00. FOET CE Faculty Publications: Recent submissions

  • Maru, Janak H.; Dr.Ashish M., Kothari; Dobariya, Priyanka (Educational Administration: Theory and Practice, 2024)
    Distributed Denial of Service (DDoS) attacks continue to pose significant threats to network infrastructure and services. As the complexity and scale of these attacks grow, traditional methods of defense are becoming ...
  • Ram, Bansi; Kalariya, Ankit (. Journal of Emerging Technologies and Innovative Research (JETIR), 2024)
    Face recognition technology has witnessed significant advancements in recent years, propelled by the rapid development of artificial intelligence (AI) techniques. This paper presents a comprehensive review of the latest ...
  • Kalariya, Ankitkumar Keshavlal; Patel, Jaykumar Ashwinbhai (Educational Administration: Theory and Practice, 2024)
    Credit course on Value Education for Consciousness Development (VECD) has been running across many universities of the country for the past few years. The course discusses issues which are very basic, sensitive and prime ...
  • Bhalodia, Tosal; Kathad, Chandani; Zala, Keyur (Cyber Security, Advances in Intelligent Systems and Computing,, 2018-04)
    Nowadays, social networking sites are very greatly used and are continuously growing at its peak. The extraordinary use of all the social networking sites mainly Facebook, Twitter, LinkedIn, and Google Plus involve huge ...
  • Bavishi, Hilloni; Nandy, Debalina (International Journal of Advanced Research (IJAR), 2021-05)
    The COVID-19 literature has accelerated at a rapid pace and the Artificial Intelligence community as well as researchers all over the globe has the responsibility to help the medical community. The CORD-19 dataset ...
  • Solanki, Divya; Bhalodia, Tosal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-08)
    : It is a methodology to process and secure data on mobile phone device. It provides the security to mobile user data using Encryption schemes. It is a concept which allows users to secure their personal data on their ...
  • Parmar, Jekishan; Kalariya, Paras (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...
  • Patel, Ayushi; Bhalodiya, Dharmesh (International Journal of Innovative Research in Technology(IJIRT), 2014)
    Frequent pattern mining is a discipline with many practical applications, where massive computational power and speed are required. Many state-of-the-art frequent pattern mining applications have inefficient solutions ...
  • Bhalodiya, Dharmesh; Patel, Chhaya (Journal of Engineering Research and Applications, 2014-04)
    Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, ...
  • Bhalodiya, Dharmesh; Tadhani, Jaydeep; Davda, Rajesh (International Journal of Computer Applications, 2019-05)
    Periodic pattern mining consists of finding patterns that exhibit either complete or partial cyclic repetitions in a time series. Past studies on partial periodic search focused on finding regular patterns, i.e., patterns ...
  • Buch, Rachna; Ganda, Dhatri; Kalola, Pooja; Borad, Nirali (Recent Trends in Programming Languages, STM Journals, 2017)
    Nowadays, cybercrime is one of the major crimes done by computer expert. In this paper, need of cyber security is mentioned and some of the impacts of the cybercrime. Cyber security is to provide prevention against the ...
  • Borad, Nirali; Shilu, Rupal (International Journal of Trend in Innovative Research (IJTIIR), 2020-06)
    As keyword searching is one bottleneck as well as service in this era. As there many research works using numerous approaches is there in current system. File system keyword search is one of them. Continuous improvement ...
  • Rajpara, Krupa; Shilu, Rupal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-06)
    Personality is an important factor that affects a person’s opinions, like-dislike, thoughts, and how a person behaves in different situations. Nowadays social media is a platform where people express their view, how ...
  • Vaishnav, Pratiksha; Kalariya, Ankit (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-06)
    In this paper, Web page classification is an information retrieval application that provides useful information that can be a basis for many different application domains. Nowadays, the number of web pages on the World ...
  • Bhalodia, Tosal; Zala, Keyur; Nandy, Debalina (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    In this paper, we look into the security challenge and issue of cyber-physical systems which is placed physically somewhere as mentioned. 1. We summary the general workflow of cyber physical systems, 2. Identify the ...
  • Bharad, Dimple; Bhalodia, Tosal; Sharma, Shubham (International Journal of Engineering Science and Computing, 2016-05)
    TCP is a connection oriented and reliable protocol of Transport layer. That is used for wireless communication and for that different types of TCP variants are available like TCP-TAHOE, TCP-RENO, and TCP-NEW RENO etc. ...
  • Bhalodia, Tosal; Agrawal, Rashmi; Rathod, J. (International Journal of Engineering Research and Development, 2013-05)
    Wireless sensor networks (WSNs) are worked with limited energy sensor nodes it is difficult and even impossible to be replaced due to the isolated environment in which they are deployed. Thus, management of power of ...
  • Bhagchandani, Niraj; Padhariya, Nilesh; Ghosh, Pinaki A. (International Journal of Emerging Trends & Technology in Computer Science, 2013)
    Trust Based service is the abstract form of the symbolic representation of social trust. This trust system is used to develop the confidence between the groups of people on timely event also. So if any point of view ...
  • Nandy, Debalina; Paadariya, Renish; Bhalodia, Tosal (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    The biggest challenge for big data from a security point of view is the protection of user’s privacy. Big data frequently contains huge amounts of personal identifiable information and therefore privacy of users is a ...
  • Parmar, J.K.; Kalariya, P.P. (International Journal of Advanced Research in Computer and Communication Engineering, 2014-02-01)
    The wireless networks have become increasingly popular in the computing industry. This is particularly true within the past decade, which has seen wireless networks being adapted to enable mobility. This article examines ...

Search DSpace


Advanced Search

Browse

My Account