Colección: TEMAS

Temas Cantidad
(OFDM) Orthogonal Frequency Division Multiplexing; (DAB) Digital Audio Broadcasting; (CDD) Cyclic Delay Diversity; (DSDD) Diagonal Shift Delay Diversity1
; mobile banking; internet banking; Bangladesh1
AQM, Lambert W function, congestion control1
ARM controller; Circuit based drivers; MAX 232; Sensor based ultrasonic detection; Motor (DC); Web cam; Image processing tool box; Automation; Pattern recognition;Module analysis1
AWGN;BER;OFDM;WiMAX1
Accountability; Cloud; JAR; Security; Service1
Ad-hoc Networks1
Adaptive Decision Feedback Equalizer (ADFE); Equalization to Remove ISI; Adaptive Equalization1
Amplitude modulation; Simple oscillator; GPS-referenced frequency-synchronizer1
Anonymity applications; cell counting; Tor; Onion router1
Anonymizing Communications; Hacking Users; Nimble; Blacklisting1
Aspect Oriented Security; Data Based Mining; Privacy Control; Data Authentication; and Security Oriented Analysis; Slicing Approach Respectively1
Assured deletion of the file oriented policy aspect; Storage of the cloud; Implementation of the prototype respectively1
Automated Vocabulary Discovery (AVD); TF-IDF; Direct Association;Relevance Strength1
Automatic Image Registration; HAIRIS; Relaxation Parameter; Sub Pixel; Segmentations; Objects; Spectral Content1
Balanced Voltage; Computational Vector; Multilevel Cascading; STATCOM; Data Coupling; Synchronous Data1
Black hole attack; DOS; MANET; Routing; Security1
Bubble sort; Selection sort; Insertion sort; Shell sort; Comb sort; Merge sort; Heap sort; Quick sort1
Byzantine Fault Tolerance; Database Storage; Track Systems; Data Centers; Byzantine Quorum Protocols1
Centralized algorithm; Distributed system; Distributive algorithm; Mutual exclusion; Token ring algorithm1
Centralized algorithm; distributed system; distributive algorithm; mutual exclusion; token ring algorithm1
Character recognition; handwriting Characteristics; Genotypic Family members; Handwriting Resemblance in family; Statistical Examination of Handwriting1
Cloud Computing3
Cloud Computing; Malicious attacks; Inter clouds; Single Cloud; Data Security1
Cloud Computing; Multiple users; Cloud Information Accountability; Java archive1
Cloud Computing; Proof of retrievability; Cloud storage service; Provable Data Possession, Cryptographic Technique1
Cloud Computing; SAAS; PAAS; IAAS; Compatibility;Application Deployment; Capability Storage;Unpredictability1
Cloud Computing; Shared Pool; Data Storage; Third Party Auditor; On-line Burden; Public Key; Cloud Data Auditing System1
Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost1
Cloud Computing; Storage Providers; Single Cloud; Multi Cloud; Security Risks; Low Cost.1
Cloud Computing; Traffic Control; Microcomputer; Traffic Signals; Agent Based Traffic Management; Mobile Multi Agent1
Cloud Computing;Peer-to-peer Networks; EQUATOR; Overlay Topology; Resources; CPU Cycles1
Cloud computation; reliability; Data authentication; Security analysis; Privacy control; intelligent network respectively1
Cloud computing; Cloud Audit Services; Provable Data Possession; Cryptographic Technique1
Cloud computing; Data security; Privacy preserving; Security analysis; Computational complexity; Data analysis respectively1
Cloud computing; Decentralized Information; Java Archives; Cloud Information Accountability1
Cloud computing; IT infrastructures; Infrastructure as a Service; Virtual machines instances; Leasing1
Cloud computing; Multi-cloud; Single cloud; Security risks1
Cloud computing; Storage; Cost-based approach; Cloud Service provider; Customer1
Cloud computing; patient report; SMS (short message service)1
Clustering; Feature Extraction; Pattern Recognition; Point Based Multi View; Analysis Based Co Citation; Similarity Measure; Correlates Factor1
Clustering; Pattern Organization; Single-View Clustering; Multi-View Clustering; Similarity Measure1
Code 1-D; modified multi-diagonal (MMD); MAI; OOC; OCDMA; MATLAB; ZCC1
Communication Engineering1
Communication services; Internet Protocol; Numerous Routing Configuration; Link failure; Node failure; congestion1
Computer Networks1
Computer Science/Statistical Computer1
Congestion Control; Core-Stateless Fair Queuing; Packet loss; Stable Token-Limited Congestion Control1
Converge cast; Time Division Multiple Access; Sensor nodes; wireless sensor networks; Contention-free medium access1
Credit Card Deception; Fake Sources; Unauthorized Persons; Discovery Methods; E-Commerce1
Credit Card; Deception Discovery Methods; E-Commerce; Authentic Connections1
