2016 ieee power electronics projects 2016 ieee matlab projects 2016 ieee robotics projects 2016 ieee java projects 2016 ieee eee projects 2016 ieee ns2 projects 2016 me projects with future enhancement 2016 ieee projects 2016 ieee embedded projects 2016 ieee dotnet projects bulk ieee projects 2016 2016 ieee android projects ieee projects latest for cse ieee 2016 projects in vellore ieee project centers in vellore latest ieee dot project titles 2015 multimedia projects latest ieee java project titles 2014 – 2015 ieee java project titles ieee projects in vellore 2015 android project 2015 matlab projects 2015 – 2016 ieee java project titles 2015 – 2016 ieee dot project titles 2014 – 2015 ieee dot project titles latest ieee projects for cse 2015 2014 ieee projects list for be btech final year pr 2015 struts and anglurjs 2015 bigdata project 2015 cloudsim projects 2015 php projects 2015 dot net list list of 2015 ieee paper projects 2015 application projects 2015 mobile wireless networks ieee project vellore best ieee project center in vellore ieee 2016 projects for cse 2016 ieee cse projects 2016 ieee it projects cloud computing best project center in vellore free download project documentation easy way to get projects free download project abstract ieee project 2013-2014 networking multimedia grid computing image processing knowledge and engineering -datamining parallel and distributed system-networking mobile computing mobile computing-wireless communication network security parallel and distributed system with security comp ieeeproject in parellel and distribution international conference data mining final year projects main projects project title 2015 best project center in vellore non-ieee projects ieee projects mini projects big data ieeeproject 2014 ieeeproject 2014 ieee java projects 2014. python new project titles big data ieee project 2022 machine learning with ai 2022 cloud computing project 2022 latest project title 2022 ai project titles 2023 project management latest mphil thesis titles.. machine learning title 2022 wireless sensor networks 2022 ieee projects at vellore 2022 mat lab projects ns projects 2022 2022 project tiltes ieee cloud computing 2022 ieeeproject in datamining ns 2 project 2022 titles 2022 python titles 2022 projects at vellore 2022 project titles ai title 2022 machine learning data science title in 2022 ieee best project center in vellore ieeeproject in mobile computing ieee cloud machine learing 202 cloud computing project title censoring in big data processing real time project 2016 framework ieee java projects 2014 wireless sensor network artificial intelligence 2022 ieee big data titles python titles 2022 cloud titles 2022 projects titles blockchain title in 2022 python 2022 project tiles deep learning techniques deep learning python 2022 project title raspberry pi protecting location privacy in sensor networks aga stealthy attacks in wireless ad hoc networks detec steganography using reversible texture synthesis ai projects routing path identification in manet with ftr ahp distributed and adaptive medium access control for matrix scrambling method an elliptic curve cryptography protecting your right verifiable attribute based k identity based proxy-oriented data uploading and r identity based proxy-oriented data uploading latest project titles. resilient device for off-line micro-payments software-defined fractal image compression polynomial interpolation efficient encryption and short ciphertexts contributory broadcast encryption a time efficient approach contributory broadcast encryption with efficient e online and offline data data mining project titles recommendation model regularized with user trust a scalable and secure of personal a mixed generative discriminative a mixed generative discriminative based hashing me novel it’s based on space air-ground big-data a kind of novel it’s based on space air-ground b a comprehensive study on willingness maximization social activity planning with quality guarantee traffic load adaptive medium access control for fu traffic load adaptive medium access control medium access control for fully connected mobile a top k query processing top k query processing and malicious node identifi node identification based on node grouping in mane resisting blackhole attacks on manets optimal reliable routing path identification in ma general model incidents in swimming pools transactions project convolutional neural networks smart cities 2023 python projects intrusion detection best project center at vellore t 2022 new titles medical image fusion machine learning new titles 2022 python titles in vellore ieee project 2014 2017 latest project titles in big data 2022 data mining titles ns2 project titles in 2022 mitigation of nosql injections cognitive radio sensor networks analysis and mitigation of nosql injections using hash tag graph based topic model effects of mobility on latency wsn analysis and mitigation dynamic threshold location prediction a novel method called location-based delivery (lbd short message format tracking system using location prediction location tracking accuracy dynamic threshold for minimizing sms delivery a tracking system using location prediction and dy nference attack on browsing history of twitter use public click analytics and twitter metadata android malware detection malware detection and prevention madam effective and efficient behavior based andro frodo fraud resilient device for off-line frodo fraud resilient device mobile nodes fraud resilient device for off-line micro-payments innovative approach of hds2 audio based puzzle gaming routing protocol in manet collision free anycast transmission scheduling in uws ns congestion control scheme performance analysis based on nonlinear red