01. Department of Computer Engineering: Recent submissions

  • Lakhani, Aryan; Lalakiya, Dhruv (2022)
    ATTENDANCE POTAL application provides the benefits of streamlined operations, enhanced administration & control, superior patient care, strict cost control and improved profitability This is powerful, flexible, and easy ...
  • Patel, Dhairya S.; Zatakiya, Dhruvik A. (2023)
    A Web crawler is a computer program that browses the World Wide Web in a methodical, automated manner or in an orderly fashion. Web crawling is an important method for collecting data on, and keeping up with, the rapidly ...
  • CodeBook 
    Malli, Jay M.; Nakrani, Jay K. (2023)
    The CodeBook provides virtual notebook, so user can prepare notes of his learning. As well as user can access his notes anywhere anytime. User can add images texts and code in his notes. Also, it’s provided features like ...
  • Desai, Nirav Harshadrai; Dr. Parag, Shukla (2023-08-22)
    Remote sensing (RS) is the technique of finding and understanding information from a long distance or remote location using sensors. Land use and land cover mapping are fundamental tasks for planning and management. ...
  • Rayjada, Hardiksinh Hardevsinh; Dr. Parag Shukla (2022-10-30)
    The Cloud Data Center it's not a Data Center or Server room, Cloud is a Third-party services provider that provides servers for rent via the Internet it’s called a cloud. The data centre it's a typical server room, anyone ...
  • Naik, Akruti Narendrakumar; Dr. Hetal Thaker (2022-11-17)
    Food security is a main apprehension in a modern society. Plant disease is critically disturbing the yield of agricultural crops and it is a massive threat to food security. Early identification of plant disease can ...
  • Bavishi, Hilloni; Nandy, Debalina (International Journal of Advanced Research (IJAR), 2021-05)
    The COVID-19 literature has accelerated at a rapid pace and the Artificial Intelligence community as well as researchers all over the globe has the responsibility to help the medical community. The CORD-19 dataset ...
  • Solanki, Divya; Bhalodia, Tosal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-08)
    : It is a methodology to process and secure data on mobile phone device. It provides the security to mobile user data using Encryption schemes. It is a concept which allows users to secure their personal data on their ...
  • Parmar, Jekishan; Kalariya, Paras (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...
  • Patel, Ayushi; Bhalodiya, Dharmesh (International Journal of Innovative Research in Technology(IJIRT), 2014)
    Frequent pattern mining is a discipline with many practical applications, where massive computational power and speed are required. Many state-of-the-art frequent pattern mining applications have inefficient solutions ...
  • Bhalodiya, Dharmesh; Patel, Chhaya (Journal of Engineering Research and Applications, 2014-04)
    Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, ...
  • Bhalodiya, Dharmesh; Tadhani, Jaydeep; Davda, Rajesh (International Journal of Computer Applications, 2019-05)
    Periodic pattern mining consists of finding patterns that exhibit either complete or partial cyclic repetitions in a time series. Past studies on partial periodic search focused on finding regular patterns, i.e., patterns ...
  • Buch, Rachna; Ganda, Dhatri; Kalola, Pooja; Borad, Nirali (Recent Trends in Programming Languages, STM Journals, 2017)
    Nowadays, cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security is mentioned and some of the impacts of the cybercrime. Cyber security is to provide prevention against the ...
  • Borad, Nirali; Shilu, Rupal (International Journal of Trend in Innovative Research (IJTIIR), 2020-06)
    As keyword searching is one bottleneck as well as service in this era. As there many research works using numerous approaches is there in current system. File system keyword search is one of them. Continuous improvement ...
  • Rajpara, Krupa; Shilu, Rupal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-06)
    Personality is an important factor that affects a person’s opinions, like-dislike, thoughts, and how a person behaves in different situations. Nowadays social media is a platform where people express their view, how ...
  • Vaishnav, Pratiksha; Kalariya, Ankit (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-06)
    In this paper, Web page classification is an information retrieval application that provides useful information that can be a basis for many different application domains. Nowadays, the number of web pages on the World ...
  • Bhalodia, Tosal; Zala, Keyur; Nandy, Debalina (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    In this paper, we look into the security challenge and issue of cyber-physical systems which is placed physically somewhere as mentioned. 1. We summary the general workflow of cyber physical systems, 2. Identify the ...
  • Bharad, Dimple; Bhalodia, Tosal; Sharma, Shubham (International Journal of Engineering Science and Computing, 2016-05)
    TCP is a connection oriented and reliable protocol of Transport layer. That is used for wireless communication and for that different types of TCP variants are available like TCP-TAHOE, TCP-RENO, and TCP-NEW RENO etc. ...
  • Bhalodia, Tosal; Agrawal, Rashmi; Rathod, J. (International Journal of Engineering Research and Development, 2013-05)
    Wireless sensor networks (WSNs) are worked with limited energy sensor nodes it is difficult and even impossible to be replaced due to the isolated environment in which they are deployed. Thus, management of power of ...
  • Bhagchandani, Niraj; Padhariya, Nilesh; Ghosh, Pinaki A. (International Journal of Emerging Trends & Technology in Computer Science, 2013)
    Trust Based service is the abstract form of the symbolic representation of social trust. This trust system is used to develop the confidence between the groups of people on timely event also. So if any point of view ...

Search DSpace


Advanced Search

Browse

My Account