Personal Information
Organization / Workplace
Vellore Area, India India
Website
Contact Details
Tags
2016 ieee power electronics projects
2016 ieee matlab projects
2016 ieee robotics projects
2016 ieee java projects
2016 ieee eee projects
2016 ieee ns2 projects
2016 me projects with future enhancement
2016 ieee projects
2016 ieee embedded projects
2016 ieee dotnet projects
bulk ieee projects 2016
2016 ieee android projects
ieee projects latest for cse
ieee 2016 projects in vellore
ieee project centers in vellore
latest ieee dot project titles
2015 multimedia projects
latest ieee java project titles
2014 – 2015 ieee java project titles
ieee projects in vellore
2015 android project
2015 matlab projects
2015 – 2016 ieee java project titles
2015 – 2016 ieee dot project titles
2014 – 2015 ieee dot project titles
latest ieee projects for cse 2015
2014 ieee projects list for be btech final year pr
2015 struts and anglurjs
2015 bigdata project
2015 cloudsim projects
2015 php projects
2015 dot net list
list of 2015 ieee paper projects
2015 application projects
2015 mobile wireless networks
ieee project vellore
best ieee project center in vellore
ieee 2016 projects for cse
2016 ieee cse projects
2016 ieee it projects
cloud computing
best project center in vellore
free download project documentation
easy way to get projects
free download project abstract
ieee project 2013-2014
networking
multimedia
grid computing
image processing
knowledge and engineering -datamining
parallel and distributed system-networking
mobile computing
mobile computing-wireless communication
network security
parallel and distributed system with security comp
ieeeproject in parellel and distribution
international conference
data mining
final year projects
main projects
project title 2015 best project center in vellore
non-ieee projects
ieee projects
mini projects
big data ieeeproject 2014
ieeeproject 2014
ieee java projects 2014.
python new project titles
big data
ieee project 2022
machine learning with ai 2022
cloud computing project 2022
latest project title 2022
ai project titles 2023
project management
latest mphil thesis titles..
machine learning title 2022
wireless sensor networks
2022 ieee projects at vellore
2022 mat lab projects
ns projects 2022
2022 project tiltes
ieee cloud computing 2022
ieeeproject in datamining
ns 2 project 2022 titles
2022 python titles
2022 projects at vellore
2022 project titles
ai title 2022
machine learning
data science title in 2022
ieee best project center in vellore
ieeeproject in mobile computing
ieee cloud machine learing 202
cloud computing project title
censoring in big data processing
real time project 2016
framework
ieee java projects 2014
wireless sensor network
artificial intelligence
2022 ieee big data titles
python titles
2022 cloud titles
2022 projects titles
blockchain title in 2022
python
2022 project tiles
deep learning techniques
deep learning
python 2022 project title
raspberry pi
protecting location privacy in sensor networks aga
stealthy attacks in wireless ad hoc networks detec
steganography using reversible texture synthesis
ai projects
routing path identification in manet with ftr ahp
distributed and adaptive medium access control for
matrix scrambling method
an elliptic curve cryptography
protecting your right verifiable attribute based k
identity based proxy-oriented data uploading and r
identity based proxy-oriented data uploading
latest project titles.