arduino based lpg gas monitoring &amp shortest path overhearing tree automatic cylinder booking with alert system top down xml keyword query processing maximum lifetime in ws ns lpg gas monitoring data aggregation techniques detecting and avoiding of worm collaborative blackhole attack on manet high and similar between sql and nosql systems aodv routing algorithm to connect semantically-related words without co-o dynamic channel access using hash tag graph based topic model to connect emantically-related words without co-occurrence in improve energy efficiency nosql (not only sql) alterdroid differential fault analysis of obfuscat differential fault analysis of obfuscated smartpho obfuscated smartphone malware alterdroid differential fault analysis top k query processing and malicious node malicious node identification based on node groupi randomness from routing metadata in ad hoc network routing metadata in ad hoc networks secret common randomness secret common randomness from routing metadata in path identification in manet with ftr ahp model optimal reliable routing path identification joker a novel opportunistic routing protocol pdf wireless ad hoc networks (2) joker a novel opportunistic routing protocol doc novel opportunistic routing protocol a game theoretic approach on resource allocation colluding nodes in manets distributed and adaptive medium access control medium access control for internet of-things-enabl internet of-things-enabled mobile networks d2 d delay aware distributed dynamic adaptation of dynamic adaptation of contention windowin wireless contention windowin wireless networks frodo fraud resilient device for off-line micro-pa droid detector android malware characterization malware characterization and detection using deep efficient data center flow scheduling characterization and detection using deep learning droid detector android malware detection using dee droid detector android malware characterization an expansion ratio resource allocation with colluding nodes in manets efficient route update large scale sensor networks encryption with efficient encryption and short cip energy efficient detection node disjoint multipath routing smartphone users using behavioral biometrics users using behavioral biometrics authentication of smartphone users using behaviora authentication of smartphone users an exploration of geographic authentication scheme energy efficient reliable an exploration of geographic a game theoretic approach on resource allocation w geographic authentication schemes fault analysis of obfuscated smartphone malware adaptive quality of-service-based routing for vehi congestion detection and propagation in urban area 2017 ieee matlab projects brain behavio r based adaptive adaptive intrusion detection in networks congestion detection and propagation brain behavio r based adaptive intrusion detection elascity quantitive of calculating cloud computing ieee projects 2017 for cse 2017 latest project in data mining best project in data mining ieee project 2017 2018 ieee 2017 2018 matlap project best image processing titles matlab projects matlab image processsing titles 2017 2018 ieee project for cse 2017 2018 ieee project titles in ns2 ieee 2017 2018 titles ieee projects titles networking 2017 2018 ns 2 simulator projects titles 2017 2018 ieee project titles for wlreless sensor network ieee project titles for wsn ieee projects 2017 2018 ieee 2017 titles wsn big data project 2017 3d reconstruction of facial structures from 2d ima ieee projects for big data facial structures from 2d images for cosmetic surg ieee project image processing 2017 project titles for big data reconstruction of facial structures mobile sensor deployment a scalable data chunk similarity based compression scalable data chunk similarity vulnerabilities of voronoi based approaches vulnerabilities of voronoi based approaches to mob voronoi based approaches to mobile sensor deployme visual exploration of changes in passenger flows a map reduce algorithm mega city metro network a self adaptive sleepwake up scheduling approach f passenger flows and tweets on mega city metro netw visual exploration of changes in passenger flows hardware performance counter to detect d dos attac adaptive sleepwake up scheduling approach scheduling approach for wireless sensor networks sleep/wake-up scheduling quality of-service-based routing for vehicular ad ant colony optimization ieee projects in ns2 ieee latest project titles 2017 2018 ieee best project center at vellore simulation project titles for ns2 2017 2018 android ieee project 2020 new titles latest new titles fault tolerant approach wireless sensor network. lightweight secure scheme detecting provenance forgery and packet drop attacks novel resource scheduling approach improve the reliability of shuffle exchange networ trust based secured coordination mechanism for wsan. achieving high performance data services with multi-network access autonomic in network query processing urban sensor networks blind people n efficient cluster tree based data collection sch mobile wireless sensor networks puzzle gaming for blind people improvement on leach protocol. ieee project titles 2017 2018 diplocloud rdf data in the cloud diplocloud efficient and scalable management of rd diplocloud efficient and scalable management ieee projects latest for cse 2017 2018 exchange based on cloud computing system cdc generation integration for health health information exchange based on cloud computi cdc generation integration for health information nomaly and community detection botnet detection detection based on anomaly and community detection botnet detection based on anomaly and community de bluetooth based employee mobile tracking bluetooth based employee mobile