Temas
Cantidad
(OFDM) Orthogonal Frequency Division Multiplexing; (DAB) Digital Audio Broadcasting; (CDD) Cyclic Delay Diversity; (DSDD) Diagonal Shift Delay Diversity1 ; mobile banking; internet banking; Bangladesh1 AQM, Lambert W function, congestion control1 ARM controller; Circuit based drivers; MAX 232; Sensor based ultrasonic detection; Motor (DC); Web cam; Image processing tool box; Automation; Pattern recognition;Module analysis1 AWGN;BER;OFDM;WiMAX1 Accountability; Cloud; JAR; Security; Service1 Ad-hoc Networks1 Adaptive Decision Feedback Equalizer (ADFE); Equalization to Remove ISI; Adaptive Equalization1 Amplitude modulation; Simple oscillator; GPS-referenced frequency-synchronizer1 Anonymity applications; cell counting; Tor; Onion router1 Anonymizing Communications; Hacking Users; Nimble; Blacklisting1 Aspect Oriented Security; Data Based Mining; Privacy Control; Data Authentication; and Security Oriented Analysis; Slicing Approach Respectively1 Assured deletion of the file oriented policy aspect; Storage of the cloud; Implementation of the prototype respectively1 Automated Vocabulary Discovery (AVD); TF-IDF; Direct Association;Relevance Strength1 Automatic Image Registration; HAIRIS; Relaxation Parameter; Sub Pixel; Segmentations; Objects; Spectral Content1 Backtracking, Alignment, Penalty, Spelling Error1 Balanced Voltage; Computational Vector; Multilevel Cascading; STATCOM; Data Coupling; Synchronous Data1 Bayesian Networks; Software Project Management; Literature review.1 Black hole attack; DOS; MANET; Routing; Security1 Bubble sort; Selection sort; Insertion sort; Shell sort; Comb sort; Merge sort; Heap sort; Quick sort1 Byzantine Fault Tolerance; Database Storage; Track Systems; Data Centers; Byzantine Quorum Protocols1 CBIR, LUV values, clusters etc.1 Centralized algorithm; Distributed system; Distributive algorithm; Mutual exclusion; Token ring algorithm1 Centralized algorithm; distributed system; distributive algorithm; mutual exclusion; token ring algorithm1 Character recognition; handwriting Characteristics; Genotypic Family members; Handwriting Resemblance in family; Statistical Examination of Handwriting1 Cloud Computing3 Cloud Computing; Malicious attacks; Inter clouds; Single Cloud; Data Security1 Cloud Computing; Multiple users; Cloud Information Accountability; Java archive1 Cloud Computing; Proof of retrievability; Cloud storage service; Provable Data Possession, Cryptographic Technique1 Cloud Computing; SAAS; PAAS; IAAS; Compatibility;Application Deployment; Capability Storage;Unpredictability1 Cloud Computing; Shared Pool; Data Storage; Third Party Auditor; On-line Burden; Public Key; Cloud Data Auditing System1 Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost1 Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost.1 Cloud Computing; Traffic Control; Microcomputer; Traffic Signals; Agent Based Traffic Management; Mobile Multi Agent1 Cloud Computing;Peer-to-peer Networks; EQUATOR; Overlay Topology; Resources; CPU Cycles1 Cloud computation; reliability; Data authentication; Security analysis; Privacy control; intelligent network respectively1 Cloud computing; Cloud Audit Services; Provable Data Possession; Cryptographic Technique1 Cloud computing; Data security; Privacy preserving; Security analysis; Computational complexity; Data analysis respectively1 Cloud computing; Decentralized Information; Java Archives; Cloud Information Accountability1 Cloud computing; IT infrastructures; Infrastructure as a Service; Virtual machines instances; Leasing1 Cloud computing; Multi-cloud; Single cloud; Security risks1 Cloud computing; Storage; Cost-based approach; Cloud Service provider; Customer1 Cloud computing; patient report; SMS (short message service)1 Clustering; Feature Extraction; Pattern Recognition; Point Based Multi View; Analysis Based Co Citation; Similarity Measure; Correlates Factor1 Clustering; GRASP; Metaheuristic; construction