Browsing 2016 by Title

Sort by: Order: Results:

  • Patel, Kavisha (Parul University, 2016-05-01)
    Data mining is the pulling out of veiled data from large database. The main problem that rises in any bulk group of data is that of secrecy of the data. Privacy-preserving in data mining (PPDM) is the part of data mining ...
  • RANA, ISHITA (Parul University, 2016-05-01)
    Frequent Item set mining is widely used in market basket analysis, web link analysis, click stream analysis and drug design. The major concern of these industries is faster processing of a very large amount of data. Frequent ...
  • DESAI, HARDI (Parul University, 2016-05-01)
    Gesture recognition is an interesting research area in the field of computer vision. Gesture recognition allow human user to interact non-verbally using different body parts like hand, face, finger, palm etc. The important ...
  • Bhavsar, Vyoma (Parul University, 2016-05-01)
    Diabetes is one among the major disease that affect the human health. The glucose testing methods analysis the glucose concentration present in the blood and it is done by traditional methods. Chemical analysis of blood ...
  • SINGH, SHUBHAM (Parul University, 2016-10-01)
    Data Reduction in the field of process becomes a challenging issue in the data mining. Everyone wants that there data must be processed quickly in order to get the result. There are various methods that can allow the large ...
  • Patel, Roshni (Parul University, 2016-05-01)
    Internet of Things (IoTs) offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoT, serious concerns are raised over access of personal information pertaining to ...
  • GANDHI, CHANDANI (Parul University, 2016-05-01)
    A major challenge for object tracking system is to detect object due to occlusion. Here we describe method to address partial occlusions for human detection in still images. For that random subspace method (RSM) is chosen ...
  • Kothadiya, Deep (Parul University, 2016-10-01)
    Over the current thread, mobile devices are become more popular among people because of they offering the primary voice communication of our routing life, but mobile devices are still suffering from limited energy supply. ...
  • PATEL, PRITI (Parul University, 2016-05-01)
    A mobile Ad–hoc network (MANET) is a dynamic wireless network. It is infrastructure less i.e. topology changes dynamically. For evaluating Quality of Services (QoS) of MANET, we need to consider throughput, end to end ...
  • Ilasariya, Anita (Parul University, 2016-05-01)
    Cloud computing provides several applications and resources to users in pay-as-yougo manner and saves huge capital investment. Many methods have been investigated to withstand attackers like data anonymization, ...
  • PATEL, VARSHA (Parul University, 2016-05-01)
    Now a day’s e-commerce widely uses recommendation system to recommend the customer by mining the historical data of purchases made by its customers. The recommendation system tries to analyze user and item tends ...
  • SINGH, SONAM RAMPUKAR (Parul University, 2016-05-01)
    Delay/Disruption Tolerant Network is designed for intermittently connected network where network partitions are frequent and very high delays are associated with some links. Due to lack of consistent connectivity, DTN ...
  • KHER, JAYVIRSINH (Parul University, 2016-05-01)
    Attribute Based Encryption was first introduced by Amit Sahai and Brent Waters. It was proposed to solve complex access control mechanism over encrypted data. In Attribute Based encryption the key and ciphertext deal ...
  • PATEL, NIDHI (Parul University, 2016-05-01)
    A Mobile ad hoc network (MANET) sharing a wireless channel among collection of mobile nodes without any centralized control. Due to dynamic topology of network set a secure path for data transfer from one node to another ...
  • Patel, Utpal Bhupendrabhai (Parul University, 2016-05-01)
    Secret sharing is an important means to achieve confidentiality and data privacy. Secret sharing scheme was first introduced by Shamir in 1979. Secret sharing deals with splitting a secret information with various players. ...
  • THACKER, NIDHI (Parul University, 2016-05-01)
    Single sign-on means that users only need to use one set of authentication credentials to authenticate to several service providers. Single Sign-On (SSO) Mechanism is the most popular authentication mechanism and is used ...
  • PATEL, KRUTI (Parul University, 2016-05-01)
    Object Tracking is an important research field in computer vision. Tracking of any object can be defined as the problem of determining the trajectory of an object in the image plane as it moves around a scene. Tracking ...

Search DSpace


Advanced Search

Browse

My Account