resilient device for off-line micro-payments
software-defined
fractal image compression
polynomial interpolation
efficient encryption and short ciphertexts
contributory broadcast encryption
a time efficient approach
contributory broadcast encryption with efficient e
online and offline data
data mining project titles
recommendation model regularized with user trust a
scalable and secure of personal
a mixed generative discriminative
a mixed generative discriminative based hashing me
novel it’s based on space air-ground big-data
a kind of novel it’s based on space air-ground b
a comprehensive study on willingness maximization
social activity planning with quality guarantee
traffic load adaptive medium access control for fu
traffic load adaptive medium access control
medium access control for fully connected mobile a
top k query processing
top k query processing and malicious node identifi
node identification based on node grouping in mane
resisting blackhole attacks on manets
optimal reliable routing path identification in ma
general model
incidents in swimming pools
transactions
project
convolutional neural networks
smart cities
2023 python projects
intrusion detection
best project center at vellore
t
2022 new titles
medical image fusion
machine learning new titles
2022 python titles in vellore
ieee project 2014
2017 latest project titles in big data
2022 data mining titles
ns2 project titles in 2022
mitigation of nosql injections
cognitive radio sensor networks
analysis and mitigation of nosql injections
using hash tag graph based topic model
effects of mobility on latency
wsn
analysis and mitigation
dynamic threshold
location prediction
a novel method called location-based delivery (lbd
short message format
tracking system using location prediction
location tracking accuracy
dynamic threshold for minimizing sms delivery
a tracking system using location prediction and dy
nference attack on browsing history of twitter use
public click analytics and twitter metadata
android malware detection
malware detection and prevention
madam effective and efficient behavior based andro
frodo fraud resilient device for off-line
frodo fraud resilient device
mobile nodes
fraud resilient device for off-line micro-payments
innovative approach of hds2
audio based puzzle gaming
routing protocol in manet
collision free anycast transmission
scheduling in uws ns
congestion control scheme
performance analysis based on nonlinear red
arduino based lpg gas monitoring &
shortest path overhearing tree
automatic cylinder booking with alert system
top down xml keyword query processing
maximum lifetime in ws ns
lpg gas monitoring
data aggregation techniques
detecting and avoiding of worm
collaborative blackhole attack on manet
high and similar between sql and nosql systems
aodv routing algorithm
to connect semantically-related words without co-o
dynamic channel access
using hash tag graph based topic model to connect
emantically-related words without co-occurrence in
improve energy efficiency
nosql (not only sql)
alterdroid differential fault analysis of obfuscat
differential fault analysis of obfuscated smartpho
obfuscated smartphone malware
alterdroid differential fault analysis
top k query processing and malicious node
malicious node identification based on node groupi
randomness from routing metadata in ad hoc network
routing metadata in ad hoc networks
secret common randomness
secret common randomness from routing metadata in
path identification in manet with ftr ahp model
optimal reliable routing path identification
joker a novel opportunistic routing protocol pdf
wireless ad hoc networks (2)
joker a novel opportunistic routing protocol doc
novel opportunistic routing protocol
a game theoretic approach on resource allocation
colluding nodes in manets
distributed and adaptive medium access control
medium access control for internet of-things-enabl
internet of-things-enabled mobile networks
d2 d delay aware distributed dynamic adaptation of
dynamic adaptation of contention windowin wireless
contention windowin wireless networks
frodo fraud resilient device for off-line micro-pa
droid detector android malware characterization
malware characterization and detection using deep
efficient data center flow scheduling
characterization and detection using deep learning
droid detector android malware detection using dee
droid detector android malware characterization an
expansion ratio
resource allocation with colluding nodes in manets
efficient route update
large scale sensor networks
encryption with efficient encryption and short cip
energy efficient detection
node disjoint multipath routing
smartphone users using behavioral biometrics
users using behavioral biometrics
authentication of smartphone users using behaviora
authentication of smartphone users
an exploration of geographic authentication scheme
energy efficient reliable
an exploration of geographic
a game theoretic approach on resource allocation w
geographic authentication schemes
fault analysis of obfuscated smartphone malware
adaptive quality of-service-based routing for vehi
congestion detection and propagation in urban area
2017 ieee matlab projects
brain behavio r based adaptive
adaptive intrusion detection in networks
congestion detection and propagation
brain behavio r based adaptive intrusion detection
elascity quantitive of calculating cloud computing
ieee projects 2017 for cse
2017 latest project in data mining
best project in data mining
ieee project 2017 2018
ieee 2017 2018 matlap project
best image processing titles
matlab projects
matlab image processsing titles 2017 2018
ieee project for cse 2017 2018
ieee project titles in ns2
ieee 2017 2018 titles
ieee projects titles networking 2017 2018
ns 2 simulator projects titles 2017 2018
ieee project titles for wlreless sensor network
ieee project titles for wsn
ieee projects 2017 2018
ieee 2017 titles wsn
big data project 2017
3d reconstruction of facial structures from 2d ima
ieee projects for big data
facial structures from 2d images for cosmetic surg
ieee project image processing
2017 project titles for big data
reconstruction of facial structures
mobile sensor deployment
a scalable data chunk similarity based compression
scalable data chunk similarity
vulnerabilities of voronoi based approaches
vulnerabilities of voronoi based approaches to mob
voronoi based approaches to mobile sensor deployme
visual exploration of changes in passenger flows a
map reduce algorithm
mega city metro network
a self adaptive sleepwake up scheduling approach f
passenger flows and tweets on mega city metro netw
visual exploration of changes in passenger flows
hardware performance counter to detect d dos attac
adaptive sleepwake up scheduling approach
scheduling approach for wireless sensor networks
sleep/wake-up scheduling
quality of-service-based routing for vehicular ad
ant colony optimization
ieee projects in ns2
ieee latest project titles 2017 2018
ieee best project center at vellore
simulation project titles for ns2 2017 2018
android
ieee project 2020 new titles
latest new titles
fault tolerant approach
wireless sensor network.
