ICETEAS 2018:Keyword Index

KeywordPapers
A
AES AlgorithmReliablity in the Fog Computing
anomalous ValuesDetection of Anomalous Value in Data Mining.
ApplicationUtility of Li-Fi in Railways
attributeDetection of Anomalous Value in Data Mining.
B
Baseline NoisesDenoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
C
Cloud ComputingA Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
Plagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Reliablity in the Fog Computing
ClusteringData Mining and its Various Concepts
Computed tomography scanAbnormality Detection in Brain CT Image Using Support Vector Machine
computer visionA Review of Face Recognition System Using Raspberry Pi in the Field of IoT
cosine similarityPlagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Cyber SecurityMalware Detection for Cyber Security Enhancement in Smart Grid
D
Data MiningDetection of Anomalous Value in Data Mining.
Data Mining and its Various Concepts
Decoy systemReliablity in the Fog Computing
different languagesUnlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India
Digital WateramrkingDesign and Implementation of Modified Butterworth Filter for Watermarking
E
e-commerceData Mining and its Various Concepts
e-GovernanceUnlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India
ECGDenoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
Edge DeviceReliablity in the Fog Computing
ElectrocardiogramAnalysis for Denoising of ECG Signals Using NLMS Adaptive Filters
F
face detectionA Review of Face Recognition System Using Raspberry Pi in the Field of IoT
FIR filtersDenoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
Fog ComputingReliablity in the Fog Computing
H
HematomasAbnormality Detection in Brain CT Image Using Support Vector Machine
Honey bee behaviour algorithmA Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
I
IIR filtersDenoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
Internet of ThingsA Review of Face Recognition System Using Raspberry Pi in the Field of IoT
Reliablity in the Fog Computing
L
Least Mean SquareAnalysis for Denoising of ECG Signals Using NLMS Adaptive Filters
Least Significant BitA Survey Paper on Different Steganography Technique
Li-FiUtility of Li-Fi in Railways
Load BalancingA Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
LSBDesign and Implementation of Modified Butterworth Filter for Watermarking
M
malware detectionMalware Detection for Cyber Security Enhancement in Smart Grid
MPTCPComparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks
MSEA Survey Paper on Different Steganography Technique
Design and Implementation of Modified Butterworth Filter for Watermarking
N
NCA Survey Paper on Different Steganography Technique
NLMSAnalysis for Denoising of ECG Signals Using NLMS Adaptive Filters
noiseDenoising of ECG Signals Using FIR & IIR Filter: a Performance Analysis
P
power conservationSecurity Challenges and Application for Underwater Wireless Sensor Network
PSNRA Survey Paper on Different Steganography Technique
Design and Implementation of Modified Butterworth Filter for Watermarking
Q
Quartiles.Detection of Anomalous Value in Data Mining.
R
radio waveSecurity Challenges and Application for Underwater Wireless Sensor Network
Raspberry PiA Review of Face Recognition System Using Raspberry Pi in the Field of IoT
rectangle fit algorithmDetection of Anomalous Value in Data Mining.
S
SCTPComparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks
Security IssuesUnlocking the Enigma of e-Governance in Rural Areas in Perspective to States of India
Smart GridMalware Detection for Cyber Security Enhancement in Smart Grid
Spatial domainA Survey Paper on Different Steganography Technique
SteganographyA Survey Paper on Different Steganography Technique
StemmingPlagiarism Checker and Classification of Files on Cloud Using Smart Cloud
storagePlagiarism Checker and Classification of Files on Cloud Using Smart Cloud
Support Vector Machine (SVM)Abnormality Detection in Brain CT Image Using Support Vector Machine
T
TCPComparative Analysis of TCP, SCTP and MPTCP in Transport Layer of Wireless Sensor Networks
TelegramA Review of Face Recognition System Using Raspberry Pi in the Field of IoT
TF-IDFPlagiarism Checker and Classification of Files on Cloud Using Smart Cloud
TokenizationPlagiarism Checker and Classification of Files on Cloud Using Smart Cloud
U
UWSN (Underwater Wireless Sensor Network)Security Challenges and Application for Underwater Wireless Sensor Network
V
Virtual MachineA Detailed Analysis on Several Load Balancing Algorithm in Cloud Computing
VLCUtility of Li-Fi in Railways
W
Web MiningData Mining and its Various Concepts