DSpace Repository

Browsing 01. Department of Computer Engineering by Issue Date

Browsing 01. Department of Computer Engineering by Issue Date

Sort by: Order: Results:

  • Bhagchandani, Niraj; Padhariya, Nilesh; Ghosh, Pinaki A. (International Journal of Emerging Trends & Technology in Computer Science, 2013)
    Trust Based service is the abstract form of the symbolic representation of social trust. This trust system is used to develop the confidence between the groups of people on timely event also. So if any point of view ...
  • Bhalodia, Tosal; Agrawal, Rashmi; Rathod, J. (International Journal of Engineering Research and Development, 2013-05)
    Wireless sensor networks (WSNs) are worked with limited energy sensor nodes it is difficult and even impossible to be replaced due to the isolated environment in which they are deployed. Thus, management of power of ...
  • Goswami, J.K.; Chauhan, C. (International Journal for Scientific Research & Development, 2013-12-01)
    Geospatial data is data about the geographic location of earth surface features and boundaries on Earth. Nowadays spatial data is used in every field of society and due to the advancements in spatial data acquisition ...
  • Patel, Ayushi; Bhalodiya, Dharmesh (International Journal of Innovative Research in Technology(IJIRT), 2014)
    Frequent pattern mining is a discipline with many practical applications, where massive computational power and speed are required. Many state-of-the-art frequent pattern mining applications have inefficient solutions ...
  • Parmar, Jekishan; Kalariya, Paras (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...
  • Parmar, J.K.; Kalariya, P.P. (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02-01)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...
  • Bhalodiya, Dharmesh; Patel, Chhaya (Journal of Engineering Research and Applications, 2014-04)
    Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, ...
  • Goswami, J.K.; Chauhan, C. (International Journal for Scientific Research & Development, 2014-06-01)
    Geospatial data is data about the geographic location of earth surface features and boundaries on Earth. Nowadays spatial data is used in every field of society and due to the advancements in spatial data acquisition ...
  • Shekhat, V.M.; Chauhan, C.R. (International Journal of Engineering Research & Technology, 2014-06-07)
    Customer satisfaction is important in this competitive environment manufacturer need to regularly upgrade their product and for they need to fulfil the customers need. Review is very good method from where we can identify ...
  • Pathan, I.; Chauhan, C. (International Journal of Computer Science and Information Technologies, 2015-04-01)
    The researchers has attracted on object tracking research. There are many tracking algorithm, The purpose of object tracking algorithm is segmenting a region of interest from a video scene and keeping track of its motion, ...
  • Vadar, S.M.; Chauhan, C. (International Journal for Scientific Research & Development, 2015-07-01)
    The quality of medical ultrasound is generally limited due to a number of factors, which originate from physical phenomena underlying the image acquisition. As a result, in the past few decades considerable efforts in ...
  • Bharad, Dimple; Bhalodia, Tosal; Sharma, Shubham (International Journal of Engineering Science and Computing, 2016-05)
    TCP is a connection oriented and reliable protocol of Transport layer. That is used for wireless communication and for that different types of TCP variants are available like TCP-TAHOE, TCP-RENO, and TCP-NEW RENO etc. ...
  • Buch, Rachna; Ganda, Dhatri; Kalola, Pooja; Borad, Nirali (Recent Trends in Programming Languages, STM Journals, 2017)
    Nowadays, cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security is mentioned and some of the impacts of the cybercrime. Cyber security is to provide prevention against the ...
  • Nandy, Debalina; Paadariya, Renish; Bhalodia, Tosal (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    The biggest challenge for big data from a security point of view is the protection of user’s privacy. Big data frequently contains huge amounts of personal identifiable information and therefore privacy of users is a ...
  • Bhalodia, Tosal; Zala, Keyur; Nandy, Debalina (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    In this paper, we look into the security challenge and issue of cyber-physical systems which is placed physically somewhere as mentioned. 1. We summary the general workflow of cyber physical systems, 2. Identify the ...
  • Buch, R.; Ganda, D.; Kalola, P.; Borad, N. (Recent Trends in Programming Languages, 2017-04-01)
    Nowadays, cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security is mentioned and some of the impacts of the cybercrime. Cyber security is to provide prevention against the ...
  • Chaudhary, Himadri; Patel, Honey; Tank, Birju (International Journal of Engineering Research & Technology (IJERT), 2018)
    Internet of Things (IoT) marketplace is swiftly expanding as companies across multiple vertical industries recognize the need for connectivity and the potential transformation enabled through connectivity. In short, ...
  • Bhalodia, Tosal; Kathad, Chandani; Zala, Keyur (Cyber Security, Advances in Intelligent Systems and Computing,, 2018-04)
    Nowadays, social networking sites are very greatly used and are continuously growing at its peak. The extraordinary use of all the social networking sites mainly Facebook, Twitter, LinkedIn, and Google Plus involve huge ...
  • Parsana, Falguni (International Journal of Research And Analytical Reviews, 2019-03)
    The paper identifies various issues and factors in Query Processing and Optimization while choosing the best Database Execution Plan. Our approach depends on various phases of query processing and optimization, heuristic ...
  • Bhalodiya, Dharmesh; Tadhani, Jaydeep; Davda, Rajesh (International Journal of Computer Applications, 2019-05)
    Periodic pattern mining consists of finding patterns that exhibit either complete or partial cyclic repetitions in a time series. Past studies on partial periodic search focused on finding regular patterns, i.e., patterns ...

Search DSpace


Advanced Search

Browse

My Account