lightweight secure scheme
detecting provenance
forgery and packet drop attacks
novel resource scheduling approach
improve the reliability of shuffle exchange networ
trust based secured
coordination mechanism for wsan.
achieving high performance
data services with multi-network access
autonomic in network query processing
urban sensor networks
blind people
n efficient cluster tree based data collection sch
mobile wireless sensor networks
puzzle gaming for blind people
improvement on leach protocol.
ieee project titles 2017 2018
diplocloud
rdf data in the cloud
diplocloud efficient and scalable management of rd
diplocloud efficient and scalable management
ieee projects latest for cse 2017 2018
exchange based on cloud computing system
cdc generation integration for health
health information exchange based on cloud computi
cdc generation integration for health information
nomaly and community detection
botnet detection
detection based on anomaly and community detection
botnet detection based on anomaly and community de
bluetooth based employee mobile tracking
bluetooth based employee mobile tracking using and
employee mobile tracking using android application
mobile tracking using android application
detection from blood samples
automated malaria detection from blood samples
blood samples using image processing
automated malaria detection from blood samples usi
ieee project tiles for ns2 2017 2018
automated malaria detection
audio based puzzle gaming for blind people
fast release/capture sampling in large-scale senso
energy-aware load balancing and application scalin
electrical impedance tomography for artificial sen
efficient audit service outsourcing for data integ
design of a mobile charging service for electric v
design and experimental validation of novel force
data collection in multi
cost minimizing dynamic migration of content
cooperative downloads in vehicular environments
combiningefficiencyfidelityandflexibilityin 150511
blood pulsation measurement using linearly polariz
an attribute
an approach of reliable data transmission with ran
an algorithm for the automatic analysis of signals
a smart sensor network for sea water quality monit
a secure and dynamic multi
a runtime integrity monitoring framework for real
a practical wireless attack on the connected car a
a methodology for visually lossless jpeg2000 compr
a method for uncertainty assessment of passive sun
a low power temperature to frequency converter for
a high reliability wearable device for elderly fal
mobile comp
project abstract
ieee project 2014-2015
project 2015
a cooperative train control model for energy savin
smart lighting system iso/iec/ieee 21451 compatibl
single image super-resolution based on gradient pr
scalable and secure sharing of personal health
road edge recognition using the stripe hough trans
revealing the trace of high-quality jpeg compressi
recent advances in wearable sensors for health mon
query aware determinization of uncertain
prt embedded micro-heaters for optimum temperature
privacy preservingdelegatedaccesscontrolinpubliccl
privacy preserving public auditing for secure clou
passivity and stability of human
passive and semi-passive wireless temperature and
optimum power allocation in sensor networks for ac
optimization-based motion planning in joint space
optimal stochastic location updates in mobile ad h
on quality of monitoring for multi channel wireles
on quality of monitoring for multi
occlusion-based cooperative transport with a swarm
nonparametric technique based high
network assisted mobile computing with optimal upl
negative information for occlusion reasoning in dy
minimum bandwidth reservations for periodic stream
local broadcast algorithms in ad hoc networks
intra-vehicle networks: a review
hop by-hoproutinginwirelessmeshnetworkswithbandwid
homomorphic authentication with random masking tec
hierarchical and networked vehicle surveillance in
dot net
cooperative caching for efficient data access in d
cooperation versus multiplexing multicast scheduli
cognitive cooperative random access for multicast
certificateless remote anonymous authentication
behavioral malware detection in delay tolerant net
behavior rule specification-based intrusion detect
attribute based encryption with privacy preserving
analyzing critical decision-based processes
an ontology-based hybrid approach to activity
a secure client side deduplication scheme in cloud
a scientometric analysis of cloud computing litera
tradeoff between reliability and security in multi
signature searching in a networked collection of f
security evaluation of pattern classifiers under a
secure mining-of-association-rules-in-horizontally
secure ordered bucketization
sane-semantic-aware-namespacein-ultra-large-scale-
product aspect ranking and its applications
peer-assisted-vod-systems-an-efficientmodeling-fra
cross-layer approach for minimizing routing disrup
cooperative-key-agreement-for-wireless-networking
a system for denial-of-service attack detection ba
ieeeproject in multimedia
free download project abstract.
