Home
EPiC Series
Kalpa Publications
Preprints
For Authors
For Editors
Volume
•
Abstracts
•
Preface
•
Authors
•
Keywords
•
BibTex Entries
ICETEAS 2018: Keyword Index
Keyword
Papers
a
AES Algorithm
Reliablity in the Fog Computing
anomalous Values
Detection of Anomalous Value in Data Mining.
Application
Utility of Li-Fi in Railways
attribute
Detection of Anomalous Value in Data Mining.
b
Baseline Noises
Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
c
Cloud Computing
A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Reliablity in the Fog Computing
Clustering
Data Mining and its Various Concepts
Computed tomography scan
Abnormality Detection in Brain CT Image Using Support Vector Machine
computer vision
A Review of Face Recognition System Using Raspberry Pi in the Field of IoT
cosine similarity
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Cyber Security
Malware Detection for Cyber Security Enhancement in Smart Grid
d
Data Mining
Detection of Anomalous Value in Data Mining.
Data Mining and its Various Concepts
Decoy system
Reliablity in the Fog Computing
different languages
Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India
Digital Wateramrking
Design and Implementation of Modified Butterworth Filter for Watermarking
e
e-commerce
Data Mining and its Various Concepts
e-Governance
Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India
ECG
Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
Edge Device
Reliablity in the Fog Computing
Electrocardiogram
Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters
f
face detection
A Review of Face Recognition System Using Raspberry Pi in the Field of IoT
FIR filters
Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
Fog Computing
Reliablity in the Fog Computing
h
Hematomas
Abnormality Detection in Brain CT Image Using Support Vector Machine
Honey bee behaviour algorithm
A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
i
IIR filters
Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
Internet of Things
A Review of Face Recognition System Using Raspberry Pi in the Field of IoT
Reliablity in the Fog Computing
l
Least Mean Square
Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters
Least Significant Bit
A Survey Paper on Different Steganography Technique
Li-Fi
Utility of Li-Fi in Railways
Load Balancing
A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
LSB
Design and Implementation of Modified Butterworth Filter for Watermarking
m
malware detection
Malware Detection for Cyber Security Enhancement in Smart Grid
MPTCP
Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks
MSE
A Survey Paper on Different Steganography Technique
Design and Implementation of Modified Butterworth Filter for Watermarking
n
NC
A Survey Paper on Different Steganography Technique
NLMS
Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters
noise
Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
p
power conservation
Security Challenges and Application for Underwater Wireless Sensor Network
PSNR
A Survey Paper on Different Steganography Technique
Design and Implementation of Modified Butterworth Filter for Watermarking
q
Quartiles.
Detection of Anomalous Value in Data Mining.
r
radio wave
Security Challenges and Application for Underwater Wireless Sensor Network
Raspberry Pi
A Review of Face Recognition System Using Raspberry Pi in the Field of IoT
rectangle fit algorithm
Detection of Anomalous Value in Data Mining.
s
SCTP
Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks
Security Issues
Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India
Smart Grid
Malware Detection for Cyber Security Enhancement in Smart Grid
Spatial domain
A Survey Paper on Different Steganography Technique
Steganography
A Survey Paper on Different Steganography Technique
Stemming
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
storage
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Support Vector Machine (SVM)
Abnormality Detection in Brain CT Image Using Support Vector Machine
t
TCP
Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks
Telegram
A Review of Face Recognition System Using Raspberry Pi in the Field of IoT
TF-IDF
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Tokenization
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
u
UWSN (Underwater Wireless Sensor Network)
Security Challenges and Application for Underwater Wireless Sensor Network
v
Virtual Machine
A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
VLC
Utility of Li-Fi in Railways
w
Web Mining
Data Mining and its Various Concepts
Copyright © 2012-2024 easychair.org. All rights reserved.