a |
AES Algorithm | Reliablity in the Fog Computing |
anomalous Values | Detection of Anomalous Value in Data Mining. |
Application | Utility of Li-Fi in Railways |
attribute | Detection of Anomalous Value in Data Mining. |
b |
Baseline Noises | Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |
c |
Cloud Computing | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud Reliablity in the Fog Computing |
Clustering | Data Mining and its Various Concepts |
Computed tomography scan | Abnormality Detection in Brain CT Image Using Support Vector Machine |
computer vision | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |
cosine similarity | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |
Cyber Security | Malware Detection for Cyber Security Enhancement in Smart Grid |
d |
Data Mining | Detection of Anomalous Value in Data Mining. Data Mining and its Various Concepts |
Decoy system | Reliablity in the Fog Computing |
different languages | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India |
Digital Wateramrking | Design and Implementation of Modified Butterworth Filter for Watermarking |
e |
e-commerce | Data Mining and its Various Concepts |
e-Governance | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India |
ECG | Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |
Edge Device | Reliablity in the Fog Computing |
Electrocardiogram | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters |
f |
face detection | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |
FIR filters | Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |
Fog Computing | Reliablity in the Fog Computing |
h |
Hematomas | Abnormality Detection in Brain CT Image Using Support Vector Machine |
Honey bee behaviour algorithm | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |
i |
IIR filters | Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |
Internet of Things | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT Reliablity in the Fog Computing |
l |
Least Mean Square | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters |
Least Significant Bit | A Survey Paper on Different Steganography Technique |
Li-Fi | Utility of Li-Fi in Railways |
Load Balancing | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |
LSB | Design and Implementation of Modified Butterworth Filter for Watermarking |
m |
malware detection | Malware Detection for Cyber Security Enhancement in Smart Grid |
MPTCP | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks |
MSE | A Survey Paper on Different Steganography Technique Design and Implementation of Modified Butterworth Filter for Watermarking |
n |
NC | A Survey Paper on Different Steganography Technique |
NLMS | Analysis for Denoising of ECG Signals Using NLMS Adaptive Filters |
noise | Denoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis |
p |
power conservation | Security Challenges and Application for Underwater Wireless Sensor Network |
PSNR | A Survey Paper on Different Steganography Technique Design and Implementation of Modified Butterworth Filter for Watermarking |
q |
Quartiles. | Detection of Anomalous Value in Data Mining. |
r |
radio wave | Security Challenges and Application for Underwater Wireless Sensor Network |
Raspberry Pi | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |
rectangle fit algorithm | Detection of Anomalous Value in Data Mining. |
s |
SCTP | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks |
Security Issues | Unlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India |
Smart Grid | Malware Detection for Cyber Security Enhancement in Smart Grid |
Spatial domain | A Survey Paper on Different Steganography Technique |
Steganography | A Survey Paper on Different Steganography Technique |
Stemming | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |
storage | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |
Support Vector Machine (SVM) | Abnormality Detection in Brain CT Image Using Support Vector Machine |
t |
TCP | Comparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks |
Telegram | A Review of Face Recognition System Using Raspberry Pi in the Field of IoT |
TF-IDF | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |
Tokenization | Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud |
u |
UWSN (Underwater Wireless Sensor Network) | Security Challenges and Application for Underwater Wireless Sensor Network |
v |
Virtual Machine | A Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing |
VLC | Utility of Li-Fi in Railways |
w |
Web Mining | Data Mining and its Various Concepts |