security cloud computing internet of things cryptography authentication wsn iot information technology wireless sensor network machine learning mobility load balancing classification manet clustering qos sensors routing cloud services wireless sensor networks optimization e-learning throughput encryption software engineering openflow bandwidth adaptive video streaming video data mining cloud dash applications dsr cbir aodv decryption aomdv enterprise mobility internet of things (iot) pattern recognition mobile computing xor operation 2’s complement distributed computing device fingerprinting prescription wireless sensor networks (wsn) packet loss hash function monitoring virtualization collaboration intrusions vanets cache spatial analysis challenges network computing customer satisfaction delay data security creativity steganography checkpointing rollback recovery denial of service aco sensor networks authenticity internet education hierarchical sdn intrusion detection system iot architecture soa round-robin scheduling priority based scheduling online communication rfid php taxonomy genetic algorithm zigbee privacy support vector machine secret key wireless networks agent energy feature extraction feature selection social network process queue transition probability matrix multi-level feedback queue scheduling markov chain model cluster head services facebook recovery manets mobile computing khi2 test ict adapitive markov chain application ipds face recognition techniques medical center ehealth healthcare webportal telemedicine automated facial system secure mobile computing fragment data-flow analysis ofdma bio-inspired lte mimo networksecurity root-of-trust satisfaction siso miso fault tolerant robust mobile support station (mss) computing test of homogeneity dynamic topology web application firewall lcins sandboxing anomaly detection authorization sasl content adaptation cost-aware web browsing oauth nsclc nuzzer multiple entity detection device-free passive (dfp) localization passive radio map information security policy document pricing user experience approach rural health clinics ddos attack grid computing recognition algorithm grid evaluation egfr gene quantitative positron imaging technique and kernel methods software and hardware of grid computing evolutionary pursuit atm networks eprca ieprca sclc nist atm network simulator machine-learning algorithms web usage e-communication decrypt data java programming language cryptosystem statistical test prbg p-value nist test suite randomness study nonlinear dimensionality reduction feature vector self organizing maps (som) artificial neural networks recognizing content-based images cloud drain cloud security intrusion detection system (ids) host based intrusion detection system (hids) network based intrusion detection system (nids) intrusion management quality mis common criteria protection profile backend service open-loop and closed-loop payments stored-value-account mobile os webos and symbian windows phone ios customer relationship management it resources relations adaptive e-learning and collaborative learning throughput level time scheduling delivery ratio ad-hoc network median multicast reliable data delivery average time standard packet classification spot jamming denial-of-service electronic jamming ap selection access link metric ieee 802.11 wmn dynamic association cross-layer association ap load balancing polyalphabetic cipher algorithm pornography chat room collaborative-based systems nearest neighbour recommender systems software defined network aodv routing protocol server mobile ad-hoc network trust value attacks in routing protocol cooperative black hole attack transmission band multiagent system data compression efficiency algorithm cloud service provider cloud clients applications delivered as services identifier matching algorithm jaro-winkler record linkage colon cancer nuclei detection gland detection whole-program psychoanalysis encrypted data iso 9564 pin based authentication android application component called service mobile payment card-present and card-not-present transactions one time password (otp) m-pin (mobile pin) secret sharing scheme verifiable computationally perfect compartmented access structure manets ideal parallelization strategy scalable parallel computing overlap between computation and communication security issues trust confidentiality software defined networks mobile tourism industry handheld device mpeg-7 sex chatting messenger linear discriminant analysis independent component analysis principal component analysis cloud type execution time heterogeneity shared memory virus internet of things (iots) malware device management spam logging it projects risk management quantitative risk assessment monte carlo simulation discrete wavelet tranformation secrete message stegnography extract message advanced node leach clusters load redirection guard channel mobile ad hoc network routing overhead varying number of nodes average end-to-end delay sartre educational technology wireless local area network(wlan) rssi(received signal strength indication) decision metrics access point (ap) association architecture mininet traditional network railference substitution seeded sdes key generation transposition fundus image glaucoma optic disc. cad systems iridocorneal angle zenoss simple network management protocol (snmp) big brother (bb) cognitive radio (cr) classical routing schema and spectrum sharing opportunistic routing cr routing protocol (crp) humidity management pervasive computing hvac occupancy sensor ventilation management digitized images color histogram image indexing vector quantization image repositories rest wot web of things signature-based ids gain ratio decision tree information gain nsl-kdd val it framework cobit enterprise architecture frameworks it government clouds macrocell p2cell microcell threats computer network oil and gas energy industry simulated annealing multiobjective optimization problem cost-effective broadcast balloon ad hoc networks two-hop neighborhood information. route-reply route-request base station mobile node disseminating traffic information in vehicular net wifi unicast address ipv6 address packet delivery ratio. slaac spread spectrum dynamic spectrum access (dsa) psnr opa data hiding financial inclusion nbfc financial institution microfinance kdd dataset decision rules decision trees malicious detection meta classifier network security mobile cloud computing uplink link selection energy consumption downlink false data injection compromised node node legitimacy vm scheduling iaas safety indian languages speech corpus platform as a service (paas) layer private cloud software as a service (saas) layer distributed computing system hybrid cloud infrastructure as a service (iaas) layer pubic cloud pattern recognition models agriculture. sdk ip ide ubiquitous computing surveillance systems generations of surveillance system challenges in surveillance system cloud based surveillance self-reliable code two factor authentication otp secure transactions power remote security linex kernel dalvik spatial decision support system (sdss). decision suggestion data warehouse online analytical processing (olap) geographic information system (gis) animal diseases fault-tolerant systems check pointing algorithms parallel & distributed computing speed electronic banking accountability electronic payment msb lsb