tracking using and employee mobile tracking using android application mobile tracking using android application detection from blood samples automated malaria detection from blood samples blood samples using image processing automated malaria detection from blood samples usi ieee project tiles for ns2 2017 2018 automated malaria detection audio based puzzle gaming for blind people fast release/capture sampling in large-scale senso energy-aware load balancing and application scalin electrical impedance tomography for artificial sen efficient audit service outsourcing for data integ design of a mobile charging service for electric v design and experimental validation of novel force data collection in multi cost minimizing dynamic migration of content cooperative downloads in vehicular environments combiningefficiencyfidelityandflexibilityin 150511 blood pulsation measurement using linearly polariz an attribute an approach of reliable data transmission with ran an algorithm for the automatic analysis of signals a smart sensor network for sea water quality monit a secure and dynamic multi a runtime integrity monitoring framework for real a practical wireless attack on the connected car a a methodology for visually lossless jpeg2000 compr a method for uncertainty assessment of passive sun a low power temperature to frequency converter for a high reliability wearable device for elderly fal mobile comp project abstract ieee project 2014-2015 project 2015 a cooperative train control model for energy savin smart lighting system iso/iec/ieee 21451 compatibl single image super-resolution based on gradient pr scalable and secure sharing of personal health road edge recognition using the stripe hough trans revealing the trace of high-quality jpeg compressi recent advances in wearable sensors for health mon query aware determinization of uncertain prt embedded micro-heaters for optimum temperature privacy preservingdelegatedaccesscontrolinpubliccl privacy preserving public auditing for secure clou passivity and stability of human passive and semi-passive wireless temperature and optimum power allocation in sensor networks for ac optimization-based motion planning in joint space optimal stochastic location updates in mobile ad h on quality of monitoring for multi channel wireles on quality of monitoring for multi occlusion-based cooperative transport with a swarm nonparametric technique based high network assisted mobile computing with optimal upl negative information for occlusion reasoning in dy minimum bandwidth reservations for periodic stream local broadcast algorithms in ad hoc networks intra-vehicle networks: a review hop by-hoproutinginwirelessmeshnetworkswithbandwid homomorphic authentication with random masking tec hierarchical and networked vehicle surveillance in dot net cooperative caching for efficient data access in d cooperation versus multiplexing multicast scheduli cognitive cooperative random access for multicast certificateless remote anonymous authentication behavioral malware detection in delay tolerant net behavior rule specification-based intrusion detect attribute based encryption with privacy preserving analyzing critical decision-based processes an ontology-based hybrid approach to activity a secure client side deduplication scheme in cloud a scientometric analysis of cloud computing litera tradeoff between reliability and security in multi signature searching in a networked collection of f security evaluation of pattern classifiers under a secure mining-of-association-rules-in-horizontally secure ordered bucketization sane-semantic-aware-namespacein-ultra-large-scale- product aspect ranking and its applications peer-assisted-vod-systems-an-efficientmodeling-fra cross-layer approach for minimizing routing disrup cooperative-key-agreement-for-wireless-networking a system for denial-of-service attack detection ba ieeeproject in multimedia free download project abstract. ieeeproject in cloud computing ieee project document. ieee project cloud computing optimal scheduling of shifts and breaks using empl web image re-ranking using query-specific semantic uniform embedding for efficient jpeg steganography traffic pattern-based content leakage detection fo sos: a distributed mobile q&a system based on soci secure deduplication-with-efficient-and-reliable-c secure and efficient data transmission for cluster quality assessment of stereoscopic 3 d image compr qos aware geographic opportunistic routing in wire privacy preserving multi-keyword ranked search ove panda public auditing for shared data with efficie online payment system using steganography and visu on false data injection attacks against power syst modeling of speaking rate influences on mandarin s model-based edge detector for spectral imagery usi locaward a security and privacy aware location bas locaward: a security and privacy aware location-ba link quality aware code dissemination in wireless keyword query routing improved evolutionary algorithm design for the pro identity based distributed provable data possessio governing software process improvements in globall exploiting service similarity for privacy in locat enabling trustworthy service evaluation in service efficient instant-fuzzy search with proximity rank designing truthful spectrum double auctions with d2p distributed dynamic pricing policy in smart gr ieee project cloud computing. public auditing with fair arbitration for cloud da dynamic and public auditing fair arbitration for cloud data dynamic and public auditing with fair arbitration auditing with verifiable outsourcing of key update verifiable outsourcing of key updates enabling cloud storage auditing enabling cloud storage auditing with verifiable ou access control for web-based cloud computing