Proceedings on International Conference on Emerging Trends in Expert Applications & Security (2018)16 articles•115 pages•Published: October 23, 2018 PapersPages 1-6 | Pages 7-14 | Pages 15-21 | Pages 22-29 | Pages 30-36 | Pages 37-42 | Pages 43-50 | Pages 51-58 | Pages 59-66 | Pages 67-73 | Pages 74-80 | Pages 81-88 | Pages 89-94 | Pages 95-102 | Pages 103-108 | Pages 109-115 |
KeyphrasesAES Algorithm, anomalous Values, Application, attribute, Baseline Noises, Cloud Computing3, Clustering, Computed tomography scan, computer vision, cosine similarity, Cyber Security, Data Mining2, Decoy system, different languages, Digital Wateramrking, e-commerce, e-Governance, ECG, Edge Device, Electrocardiogram, face detection, FIR filters, Fog Computing, Hematomas, Honey bee behaviour algorithm, IIR filters, Internet of Things2, Least Mean Square, Least Significant Bit, Li-Fi, Load Balancing, LSB, malware detection, MPTCP, MSE2, NC, NLMS, noise, power conservation, PSNR2, Quartiles., radio wave, Raspberry Pi, rectangle fit algorithm, SCTP, Security Issues, Smart Grid, Spatial domain, Steganography, Stemming, storage, Support Vector Machine (SVM), TCP, Telegram, TF-IDF, Tokenization, UWSN (Underwater Wireless Sensor Network), Virtual Machine, VLC, Web Mining |
|