DSpace Repository

Browsing 01. Journal Articles by Title

Browsing 01. Journal Articles by Title

Sort by: Order: Results:

  • Patel, Shital S; Dr. Dipti H., Domadia (The Maharaja Sayajirao University of Baroda, 2021-04)
    Natural Language processing study has reached some extent where distinct machine learning algorithms were implemented to obtain better leads to text classification. This paper presents much previous research works in this ...
  • Chaudhary, Himadri; Patel, Honey; Tank, Birju (International Journal of Engineering Research & Technology (IJERT), 2018)
    Internet of Things (IoT) marketplace is swiftly expanding as companies across multiple vertical industries recognize the need for connectivity and the potential transformation enabled through connectivity. In short, ...
  • Bhalodiya, Dharmesh; Patel, Chhaya (Journal of Engineering Research and Applications, 2014-04)
    Frequent itemset mining (FIM) is a core area for many data mining applications as association rules computation, clustering and correlations, which has been comprehensively studied over the last decades. Furthermore, ...
  • Bhalodia, Tosal; Kathad, Chandani; Zala, Keyur (Cyber Security, Advances in Intelligent Systems and Computing,, 2018-04)
    Nowadays, social networking sites are very greatly used and are continuously growing at its peak. The extraordinary use of all the social networking sites mainly Facebook, Twitter, LinkedIn, and Google Plus involve huge ...
  • Chauhan, Mansi; Paneri, Devangi (International Journal of Scientific Research & Engineering Trends, 2021-04)
    In Today’s Technological Life Social media quiets a specious amount of Information. Social media has become a tremendous source of acquiring Users Opinions. It also helps to analyze how people, particularly consumers, feel ...
  • Maru, Janak H.; Dr.Ashish M., Kothari; Dobariya, Priyanka (Educational Administration: Theory and Practice, 2024)
    Distributed Denial of Service (DDoS) attacks continue to pose significant threats to network infrastructure and services. As the complexity and scale of these attacks grow, traditional methods of defense are becoming ...
  • Hirapara, Jignesh; Vanjara, Pratik (Research Matrix, 2022-01)
    Machine learning and its methodologies are used in agribusiness domains to predict edit costs based on stock availability and generation. On a daily basis, a massive amount of data is generated through the display of ...
  • Bhalodia, Tosal; Zala, Keyur; Nandy, Debalina (National Conference on Latest Trends in Networking and Cyber Security, 2017-03)
    In this paper, we look into the security challenge and issue of cyber-physical systems which is placed physically somewhere as mentioned. 1. We summary the general workflow of cyber physical systems, 2. Identify the ...
  • Gandhi, Yesha Jayeshbhai (journal of emerging technologies and innovative research, 2024-04)
    The idea of "survival of the fittest," or natural selection, emphasizes the natural world's constant need for adaptation and development. It is a dynamic force that ensures a species' adaptability and relevance in changing ...
  • Chavda, Rohit P.; Bhalodia, Tosal (International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2024)
    Plant diseases are a major problem for the agriculture industry because they can cause large crop losses and jeopardize food security. Deep learning approaches have demonstrated encouraging results in automating plant ...
  • Bharad, Dimple; Bhalodia, Tosal; Sharma, Shubham (International Journal of Engineering Science and Computing, 2016-05)
    TCP is a connection oriented and reliable protocol of Transport layer. That is used for wireless communication and for that different types of TCP variants are available like TCP-TAHOE, TCP-RENO, and TCP-NEW RENO etc. ...
  • Chaniyara, Shital M.; Dr. Dipti H., Domadiya; Dr. Stavan C., Patel (High Technology Letters, 2021)
    Millions of structured, semi-structured, and unstructured documents are produced around the globe a day today. Several research societies like IEEE, Elsevier, Springer, and Wiley that we use to publish the scientific ...
  • Ram, Bansi; Kalariya, Ankit (. Journal of Emerging Technologies and Innovative Research (JETIR), 2024)
    Face recognition technology has witnessed significant advancements in recent years, propelled by the rapid development of artificial intelligence (AI) techniques. This paper presents a comprehensive review of the latest ...
  • Dr. Kishor H., Atkotiya; Gujarati, Prakash P. (Wesleyan Journal of Research, 2021-01)
    Semantic web technologies have been exposed in different fields. They can define and linked data over the net consistently and coherently. The semantic web is a technology to save data in a machine-readable format that ...
  • Sadaria, Priti; Dr. Achyut C., Patel (Journal of Information and Computational Science, 2020)
    Now a day no field remains untouched with Information Technology. Health care industries are using Information Technology for different aspects. Mining of valuable information by analyzing this quickly rising data for ...
  • Kalariya, Ankitkumar Keshavlal; Patel, Jaykumar Ashwinbhai (Educational Administration: Theory and Practice, 2024)
    Credit course on Value Education for Consciousness Development (VECD) has been running across many universities of the country for the past few years. The course discusses issues which are very basic, sensitive and prime ...
  • Dr. Jaydeep R., Ramani; Dr Jayesh N., Zalavadia (Juni Khyat, 2023-07)
    The Internet of things (IoT) represent the next phase of the digital world that expanding rapidly and transform the lives of customer. While the Internet does not usually extend beyond the electronic world, connected objects ...
  • Shekhat, V.M.; Chauhan, C.R. (International Journal of Engineering Research & Technology, 2014-06-07)
    Customer satisfaction is important in this competitive environment manufacturer need to regularly upgrade their product and for they need to fulfil the customers need. Review is very good method from where we can identify ...
  • Solanki, Divya; Bhalodia, Tosal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-08)
    : It is a methodology to process and secure data on mobile phone device. It provides the security to mobile user data using Encryption schemes. It is a concept which allows users to secure their personal data on their ...
  • Ramani, Jaydeep R.; Dr. Jayesh N., Zalavadia (Tathapi, 2020-04)
    Now days few businesses including like banking, money, retail, protection, exposure, database promoting, and deals anticipate, and so on are Information Mining instruments for Customer Relationship Management (CRM). Driving ...

Search DSpace


Advanced Search

Browse

My Account