servi web-based cloud computing services fine grained two-factor access control for web-bas fine grained two-factor access control flexible and fine grained flexible and fine grained attribute-based data sto fine grained attribute-based data storage in cloud attribute-based data storage in cloud computing follow me cloud when cloud services cloud services follow mobile users follow me cloud when cloud services follow mobile search on encrypted spatial data geometric range search on encrypted spatial data p geometric range search on encrypted spatial data d geometric range search on encrypted geometric range search on encrypted spatial data identity based encryption identity based encryption with cloud revocation au encryption with cloud revocation authority and its distributed dynamic adaptation of contention windo top down xml keyword query processing pdf top down xml keyword query processing doc parallel mining of frequent sequences probabilistic static load balancing of parallel mi probabilistic static load balancing load balancing of parallel mining of frequent sequ nearest keyword set search in multi dimensional da nearest keyword set search set search in multi dimensional datasets efficient algorithms for mining top k high utility recommendation with user-item subgroup analysis domain sensitive recommendation with user-item sub clustering data streams based on shared density be shared density between micro clusters clustering data streams based on shared density data streams based on shared density between micro booster in high dimensional data classification do high dimensional data classification booster in high dimensional data classification pd booster in high dimensional data classification automatically mining facets for queries from their automatically mining facets a novel recommendation model regularized a novel recommendation model regularized with user model regularized with user trust and item ratings willingness maximization for social activity plann cloud revocation authority and its applications discriminative based hashing method mphil thesis thesis titles 2016 2016 thesis titles recent thesis titles mphil thesis titles 2016 ieee dot project titles ns2 project titles dot net project titles 2016 android project projects php project titles java projects title 2016 ieee projects list for be btech final year pr list of 2016 ieee paper projects 2016 projects titles 2016 application projects titles latest ieee projects for cse 2016 2016 ieee java project titles android project titles 2016 cloudsim projects titles 2016 bigdata project titles a scalable and reliable matching service for conte abstract wireless biosensing using silver wearable sensors for human activity monitoring throughput and delay analysis for converge cast wi space-efficient verifiable secret sharing using po data uploading and remote data integrity checking remote data integrity checking in public cloud model driven development patterns model driven development patterns for mobile servi development patterns for mobile services in cloud mobile services in cloud of things fine-grained owner-enforced search authorization attribute based keyword search with fine-grained o public infrastructure clouds user security guarantees in public infrastructure providing user security guarantees providing user security guarantees in public infra large-scale storage systems approximate methodology for large-scale storage sy real time semantic search using approximate method secure data sharing in cloud computing using revoc revocable storage identity-based encryption cloud computing using revocable storage identity-b tmacs a robust and verifiable threshold multi auth video stream analysis in clouds an object detectio video stream analysis fine-grained owner-enforced search authorization 2 adaptive medium access control for internet of-thi resisting blackhole attack resisting blackhole attacks on manets doc study on willingness maximization for social activ space air-ground big-data 2016 ieee android proje phase without generating candidates mining partially ordered sequential rules common t monitoring approach vehicle s using gps and catagrizing driver using datamining multi objective tasks scheduling algorithm for cloud computing throughput optimizat network level performance enhancement in wireless nanosensor networks throug novel common vehicle information model (cvim) for future automotive veh on the security of a public auditing mechanism for shared cloud data service on the security of dataaccess control for multiaut online data deduplication memory big-data analytic systems online learning for offloading caa cloud security flow control upcoding fraud monetary domains incremental semi supervised clustering ensemble for high dimensional data clus lightweight and privacy preserving delegatable proofs of storage data dynamics in cloud storage (2) linked semantic model for information resource ser logic bug detection and localization using symboli map reduce programming model for parallel k mediod maximizing p2 p file access availability in mobile ad hoc networks though repl mining high utility patterns in one autoscaling in energy harvesting ieee best project center ieee project isp ai new project titles social network matlab ieee java projects ieee matlab projects information technology information security ieee cloud networking projects ai networking ieee cloud computing project ieee cloud ieee latest projects ieee latest project title 2022 2022 titles for machine learni optimization of tasks in cloud computing based on min-min and priority (2) outlier detection techniques for network attacks pa wi parallelweighted itemset mining by means of mapreduce performance analysis gorithms for dynamic workflow