ieeeproject in cloud computing
ieee project document.
ieee project cloud computing
optimal scheduling of shifts and breaks using empl
web image re-ranking using query-specific semantic
uniform embedding for efficient jpeg steganography
traffic pattern-based content leakage detection fo
sos: a distributed mobile q&a system based on soci
secure deduplication-with-efficient-and-reliable-c
secure and efficient data transmission for cluster
quality assessment of stereoscopic 3 d image compr
qos aware geographic opportunistic routing in wire
privacy preserving multi-keyword ranked search ove
panda public auditing for shared data with efficie
online payment system using steganography and visu
on false data injection attacks against power syst
modeling of speaking rate influences on mandarin s
model-based edge detector for spectral imagery usi
locaward a security and privacy aware location bas
locaward: a security and privacy aware location-ba
link quality aware code dissemination in wireless
keyword query routing
improved evolutionary algorithm design for the pro
identity based distributed provable data possessio
governing software process improvements in globall
exploiting service similarity for privacy in locat
enabling trustworthy service evaluation in service
efficient instant-fuzzy search with proximity rank
designing truthful spectrum double auctions with
d2p distributed dynamic pricing policy in smart gr
ieee project cloud computing.
public auditing with fair arbitration for cloud da
dynamic and public auditing
fair arbitration for cloud data
dynamic and public auditing with fair arbitration
auditing with verifiable outsourcing of key update
verifiable outsourcing of key updates
enabling cloud storage auditing
enabling cloud storage auditing with verifiable ou
access control for web-based cloud computing servi
web-based cloud computing services
fine grained two-factor access control for web-bas
fine grained two-factor access control
flexible and fine grained
flexible and fine grained attribute-based data sto
fine grained attribute-based data storage in cloud
attribute-based data storage in cloud computing
follow me cloud when cloud services
cloud services follow mobile users
follow me cloud when cloud services follow mobile
search on encrypted spatial data
geometric range search on encrypted spatial data p
geometric range search on encrypted spatial data d
geometric range search on encrypted
geometric range search on encrypted spatial data
identity based encryption
identity based encryption with cloud revocation au
encryption with cloud revocation authority and its
distributed dynamic adaptation of contention windo
top down xml keyword query processing pdf
top down xml keyword query processing doc
parallel mining of frequent sequences
probabilistic static load balancing of parallel mi
probabilistic static load balancing
load balancing of parallel mining of frequent sequ
nearest keyword set search in multi dimensional da
nearest keyword set search
set search in multi dimensional datasets
efficient algorithms for mining top k high utility
recommendation with user-item subgroup analysis
domain sensitive recommendation with user-item sub
clustering data streams based on shared density be
shared density between micro clusters
clustering data streams based on shared density
data streams based on shared density between micro
booster in high dimensional data classification do
high dimensional data classification
booster in high dimensional data classification pd
booster in high dimensional data classification
automatically mining facets for queries from their
automatically mining facets
a novel recommendation model regularized
a novel recommendation model regularized with user
model regularized with user trust and item ratings
willingness maximization for social activity plann
cloud revocation authority and its applications
discriminative based hashing method
mphil thesis
thesis titles 2016
2016 thesis titles
recent thesis titles
mphil thesis titles
2016 ieee dot project titles
ns2 project titles
dot net project titles
2016 android project projects
php project titles
java projects title
2016 ieee projects list for be btech final year pr
list of 2016 ieee paper projects
2016 projects titles
2016 application projects titles
latest ieee projects for cse 2016
2016 ieee java project titles
android project titles
2016 cloudsim projects titles
2016 bigdata project titles
a scalable and reliable matching service for conte
abstract
wireless biosensing using silver
wearable sensors for human activity monitoring
throughput and delay analysis for converge cast wi
space-efficient verifiable secret sharing using po
data uploading and remote data integrity checking
remote data integrity checking in public cloud
model driven development patterns
model driven development patterns for mobile servi
development patterns for mobile services in cloud
mobile services in cloud of things
fine-grained owner-enforced search authorization
attribute based keyword search with fine-grained o
public infrastructure clouds
user security guarantees in public infrastructure
