Colección: TEMAS

Temas Cantidad
ARM controller; Circuit based drivers; MAX 232; Sensor based ultrasonic detection; Motor (DC); Web cam; Image processing tool box; Automation; Pattern recognition;Module analysis1
Adaptive Decision Feedback Equalizer (ADFE); Equalization to Remove ISI; Adaptive Equalization1
Anonymizing Communications; Hacking Users; Nimble; Blacklisting1
Aspect Oriented Security; Data Based Mining; Privacy Control; Data Authentication; and Security Oriented Analysis; Slicing Approach Respectively1
Assured deletion of the file oriented policy aspect; Storage of the cloud; Implementation of the prototype respectively1
Balanced Voltage; Computational Vector; Multilevel Cascading; STATCOM; Data Coupling; Synchronous Data1
Byzantine Fault Tolerance; Database Storage; Track Systems; Data Centers; Byzantine Quorum Protocols1
Cloud Computing; Malicious attacks; Inter clouds; Single Cloud; Data Security1
Cloud Computing; Multiple users; Cloud Information Accountability; Java archive1
Cloud Computing; Proof of retrievability; Cloud storage service; Provable Data Possession, Cryptographic Technique1
Cloud Computing; SAAS; PAAS; IAAS; Compatibility;Application Deployment; Capability Storage;Unpredictability1
Cloud Computing; Shared Pool; Data Storage; Third Party Auditor; On-line Burden; Public Key; Cloud Data Auditing System1
Cloud Computing; Traffic Control; Microcomputer; Traffic Signals; Agent Based Traffic Management; Mobile Multi Agent1
Cloud computation; reliability; Data authentication; Security analysis; Privacy control; intelligent network respectively1
Cloud computing; Data security; Privacy preserving; Security analysis; Computational complexity; Data analysis respectively1
Cloud computing; IT infrastructures; Infrastructure as a Service; Virtual machines instances; Leasing1
Cloud computing; Multi-cloud; Single cloud; Security risks1
Clustering; Feature Extraction; Pattern Recognition; Point Based Multi View; Analysis Based Co Citation; Similarity Measure; Correlates Factor1
Clustering; Pattern Organization; Single-View Clustering; Multi-View Clustering; Similarity Measure1
Credit Card; Forged Sources; Illegal Persons; Discovery Methods; E-Commerce; Authentic Connections; Artificial Intelligence1
Data Capture; Query Based Data; Similarity Fusion Score; Correlation; Web Based Application; Search Engine Oriented Retrieval; Classification; Feature Extraction; Data Processing1
Data Mining1
Data Mining; Analysis; Time series; Prediction; Assessment; Modeling; Decision making; Forecast.1
Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively1
Data preservation; Minimization of delay; Distribution of the load; Reordering of the packet and Forwarding multi path based aspect respectively1
Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively1
Electronic Health Records; Machine Learning; Textual representation; Short medical text1
Emergency Mobile Health Care; Computing Opportunity; Control Based Privacy Access; Sensor Network; Mobile Computing; Data Authentication1
Extraction of template; Clustering analysis; Pattern recognition; Data classification; Principle length of minimum description respectively1
Filtering packets; Spoofing IP Address; Web Server; Probabilistic Ppacket1
Fraud Detection; Commerce Oriented Electronics; Artificial Intelligence; Neural Network; Ordered Sequence; Data Alignment; Machine Learning1
Hiding Information; Data Hiding; Bits of High Priority; Bits of Low Priority; Audio Authentication; Data Transfer; Encryption1
Identifiable Task; Clustering; Historical Dependent User; Proportionate Outcome; Query Restoration; Extracting Features.1
Identification of the Radio Frequency; Wireless Environment; Protocol ZIGBEE; Monitoring Environment in Real Time1
Image Records; Multimedia management; Relevance Feedback; Support Vector Machine Relevance Feedback; Semantic gap1
Image Retrieval; Similarity Score; Correlation;Image Enhancement; Pre Processing; Histogram;Gradient; Classification; Smoothening1
Integration of the data; Data authentication; and Dependable storage of the distribution based strategy; Privacy concern; Computational analysis respectively1
