Colección: TEMAS

Temas Cantidad
(OFDM) Orthogonal Frequency Division Multiplexing; (DAB) Digital Audio Broadcasting; (CDD) Cyclic Delay Diversity; (DSDD) Diagonal Shift Delay Diversity1
; mobile banking; internet banking; Bangladesh1
AQM, Lambert W function, congestion control1
ARM controller; Circuit based drivers; MAX 232; Sensor based ultrasonic detection; Motor (DC); Web cam; Image processing tool box; Automation; Pattern recognition;Module analysis1
AWGN;BER;OFDM;WiMAX1
Accountability; Cloud; JAR; Security; Service1
Ad-hoc Networks1
Adaptive Decision Feedback Equalizer (ADFE); Equalization to Remove ISI; Adaptive Equalization1
Amplitude modulation; Simple oscillator; GPS-referenced frequency-synchronizer1
Anonymity applications; cell counting; Tor; Onion router1
Anonymizing Communications; Hacking Users; Nimble; Blacklisting1
Aspect Oriented Security; Data Based Mining; Privacy Control; Data Authentication; and Security Oriented Analysis; Slicing Approach Respectively1
Assured deletion of the file oriented policy aspect; Storage of the cloud; Implementation of the prototype respectively1
Automated Vocabulary Discovery (AVD); TF-IDF; Direct Association;Relevance Strength1
Automatic Image Registration; HAIRIS; Relaxation Parameter; Sub Pixel; Segmentations; Objects; Spectral Content1
Backtracking, Alignment, Penalty, Spelling Error1
Balanced Voltage; Computational Vector; Multilevel Cascading; STATCOM; Data Coupling; Synchronous Data1
Bayesian Networks; Software Project Management; Literature review.1
Black hole attack; DOS; MANET; Routing; Security1
Bubble sort; Selection sort; Insertion sort; Shell sort; Comb sort; Merge sort; Heap sort; Quick sort1
Byzantine Fault Tolerance; Database Storage; Track Systems; Data Centers; Byzantine Quorum Protocols1
CBIR, LUV values, clusters etc.1
Centralized algorithm; Distributed system; Distributive algorithm; Mutual exclusion; Token ring algorithm1
Centralized algorithm; distributed system; distributive algorithm; mutual exclusion; token ring algorithm1
Character recognition; handwriting Characteristics; Genotypic Family members; Handwriting Resemblance in family; Statistical Examination of Handwriting1
Cloud Computing3
Cloud Computing; Malicious attacks; Inter clouds; Single Cloud; Data Security1
Cloud Computing; Multiple users; Cloud Information Accountability; Java archive1
Cloud Computing; Proof of retrievability; Cloud storage service; Provable Data Possession, Cryptographic Technique1
Cloud Computing; SAAS; PAAS; IAAS; Compatibility;Application Deployment; Capability Storage;Unpredictability1
Cloud Computing; Shared Pool; Data Storage; Third Party Auditor; On-line Burden; Public Key; Cloud Data Auditing System1
Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost1
Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost.1
Cloud Computing; Traffic Control; Microcomputer; Traffic Signals; Agent Based Traffic Management; Mobile Multi Agent1
Cloud Computing;Peer-to-peer Networks; EQUATOR; Overlay Topology; Resources; CPU Cycles1
Cloud computation; reliability; Data authentication; Security analysis; Privacy control; intelligent network respectively1
Cloud computing; Cloud Audit Services; Provable Data Possession; Cryptographic Technique1
Cloud computing; Data security; Privacy preserving; Security analysis; Computational complexity; Data analysis respectively1
Cloud computing; Decentralized Information; Java Archives; Cloud Information Accountability1
Cloud computing; IT infrastructures; Infrastructure as a Service; Virtual machines instances; Leasing1
Cloud computing; Multi-cloud; Single cloud; Security risks1
Cloud computing; Storage; Cost-based approach; Cloud Service provider; Customer1
Cloud computing; patient report; SMS (short message service)1
Clustering; Feature Extraction; Pattern Recognition; Point Based Multi View; Analysis Based Co Citation; Similarity Measure; Correlates Factor1
Clustering; GRASP; Metaheuristic; construction phase and Improvement phase1
