Parul University Digital Repository

Computer Science and Engineering

Computer Science and Engineering

 

Collections in this community

Recent Submissions

  • SINGH, SHUBHAM (Parul University, 2016-10-01)
    Data Reduction in the field of process becomes a challenging issue in the data mining. Everyone wants that there data must be processed quickly in order to get the result. There are various methods that can allow the large ...
  • TAMBOLI, GRISHMA P. (Parul University, 2016-05-01)
    The Technology World, Mobile Devices such as Smart phones, Tablets are becoming important part of the Human life. They are facing some challenges in their resource such as battery life, bandwidth and storage. They also are ...
  • SINGH, SONAM RAMPUKAR (Parul University, 2016-05-01)
    Delay/Disruption Tolerant Network is designed for intermittently connected network where network partitions are frequent and very high delays are associated with some links. Due to lack of consistent connectivity, DTN ...
  • Ray, Krishna J. (Parul University, 2016-05-01)
    Privacy preserving is most popular study for the research field. Privacy means gives the protection to the private information at preserving time. In Market place, discovery of frequent item sets using association rules ...
  • PRAJAPATI, VISHRUTI N (Parul University, 2016-05-01)
    Web Service Composition will help to combine multiple services for creating the new valuable services. As, Many research has been done for automatic web service composition, but still, to create good reliable and scalable ...
  • Kothadiya, Deep (Parul University, 2016-10-01)
    Over the current thread, mobile devices are become more popular among people because of they offering the primary voice communication of our routing life, but mobile devices are still suffering from limited energy supply. ...
  • Patel, Kavisha (Parul University, 2016-05-01)
    Data mining is the pulling out of veiled data from large database. The main problem that rises in any bulk group of data is that of secrecy of the data. Privacy-preserving in data mining (PPDM) is the part of data mining ...
  • Patel, Ruchita (Parul University, 2016-05-01)
    The Cloud Computing is a most of the leading technology that provides data storage, pool of resources and online admittance to processor services. In the research area, the task scheduling in the cloud computing becomes ...
  • PANCHAL, JIGNASHA B. (Parul University, 2015-05-01)
    Hand Gesture Recognition play vital role for developing human computer interaction and sign language recognition. Sign language recognition is used for deaf and dump people. Existing system based on vision based static ...
  • Agrawal, Ritu Ramkumar (Parul University, 2013-05-01)
    The data classification is the main analyzing method for the information extracting. Classification in data mining has gained a lot of importance in literature and it has a great deal of application areas from medicine ...
  • DESAI, HARDI (Parul University, 2016-05-01)
    Gesture recognition is an interesting research area in the field of computer vision. Gesture recognition allow human user to interact non-verbally using different body parts like hand, face, finger, palm etc. The important ...
  • TAMBOLI, GRISHMA (Parul University, 2016-05-01)
    The Technology World, Mobile Devices such as Smart phones, Tablets are becoming important part of the Human life. They are facing some challenges in their resource such as battery life, bandwidth and storage. They also are ...
  • Patel, Utpal Bhupendrabhai (Parul University, 2016-05-01)
    Secret sharing is an important means to achieve confidentiality and data privacy. Secret sharing scheme was first introduced by Shamir in 1979. Secret sharing deals with splitting a secret information with various players. ...
  • Kumar, Swarndeep Saket Jayant (Parul University, 2016-05-01)
    Amongst various kinds of clustering techniques, partition based clustering are of immense importance and they are widely used in the modern days large data analysis. The K-Means and K-Mediod Algorithms in their existing ...
  • RANA, ISHITA (Parul University, 2016-05-01)
    Frequent Item set mining is widely used in market basket analysis, web link analysis, click stream analysis and drug design. The major concern of these industries is faster processing of a very large amount of data. Frequent ...
  • LAD, DIVYA N. (Parul University, 2016-05-01)
    The video established object tracking and detection contracts by non-stationary image stream that shift over time. Strong and real-time moving objects detection are difficult problem in computer vision research area. ...
  • THACKER, NIDHI (Parul University, 2016-05-01)
    Single sign-on means that users only need to use one set of authentication credentials to authenticate to several service providers. Single Sign-On (SSO) Mechanism is the most popular authentication mechanism and is used ...
  • Patel, Roshni (Parul University, 2016-05-01)
    Internet of Things (IoTs) offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoT, serious concerns are raised over access of personal information pertaining to ...
  • UPASANI, NIRZARI (Parul University, 2016-05-01)
    In Mobile Ad-Hoc Networks (MANET), the challenging problem is the designing of the selfadapted, self-organized and self-configured routing protocols. Ant Colony Routing (ACR) is the member of routing protocols which are ...
  • PATEL, PRITI (Parul University, 2016-05-01)
    A mobile Ad–hoc network (MANET) is a dynamic wireless network. It is infrastructure less i.e. topology changes dynamically. For evaluating Quality of Services (QoS) of MANET, we need to consider throughput, end to end ...

View more