Internet oriented design; End to end; Peer to peer; Routing based multi hoping strategy; Effective analysis; Performance evaluation strategy respectively1
Leakage of the Data; Strategy Allocation; Data Authentication; Security Analysis; Watermarking Strategy;Data Hiding Technique Respectively1
Localizing Iris; Image Processing; Segmentation; Pattern Recognition; Extraction of Features; Enhancement1
Machine Oriented Supported Vectors; Regularization;Features Extraction; Metadata; Retrieval Accuracy; Similarity Score1
Mobile Computing; Dynamic Analysis; Maximizing Network; Optimization; Processing Query Orientation; Data Packets; Image Retrieval; Modeling Network1
Mobile Continual Query; Location Based; MobiQual; Mobile Node; CQ Query; Query Load Shedding1
Mobile Sampling; Sensor Field; Mobile Objects; Sensor Data; Broadcast; Band Based Directional Broadcast1
Mobile augmented reality; Wireless carriers; Network-Assisted Mobile Computing; Active Network1
Model User; Fuzzy Logic; Rule Based Fuzzy; Evolution of the System Based Fuzzy; UNIX; Support Machine Based Vector1
Multi-hop Routing; Trust-aware Routing Framework; Risky Attacks; Wireless Sensor Networks1
Natural Language Processing; Machine Translation; Statistical Machine Translation; Reordering1
No aplica1
Online auction fraud; Internet auction sites; Fraud Detection systems; Proactive model1
Opportunistic routing; ad hoc networks; Wireless transmissions; Network topology1
Packet Distribution; Router Bandwidth; Static RAM; Dynamic RAM; Data Transfer; Resource Allocation; Time Management; Data Visualization1
Point Matching; Optimization;Robust Point Matching; Energy Function; Transformation Variables; Regularization1
Priority Basis; Leakage of Data; Misuse of Data;Security Analysis; M Score Techniques; Weight Measurability1
Privacy Safeguarding; Multi-hop Wireless Networks, Traffic Analysis Attacks; Onion Routing; Global Encoding Vectors1
Query Uncertainty; Data Computation; Index; Mean Range Oriented Query; Constrained Probability; Filter Based Statistics; Uncertain Equality; Distance Based Minimal Priority1
Relational database; Uncertain databases; Aggregation queries; Trio1
Retrieval of the Images; Similarity Fusion Score; Database;Demand of the Query; User Oriented Strategy1
Revocation; Security; Blocking Networks; Backlist; Misbehavior of the Network; Network Manager1
Routing of the geographic strategy; Forwarding of the opportunistic data transfer;Delivery of the reliable data transfer and network related to the mobile based ad hoc strategy respectively1
SAAS; IAAS; PAAS; Cloud computing; HTC; Application deployment; Virtual machine; Service provider; Lease preset1
Scheduling Back Bone Based Virtualization; Service Oriented Quality; Network Based Sensor in Wireless Scenario; Replacement by the Local Iterative; Graph Schedule using Transition1
Search Engine; WebPages; Publishing Search Logs; ZEALOUS; k-anonymity; Probabilistic confidentiality1
Sensor Network; Wireless Communication; Computation Oriented Iteration; Estimation, Detection; Separation of Network1
Social Networks; Online Communities; Tagging; Multimedia Content; Inappropriate Tags; Web Sites; Short Textual Interpretations1
Third Generation Network; Effective Transmission;Performance Evaluation; Explicit Analysis;Streaming Based Video Respectively1
Wireless Sensor Networks; Denial of Service; Jamming Attacks; Wireless Nodes; Protocol; Adversary Node1
Wireless Sensor Networks; MQTT-S Protocol; Constrained Application Protocol (CoAP), Retransmission Timeout; Packet Delivery Ratio; Smooth Round Trip1
Wireless networks; Denial of Service attack; Selective jamming attacks1
cloud Computing; Data Integrity; Service Dependent Audit; Service Provider; Data Outsourcing; Packet Transmission; Data authentication; Architectural System; Preserving Privacy; Performance Evaluation1
computing; Data robustness; Proxy re-encryption system; Data secrecy1
machine translation1
order to improve the performance of the system followed by the accurate analysis respectively1