Now showing items 610-629 of 820

    • Precision agriculture using wireless sensor network 

      Joshi, Nikita Rajeshbhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Farming practices should evolve with the rapid increase in population. Recent growth in wireless sensor network (WSN) has the capability to meet this objective. Better quality in crop production can be achieved using ...
    • Precoder design for beamforming in K-User MIMO interference chennel 

      Nivedita, S. (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Beamforming in MIMO wireless networks, is a techniques used for mitigating interference and achieve the best possible throughput. Accurate channel state information is essential for efficient design of beamforming vectors ...
    • Predicting quality of service parameter for Internet of Things network 

      Patel, Maitri (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      Nowadays, the Internet of Things applications are developed to facilitate users worldwide. Machine learning is very useful to make some decisions for those applications. The main aim of this present work is to provide a ...
    • Prediction of significant co-ordinates from GPS data using clustering techniques 

      Jha, Mayank (2020)
      Location aware computing is used for providing personalised services based on the semantic locations of the users. It can also be used for detecting customer density throughout a region which can help a company for allocating ...
    • Predictive maintenance schedule 

      Changulani, Smriti (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The transportation sector is an eminent and indispensable part of the development of an economy. An potent transportation system supports social and economic benefits and opportunities. When transportation systems are ...
    • Presentation Attack Detection in Face Recognition System 

      Sherasia, Kehkasha (2021)
      One of the quickest, most precise and easily available biometric recognition system is Face recognition. These systems have wide range of uses like phone verification, payment method security checks, border control and ...
    • Printed gujarati word-matching 

      Pulavwala, Tasneem (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      This report describes an approach to perform word-matching for printed Gujarati script word images. A query word image can be used to match indexed word images of a document for document retrieval. The process starts with ...
    • Privacy preservation in vehicular ad-hoc networks (VANETs) 

      Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ...
    • Privacy Preserving Evaluation of a Web-Based Questionnaire 

      Lata, Shubham (2021)
      This thesis focuses on methods of evaluation of web-based multiple choice type questionnaire, such as online examination and online surveys, in a privacy preserving process. Two styles of questionnaire are discussed, their ...
    • Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System 

      Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ...
    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Privacy Resilient Health Record Storage using Blockchain 

      Hingar, Ruchi (2021)
      Blockchain is a decentralized peer-to-peer distributed ledger. Each block of blockchain stores the hash of the previous block creating a chain of blocks, thus the name blockchain. Blockchain is said to tamper-evident and ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...
    • Processor allocation for parallel applications in computing cluster 

      Gajjar, Mrugesh R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      We study the problem of processor allocation in multi-computer for parallel processes that do I/O and IPC (Inter Process Communication). A simulator has been modified to accept synthetic parallel workload that does I/O and ...
    • Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

      Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    • Protecting mobile agents against malicious hosts using trusted computing 

      Panchal, Niravkumar K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
    • Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus 

      Jain, Abhay (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
    • Public toilet hygiene management system 

      Chandra, Shubham (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Hygiene in public toilets require accurate monitoring of the gases produced as byproducts. Even if the complaint is made, the chances of getting it cleaned is very low so the problem remained unsolved. Although smart urinal ...
    • Pulse shaping design for PAPR reduction in OFDM 

      Jain, Akansha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Future mobile communications systems reaching for ever increasing data rates require higher bandwidths than those typical used in todays cellular systems. By going to higher bandwidth the (for low bandwidth) at fading ...
    • Pulse shaping for linear time varying channels 

      Doshi, Savankumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Pulse shaping is the one of the important an critical area for wireless communication. In this article we show the relation between pulse shaping for wide sense stationary uncorrelated scattering (WSSUS) channels and the ...