applications ieee project center in vellore ieee project iot project title for iot 2022 ieee project for python ieee project best in vellore project title for 2022 ieee project aritifical intell ai 2022 project title big data project tilte in 2022 an improved vertical algorithm frequent itemset mining from uncertain database a distributed key management cooperative message authentication a large scale hidden semi detection on user browsing behaviors a self tuning failure detection computing service cda a cloud dependability analysis characterizing system dependability collaboration based cloud computing management framework credit card fraud detection hidden markov model enhanced security for online exams using group cryptography optimal file coded servers an approximate search framework for big data gap finder security information unstructured text finding inconsistency an anomalous behavior detection model in cloud com cyberattack short term memory network hierarchical long an authenticated trust and reputation calculation gradient illumination description image forgery detecting errors in big sensor data on cloud framework of a national level electronic cloud computing applications expressive efficient and revocable data access control for multi author flexible container based computing platform on clo focusing on a probability element parameter selection of message importance measure in big data gene selection sample classification using k nearest neighbor and get to the point summarization with pointer genera health data integration secured record linkage healthcare holistic perspective honeywords health record system hybrid intrusion detection (hids) using fuzzy logic jamming aware traffic allocation multiple-path routing using portfolio selection next generation computing next generation privacy preserving multi-keyword over encrypted cloud data privacy preserving public torage security in cloud rethinking vehicular communications vanet with cloud computing attribute based encryption computing using attribute based encryption star a proposed architecture bitcoin transactions ensemble stacking model machine learning (ml) payments unlawful activities origin-destination passenger flow prediction metro systems adaptive feature fusion networks affn adaptive feature od flows agricultural text classificati dynamic fusion newborn babies cardiac intensive care unit using statistical model early detection machine learning approach cmlm ieee project 2023 heartbleed-like attacks iot frameworks measurement approach 2023 ai projects cyber security internet of things (iot). https sites a new framework fraud detection multiple features temporal segment transformers behavior recognition campus abnormal abnormal action detecting and mitigating botnet attacks software-defined networking sdn distributed denial of service ddos dl projects ensemble prediction fraudulent cryptocurrency lstm key semantic features convolution neural network bi-lstm phenotypic numerical type ieee projects 2023 cross-silo federated learning applications false data injection attack detection in smart grid privacy-enhancing computation performance fdia trusted third-party cnns programming group machine-learned iiot network block chain lraning blackchain iiot iiot networks block hunter federated learning block hunter federated blockchain block chain certificate blockchain transparency blockchain machine learning blockchain with ai blockchain-based certificate blockchain-based cloud data integrity verification scheme with high efficiency password cracking big data titles 2022 networking project 2022 ieee networking titles 2022 low cost projects ai project titles 2022 new titles ieee project ieee project ai 2022 ieee new titles network security title 2022 a two-fold machine 2022 new ieee titles matlap project block hunter federated learn cyber threat hunting blockchain-based iiot networks blockchain-based cloud data 2023 ieee project machine learning project 2023 ai titles 2023 ieee projects python ieee projects ai projects new training firearms monitoring faster region-based cyber-hate detection multi-stage machine learning fuzzy approach recurrent neural networks ‘‘critical thinking’’ optimization techniques genetic algorithms integrity verification scheme composite behavioral modelin online social networks identity theft detection theft detection in online soci traceable and revocable cipher ciphertech policy attribute query processing with strong privacy protection fo encryption scheme machine learning & ai projects data science 2023 new application titles 2023 data science titles 20023 photo helper photographing guidance deep feature retrieval cardiac arrest brain tumor patterns svd and shear let transform pet and mri brain image fusion wavelet transform structural information adjustment video steganography spatial and iwt domai image denoising algorithms animal behavior analysis image transmission technique via olor transformations watermarking scheme cb cr space. a big data clustering algorithm mitigating the risk of customer image dehazing algorithm cognitive multiple access channels interference cancellation per antenna constant envelope large multi-user mimo systems sharp spectrum probing in cognitive radio spectrum sensing of interleaved cognitive radio networks multicell multiuser mimo uplink very large antenna arrays finite dimensional channel xor encryption depth analysis brain segmentation detect tumor region image processing techniques dark channel prior collaboration framework color iris recognition dct vs. hsv color spaces a hybrid cloud approach secure authorized deduplication neurological diagnostics diagnostics comparison of pixel level image fusion methods improvement based haze removal underwater