2016

 

Recent Submissions

  • SINGH, SHUBHAM (Parul University, 2016-10-01)
    Data Reduction in the field of process becomes a challenging issue in the data mining. Everyone wants that there data must be processed quickly in order to get the result. There are various methods that can allow the large ...
  • TAMBOLI, GRISHMA P. (Parul University, 2016-05-01)
    The Technology World, Mobile Devices such as Smart phones, Tablets are becoming important part of the Human life. They are facing some challenges in their resource such as battery life, bandwidth and storage. They also are ...
  • SINGH, SONAM RAMPUKAR (Parul University, 2016-05-01)
    Delay/Disruption Tolerant Network is designed for intermittently connected network where network partitions are frequent and very high delays are associated with some links. Due to lack of consistent connectivity, DTN ...
  • Ray, Krishna J. (Parul University, 2016-05-01)
    Privacy preserving is most popular study for the research field. Privacy means gives the protection to the private information at preserving time. In Market place, discovery of frequent item sets using association rules ...
  • PRAJAPATI, VISHRUTI N (Parul University, 2016-05-01)
    Web Service Composition will help to combine multiple services for creating the new valuable services. As, Many research has been done for automatic web service composition, but still, to create good reliable and scalable ...
  • Kothadiya, Deep (Parul University, 2016-10-01)
    Over the current thread, mobile devices are become more popular among people because of they offering the primary voice communication of our routing life, but mobile devices are still suffering from limited energy supply. ...
  • Patel, Kavisha (Parul University, 2016-05-01)
    Data mining is the pulling out of veiled data from large database. The main problem that rises in any bulk group of data is that of secrecy of the data. Privacy-preserving in data mining (PPDM) is the part of data mining ...
  • Patel, Ruchita (Parul University, 2016-05-01)
    The Cloud Computing is a most of the leading technology that provides data storage, pool of resources and online admittance to processor services. In the research area, the task scheduling in the cloud computing becomes ...
  • DESAI, HARDI (Parul University, 2016-05-01)
    Gesture recognition is an interesting research area in the field of computer vision. Gesture recognition allow human user to interact non-verbally using different body parts like hand, face, finger, palm etc. The important ...
  • TAMBOLI, GRISHMA (Parul University, 2016-05-01)
    The Technology World, Mobile Devices such as Smart phones, Tablets are becoming important part of the Human life. They are facing some challenges in their resource such as battery life, bandwidth and storage. They also are ...
  • Patel, Utpal Bhupendrabhai (Parul University, 2016-05-01)
    Secret sharing is an important means to achieve confidentiality and data privacy. Secret sharing scheme was first introduced by Shamir in 1979. Secret sharing deals with splitting a secret information with various players. ...
  • Kumar, Swarndeep Saket Jayant (Parul University, 2016-05-01)
    Amongst various kinds of clustering techniques, partition based clustering are of immense importance and they are widely used in the modern days large data analysis. The K-Means and K-Mediod Algorithms in their existing ...
  • RANA, ISHITA (Parul University, 2016-05-01)
    Frequent Item set mining is widely used in market basket analysis, web link analysis, click stream analysis and drug design. The major concern of these industries is faster processing of a very large amount of data. Frequent ...
  • LAD, DIVYA N. (Parul University, 2016-05-01)
    The video established object tracking and detection contracts by non-stationary image stream that shift over time. Strong and real-time moving objects detection are difficult problem in computer vision research area. ...
  • THACKER, NIDHI (Parul University, 2016-05-01)
    Single sign-on means that users only need to use one set of authentication credentials to authenticate to several service providers. Single Sign-On (SSO) Mechanism is the most popular authentication mechanism and is used ...
  • Patel, Roshni (Parul University, 2016-05-01)
    Internet of Things (IoTs) offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoT, serious concerns are raised over access of personal information pertaining to ...
  • UPASANI, NIRZARI (Parul University, 2016-05-01)
    In Mobile Ad-Hoc Networks (MANET), the challenging problem is the designing of the selfadapted, self-organized and self-configured routing protocols. Ant Colony Routing (ACR) is the member of routing protocols which are ...
  • PATEL, PRITI (Parul University, 2016-05-01)
    A mobile Ad–hoc network (MANET) is a dynamic wireless network. It is infrastructure less i.e. topology changes dynamically. For evaluating Quality of Services (QoS) of MANET, we need to consider throughput, end to end ...
  • KHER, JAYVIRSINH (Parul University, 2016-05-01)
    Attribute Based Encryption was first introduced by Amit Sahai and Brent Waters. It was proposed to solve complex access control mechanism over encrypted data. In Attribute Based encryption the key and ciphertext deal ...
  • Shah, Shreya (Parul University, 2016-05-01)
    A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET doesn’t having any access point. Due to high availability of wireless ...

View more