Now showing items 923-942 of 1148

    • S-DIHE: Secure Deduplication of images based on Homomorphic Encryption 

      Patel, Nimmi (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      The cloud space is occupied with multiple versions of the same data, including images, text files, et. Cetera. Though cloud service providers (CSPs) are provid- ing very cost effective storage space but combating the ...
    • Salient Object Super-resolution 

      Gaur, Attendra (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Salient object super-resolution refers to enhancing the resolution and details ofsalient objects or regions in an image. It is a sub-field of image super-resolution,which aims to generate high-resolution salient object ...
    • Save Rivers : An interactive website for Betwa Utthan organization in Vidisha (M.P) 

      Agarwal, Anusha (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      In our present time the river pollution is one of the biggest problems in our world. It�s mainly because of illegal dumping, industrialization and agriculture. Moreover, the people don�t know how to treat their sewage waste ...
    • Scalable Privacy-Preserving Recommendation System 

      Tamboli, Rushabh (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      Recommendation systems, which are used by e-business applications, play an essential role in our daily life. For example, companies like Amazon, Flipkart, YouTube use recommendation systems to generate customized recommendations ...
    • Scalable routing in mobile ad hoc networks 

      Patel, Brijesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      In Mobile Ad Hoc Networks (MANETs), performing routing is a challenging task in presence of the varying network parameters like node mobility, traffic and network size. It is very important to analyze the scalability ...
    • Scheduling and isolation in virtualization 

      Somani, Gaurav (Dhirubhai Ambani Institute of Information and Communication Technology, 2009)
      Virtual machine (VM) based server implementation is popular for numerous advantages like fault isolation, efficient hardware utilization, security and ease of management. Virtual machine monitor (VMM) like Xen is a popular ...
    • Scheduling in grid: rescheduling MPI applications using a fault-tolerant MPI implementation 

      Reddy, M. Vivekananda (Dhirubhai Ambani Institute of Information and Communication Technology, 2005)
      Due to advancement in grid technologies, resources spread across the globe can be accessed using standard general purpose protocols. Simulations and scientific experiments were earlier restricted due to limited availability ...
    • Schema based indexing for namespace mapping of raw sparql and summarization of lod 

      Hapani, Hitesh (Dhirubhai Ambani Institute of Information and Communication Technology, 2015)
      Linked open data(LOD) in Semantic Web is growing day by day. There are datasets available that can be used in different application. However, identifying useful dataset from cloud, determining the quality and obtaining ...
    • Schema Design and Evaluation for Cassandra 

      Hajare, Kavan Vijaybhai (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Cassandra is one of the widely used distributed database because of some featureslike fault tolerance, partition tolerance, seamless replication and scalability. However,designing the schema for Cassandra is a challenging ...
    • SDINet Scheme for Generalized Text Detection in Scene and Document Images 

      Pal, Pravir (Dhirubhai Ambani Institute of Information and Communication Technology, 2022)
      Text Detection is an essential intermediate step in optical character recognition (OCR). OCR applied in scene text images is helpful for applications such as traffic signs and vehicle number plate recognition. OCR applied ...
    • Secure and efficient dealing with node capture attack in wireless sensor networks 

      Agrawal, Sarita (Dhirubhai Ambani Institute of Information and Communication Technology, 2017)
      Wireless Sensor Networks (WSN) have found enormous applications in various areas of day-to-day life such as in health-care, battle-field surveillance and disaster management. The communication amongst the sensor nodes ...
    • Secure and efficient key assignment scheme for dynamic access control in a hierarchy 

      Vadnala, Praveen Kumar (Dhirubhai Ambani Institute of Information and Communication Technology, 2006)
      The users belonging to an organization are often assigned different access permissions depending on their security class. In this situation, the users belonging to a higher security class are allowed access to the information ...
    • Secure data delivery in mobile ad hoc network using multiple paths 

      Maheshwari, Mayur (Dhirubhai Ambani Institute of Information and Communication Technology, 2011)
      A mobile ad hoc network (MANET) is a self configurable, self organized, infrastructure less multi hop mobile wireless network.Characteristics of ad hoc network make security a critical issue i.e. any node can join the ...
    • Secure SQL with access control for database as a service model 

      Dave, Jay (Dhirubhai Ambani Institute of Information and Communication Technology, 2014)
      Rapid growth of internet and networking technology emerges "Software as a service model". In this model, application service providers (ASP) provides each functionality of software over internet. ASP provides access of ...
    • Security analysis of two fair exchange protocols 

      Gahlot, Jai (Dhirubhai Ambani Institute of Information and Communication Technology, 2007)
      E-commerce applications enable two parties to exchange digital items electronically. It is critical for such applications that the underlying protocols ensure the fairness requirement: no honest participant should suffer ...
    • Security and Privacy concerns in Voice Assistants Devices 

      Trivedi, Revant (2021)
      Voice assistant devices are the new generation devices which provides voice interfaces to interact. They are backed with powerful technologies and service providers. These devices perform various tasks by just providing ...
    • Security Enhancement using Channel State Information for Multicarrier Modulation 

      Sindhav, Nidhi K. (2021)
      Wireless technologies of the fifth generation (5G) are vital to advancing Internet-of- Things (IoT) networks in the future. Information security in wireless networks is one of the most difficult problems due to the open ...
    • Security of remote car locking system against eavesdropping 

      Patel, Jinita (Dhirubhai Ambani Institute of Information and Communication Technology, 2018)
      Vehicle industry is growing rapidly. To sustain in the market manufacturer uses various technology in vehicles. In today's world users need more comfort in addition to efficiency of vehicles. With the advancement in the ...
    • Segmentation and classification: optical character recognition algorithms to enhance the accuracy 

      Shah, Ketul Tejas (Dhirubhai Ambani Institute of Information and Communication Technology, 2019)
      OCR (Optical Character Recognition) is a well known algorithm for the conversion of machine printed or handwritten text images to machine-encoded text. As the word "Optical" is related to light or vision, an OCR system ...
    • Self-Calibrating Soil Moisture Sensor for In-Situ Application 

      Jain, Shivangi (Dhirubhai Ambani Institute of Information and Communication Technology, 2023)
      Self-calibration techniques are performed with the following methods likesensor calibration wrt sensor and sensor calibration wrt soil. For self-calibrationwrt sensor, we deployed the sensor in different states of soil ...