phase and Improvement phase1 Clustering; Pattern Organization; Single-View Clustering; Multi-View Clustering; Similarity Measure1 Code 1-D; modified multi-diagonal (MMD); MAI; OOC; OCDMA; MATLAB; ZCC1 Communication Engieering1 Communication Engineering1 Communication services; Internet Protocol; Numerous Routing Configuration; Link failure; Node failure; congestion1 Computer Networks2 Computer Science4 Computer Science & Engineering4 Computer Science and Engineering1 Computer Science/Statistical Computer1 Computer science1 Concurrent Engineering; KBE; DSS and Expert Systems; Knowledge and Information Management1 Congestion Control; Core-Stateless Fair Queuing; Packet loss; Stable Token-Limited Congestion Control1 Converge cast; Time Division Multiple Access; Sensor nodes; wireless sensor networks; Contention-free medium access1 Credit Card Deception; Fake Sources; Unauthorized Persons; Discovery Methods; E-Commerce1 Credit Card; Deception Discovery Methods; E-Commerce; Authentic Connections1 Credit Card; Forged Sources; Illegal Persons; Discovery Methods; E-Commerce; Authentic Connections; Artificial Intelligence2 Data Capture; Query Based Data; Similarity Fusion Score; Correlation; Web Based Application; Search Engine Oriented Retrieval; Classification; Feature Extraction; Data Processing1 Data Hiding; LSB Method; Steganography; Cover Image; Stego Image1 Data Mining4 Data Mining; Analysis; Time series; Prediction; Assessment; Modeling; Decision making; Forecast.1 Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively1 Data preservation; Minimization of delay; Distribution of the load; Reordering of the packet and Forwarding multi path based aspect respectively1 Data uncertainty; Decision-tree classification; Pruning technique; Probability distribution1 Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively1 Digital media content; watermarking; Compressed and encrypted domain; JPEG2000; Decryption1 Dimensionality Reduction; Microarray Gene; Feature Selection; Gene Classification; Principle Component Analysis; Multi-linear Principle Component Analysis; FIS1 Dimensionality; Clustering; Feature Selection; Text Classification; High Dimensional; Data Sets1 Disseminated; Accountability; Data Sharing; Internet; Scalable Services; JARs; Cloud Computing; Object Centered Approach1 Distributed Computing1 Distributed, minimum-weight spanning tree, synchronous, communication complexity, time complexity.1 Electromagnetic radiation; Satellite; Sensors; Sensing1 Electronic Health Records; Machine Learning; Textual representation; Short medical text1 Electronics & Communications1 Electronics Engineering1 Embaded Systems3 Emergency Mobile Health Care; Computing Opportunity; Control Based Privacy Access; Sensor Network; Mobile Computing; Data Authentication1 Extraction of template; Clustering analysis; Pattern recognition; Data classification; Principle length of minimum description respectively1 Face Detection, Color Models, Skin Color Extraction, Adaptive Template Matching.1 Face Detection; Eye Region Extraction; Eye Blink Detection; Drowsiness Detection1 Filtering packets; Spoofing IP Address; Web Server; Probabilistic Ppacket1 Forensic Science, Computer Application1 Fraud Detection; Commerce Oriented Electronics; Artificial Intelligence; Neural Network; Ordered Sequence; Data Alignment; Machine Learning1 Frequency; Multiplier; Four-Quadrant1 Fuzzy Logic , Diemensionality REduction1 Gold Sequence (Random Sequence); VLSI; 16nm Technology1 Graphical LCD; ATmega32; proteus software; cost effective; compact size; embedded system; Research and development1 Hiding Information; Data Hiding; Bits of High Priority; Bits of Low Priority; Audio Authentication; Data Transfer; Encryption1 Image Processing4 Image processing2 Information Security2 Network Sequrity3 No aplica15 Wireless Sensor Networks3 Wireless sensor networks; Multi Frequency scheduling; Converge Cast; Transmission power control2