01. Faculty of Engineering and Technology: Recent submissions

  • Thanki, Rohit; Kothari, Ashish; Trivedi, Deven (Journal of Information Security and Applications, Elsevier, 2019-06)
    In this paper, a hybrid and blind watermarking scheme is proposed for the protection of copyright of digital images. The scheme based on hybridization of two advance transforms such that discrete curvelet transform (DCuT) ...
  • Raviya, Kaushik; Vyas, Ved; Kothari, Ashish (International Journal of Advanced Trends in Computer Science and Engineering, 2019-04)
    The paper describes an effective method to embed grayscale images or watermarks in the original cover images. To do so, we used a famous linear algebra technique called Singular Value Decomposition. To carry out the ...
  • Thanki, Rohit; Kothari, Ashish; Borra, Surekha (Multimedia Tools and Applications, Springer, 2021-05)
    Images frequently are helpless to burglary and copyright encroachment. There are numerous events where pictures were illegally copied from websites for utilization or monetary profit and were gotten away from equity, ...
  • Doshi, Meera; Gajjar, Prakash; Kothari, Ashish (Journal of King Saud University-Computer and Information Sciences ,Elsevier, 2022)
    The prime intention of super-resolution (SR) technique is to restore the high-resolution images from one or more low-resolution (LR) images. These images are captured from the same scene with different acquisition systems ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (Indian Journal of Science and Technology, 2017-05)
    To evaluate the crowd densities in video scene under different constraints. For the crowded video analysis robust foreground detection methods are required to differentiate between moving or static foreground objects and ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (International Journal of Electronics Engineering Research., 2017)
    Our objective is to ensure high level of security in public places using static PTZ camera and robust detection and tracking algorithm for video sequences and also to generate the multi model background subtraction ...
  • Ghedia, Navneet; Vithalani, C.; Kothari, Ashish (International Journal of Computational Intelligence Research, 2017)
    Machine perception is an essential feature for an autonomous system. For the computer vision researcher perception of scene is an important aspect. Smart surveillance system can be able to sense the environments and ...
  • Raviya, Kapil; Vyas, Ved; Kothari, Ashish (I.J. Image, Graphics and Signal Processing,Modern Education and Computer Science Press(MECS), 2016-10)
    The main target of stereo matching algorithms is to find out the three dimensional (3D) distance, or depth of objects from a stereo pair of images. Depth information can be derived from images using disparity map ...
  • Kotecha, M.; Kothari, A. (International Journal of Advance Research in Computer Science and Management Studies, 2015-10)
    Image compression finds its application in those systems which require considerable reduction in storage space and bandwidth required for transmission. In this paper, we summarize about the different research papers ...
  • Kothari, Ashish; Vyas, Ved (International Journal of Recent Research in Electrical and Electronics Engineering (IJRREEE), 2014-06)
    In this paper, we have suggested the spatial domain method for the digital video watermarking for both visible and invisible watermarks. The methods are used for the copyright protection as well as proof of ownership. ...
  • Sheth, Kinjal; Vora, Vishal (Bulletin of Electrical Engineering and Informatics, 2023-04)
    Forgery with the digital images is being very easy now days due to the very advanced and open source image editing tools, software and devises which supports a high quality of resolutions. Tempering with digital documents ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), 2022-12)
    In vehicular ad hoc networks (VANETs), safety related applications require fast and reliable message broadcasting techniques for efficient performance. Reducing redundancy and increasing the reliability of message ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), EverScience Publications, 2022-08)
    The Intelligent transportation system (ITS) aims to improve the performance of the transportation systems. Vehicular ad hoc networks (VANETs) are the potential mechanism by which ITS can realize its goal. VANET ...
  • Vala, Mehul; Vora, Vishal (International Journal of Computer Networks and Applications (IJCNA), EverScience Publications, 2022-08)
    The Intelligent transportation system (ITS) aims to improve the performance of the transportation systems. Vehicular ad hoc networks (VANETs) are the potential mechanism by which ITS can realize its goal. VANET ...
  • Chandarana, Dimpee; Kothari, Ashish (International Journal of Advance Engineering and Research Development (IJAERD), 2015)
    Brain tumor is an abnormal growth of the cells inside the brain. Detecting Brain tumor takes special skills and techniques because they are difficult to detect – especially in early stages. The boundary of the tumor ...
  • Parmar, Jekishan; Kalariya, Paras (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...
  • Patel, Ayushi; Bhalodiya, Dharmesh (International Journal of Innovative Research in Technology(IJIRT), 2014)
    Frequent pattern mining is a discipline with many practical applications, where massive computational power and speed are required. Many state-of-the-art frequent pattern mining applications have inefficient solutions ...
  • Bhalodiya, Dharmesh; Patel, Chhaya (Journal of Engineering Research and Applications, 2014-04)
    Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, ...
  • Bhalodiya, Dharmesh; Tadhani, Jaydeep; Davda, Rajesh (International Journal of Computer Applications, 2019-05)
    Periodic pattern mining consists of finding patterns that exhibit either complete or partial cyclic repetitions in a time series. Past studies on partial periodic search focused on finding regular patterns, i.e., patterns ...
  • Buch, Rachna; Ganda, Dhatri; Kalola, Pooja; Borad, Nirali (Recent Trends in Programming Languages, STM Journals, 2017)
    Nowadays, cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security is mentioned and some of the impacts of the cybercrime. Cyber security is to provide prevention against the ...

Search DSpace


Advanced Search

Browse

My Account