Now showing items 689-708 of 849

    • Scalable routing in mobile ad hoc networks 

      Patel, Brijesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      In Mobile Ad Hoc Networks (MANETs), performing routing is a challenging task in presence of the varying network parameters like node mobility, traffic and network size. It is very important to analyze the scalability ...
    • Scheduling and isolation in virtualization 

      Somani, Gaurav (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Virtual machine (VM) based server implementation is popular for numerous advantages like fault isolation, efficient hardware utilization, security and ease of management. Virtual machine monitor (VMM) like Xen is a popular ...
    • Scheduling in grid: rescheduling MPI applications using a fault-tolerant MPI implementation 

      Reddy, M. Vivekananda (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Due to advancement in grid technologies, resources spread across the globe can be accessed using standard general purpose protocols. Simulations and scientific experiments were earlier restricted due to limited availability ...
    • Schema based indexing for namespace mapping of raw sparql and summarization of lod 

      Hapani, Hitesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Linked open data(LOD) in Semantic Web is growing day by day. There are datasets available that can be used in different application. However, identifying useful dataset from cloud, determining the quality and obtaining ...
    • Secure and efficient dealing with node capture attack in wireless sensor networks 

      Agrawal, Sarita (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Wireless Sensor Networks (WSN) have found enormous applications in various areas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes ...
    • Secure and efficient key assignment scheme for dynamic access control in a hierarchy 

      Vadnala, Praveen Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Secure SQL with access control for database as a service model 

      Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Security of remote car locking system against eavesdropping 

      Patel, Jinita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Vehicle industry is growing rapidly. To sustain in the market manufacturer uses various technology in vehicles. In today's world users need more comfort in addition to efficiency of vehicles. With the advancement in the ...
    • Segmentation and classification: optical character recognition algorithms to enhance the accuracy 

      Shah, Ketul Tejas (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      OCR (Optical Character Recognition) is a well known algorithm for the conversion of machine printed or handwritten text images to machine-encoded text. As the word "Optical" is related to light or vision, an OCR system ...
    • Self-calibrating technique for digital-to-analog converter in successive approximation register analog-to-digital converter 

      Patel, Sujit Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Successive Approximation Register (SAR) analog to digital converter resolution is limited mainly by the capacitor ratio error; comparator offset voltage and capacitor voltage dependence error. A SAR ADC resolution is limited ...
    • Selfish routing and network creation games 

      Gandhi, Ratnik (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      This work studies the two important problems of routing and network creation in the situation of selfish behavior of agents. In routing, agents want to send their data from source to destination. They try to reduce cost ...
    • Semantic aware partitioning and distribution with partial replication for RDF graph 

      Pandat, Ami (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      At this stage, managing huge RDF data is one of the major challenges for building modern day applications. Relational approach and Graph based approach aretwo techniques for RDF data management. This thesis introduces a ...
    • Semantic web data management: data partitioning and query execution 

      Padiya, Trupti (Dhirubhai Ambani Institute of Information and Communication Technology, 2012)
      Semantic Web database is an RDF database. Due to increased use of Semantic Web in real life applications, we can find immense growth in the use of RDF databases. As there is a tremendous increase in RDF data, efficient ...
    • Sensor based approach for early disease detection in plants 

      Mitali, Nandani (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      Among various issues in agriculture, one is depreciation in yield of crops. India loses 15-25 % of potential crop output due to pests, weeds and diseases.This project focuses on monitoring the health of crops.It is based ...
    • Sequence Alignment Based on segment to segment Comparision 

      Desai, Meet (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      "Computational Biology. MSA is a known NP-Complete Problem and hence the focus is always on approximation algorithms and heuristics. Most of the current MSA methods work at residue level i.e they are based on residue to ...
    • Service integration on social network 

      Patel, Mehul (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Microblogging services are part of social network platforms, which allow people to exchange short messages. Social networks provide people to play an active role in collecting, analyzing and reporting news and information. ...
    • Service level agreement parameter matching in cloud computing 

      Chauhan, Tejas (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Cloud is a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or software services). It provides an on-demand, pay-asyo-ugo computing resources and had become an ...
    • Service selection using WS-agreement 

      Chudasma, Nrupen (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      The business requirements are dynamic in nature and identification of suitable busi- ness partners "on demand", who can satisfy a set of guarantees is a critical process. Selection of business partners is influenced by ...