Proceedings on International Conference on Emerging Trends in Expert Applications & Security (2018)

16 articles115 pagesPublished: October 23, 2018

Papers

Pages 1-6
Pages 7-14
Pages 15-21
Pages 22-29
Pages 30-36
Pages 37-42
Pages 43-50
Pages 51-58
Pages 59-66
Pages 67-73
Pages 74-80
Pages 81-88
Pages 89-94
Pages 95-102
Pages 103-108
Pages 109-115

Keyphrases

AES Algorithm, anomalous Values, Application, attribute, Baseline Noises, Cloud Computing3, Clustering, Computed tomography scan, computer vision, cosine similarity, Cyber Security, Data Mining2, Decoy system, different languages, Digital Wateramrking, e-commerce, e-Governance, ECG, Edge Device, Electrocardiogram, face detection, FIR filters, Fog Computing, Hematomas, Honey bee behaviour algorithm, IIR filters, Internet of Things2, Least Mean Square, Least Significant Bit, Li-Fi, Load Balancing, LSB, malware detection, MPTCP, MSE2, NC, NLMS, noise, power conservation, PSNR2, Quartiles., radio wave, Raspberry Pi, rectangle fit algorithm, SCTP, Security Issues, Smart Grid, Spatial domain, Steganography, Stemming, storage, Support Vector Machine (SVM), TCP, Telegram, TF-IDF, Tokenization, UWSN (Underwater Wireless Sensor Network), Virtual Machine, VLC, Web Mining