images using fusion technique a micro video recommendation system based on big data scalable attribute-based based access control scheme flexible delegation a compendium for prediction success of a movie based upon different factors feedforward network invariant face recognition a cypher query based sql data mining on protein datasets using neo4j graph database dimensional neighborhood embedding for face recognition a data mining framework analyze road accident data brain tumor segmentation hybrid clustering technique a framework for sentiment analysis opinion mining of hotel reviews cognitive service access privileges for cloud storage spin with cluster wireless mobile sensors linear wireless sensor networks calorie estimation based on raspberry pi. fruit recognition &amp portable assistive device for blind dumb and deaf people using ai. automated vision based surveillance automated vision based efficient face detection identification in networked video surveillance systems indoor intrusion detection filtering system using raspberry pi io t based smart energy project title 2015 best project center in vellorei global energy balance. hierarchical adaptive trust establishment vehicular networks implementing energy efficient technique gray hole and black-hole attacks in wireless senso power aware olsr leveraging sdn wsn an analysis new hierarchical stable election protocol opportunistic routing algorithm qos aware geographic opportunistic random walk based approach section of node density cluster in spin for data secure spin with cluster for data raspberry pi and power management using ai. task assignment algorithm for cognitive radio netw low complexity cyclostationary spectrum interference avoidance in femto-cells lte-a based networks subcarrier collisions random access in ofdm-based cognitive radio networ mimo sc fdma systems bandwidth reservation coexistence strategy i opportunistic spectrum access environments ber analysis in wavelet lte uplink transmission chaos communication mimo technique energy efficiency optimization mimo system with spectral efficiency constraint smart farmland for crop prevention animal intrusion detection using cnn object tracking with raspberry pi oriented gradients (hog) vector machine (svm). auto image description converting to speech and text for visually impaire monitoring system using visual behavior and machin leaf disease detection using knn deep neural network. real time vehicle detection tracking and counting raspberry pi. smart cloud based parking system machine learning for smart cities cooperative spectrum sensing scheme video analytics for traffic monitoring defogging method for traffic monitoring videos bayesian networks data integration foreign keys cleaning uncertain data diverse accuracy rates combining network tax risk assessment dag privacy-preserving algorithm decision mechanism cloud network text clustering deep feature robust and fast detection sliding windows robust watermarking by svd wavelet column transform of host image simultaneous feature and dictionary image set based face recognition study and analysis of robust watermarking technique using matlab subsense a universal change detection ocal adaptive sensitivity technique for qrs complex using particle swarm towards practical self embedding jpeg-compressed digital tumor detection in brain mri image k means and fuzzy c-means clustering algorithm explanation intermediate loss ct and mri scans detecting errors in big sensor data on cloud multiple data-hiders secret sharing encrypted images reversible data hiding access control by signature security framework achieving efficient and privacy preserving cross-domain big data deduplication in cloud adaptive encrypted cloud storage model new capacity private information discretization heuristics high accuracy huge noise noise reduction enriching data data imputation under similarity rule a study on secure intrusion detection system in wireless mane ts to increase the perform 3 d iris scanner single image neural networks a survey on political analysis in twitter. 3d super-resolution retrieval scheme crowdsourcing in big data environment revocable storage identity secure data sharing fire detection orest fire surveillance a secure client side deduplication scheme in cloud storage environments flower classification using neural network based image processing attribute-based cloud server green cloud computing dynamic resource symbiotic organism algorithm in cloud computing ergodic sum rate maximization for fading cloud colonography medical testbed a profile based big data agricultural context improvement based haze images using fusion technique a public opinion keyword vector for social sentiment analysis research a queuing method for adaptive support vector machine cloud intrusion detection auto-encoder efficient protection a reliable task assignment strategy for spatial mobile edge-cloud computing networks infant cry analysis detection k nearest correlated neighbor classification for i recognition using feature fusion lossless image compression technique combination methods lung cancer detection using digital image processing on ct scan shearlet transform multifocus image fusion nsct and focused area detection optimizing image segmentation based k means clustering prosody modification of speech tutoring applications retinal disease screenin efficient computing resource secure cloud storage regular language survey on multi label data stream fusion of pan images ms preserving spectral quality a secure group key management scheme for sensor networks unified framework gait recognition image and gabor wavelet human activity recognition using neural networks image quality improvement omputed tomography images local binary patterns
Ver mais