providing user security guarantees
providing user security guarantees in public infra
large-scale storage systems
approximate methodology for large-scale storage sy
real time semantic search using approximate method
secure data sharing in cloud computing using revoc
revocable storage identity-based encryption
cloud computing using revocable storage identity-b
tmacs a robust and verifiable threshold multi auth
video stream analysis in clouds an object detectio
video stream analysis
fine-grained owner-enforced search authorization 2
adaptive medium access control for internet of-thi
resisting blackhole attack
resisting blackhole attacks on manets doc
study on willingness maximization for social activ
space air-ground big-data 2016 ieee android proje
phase without generating candidates
mining partially ordered sequential rules common t
monitoring approach vehicle s
using gps and catagrizing driver using datamining
multi objective tasks scheduling
algorithm for cloud computing throughput optimizat
network level performance
enhancement in wireless nanosensor networks throug
novel common vehicle
information model (cvim) for future automotive veh
on the security of a public auditing
mechanism for shared cloud data service
on the security of dataaccess control for multiaut
online data deduplication
memory big-data analytic systems
online learning for offloading
caa
cloud security
flow control
upcoding fraud
monetary domains
incremental semi supervised
clustering ensemble for high dimensional data clus
lightweight and privacy preserving
delegatable proofs of storage
data dynamics in cloud storage (2)
linked semantic model for information resource ser
logic bug detection and localization using symboli
map reduce programming model for parallel k mediod
maximizing p2 p file access
availability in mobile ad hoc networks though repl
mining high utility patterns in one
autoscaling in energy harvesting
ieee best project center
ieee project isp
ai new project titles
social network
matlab
ieee java projects
ieee matlab projects
information technology
information security
ieee cloud networking projects
ai networking
ieee cloud computing project
ieee cloud
ieee latest projects
ieee latest project title 2022
2022 titles for machine learni
optimization of tasks in cloud computing based on
min-min and priority (2)
outlier detection techniques for network attacks
pa wi parallelweighted itemset
mining by means of mapreduce
performance analysis
gorithms for dynamic
workflow applications
ieee project center in vellore
ieee project iot
project title for iot 2022
ieee project for python
ieee project best in vellore
project title for 2022
ieee project aritifical intell
ai 2022 project title
big data project tilte in 2022
an improved vertical algorithm
frequent itemset mining from uncertain database
a distributed key management
cooperative message authentication
a large scale hidden semi
detection on user browsing behaviors
a self tuning failure detection
computing service
cda a cloud dependability analysis
characterizing system dependability
collaboration based cloud computing
management framework
credit card fraud detection
hidden markov model
enhanced security for online exams
using group cryptography
optimal file
coded servers
an approximate search framework for big data
gap finder
security information
unstructured text
finding inconsistency
an anomalous behavior detection model in cloud com
cyberattack
short term memory network
hierarchical long
an authenticated trust and reputation calculation
gradient
illumination description
image forgery
detecting errors in big sensor data on cloud
framework of a national level electronic
cloud computing applications
expressive
efficient
and revocable data access control for multi author
flexible container based computing platform on clo
focusing on a probability
element parameter selection of message
importance measure in big data
gene selection
sample classification using k nearest neighbor and
get to the point summarization with pointer genera
health data integration
secured record linkage
healthcare
holistic perspective
honeywords
health record system
hybrid intrusion detection
(hids) using fuzzy logic
jamming aware traffic allocation
multiple-path routing using portfolio selection
next generation
computing next generation
privacy preserving multi-keyword
over encrypted cloud data
privacy preserving public
torage security in cloud
rethinking vehicular communications
vanet with cloud computing
attribute based encryption
computing using attribute based encryption
star a proposed architecture
bitcoin transactions
ensemble stacking model
machine learning (ml)
payments
unlawful activities
origin-destination
passenger flow prediction
metro systems
adaptive feature
fusion networks
affn
adaptive
feature
od flows
agricultural text classificati
dynamic fusion
newborn babies
cardiac intensive care unit
using statistical model
early detection
machine learning approach
cmlm
ieee project 2023
heartbleed-like attacks
iot frameworks
measurement approach
2023 ai projects
cyber security
internet of things (iot).
