DSpace at ATMIYA UNIVERSITY: Recent submissions

  • Vaidya, S.; Vyas, N. (Annals of Pure and Applied Mathematics, 2013)
    An edge labeling of a graph is a bijection from E(G) to the set {1,2,… , |E(G)|}. If for any two distinct vertices u and v, the sum of labels on the edges incident to u is different from the sum of labels on the edges ...
  • Vaid, S.; Vyas, N. (International Journal of Mathematics and Scientific Computing, 2012)
    A binary vertex labeling f : E(G) → {0, 1} with induced labeling f ∗ : V (G) → {0, 1} defined by f ∗ P (v) = {f(uv) | uv ∈ E(G)}(mod 2) is called E-cordial labeling of a graph G if the number of vertices labeled 0 ...
  • Vaidya, S.; Vyas, N. (International Journal of Advanced Computer and Mathematical Sciences, 2012)
    Let G=(V(G),E(G)) be a graph and f E G : ( ) {0,1} → be a binary edge labeling. Define * f V G : ( ) {0,1} → by * ( ) ( ) ( )( 2) uv E G f v f uv mod ∈ = ∑ . The function f is called E-cordial labeling of G if | ...
  • Vaidya, S.; Vyas, N. (Annals of Pure and Applied Mathematics, 2012)
    A graph with q edges is called antimagic if its edges can be labeled with 1, 2,…,q such that the sums of the labels of the edges incident to each vertex are distinct. Here we prove that the graphs obtained by switching ...
  • Vaidya, S.; Vyas, N. (International Journal of Contemporary Advanced Mathematics (IJCM), 2011)
    Let G be a bipartite graph with a partite sets V1 and V2 and G′ be the copy of G with corresponding partite sets V1 ′ and V2 ′ . The mirror graph M(G) of G is obtained from G and G′ by joining each vertex of V1 ...
  • Vaidya, S.; Vyas, N. (Studies in Mathematical Sciences, CSCanada, 2011-11)
    We investigate E-cordial labeling for some cartesian product of graphs. We prove that the graphs Kn × P2 and Pn × P2 are E-cordial for n even while Wn × P2 and K1,n × P2 are E-cordial for n odd.
  • Vaidya, S.; Vyas, N. (Journal of Mathematics Research, 2011-08)
    For the graph G1 and G2 the tensor product is denoted by G1(Tp)G2 which is the graph with vertex set V(G1(Tp)G2) = V(G1) × V(G2) and edge set E(G1(Tp)G2) = {(u1, v1), (u2, v2)/u1u2 E(G1) and v1v2 E(G2)}. The graph Pm(Tp)Pn ...
  • Solanki, Divya; Bhalodia, Tosal (International Journal of Advanced Research in Science, Communication and Technology (IJARSCT), 2021-08)
    : It is a methodology to process and secure data on mobile phone device. It provides the security to mobile user data using Encryption schemes. It is a concept which allows users to secure their personal data on their ...
  • Chudasama, Kalpesh (SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology, 2020-12)
    In this paper, I explore carbon nanotube (CNT) composites’ use in the monopole antenna structures as an efficient alternative for copper. I explore the use of CNT material for GSM applications. An attempt has been made ...
  • Bokarvadia, Ashish; Chudasama, Kalpesh (National Conference on Emerging Trends in Computer, Electrical & Electronics (ETCEE-2015) International Journal of Advance Engineering and Research Development (IJAERD), 2022)
    in today’s world networking is important part of industrial automation in monitoring of industrial process Parameters. Embedded Ethernet is nothing but a microcontroller which is able to communicate with the network ...
  • Patel, Jay; Thakar, Viral (A Novel Feature Based Adaptive Algorithm for Automatic Shot Boundary Detection, 2016-05)
    The video shot boundary detection(SBD) is a region, where many practices and techniques have been suggested and have requested to perform consistently on the videos like talk shows , different sports events & news ...
  • Patel, Jay; Thakar, Viral (International Research Journal of Engineering and Technology (IRJET), 2016-03)
    The video shot boundary detection (SBD) is a region, where many practices and techniques have been suggested and have requested to perform consistently on the videos like talk shows, different sports events & news ...
  • Thakar, Viral; Patel, jay; Nathani, Vipul (International Journal of Scientific Engineering and Applied Science (IJSEAS), 2015-06)
    With technological revolution in the field of MEMs and Embedded Systems, Wireless Sensors Networks has emerged as one of the prime research field in the recent years. In past few years many researchers have continuously ...
  • Thanki, Rohit; Kothari, Ashish (Communications in Computer and Information Science, vol 1235. Springer, 2020)
    Image watermarking is one of the techniques used for copyright protection of digital images. In this paper, copyright protection of color images using watermarking is presented with the help of data encryption. The main ...
  • Varia, Dhaval; Kothari, A.; Rathod, Dushyant (Studies in Indian Places Names (UGC Care Journal), 2020)
    In this paper, the layered design to investigations and interesting route arranging dependent on the basic parameter Air Pollution is proposed. Different ways have been proposed for limiting the criticality of Air Pollution ...
  • Raviya, Kaushik; Vyas, Ved; Kothari, Ashish (International Journal of Innovative Technology and Exploring Engineering (IJITEE), 2019-06)
    The present paper focuses on the mixture of Discrete Wavelet Transform and Discrete Cosine Transform used in the purpose of Digital Image Watermarking. People nowadays need Digital media as an alternate of paper ...
  • Thanki, Rohit; Kothari, Ashish (Journal of Ambient Intelligence and Humanized Computing , Springer., 2019-04)
    When digital images are shared over an open access network such as the internet, facebook, WhatsApp, and other social media, then the security of these images are required. The digital watermarking is one approach for ...
  • Thanki, Rohit; Kothari, Ashish (Multimedia Tools and Applications, Springer, 2020-09)
    In this paper, a robust and hybrid domain watermarking scheme is proposed for the security of medical images in telemedicine applications. The secret identity of the patient is inserting into the cover medical image using ...
  • Thanki, Rohit; Borra, Surekha; Kothari, Ashish (International Journal of Digital Crime and Forensics, 2021-04)
    Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile ...
  • Raviya, Kapil; Vyas, Ved; Kothari, Ashish; Gohil, Gunvantsinh (Oriental Journal of Computer Science and Technology, 2019)
    The researcher have suggested real time depth based on frequency domain hole filling. It get better quality of depth sequence generated by sensor. This method is capable to produce high feature depth video which can ...