Browsing 2016 by Issue Date

Sort by: Order: Results:

  • Shah, Shreya (Parul University, 2016-05-01)
    A Mobile Ad-Hoc Network (MANET) is defined as an arrangement of wireless mobile nodes which creates a temporary network for the communication. MANET doesn’t having any access point. Due to high availability of wireless ...
  • PATEL, NIDHI (Parul University, 2016-05-01)
    A Mobile ad hoc network (MANET) sharing a wireless channel among collection of mobile nodes without any centralized control. Due to dynamic topology of network set a secure path for data transfer from one node to another ...
  • THACKER, NIDHI (Parul University, 2016-05-01)
    Single sign-on means that users only need to use one set of authentication credentials to authenticate to several service providers. Single Sign-On (SSO) Mechanism is the most popular authentication mechanism and is used ...
  • PATEL, PRITI (Parul University, 2016-05-01)
    A mobile Ad–hoc network (MANET) is a dynamic wireless network. It is infrastructure less i.e. topology changes dynamically. For evaluating Quality of Services (QoS) of MANET, we need to consider throughput, end to end ...
  • Patel, Roshni (Parul University, 2016-05-01)
    Internet of Things (IoTs) offers capabilities to identify and connect worldwide physical objects into a unified system. As a part of IoT, serious concerns are raised over access of personal information pertaining to ...
  • UPASANI, NIRZARI (Parul University, 2016-05-01)
    In Mobile Ad-Hoc Networks (MANET), the challenging problem is the designing of the selfadapted, self-organized and self-configured routing protocols. Ant Colony Routing (ACR) is the member of routing protocols which are ...
  • KHER, JAYVIRSINH (Parul University, 2016-05-01)
    Attribute Based Encryption was first introduced by Amit Sahai and Brent Waters. It was proposed to solve complex access control mechanism over encrypted data. In Attribute Based encryption the key and ciphertext deal ...
  • Patel, Kinjal (Parul University, 2016-05-01)
    “Wireless sensor networks are mostly used in the transmission of data, to monitor physical or environmental conditions. In the, Wireless sensor networks sensor nodes will have to depends on a limited supply of energy. ...
  • GANDHI, CHANDANI (Parul University, 2016-05-01)
    A major challenge for object tracking system is to detect object due to occlusion. Here we describe method to address partial occlusions for human detection in still images. For that random subspace method (RSM) is chosen ...
  • Bhavsar, Vyoma (Parul University, 2016-05-01)
    Diabetes is one among the major disease that affect the human health. The glucose testing methods analysis the glucose concentration present in the blood and it is done by traditional methods. Chemical analysis of blood ...
  • Ilasariya, Anita (Parul University, 2016-05-01)
    Cloud computing provides several applications and resources to users in pay-as-yougo manner and saves huge capital investment. Many methods have been investigated to withstand attackers like data anonymization, ...
  • PATEL, KRUTI (Parul University, 2016-05-01)
    Object Tracking is an important research field in computer vision. Tracking of any object can be defined as the problem of determining the trajectory of an object in the image plane as it moves around a scene. Tracking ...
  • PATEL, VARSHA (Parul University, 2016-05-01)
    Now a day’s e-commerce widely uses recommendation system to recommend the customer by mining the historical data of purchases made by its customers. The recommendation system tries to analyze user and item tends ...
  • PARIKH, AANAL (Parul University, 2016-05-01)
    Delay Tolerant Networks are the opportunistic networks in which there is no direct path available from source node to the destination node. In the existing systems we have implemented the Spray and Wait protocol which ...
  • SHETH, PALAK (Parul University, 2016-05-01)
    Gesture Recognition is an important research field in computer vision. For recognizing any object, first we have to extract the features from an image. Gesture Recognition can be done for various features like face, hand, ...
  • Kumar, Swarndeep Saket Jayant (Parul University, 2016-05-01)
    Amongst various kinds of clustering techniques, partition based clustering are of immense importance and they are widely used in the modern days large data analysis. The K-Means and K-Mediod Algorithms in their existing ...
  • RANA, ISHITA (Parul University, 2016-05-01)
    Frequent Item set mining is widely used in market basket analysis, web link analysis, click stream analysis and drug design. The major concern of these industries is faster processing of a very large amount of data. Frequent ...
  • Patel, Utpal Bhupendrabhai (Parul University, 2016-05-01)
    Secret sharing is an important means to achieve confidentiality and data privacy. Secret sharing scheme was first introduced by Shamir in 1979. Secret sharing deals with splitting a secret information with various players. ...
  • LAD, DIVYA N. (Parul University, 2016-05-01)
    The video established object tracking and detection contracts by non-stationary image stream that shift over time. Strong and real-time moving objects detection are difficult problem in computer vision research area. ...
  • SINGH, SONAM RAMPUKAR (Parul University, 2016-05-01)
    Delay/Disruption Tolerant Network is designed for intermittently connected network where network partitions are frequent and very high delays are associated with some links. Due to lack of consistent connectivity, DTN ...

Search DSpace


Advanced Search

Browse

My Account