ICETEAS 2018: Volume Information

Proceedings on International Conference on Emerging Trends in Expert Applications & Security (2018)

16 articles115 pagesPublished: October 23, 2018

Papers

Darshanaben Dipakkumar Pandya and Sanjay Gaur
1-6
Arihant Kumar Jain, Richa Sharma and Anima Sharma
7-14
Sarvesh Kumar Kumar, Bersha Kumari and Harshita Chawla
15-21
Geerija Lavania, Preeti Sharma and Richa Upadhyay
22-29
Congmiao Li, Dipti Srinivasan and Thomas Reindl
30-36
Arpit Porwal, Garima Ojha and Geet Kalani
37-42
Chhavi Saxena, Vivek Upadhyaya, Hemant Kumar Gupta and Avinash Sharma
43-50
Chhavi Saxena, Vivek Upadhyaya, Hemant Kumar Gupta and Avinash Sharma
51-58
Shubhra Saxena, Navneet Sharma, Akash Saxena and Jayanti Goyal
59-66
Avinash Sharma, Nishi Gupta and Sanjeev Rana
67-73
Bhavna Sharma and Priyanka Mitra
74-80
Manish Sharma and Shilpi Sharma
81-88
Manu Sharma
89-94
Alisha Sikri, Surjeet Dalal, Netra Pal Singh and Neeraj Dahiya
95-102
Shashi Kant Singh, Seema Yadav, Ankur Raj and Priya Gupta
103-108
Devendra Kumar Somwanshi, Indu Chhipa and Rohita Gupta
109-115

Keyphrases

AES Algorithm, anomalous Values, Application, attribute, Baseline Noises, Cloud Computing3, Clustering, Computed tomography scan, computer vision, cosine similarity, Cyber Security, Data Mining2, Decoy system, different languages, Digital Wateramrking, e-commerce, e-Governance, ECG, Edge Device, Electrocardiogram, face detection, FIR filters, Fog Computing, Hematomas, Honey bee behaviour algorithm, IIR filters, Internet of Things2, Least Mean Square, Least Significant Bit, Li-Fi, Load Balancing, LSB, malware detection, MPTCP, MSE2, NC, NLMS, noise, power conservation, PSNR2, Quartiles., radio wave, Raspberry Pi, rectangle fit algorithm, SCTP, Security Issues, Smart Grid, Spatial domain, Steganography, Stemming, storage, Support Vector Machine (SVM), TCP, Telegram, TF-IDF, Tokenization, UWSN (Underwater Wireless Sensor Network), Virtual Machine, VLC, Web Mining.