Now showing items 617-636 of 820

    • Privacy preservation in vehicular ad-hoc networks (VANETs) 

      Garg, Garima (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Vehicular Ad-hoc Networks (VANETs) are the special application of Mobile Ad-hoc Networks (MANETs). Due to increase in the number of road accidents, VANETs provide security to road traffic by sending safety messages to other ...
    • Privacy Preserving Evaluation of a Web-Based Questionnaire 

      Lata, Shubham (2021)
      This thesis focuses on methods of evaluation of web-based multiple choice type questionnaire, such as online examination and online surveys, in a privacy preserving process. Two styles of questionnaire are discussed, their ...
    • Privacy Preserving Identity Verification and Verifiable Computation For HealthCare System 

      Naik, Shruti Rajendrakumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Paper based medical consulting system has been replaced by electronic health monitoring system due to features like low cost, on demand global accessibility, reliability, accuracy and mobility. Generally, mobile healthcare ...
    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Privacy Resilient Health Record Storage using Blockchain 

      Hingar, Ruchi (2021)
      Blockchain is a decentralized peer-to-peer distributed ledger. Each block of blockchain stores the hash of the previous block creating a chain of blocks, thus the name blockchain. Blockchain is said to tamper-evident and ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...
    • Processor allocation for parallel applications in computing cluster 

      Gajjar, Mrugesh R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      We study the problem of processor allocation in multi-computer for parallel processes that do I/O and IPC (Inter Process Communication). A simulator has been modified to accept synthetic parallel workload that does I/O and ...
    • Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

      Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    • Protecting mobile agents against malicious hosts using trusted computing 

      Panchal, Niravkumar K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
    • Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus 

      Jain, Abhay (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
    • Public toilet hygiene management system 

      Chandra, Shubham (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Hygiene in public toilets require accurate monitoring of the gases produced as byproducts. Even if the complaint is made, the chances of getting it cleaned is very low so the problem remained unsolved. Although smart urinal ...
    • Pulse shaping design for PAPR reduction in OFDM 

      Jain, Akansha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Future mobile communications systems reaching for ever increasing data rates require higher bandwidths than those typical used in todays cellular systems. By going to higher bandwidth the (for low bandwidth) at fading ...
    • Pulse shaping for linear time varying channels 

      Doshi, Savankumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Pulse shaping is the one of the important an critical area for wireless communication. In this article we show the relation between pulse shaping for wide sense stationary uncorrelated scattering (WSSUS) channels and the ...
    • QoS aware distributed service composition using agents 

      Aroor, Anoop (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      Automated service composition is a way of putting together or assembling different web services to satisfy the user query or request, without using a given template. One of the ways of achieving automated service composition ...
    • Quantification of mineral end-members in lunar spectra through deep learning 

      Patel, Mausamee (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The quantification of common lunar surface minerals through spectral unmixing is the primary objective of this thesis. Hyper spectral unmixing for sub-pixel identification of surface materials is one of the most challenging ...
    • Query expansion in biomedical information retrieval 

      Sankhavara, Jainisha (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Retrieving relevant information from biomedical documents is a new challenging task. Health related articles from the literature of biomedical and life sciences are a good source of knowledge for searching information ...
    • Query interceptor 

      Suthar, Shubham Lalitkumar (2020)
      Query Interceptor is a product comprising three components which aims to maintain healthy database by restricting bad queries from hitting the database and restrict user access to only permitted data. It intercepts queries ...
    • Query optimization of object oriented database through compilation and execution 

      Khandhar, Mihir (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Database is central to many applications like a website, app, software or any business applications to store the data in various formats which can be retrieved efficiently and conveniently as and when required by the ...
    • Query Processing in Different Domains 

      Mishra, Sonal (Dhirubhai Ambani Institute of Information and Communication Technology, 2021)
      In this modern era, digital content is exploding in every domain. Biomedical domain is also no exception.In this modern era, digital content is exploding in every domain. Biomedical domain is also no exception. Finding ...
    • Queueing-theoretic framework for perfermance analysis of mobile ad hoc networks with finite buffer nodes 

      Shah, Sapan (Dhirubhai Ambani Institute of Information and Communication Technology, 2008)
      Wireless Ad Hoc network is a decentralized wireless network which allows nodes to join and create networks without any infrastructure. These kinds of networks are advantageous because they can be readily deployed anywhere, ...