Browsing 2016 by Title

Sort by: Order: Results:

  • PATEL, PRITI (Parul University, 2016-05-01)
    A mobile Ad–hoc network (MANET) is a dynamic wireless network. It is infrastructure less i.e. topology changes dynamically. For evaluating Quality of Services (QoS) of MANET, we need to consider throughput, end to end ...
  • Ilasariya, Anita (Parul University, 2016-05-01)
    Cloud computing provides several applications and resources to users in pay-as-yougo manner and saves huge capital investment. Many methods have been investigated to withstand attackers like data anonymization, ...
  • PATEL, VARSHA (Parul University, 2016-05-01)
    Now a day’s e-commerce widely uses recommendation system to recommend the customer by mining the historical data of purchases made by its customers. The recommendation system tries to analyze user and item tends ...
  • SINGH, SONAM RAMPUKAR (Parul University, 2016-05-01)
    Delay/Disruption Tolerant Network is designed for intermittently connected network where network partitions are frequent and very high delays are associated with some links. Due to lack of consistent connectivity, DTN ...
  • KHER, JAYVIRSINH (Parul University, 2016-05-01)
    Attribute Based Encryption was first introduced by Amit Sahai and Brent Waters. It was proposed to solve complex access control mechanism over encrypted data. In Attribute Based encryption the key and ciphertext deal ...
  • PATEL, NIDHI (Parul University, 2016-05-01)
    A Mobile ad hoc network (MANET) sharing a wireless channel among collection of mobile nodes without any centralized control. Due to dynamic topology of network set a secure path for data transfer from one node to another ...
  • Patel, Utpal Bhupendrabhai (Parul University, 2016-05-01)
    Secret sharing is an important means to achieve confidentiality and data privacy. Secret sharing scheme was first introduced by Shamir in 1979. Secret sharing deals with splitting a secret information with various players. ...
  • THACKER, NIDHI (Parul University, 2016-05-01)
    Single sign-on means that users only need to use one set of authentication credentials to authenticate to several service providers. Single Sign-On (SSO) Mechanism is the most popular authentication mechanism and is used ...
  • PATEL, KRUTI (Parul University, 2016-05-01)
    Object Tracking is an important research field in computer vision. Tracking of any object can be defined as the problem of determining the trajectory of an object in the image plane as it moves around a scene. Tracking ...

Search DSpace


Advanced Search

Browse

My Account