01. Faculty of Engineering and Technology: Recent submissions

  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (International Journal of Electronics Engineering Research., 2017)
    Our objective is to ensure high level of security in public places using static PTZ camera and robust detection and tracking algorithm for video sequences and also to generate the multi model background subtraction ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (International Journal of Computational Intelligence Research, 2017)
    Machine perception is an essential feature for an autonomous system. For the computer vision researcher perception of scene is an important aspect. Smart surveillance system can be able to sense the environments and ...
  • Raviya, Kapil; Vyas, Ved; Kothari, Ashish (I.J. Image, Graphics and Signal Processing,Modern Education and Computer Science Press(MECS), 2016-10)
    The main target of stereo matching algorithms is to find out the three dimensional (3D) distance, or depth of objects from a stereo pair of images. Depth information can be derived from images using disparity map ...
  • Kotecha, M.; Kothari, A. (International Journal of Advance Research in Computer Science and Management Studies, 2015-10)
    Image compression finds its application in those systems which require considerable reduction in storage space and bandwidth required for transmission. In this paper, we summarize about the different research papers ...
  • Kothari, Ashish; Vyas, Ved (International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE), 2014-06)
    In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. ...
  • Sheth, Kinjal; Vora, Vishal (Bulletin of Electrical Engineering and Informatics, 2023-04)
    Forgery with the digital images is being very easy now days due to the very advanced and open source image editing tools, software and devises which supports a high quality of resolutions. Tempering with digital documents ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), 2022-12)
    In vehicular ad hoc networks (VANETs), safety related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message ...
  • Dobaria, Ankit; Vora, Vishal (International Journal of Electrical and Electronics Research (IJEER), FOREX publications, 2022-11)
    The spectrum sensing method's dependability is greatly influenced by two of the most crucial factors, including various fading channels and nearby wireless users. Multipath fading, buried terminals, and shadowing are ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), EverScience Publications, 2022-08)
    The Intelligent transportation system (ITS) aims to improve the performance of the transportation systems. Vehicular ad hoc networks (VANETs) are the potential mechanism by which ITS can realize its goal. VANET ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), EverScience Publications, 2022-08)
    The Intelligent transportation system (ITS) aims to improve the performance of the transportation systems. Vehicular ad hoc networks (VANETs) are the potential mechanism by which ITS can realize its goal. VANET ...
  • Chandarana, Dimpee; Kothari, Ashish (International Journal of Advance Engineering and Research Development (IJAERD), 2015)
    Brain tumor is an abnormal growth of the cells inside the brain. Detecting Brain tumor takes special skills and techniques because they are difficult to detect – especially in early stages. The boundary of the tumor ...
  • Parmar, Jekishan; Kalariya, Paras (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...
  • Patel, Ayushi; Bhalodiya, Dharmesh (International Journal of Innovative Research in Technology(IJIRT), 2014)
    Frequent pattern mining is a discipline with many practical applications, where massive computational power and speed are required. Many state-of-the-art frequent pattern mining applications have inefficient solutions ...
  • Bhalodiya, Dharmesh; Patel, Chhaya (Journal of Engineering Research and Applications, 2014-04)
    Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, ...
  • Bhalodiya, Dharmesh; Tadhani, Jaydeep; Davda, Rajesh (International Journal of Computer Applications, 2019-05)
    Periodic pattern mining consists of finding patterns that exhibit either complete or partial cyclic repetitions in a time series. Past studies on partial periodic search focused on finding regular patterns, i.e., patterns ...
  • Buch, Rachna; Ganda, Dhatri; Kalola, Pooja; Borad, Nirali (Recent Trends in Programming Languages, STM Journals, 2017)
    Nowadays, cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security is mentioned and some of the impacts of the cybercrime. Cyber security is to provide prevention against the ...
  • Borad, Nirali; Shilu, Rupal (International Journal of Trend in Innovative Research (IJTIIR), 2020-06)
    As keyword searching is one bottleneck as well as service in this era. As there many research works using numerous approaches is there in current system. File system keyword search is one of them. Continuous improvement ...
  • Rajpara, Krupa; Shilu, Rupal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-06)
    Personality is an important factor that affects a person’s opinions, like-dislike, thoughts, and how a person behaves in different situations. Nowadays social media is a platform where people express their view, how ...
  • Vaishnav, Pratiksha; Kalariya, Ankit (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-06)
    In this paper, Web page classification is an information retrieval application that provides useful information that can be a basis for many different application domains. Nowadays, the number of web pages on the World ...
  • Bhalodia, Tosal; Zala, Keyur; Nandy, Debalina (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    In this paper, we look into the security challenge and issue of cyber-physical systems which is placed physically somewhere as mentioned. 1. We summary the general workflow of cyber physical systems, 2. Identify the ...

Search DSpace


Advanced Search

Browse

My Account