https sites
a new framework
fraud detection
multiple features
temporal segment transformers
behavior recognition
campus abnormal
abnormal action
detecting and mitigating
botnet attacks
software-defined networking
sdn
distributed denial of service
ddos
dl
projects
ensemble
prediction
fraudulent cryptocurrency
lstm
key semantic features
convolution neural network
bi-lstm
phenotypic numerical type
ieee projects 2023
cross-silo federated learning
applications
false data injection
attack detection in smart grid
privacy-enhancing
computation performance
fdia
trusted third-party
cnns
programming
group
machine-learned
iiot network
block chain lraning
blackchain iiot
iiot networks
block hunter
federated learning
block hunter federated
blockchain
block chain certificate
blockchain transparency
blockchain machine learning
blockchain with ai
blockchain-based certificate
blockchain-based cloud
data integrity verification
scheme with high efficiency
password cracking
big data titles 2022
networking project 2022
ieee networking titles 2022
low cost projects
ai project titles 2022
new titles ieee project
ieee project ai
2022 ieee new titles
network security title 2022
a two-fold machine
2022 new ieee titles
matlap project
block hunter federated learn
cyber threat hunting
blockchain-based iiot networks
blockchain-based cloud data
2023 ieee project
machine learning project
2023 ai titles
2023 ieee projects
python ieee projects
ai projects new
training
firearms monitoring
faster region-based
cyber-hate detection
multi-stage machine learning
fuzzy approach
recurrent neural networks
‘‘critical thinking’’
optimization techniques
genetic algorithms
integrity verification scheme
composite behavioral modelin
online social networks
identity theft detection
theft detection in online soci
traceable and revocable cipher
ciphertech policy attribute
query processing with strong privacy protection fo
encryption scheme
machine learning & ai projects
data science 2023
new application titles 2023
data science titles 20023
photo helper
photographing guidance
deep feature retrieval
cardiac arrest
brain tumor patterns
svd and shear let transform
pet and mri brain image fusion
wavelet transform
structural information adjustment
video steganography
spatial and iwt domai
image denoising algorithms
animal behavior analysis
image transmission technique via
olor transformations
watermarking scheme
cb cr space.
a big data clustering algorithm
mitigating the risk of customer
image dehazing algorithm
cognitive multiple access channels
interference cancellation
per antenna constant envelope
large multi-user mimo systems
sharp spectrum
probing in cognitive radio
spectrum sensing of interleaved
cognitive radio networks
multicell multiuser mimo uplink
very large antenna arrays
finite dimensional channel
xor encryption
depth analysis
brain segmentation
detect tumor region
image processing techniques
dark channel prior
collaboration framework
color iris recognition dct vs.
hsv color spaces
a hybrid cloud approach
secure authorized deduplication
neurological diagnostics
diagnostics
comparison of pixel level
image fusion methods
improvement based haze removal
underwater images using fusion technique
a micro video recommendation
system based on big data
scalable attribute-based
based access control scheme
flexible delegation
a compendium for prediction
success of a movie based upon different factors
feedforward network
invariant face recognition
a cypher query based
sql data mining on protein datasets
using neo4j graph database
dimensional neighborhood
embedding for face recognition
a data mining framework
analyze road accident data
brain tumor segmentation
hybrid clustering technique
a framework for sentiment analysis
opinion mining of hotel reviews
cognitive service
access privileges for cloud storage
spin with cluster
wireless
mobile sensors
linear wireless sensor networks
calorie estimation based on raspberry pi.
fruit recognition &
portable assistive device for blind
dumb and deaf people using ai.
