Now showing items 858-877 of 1148

    • Privacy preserving identity verification with binding blinding technique in cloud assisted healthcare applications 

      Patwa, Dolly R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      In recent times, broad deployment of computers and mobile devices such as mobile phones, PDA's rigged with cost efficient sensors, have shown great potential in recognizing positive direction to healthcare services. It ...
    • Privacy Resilient Health Record Storage using Blockchain 

      Hingar, Ruchi (2021)
      Blockchain is a decentralized peer-to-peer distributed ledger. Each block of blockchain stores the hash of the previous block creating a chain of blocks, thus the name blockchain. Blockchain is said to tamper-evident and ...
    • Privacy-Preserving Iris Based Authentication System 

      Agrawal, Radha (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Biometric authentication systems have gained immense popularity due to theirability to provide secure and convenient authentication. However, the leakageof sensitive biometric data can compromise an individual�s privacy ...
    • Privacy-Preserving Proximity Detection through Haversine Distance and Geo-Hash 

      Rathi, Jash (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      Proximity implies computing suitable distance between nearby people and places. Proximity detection is very crucial to many multimedia applications. For instance, fatal incidents occur near forests if animals like elephants ...
    • Private Contact Tracing based on Trajectory-data through Trusted Hardware 

      Kurkiya, Astha (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      The COVID19 pandemic has triggered technical measures to halt the disease�s spread. One of the most promising solutions for this is private contact tracing (PCT). However, the recently suggested Bluetooth-based PCT has ...
    • Private targeted advertising using homomorphic encryption 

      Dave, Ainish Juotindra (Dhirubhai Ambani Institute of Information and Communication Technology, 2016)
      Privacy of the user data in online setup is an important feature. The users of Internetdo not want to share their private information or interests with anybody.The targeted advertising domain clearly tracks the user activity ...
    • Processor allocation for parallel applications in computing cluster 

      Gajjar, Mrugesh R. (Dhirubhai Ambani Institute of Information and Communication Technology, 2004)
      We study the problem of processor allocation in multi-computer for parallel processes that do I/O and IPC (Inter Process Communication). A simulator has been modified to accept synthetic parallel workload that does I/O and ...
    • Prolog based approach to reasoning about dynamic hierarchical key assignment schemes 

      Mundra, Anil Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      The problem of allowing the higher level users access the information related to lower level is called Hierarchical Access Control Problem. In a hierarchical access control system, users are partitioned into a number of ...
    • Protecting mobile agents against malicious hosts using trusted computing 

      Panchal, Niravkumar K. (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      The concept of mobile agents was invented about a decade ago. Since then, plenty of innovative applications of mobile agents have been proposed. But it remains to be the fact that these applications have not been deployed ...
    • Protecting structures on heap from buffer overflow vulnerabilities with TIED-LibsafePlus 

      Jain, Abhay (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      In spite of the numerous defenses that have been devised to combat the buffer overflow attack, buffer overflow vulnerability in the C programs still exist as the one widely exploited by the attackers to subsume the privileges ...
    • Public toilet hygiene management system 

      Chandra, Shubham (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Hygiene in public toilets require accurate monitoring of the gases produced as byproducts. Even if the complaint is made, the chances of getting it cleaned is very low so the problem remained unsolved. Although smart urinal ...
    • Pulse shaping design for PAPR reduction in OFDM 

      Jain, Akansha (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Future mobile communications systems reaching for ever increasing data rates require higher bandwidths than those typical used in todays cellular systems. By going to higher bandwidth the (for low bandwidth) at fading ...
    • Pulse shaping for linear time varying channels 

      Doshi, Savankumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      Pulse shaping is the one of the important an critical area for wireless communication. In this article we show the relation between pulse shaping for wide sense stationary uncorrelated scattering (WSSUS) channels and the ...
    • PURAMPOKKU : The changing interface and role of land and water has put the poor of the city in the path of the Flood and Drought 

      Tamllselvan, Koushlkram (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Cartographic storytelling is a relatively new format in which data and information are presented in a way that leads the audience from one piece of information to the next as they travel through a story. In this format, ...
    • Q-Learning Accelerator Chip Design for Robot Path Planning 

      Advani, Harsh Shekhar (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      A variety of frameworks and set of tools used for creating complex and difficult behaviours are provided by reinforcement learning in robotics. Q-learning is one of the most popularly used algorithms in reinforcement ...
    • QoS aware distributed service composition using agents 

      Aroor, Anoop (Dhirubhai Ambani Institute of Information and Communication Technology, 2013)
      Automated service composition is a way of putting together or assembling different web services to satisfy the user query or request, without using a given template. One of the ways of achieving automated service composition ...
    • QoS-aware Task Allocation and Scheduling in Cloud-Fog-Edge Architecture with Proactive Migration Strategy 

      Joshi, Nikita (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      The vision of the Internet of Things (loT) is made possible by advancements in sensor technologies, smart devices, wearable gadgets, and communication paradigms. IoT Service Providers (loSPs) provide loT services such as ...
    • Quantification of mineral end-members in lunar spectra through deep learning 

      Patel, Mausamee (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      The quantification of common lunar surface minerals through spectral unmixing is the primary objective of this thesis. Hyper spectral unmixing for sub-pixel identification of surface materials is one of the most challenging ...
    • Quantile Regression and Deep Learning Models for Air Quality Analysis and Prediction in Delhi City 

      Jha, Gaurav (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Quantile regression models have gained popularity among researchers these days.The mean regression model estimates the mean of yi given x. But in some applications,estimation of the quantiles of yi given x is not very ...
    • Query expansion in biomedical information retrieval 

      Sankhavara, Jainisha (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Retrieving relevant information from biomedical documents is a new challenging task. Health related articles from the literature of biomedical and life sciences are a good source of knowledge for searching information ...