sort; Merge sort; Heap sort; Quick sort | 1 |
Byzantine Fault Tolerance; Database Storage; Track Systems; Data Centers; Byzantine Quorum Protocols | 1 |
Centralized algorithm; Distributed system; Distributive algorithm; Mutual exclusion; Token ring algorithm | 1 |
Centralized algorithm; distributed system; distributive algorithm; mutual exclusion; token ring algorithm | 1 |
Character recognition; handwriting Characteristics; Genotypic Family members; Handwriting Resemblance in family; Statistical Examination of Handwriting | 1 |
Cloud Computing | 3 |
Cloud Computing; Malicious attacks; Inter clouds; Single Cloud; Data Security | 1 |
Cloud Computing; Multiple users; Cloud Information Accountability; Java archive | 1 |
Cloud Computing; Proof of retrievability; Cloud storage service; Provable Data Possession, Cryptographic Technique | 1 |
Cloud Computing; SAAS; PAAS; IAAS; Compatibility;Application Deployment; Capability Storage;Unpredictability | 1 |
Cloud Computing; Shared Pool; Data Storage; Third Party Auditor; On-line Burden; Public Key; Cloud Data Auditing System | 1 |
Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost | 1 |
Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost. | 1 |
Cloud Computing; Traffic Control; Microcomputer; Traffic Signals; Agent Based Traffic Management; Mobile Multi Agent | 1 |
Cloud Computing;Peer-to-peer Networks; EQUATOR; Overlay Topology; Resources; CPU Cycles | 1 |
Cloud computation; reliability; Data authentication; Security analysis; Privacy control; intelligent network respectively | 1 |
Cloud computing; Cloud Audit Services; Provable Data Possession; Cryptographic Technique | 1 |
Cloud computing; Data security; Privacy preserving; Security analysis; Computational complexity; Data analysis respectively | 1 |
Cloud computing; Decentralized Information; Java Archives; Cloud Information Accountability | 1 |
Cloud computing; IT infrastructures; Infrastructure as a Service; Virtual machines instances; Leasing | 1 |
Cloud computing; Multi-cloud; Single cloud; Security risks | 1 |
Cloud computing; Storage; Cost-based approach; Cloud Service provider; Customer | 1 |
Cloud computing; patient report; SMS (short message service) | 1 |
Clustering; Feature Extraction; Pattern Recognition; Point Based Multi View; Analysis Based Co Citation; Similarity Measure; Correlates Factor | 1 |
Clustering; Pattern Organization; Single-View Clustering; Multi-View Clustering; Similarity Measure | 1 |
Code 1-D; modified multi-diagonal (MMD); MAI; OOC; OCDMA; MATLAB; ZCC | 1 |
Communication Engineering | 1 |
Communication services; Internet Protocol; Numerous Routing Configuration; Link failure; Node failure; congestion | 1 |
Computer Networks | 1 |
Computer Science/Statistical Computer | 1 |
Congestion Control; Core-Stateless Fair Queuing; Packet loss; Stable Token-Limited Congestion Control | 1 |
Converge cast; Time Division Multiple Access; Sensor nodes; wireless sensor networks; Contention-free medium access | 1 |
Credit Card Deception; Fake Sources; Unauthorized Persons; Discovery Methods; E-Commerce | 1 |
Credit Card; Deception Discovery Methods; E-Commerce; Authentic Connections | 1 |
Credit Card; Forged Sources; Illegal Persons; Discovery Methods; E-Commerce; Authentic Connections; Artificial Intelligence | 2 |
Data Capture; Query Based Data; Similarity Fusion Score; Correlation; Web Based Application; Search Engine Oriented Retrieval; Classification; Feature Extraction; Data Processing | 1 |
Data Mining | 4 |
Data Mining; Analysis; Time series; Prediction; Assessment; Modeling; Decision making; Forecast. | 1 |
Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively | 1 |
Data preservation; Minimization of delay; Distribution of the load; Reordering of the packet and Forwarding multi path based aspect respectively | 1 |
Data uncertainty; Decision-tree classification; Pruning technique; Probability distribution | 1 |
Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively | 1 |
Digital media content; watermarking; Compressed and encrypted domain; JPEG2000; Decryption | 1 |
Dimensionality; Clustering; Feature Selection; Text Classification; High Dimensional; Data Sets | 1 |
Disseminated; Accountability; Data Sharing; Internet; Scalable Services; JARs; Cloud Computing; Object Centered Approach | 1 |
Electronic Health Records; Machine Learning; Textual representation; Short medical text | 1 |
Embaded Systems | 3 |
Emergency Mobile Health Care; Computing Opportunity; Control Based Privacy Access; Sensor Network; Mobile Computing; Data Authentication | 1 |
Extraction of template; Clustering analysis; Pattern recognition; Data classification; Principle length of minimum description respectively | 1 |
Face Detection; Eye Region Extraction; Eye Blink Detection; Drowsiness Detection | 1 |
Filtering packets; Spoofing IP Address; Web Server; Probabilistic Ppacket | 1 |
Forensic Science, Computer Application | 1 |
Fraud Detection; Commerce Oriented Electronics; Artificial Intelligence; Neural Network; Ordered Sequence; Data Alignment; Machine Learning | 1 |
Gold Sequence (Random Sequence); VLSI; 16nm Technology | 1 |
Graphical LCD; ATmega32; proteus software; cost effective; compact size; embedded system; Research and development | 1 |
Hiding Information; Data Hiding; Bits of High Priority; Bits of Low Priority; Audio Authentication; Data Transfer; Encryption | 1 |
IEEE 802.11; MORSA; TCP; WLAN; Video | 1 |
Identifiable Task; Clustering; Historical Dependent User; Proportionate Outcome; Query Restoration; Extracting Features. | 1 |
Identification of the Radio Frequency; Wireless Environment; Protocol ZIGBEE; Monitoring Environment in Real Time | 1 |
Image Processing | 1 |
Image Processing, 3D laser | 1 |
Image Processing; Image reduction; Colour image; Penalty function | 1 |
Image Records; Multimedia management; Relevance Feedback; Support Vector Machine Relevance Feedback; Semantic gap | 1 |
Image Retrieval; Similarity Score; Correlation;Image Enhancement; Pre Processing; Histogram;Gradient; Classification; Smoothening | 1 |
Image processing | 1 |
Integration of the data; Data authentication; and Dependable storage of the distribution based strategy; Privacy concern; Computational analysis respectively | 1 |
Internet Protocol; Numerous Routing Configurations; Routing Technologies; Jamming | 1 |
Internet oriented design; End to end; Peer to peer; Routing based multi hoping strategy; Effective analysis; Performance evaluation strategy respectively | 1 |
Intrusion Detection Systems; Double Guard; Attacks; web based services | 1 |
Laser Triangulation, 3D mesh,Laser Stripe | 1 |
Leakage of the Data; Strategy Allocation; Data Authentication; Security Analysis; Watermarking Strategy;Data Hiding Technique Respectively | 1 |
License plate; License plate recognition (LPR); preprocessing; Character Segmentation | 1 |
Localizing Iris; Image Processing; Segmentation; Pattern Recognition; Extraction of Features; Enhancement | 1 |
Location Reliant Queries; Query Imprecision; Multi Dimensional; Filtering and Verification | 1 |
MANETs; Routing Protocols; Proactive; Reactive; Hybrid | 1 |
Machine Oriented Supported Vectors; Regularization;Features Extraction; Metadata; Retrieval Accuracy; Similarity Score | 1 |
Median edge detector; Gradient-adjusted Predictor; Reversible watermarking; prediction-error expansion | 1 |
Memory Built In Self Test; Address Generator; Fault Detection; Back to Back; Speed Related Faults; Non Linear Algorithms | 1 |
Mining; Incomplete Data Sets; Missing Values; Pre-Processing; Unsupervised Filter | 1 |
Network Sequrity | 3 |
No aplica | 14 |
Wireless Sensor Networks | 3 |
Wireless sensor networks; Multi Frequency scheduling; Converge Cast; Transmission power control | 2 |