automated vision based surveillance
automated vision based
efficient face detection
identification in networked
video surveillance systems
indoor intrusion detection
filtering system using raspberry pi
io t based smart energy
project title 2015 best project center in vellorei
global energy balance.
hierarchical adaptive trust establishment
vehicular networks
implementing energy efficient technique
gray hole and black-hole attacks in wireless senso
power aware olsr
leveraging sdn
wsn an analysis
new hierarchical stable election protocol
opportunistic routing algorithm
qos aware geographic opportunistic
random walk based approach
section of node density
cluster in spin for data
secure spin with cluster for data
raspberry pi and power management using ai.
task assignment algorithm for cognitive radio netw
low complexity cyclostationary spectrum
interference avoidance
in femto-cells lte-a based networks
subcarrier collisions
random access in ofdm-based cognitive radio networ
mimo sc fdma systems
bandwidth reservation
coexistence strategy i
opportunistic spectrum access environments
ber analysis in wavelet
lte uplink transmission
chaos communication
mimo technique
energy efficiency optimization
mimo system with spectral efficiency constraint
smart farmland for crop prevention
animal intrusion detection using cnn
object tracking with raspberry pi
oriented gradients (hog)
vector machine (svm).
auto image description
converting to speech and text for visually impaire
monitoring system using visual behavior and machin
leaf disease detection using knn
deep neural network.
real time vehicle detection
tracking and counting
raspberry pi.
smart cloud based parking system
machine learning for smart cities
cooperative spectrum sensing scheme
video analytics for traffic monitoring
defogging method for traffic monitoring videos
bayesian networks
data integration
foreign keys
cleaning uncertain data
diverse accuracy rates
combining network
tax risk assessment
dag
privacy-preserving
algorithm
decision mechanism
cloud network
text clustering
deep feature
robust and fast detection
sliding windows
robust watermarking by svd
wavelet column transform of host image
simultaneous feature and dictionary
image set based face recognition
study and analysis of robust
watermarking technique using matlab
subsense a universal change detection
ocal adaptive sensitivity
technique for qrs complex
using particle swarm
towards practical self embedding
jpeg-compressed digital
tumor detection in brain mri image
k means and fuzzy c-means clustering algorithm
explanation
intermediate loss
ct and mri scans
detecting errors in big sensor
data on cloud
multiple data-hiders
secret sharing
encrypted images
reversible data hiding
access control by signature
security framework
achieving efficient and privacy preserving
cross-domain big data
deduplication in cloud
adaptive encrypted cloud storage model
new capacity
private information
discretization
heuristics
high accuracy
huge noise
noise reduction
enriching data
data imputation
under similarity rule
a study on secure intrusion detection
system in wireless mane ts to increase the perform
3 d iris scanner
single image
neural networks
a survey on political
analysis in twitter.
3d super-resolution
retrieval scheme
crowdsourcing in big
data environment
revocable storage identity
secure data sharing
fire detection
orest fire surveillance
a secure client side deduplication
scheme in cloud storage environments
flower classification using neural
network based image processing
attribute-based
cloud server
green cloud computing
dynamic resource
symbiotic organism
algorithm in cloud computing
ergodic sum rate maximization for fading
cloud colonography
medical testbed
a profile based big data
agricultural context
improvement based haze
images using fusion technique
a public opinion keyword
vector for social sentiment analysis research
a queuing method for adaptive
support vector machine
cloud intrusion detection
auto-encoder
efficient protection
a reliable task assignment
strategy for spatial
mobile edge-cloud computing networks
infant cry analysis
detection
k nearest correlated neighbor classification for i
recognition using feature fusion
lossless image compression technique
combination methods
lung cancer detection using digital
image processing on ct scan
shearlet transform
multifocus image fusion
nsct and focused area detection
optimizing image segmentation
based k means clustering
prosody modification of speech
tutoring applications
retinal disease screenin
efficient computing resource
secure cloud storage
regular language
survey on multi label
data stream
fusion of pan images ms
preserving spectral quality
a secure group key management
scheme for sensor networks
unified framework
gait recognition
image and gabor wavelet
human activity recognition
using neural networks
image quality improvement
omputed tomography images
local binary patterns
See more
Users being followed by Shakas Technologies