Patel, Jay; Kanchava, Yuvrajsinh(23rd ISTE State Annual Convention And National Conference on “Role of innovation & Human values in Engineering & Technology”, 2024-03-21)
It is an effort in the direction of energy efficient alternative for home lighting system. It proposes the off grid decentralized solar power system. An Existing setup of electricity generation is centralized. It generates ...
Ratnottar, Jigar Bhanushankar; Vyas, Divyang D.(Parul International Conference on Engineering and Technology (PICET), 2024-05)
India's power area is experiencing a sturdy boom in demand, manufacturing, and energy transmission.
India is operating on several progressive policies and programs within the energy sector for holistic transformation. A ...
Sheth, Kinjal Ravi; Dr. Vishal S., Vora(International Journal of Biometrics, 2024-10-03)
It is a common practice to digitally edit or ‘retouch’ facial images for various purposes, such as enhancing one’s appearance on social media, matrimonial sites, or even as an authentic proof. When regulations are not ...
Sheth, Kinjal R.; Vora, Vishal S.(Vietnam Journal of Science and Technology, 2024)
Facial retouching in supporting documents can have adverse effects, undermining the credibility and authenticity of the information presented. This paper presents a comprehensive investigation into the classification of ...
Sheth, Kinjal R.; Dr. Vishal S., Vora(Iraqi Journal for Electrical and Electronic Engineering, 2024-06)
Facial retouching, also referred to as digital retouching, is the process of modifying or enhancing facial characteristics in digital images or photographs. While it can be a valuable technique for fixing flaws or achieving ...
Reliable and timely message reception of an emergency event is the prime objective of emergency message dissemination protocols in vehicular networks. Varying vehicle density and road topologies in vehicular networks raise ...
Pithiya, Kiran; Kothari, Ashish M.(Educational Administration: Theory and Practice, 2024)
As the digital landscape continues to evolve, the need for robust security measures to
protect digital assets, particularly images, has become increasingly paramount. This
research paper introduces a novel approach to ...
Pate, Nayankumar; Dwivedi, Ved Vyas; Kothari, Ashish(ICTACT Journal on Image and Video Processing, 2022)
Medical imaging greatly affects medication, particularly in the fields of diagnosis analysis and careful surgical planning. In any case, medical imaging gadgets continue delivering a great deal of data information for each ...
Singh, Shikha; Dr.Yagnesh B., Shukla(Journal Of Critical Reviews, 2020)
In this paper, different techniques involved in designing high performance with minimum power consuming full adder circuits are discussed and compared. Full adder plays an important role in portable digital applications ...
Chudasama, Kalpesh(SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 2020-12)
In this paper, I explore carbon nanotube (CNT) composites’ use in the monopole antenna structures as an efficient alternative
for copper. I explore the use of CNT material for GSM applications. An attempt has been made ...
Bokarvadia, Ashish; Chudasama, Kalpesh(National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE-2015) International Journal of Advance Engineering and Research Development (IJAERD), 2022)
in today’s world networking is important part of
industrial automation in monitoring of industrial process
Parameters. Embedded Ethernet is nothing but a microcontroller
which is able to communicate with the network ...
Patel, Jay; Thakar, Viral(A Novel Feature Based Adaptive Algorithm for Automatic Shot Boundary Detection, 2016-05)
The video shot boundary detection(SBD) is a region,
where many practices and techniques have been
suggested and have requested to perform consistently
on the videos like talk shows , different sports events
& news ...
Patel, Jay; Thakar, Viral(International Research Journal of Engineering and Technology (IRJET), 2016-03)
The video shot boundary detection (SBD) is a
region, where many practices and techniques have been
suggested and have requested to perform consistently on the
videos like talk shows, different sports events & news ...
Thakar, Viral; Patel, jay; Nathani, Vipul(International Journal of Scientific Engineering and Applied Science (IJSEAS), 2015-06)
With technological revolution in the field of MEMs
and Embedded Systems, Wireless Sensors Networks
has emerged as one of the prime research field in the
recent years. In past few years many researchers have
continuously ...
Thanki, Rohit; Kothari, Ashish(Communications in Computer and Information Science, vol 1235. Springer, 2020)
Image watermarking is one of the techniques used for copyright protection of digital images. In this paper, copyright protection of color images using watermarking is presented with the help of data encryption. The main ...
Varia, Dhaval; Kothari, A.; Rathod, Dushyant(Studies in Indian Places Names (UGC Care Journal), 2020)
In this paper, the layered design to investigations and interesting route arranging dependent on the basic parameter Air
Pollution is proposed. Different ways have been proposed for limiting the criticality of Air Pollution ...
Raviya, Kaushik; Vyas, Ved; Kothari, Ashish(International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019-06)
The present paper focuses on the mixture of Discrete
Wavelet Transform and Discrete Cosine Transform used in the
purpose of Digital Image Watermarking. People nowadays need
Digital media as an alternate of paper ...
Thanki, Rohit; Kothari, Ashish(Journal of Ambient Intelligence and Humanized Computing , Springer., 2019-04)
When digital images are shared over an open access network such as the internet, facebook, WhatsApp, and other social
media, then the security of these images are required. The digital watermarking is one approach for ...
Thanki, Rohit; Kothari, Ashish(Multimedia Tools and Applications, Springer, 2020-09)
In this paper, a robust and hybrid domain watermarking scheme is proposed for the security of medical images in telemedicine applications. The secret identity of the patient is inserting into the cover medical image using ...
Thanki, Rohit; Borra, Surekha; Kothari, Ashish(International Journal of Digital Crime and Forensics, 2021-04)
Application of fragile watermarking on biometric images stored at a server or cloud ensures
proper authentication and tamper detection when access to the servers was shared. In this paper,
a hybrid domain fragile ...