Colección: TEMAS
Temas | Cantidad |
---|---|
ARM controller; Circuit based drivers; MAX 232; Sensor based ultrasonic detection; Motor (DC); Web cam; Image processing tool box; Automation; Pattern recognition;Module analysis | 1 |
Adaptive Decision Feedback Equalizer (ADFE); Equalization to Remove ISI; Adaptive Equalization | 1 |
Anonymizing Communications; Hacking Users; Nimble; Blacklisting | 1 |
Aspect Oriented Security; Data Based Mining; Privacy Control; Data Authentication; and Security Oriented Analysis; Slicing Approach Respectively | 1 |
Assured deletion of the file oriented policy aspect; Storage of the cloud; Implementation of the prototype respectively | 1 |
Balanced Voltage; Computational Vector; Multilevel Cascading; STATCOM; Data Coupling; Synchronous Data | 1 |
Byzantine Fault Tolerance; Database Storage; Track Systems; Data Centers; Byzantine Quorum Protocols | 1 |
Cloud Computing; Malicious attacks; Inter clouds; Single Cloud; Data Security | 1 |
Cloud Computing; Multiple users; Cloud Information Accountability; Java archive | 1 |
Cloud Computing; Proof of retrievability; Cloud storage service; Provable Data Possession, Cryptographic Technique | 1 |
Cloud Computing; SAAS; PAAS; IAAS; Compatibility;Application Deployment; Capability Storage;Unpredictability | 1 |
Cloud Computing; Shared Pool; Data Storage; Third Party Auditor; On-line Burden; Public Key; Cloud Data Auditing System | 1 |
Cloud Computing; Traffic Control; Microcomputer; Traffic Signals; Agent Based Traffic Management; Mobile Multi Agent | 1 |
Cloud computation; reliability; Data authentication; Security analysis; Privacy control; intelligent network respectively | 1 |
Cloud computing; Data security; Privacy preserving; Security analysis; Computational complexity; Data analysis respectively | 1 |
Cloud computing; IT infrastructures; Infrastructure as a Service; Virtual machines instances; Leasing | 1 |
Cloud computing; Multi-cloud; Single cloud; Security risks | 1 |
Clustering; Feature Extraction; Pattern Recognition; Point Based Multi View; Analysis Based Co Citation; Similarity Measure; Correlates Factor | 1 |
Clustering; Pattern Organization; Single-View Clustering; Multi-View Clustering; Similarity Measure | 1 |
Credit Card; Forged Sources; Illegal Persons; Discovery Methods; E-Commerce; Authentic Connections; Artificial Intelligence | 1 |
Data Capture; Query Based Data; Similarity Fusion Score; Correlation; Web Based Application; Search Engine Oriented Retrieval; Classification; Feature Extraction; Data Processing | 1 |
Data Mining | 1 |
Data Mining; Analysis; Time series; Prediction; Assessment; Modeling; Decision making; Forecast. | 1 |
Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively | 1 |
Data preservation; Minimization of delay; Distribution of the load; Reordering of the packet and Forwarding multi path based aspect respectively | 1 |
Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively | 1 |
Electronic Health Records; Machine Learning; Textual representation; Short medical text | 1 |
Emergency Mobile Health Care; Computing Opportunity; Control Based Privacy Access; Sensor Network; Mobile Computing; Data Authentication | 1 |
Extraction of template; Clustering analysis; Pattern recognition; Data classification; Principle length of minimum description respectively | 1 |
Filtering packets; Spoofing IP Address; Web Server; Probabilistic Ppacket | 1 |
Fraud Detection; Commerce Oriented Electronics; Artificial Intelligence; Neural Network; Ordered Sequence; Data Alignment; Machine Learning | 1 |
Hiding Information; Data Hiding; Bits of High Priority; Bits of Low Priority; Audio Authentication; Data Transfer; Encryption | 1 |
Identifiable Task; Clustering; Historical Dependent User; Proportionate Outcome; Query Restoration; Extracting Features. | 1 |
Identification of the Radio Frequency; Wireless Environment; Protocol ZIGBEE; Monitoring Environment in Real Time | 1 |
Image Records; Multimedia management; Relevance Feedback; Support Vector Machine Relevance Feedback; Semantic gap | 1 |
Image Retrieval; Similarity Score; Correlation;Image Enhancement; Pre Processing; Histogram;Gradient; Classification; Smoothening | 1 |
Integration of the data; Data authentication; and Dependable storage of the distribution based strategy; Privacy concern; Computational analysis respectively | 1 |