stego-image rgb embedding cover image distributed systems fault tolerance mobile computing system hmm intrusion detection packet delivery fraction cr ad hoc network (crahn) iwt id based cryptography group signature bilinear pairings software project documentation documentation software projects image equalization contrast enhancement wavelet thresholding dwt svd internet banking iran internet users developed technology acceptance model 3 java swing jfuzzylogic driver attention load rating matlab driver distractions fuzzy inference system opnet multi-protocol label switching frr and rsvp/cr-ldp segment in-network networkassisted traffic shaping server-based wireless communication non commutative groups key agreement decomposition problem conjugacy search problem cellular system gsm biometric system priority mac gaming social-awareness signaling encoding cdn streaming adaptive sand suggesting system evaluating system complaint system academic advising system social network analysis spf selinux md5 bdna awgn dncnn single image super-resolution (sisr) and jpeg imag gaussian denoising neural networks decision tree learning regression reinforcement learning q-learning test oracle test case neural fault atnn priority scheduling min-min resource reservation max-mix secure shell particle swarm optimization honeypots differential evolution dash. co-operative research challenge plant diseases image segmentation agriculture image processing n-mote n-gateway debris shortest path problem alternative path algorithm bellman-ford algorithm floyd-warshall algorithm dijkstra’s algorithm mobile map map register voter voter card transfer voter registration inec electoral integrity electoral fraud locusts task migration pupetter resource deficient cyber foraging sligshot secure authentication rate-quality overlapping community detection maximal clique problem graph mining multi-path risk analysis deployment model cloud spatial analysis healthcare cloud gis cdrq routing drq routing cbq routing q routing dsdv e-justice e-government electronic inquiries system bis real-time traffic htt goodput end-to-end delay anycast routing sybil attacks audio visual communication system multipath routing desktop application seed vigour index seed germination percentage ontology semantic personalized relays. pic microcontroller bc547 transistor android application video spreading codes synchronization spectrograph hamming distance correlation audio spreading codes x-frame-options iframe frame busting cursorjacking clickjacking shape texture color human activity prediction. fp pattern cluster analysis bayesian networks weka multi-criteria link disjoint node disjoint loop-free paths oil & gas industry mes scada coordination process optimizing information systems integration trade union macromedia-flash unionism mysql dynamic website cyberspace asup ids cloud intrusion detection system elastic festive panda tapas time-varying stalling flickering attacks permissions dynamic analysis static analysis android malware bloom-filter based ip chock (bf-ipcm) fast start congestion transport layer tcp user-qoe mobile sensing platform wireless sensing mobile sensing message information controlled replication routing performance epidemic routing resource concentrate unstructured. structured distributed centralized peer to peer networks uml 2.0 dtos forward engineering characteristic features bottleneck attribute selection attribute filters technology e-banking services e-banking big data soil remote monitoring multiplexer hotspot fertilizer data logger drip irrigation transportation network degree bridging coefficient bridging centrality betweenness centrality sharing demand h-field e-field return loss directivity gain router artificial intelligence artificial neural network open source re-duplicate combination cloud empower duplicate validity coverage black spots channel allocation schemes antenna configuration cellular network terrain s sector antenna hill plaintext nearest prime number ciphertext alterable programming agile elimination of waste lean stream smart building tam perceived ease of use technology acceptance perceived usefulness metrics of evaluation agent communication language cognitive radio ad-hoc networks link reliability spectrum diversity joint path nearest prime pixels image cryptography flat based location based routing techniques stimulating creativity non-work related internet usage diversity detection scheduling tasks heuristic algorithm transport network minimal edge control set edge control set throttled load balancing algorithm cloud-analyst honeybee algorithm cloud load balancing biased random algorithm project management scrum agile projects software development routing protocols ospf (open shortest path) mpc (multiple routing configuration) dmo (decomposition with minimum overhead) rmo (routing with minimum overhead opnet 14.5 random mobility olsr web vulnerability cookie reflected xss persistent xss virtual desktop cloud os web os background extraction foreground extraction and identification vectorizing motion tracking scene segmentation background filling saas cloud vendors cloud risk and iaas paas black-berry os android ip routing sink multiagent systems knowledge query manipulation language (kqml) plain text ascii values cipher text wait state cloud service smart schools attacker mwsn security prerequisites security attacks identity based encryption revocation multi owner data sharing wi-fi rf precision farming wireless sensor networks (wsns) bluetooth world wide web scalability web content mining cost optimality parallel web content mining serial web content mining teacher’s performance pir sensors cctv student’s behavior http protocol e-metering pic 16f877a lamp web technology device oriented security challenges m2m communicating devices security solutions faceto-face whatsapp blended learning system engineering students physical classroom hybrid blended learning system virtual classroom programmable networks sdn web floodlight controller software-defined network closest data center optimized response time dynamic load use cases algorithm classifier protocols smart healthcare system query relation semiotic set difference image enhancement afm imaging nyquist rate top-hat and bottom-hat transform sparse sampling cloud computing deployment models cloud computing service models characteristics knowledge creation centralization knowledge retention blugod model knowledge management complexity knowledge transfer formalization organizational structure tora rfar data center tuning challenges rnp link quality lqi need for link quality analysis prr routing protocol location femtocell locata indoor positioning channel angular pressing mechanical properties fracture and hardness. alloy and pure copper semantics resource discovery coap cognitive radio filter bank near perfect reconstruction prototype filter process scheduling digital data audio data visual data idea generation textual data www quality assurance ad boost web interaction mining online tools electronic prescribing applications symptoms crm uda lof collision free and queue theory cluster and position based mac transmission wava herbal practitioners telediagnosis wireless sensor networks (wsns). ieee 802.15.4 cbr traffic loads ieee 802.11 qualnet 5.0.2 simulator fingerprint authentication database modeling security analysis atm software testing social network sites malicious spam
See more