Search
Now showing items 61-70 of 126
On Minimality Attack in Privacy Preserving Data Publishing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
"Data Publishing has become much concern in recent yerars for protecting the individual privacy. Information about the individuals is collected from various domain and is being published public. We can extract lot of wealth ...
Modelling and short term forecasting of flash floods in an urban environment
(Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
Rapid urbanization, climate change and extreme rainfall has resulted in a growingnumber of cases of urban flash floods. It is important to predict the occurrenceof flood so that the aftermath of the flood can be minimized. ...
The Study of Vertex Coloring Algorithms Using Heuristic Approaches
(Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
Graph vertex coloring is one of the most studied NP-complete optimization problem (READ, 1972) [2]. The problem is that; given a graph G, determine the number of colors required to color G, so that no two adjacent vertices ...
The Study of Cycles in 2-connected Graphs Specifically Odd Graphs
(Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
Counting the number of cycles in an undirected graph is a classical problemwhich
is known to be intractable and so research on this problem typically focuses on approximation
algorithms, special cases, heuristics and some ...
Phase-based Features for Replay Spoof Detection System
(Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
Automatic Speaker Verification (ASV) system is used to verify the claimed identity of a speaker based on speech samples with the help of machines. The spoofing attacks increased due to significant technological advances ...
Design and Implementation of Low Power Superscalar Processors
(Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
This thesis presents an 8-stage low power Superscalar processor. Since there has come an upper limit on the frequency that a single core inline processor can provide, to improve performance we need to exploit concepts like ...
On insider attack in distributed file systems
(Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
Due to heavy use of internet, mobiles, sensors etc. Data is growing rapidly day-by-day. However traditional database systems fail to store such a huge semi structured or unstructured data which raises the need for distributed ...
Service level agreement parameter matching in cloud computing
(Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
Cloud is a large pool of easily usable and accessible virtualized resources (such as hardware, development platforms and/or software services). It provides an on-demand, pay-asyo-ugo computing resources and had become an ...
Energy efficient protocol for connected dominating set management in wireless sensor network
(Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
A wireless Network is a collection of wireless mobiles modes and the access points, where mobile nodes in pure Ad-Hoc mode form a temporary network without requiring any centralized administration wireless communication ...
Azure migration manager & certification recommendation system
(Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
1. Azure Migration Manager: Migrating from on-premise workload to cloud is one of the huge and tough tasks for every organization. For this one will need an expert who will guide for what to migrate, how to migrate, how ...