Internet oriented design; End to end; Peer to peer; Routing based multi hoping strategy; Effective analysis; Performance evaluation strategy respectively | 1 |
Leakage of the Data; Strategy Allocation; Data Authentication; Security Analysis; Watermarking Strategy;Data Hiding Technique Respectively | 1 |
Localizing Iris; Image Processing; Segmentation; Pattern Recognition; Extraction of Features; Enhancement | 1 |
Machine Oriented Supported Vectors; Regularization;Features Extraction; Metadata; Retrieval Accuracy; Similarity Score | 1 |
Mobile Computing; Dynamic Analysis; Maximizing Network; Optimization; Processing Query Orientation; Data Packets; Image Retrieval; Modeling Network | 1 |
Mobile Continual Query; Location Based; MobiQual; Mobile Node; CQ Query; Query Load Shedding | 1 |
Mobile Sampling; Sensor Field; Mobile Objects; Sensor Data; Broadcast; Band Based Directional Broadcast | 1 |
Mobile augmented reality; Wireless carriers; Network-Assisted Mobile Computing; Active Network | 1 |
Model User; Fuzzy Logic; Rule Based Fuzzy; Evolution of the System Based Fuzzy; UNIX; Support Machine Based Vector | 1 |
Multi-hop Routing; Trust-aware Routing Framework; Risky Attacks; Wireless Sensor Networks | 1 |
Natural Language Processing; Machine Translation; Statistical Machine Translation; Reordering | 1 |
No aplica | 1 |
Online auction fraud; Internet auction sites; Fraud Detection systems; Proactive model | 1 |
Opportunistic routing; ad hoc networks; Wireless transmissions; Network topology | 1 |
Packet Distribution; Router Bandwidth; Static RAM; Dynamic RAM; Data Transfer; Resource Allocation; Time Management; Data Visualization | 1 |
Point Matching; Optimization;Robust Point Matching; Energy Function; Transformation Variables; Regularization | 1 |
Priority Basis; Leakage of Data; Misuse of Data;Security Analysis; M Score Techniques; Weight Measurability | 1 |
Privacy Safeguarding; Multi-hop Wireless Networks, Traffic Analysis Attacks; Onion Routing; Global Encoding Vectors | 1 |
Query Uncertainty; Data Computation; Index; Mean Range Oriented Query; Constrained Probability; Filter Based Statistics; Uncertain Equality; Distance Based Minimal Priority | 1 |
Relational database; Uncertain databases; Aggregation queries; Trio | 1 |
Retrieval of the Images; Similarity Fusion Score; Database;Demand of the Query; User Oriented Strategy | 1 |
Revocation; Security; Blocking Networks; Backlist; Misbehavior of the Network; Network Manager | 1 |
Routing of the geographic strategy; Forwarding of the opportunistic data transfer;Delivery of the reliable data transfer and network related to the mobile based ad hoc strategy respectively | 1 |
SAAS; IAAS; PAAS; Cloud computing; HTC; Application deployment; Virtual machine; Service provider; Lease preset | 1 |
Scheduling Back Bone Based Virtualization; Service Oriented Quality; Network Based Sensor in Wireless Scenario; Replacement by the Local Iterative; Graph Schedule using Transition | 1 |
Search Engine; WebPages; Publishing Search Logs; ZEALOUS; k-anonymity; Probabilistic confidentiality | 1 |
Sensor Network; Wireless Communication; Computation Oriented Iteration; Estimation, Detection; Separation of Network | 1 |
Social Networks; Online Communities; Tagging; Multimedia Content; Inappropriate Tags; Web Sites; Short Textual Interpretations | 1 |
Third Generation Network; Effective Transmission;Performance Evaluation; Explicit Analysis;Streaming Based Video Respectively | 1 |
Wireless Sensor Networks; Denial of Service; Jamming Attacks; Wireless Nodes; Protocol; Adversary Node | 1 |
Wireless Sensor Networks; MQTT-S Protocol; Constrained Application Protocol (CoAP), Retransmission Timeout; Packet Delivery Ratio; Smooth Round Trip | 1 |
Wireless networks; Denial of Service attack; Selective jamming attacks | 1 |
cloud Computing; Data Integrity; Service Dependent Audit; Service Provider; Data Outsourcing; Packet Transmission; Data authentication; Architectural System; Preserving Privacy; Performance Evaluation | 1 |
computing; Data robustness; Proxy re-encryption system; Data secrecy | 1 |
machine translation | 1 |
order to improve the performance of the system followed by the accurate analysis respectively | 1 |