Clustering; Pattern Organization; Single-View Clustering; Multi-View Clustering; Similarity Measure1
Code 1-D; modified multi-diagonal (MMD); MAI; OOC; OCDMA; MATLAB; ZCC1
Communication Engieering1
Communication Engineering1
Communication services; Internet Protocol; Numerous Routing Configuration; Link failure; Node failure; congestion1
Computer Networks2
Computer Science4
Computer Science & Engineering4
Computer Science and Engineering1
Computer Science/Statistical Computer1
Computer science1
Concurrent Engineering; KBE; DSS and Expert Systems; Knowledge and Information Management1
Congestion Control; Core-Stateless Fair Queuing; Packet loss; Stable Token-Limited Congestion Control1
Converge cast; Time Division Multiple Access; Sensor nodes; wireless sensor networks; Contention-free medium access1
Credit Card Deception; Fake Sources; Unauthorized Persons; Discovery Methods; E-Commerce1
Credit Card; Deception Discovery Methods; E-Commerce; Authentic Connections1
Credit Card; Forged Sources; Illegal Persons; Discovery Methods; E-Commerce; Authentic Connections; Artificial Intelligence2
Data Capture; Query Based Data; Similarity Fusion Score; Correlation; Web Based Application; Search Engine Oriented Retrieval; Classification; Feature Extraction; Data Processing1
Data Hiding; LSB Method; Steganography; Cover Image; Stego Image1
Data Mining4
Data Mining; Analysis; Time series; Prediction; Assessment; Modeling; Decision making; Forecast.1
Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively1
Data preservation; Minimization of delay; Distribution of the load; Reordering of the packet and Forwarding multi path based aspect respectively1
Data uncertainty; Decision-tree classification; Pruning technique; Probability distribution1
Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively1
Digital media content; watermarking; Compressed and encrypted domain; JPEG2000; Decryption1
Dimensionality Reduction; Microarray Gene; Feature Selection; Gene Classification; Principle Component Analysis; Multi-linear Principle Component Analysis; FIS1
Dimensionality; Clustering; Feature Selection; Text Classification; High Dimensional; Data Sets1
Disseminated; Accountability; Data Sharing; Internet; Scalable Services; JARs; Cloud Computing; Object Centered Approach1
Distributed Computing1
Distributed, minimum-weight spanning tree, synchronous, communication complexity, time complexity.1
Electromagnetic radiation; Satellite; Sensors; Sensing1
Electronic Health Records; Machine Learning; Textual representation; Short medical text1
Electronics & Communications1
Electronics Engineering1
Embaded Systems3
Emergency Mobile Health Care; Computing Opportunity; Control Based Privacy Access; Sensor Network; Mobile Computing; Data Authentication1
Extraction of template; Clustering analysis; Pattern recognition; Data classification; Principle length of minimum description respectively1
Face Detection, Color Models, Skin Color Extraction, Adaptive Template Matching.1
Face Detection; Eye Region Extraction; Eye Blink Detection; Drowsiness Detection1
Filtering packets; Spoofing IP Address; Web Server; Probabilistic Ppacket1
Forensic Science, Computer Application1
Fraud Detection; Commerce Oriented Electronics; Artificial Intelligence; Neural Network; Ordered Sequence; Data Alignment; Machine Learning1
Frequency; Multiplier; Four-Quadrant1
Fuzzy Logic , Diemensionality REduction1
Gold Sequence (Random Sequence); VLSI; 16nm Technology1
Graphical LCD; ATmega32; proteus software; cost effective; compact size; embedded system; Research and development1
Hiding Information; Data Hiding; Bits of High Priority; Bits of Low Priority; Audio Authentication; Data Transfer; Encryption1
Image Processing4
Image processing2
Information Security2
Network Sequrity3
No aplica15
Wireless Sensor Networks3
Wireless sensor networks; Multi Frequency scheduling; Converge Cast; Transmission power control2