Credit Card; Forged Sources; Illegal Persons; Discovery Methods; E-Commerce; Authentic Connections; Artificial Intelligence2
Data Capture; Query Based Data; Similarity Fusion Score; Correlation; Web Based Application; Search Engine Oriented Retrieval; Classification; Feature Extraction; Data Processing1
Data Mining4
Data Mining; Analysis; Time series; Prediction; Assessment; Modeling; Decision making; Forecast.1
Data encryption; Data authentication; Digitalization; privacy preservation; Security analysis respectively1
Data preservation; Minimization of delay; Distribution of the load; Reordering of the packet and Forwarding multi path based aspect respectively1
Data uncertainty; Decision-tree classification; Pruning technique; Probability distribution1
Denial of Service; Wireless Communication; Packet Transfer;Communication Coverage; Classification of Packets;Jamming Selection; International Threat Respectively1
Digital media content; watermarking; Compressed and encrypted domain; JPEG2000; Decryption1
Dimensionality; Clustering; Feature Selection; Text Classification; High Dimensional; Data Sets1
Disseminated; Accountability; Data Sharing; Internet; Scalable Services; JARs; Cloud Computing; Object Centered Approach1
Electronic Health Records; Machine Learning; Textual representation; Short medical text1
Embaded Systems3
Emergency Mobile Health Care; Computing Opportunity; Control Based Privacy Access; Sensor Network; Mobile Computing; Data Authentication1
Extraction of template; Clustering analysis; Pattern recognition; Data classification; Principle length of minimum description respectively1
Face Detection; Eye Region Extraction; Eye Blink Detection; Drowsiness Detection1
Filtering packets; Spoofing IP Address; Web Server; Probabilistic Ppacket1
Forensic Science, Computer Application1
Fraud Detection; Commerce Oriented Electronics; Artificial Intelligence; Neural Network; Ordered Sequence; Data Alignment; Machine Learning1
Gold Sequence (Random Sequence); VLSI; 16nm Technology1
Graphical LCD; ATmega32; proteus software; cost effective; compact size; embedded system; Research and development1
Hiding Information; Data Hiding; Bits of High Priority; Bits of Low Priority; Audio Authentication; Data Transfer; Encryption1
IEEE 802.11; MORSA; TCP; WLAN; Video1
Identifiable Task; Clustering; Historical Dependent User; Proportionate Outcome; Query Restoration; Extracting Features.1
Identification of the Radio Frequency; Wireless Environment; Protocol ZIGBEE; Monitoring Environment in Real Time1
Image Processing1
Image Processing, 3D laser1
Image Processing; Image reduction; Colour image; Penalty function1
Image Records; Multimedia management; Relevance Feedback; Support Vector Machine Relevance Feedback; Semantic gap1
Image Retrieval; Similarity Score; Correlation;Image Enhancement; Pre Processing; Histogram;Gradient; Classification; Smoothening1
Image processing1
Integration of the data; Data authentication; and Dependable storage of the distribution based strategy; Privacy concern; Computational analysis respectively1
Internet Protocol; Numerous Routing Configurations; Routing Technologies; Jamming1
Internet oriented design; End to end; Peer to peer; Routing based multi hoping strategy; Effective analysis; Performance evaluation strategy respectively1
Intrusion Detection Systems; Double Guard; Attacks; web based services1
Laser Triangulation, 3D mesh,Laser Stripe1
Leakage of the Data; Strategy Allocation; Data Authentication; Security Analysis; Watermarking Strategy;Data Hiding Technique Respectively1
License plate; License plate recognition (LPR); preprocessing; Character Segmentation1
Localizing Iris; Image Processing; Segmentation; Pattern Recognition; Extraction of Features; Enhancement1
Location Reliant Queries; Query Imprecision; Multi Dimensional; Filtering and Verification1
MANETs; Routing Protocols; Proactive; Reactive; Hybrid1
Machine Oriented Supported Vectors; Regularization;Features Extraction; Metadata; Retrieval Accuracy; Similarity Score1
Median edge detector; Gradient-adjusted Predictor; Reversible watermarking; prediction-error expansion1
Memory Built In Self Test; Address Generator; Fault Detection; Back to Back; Speed Related Faults; Non Linear Algorithms1
Mining; Incomplete Data Sets; Missing Values; Pre-Processing; Unsupervised Filter1
Network Sequrity3
No aplica14
Wireless Sensor Networks3
Wireless sensor networks; Multi Frequency scheduling; Converge Cast; Transmission power control2