Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 22
Issue Date | Title | Author(s) |
2021-05 | A Review on Question and Answer System for COVID-19 Literature on Pre-Trained Models | Bavishi, Hilloni; Nandy, Debalina |
2021-08 | Improve Data Security on Mobile Phone using Encryption Schemes | Solanki, Divya; Bhalodia, Tosal |
2014-02 | Wireless Sensor Network: Analysis Of Routing Protocols | Parmar, Jekishan; Kalariya, Paras |
2014 | A survey on Frequent Itemset Mining Techniques using GPU | Patel, Ayushi; Bhalodiya, Dharmesh |
2014-04 | Comparative Study of Frequent Itemset Mining Techniques on Graphics Processor | Bhalodiya, Dharmesh; Patel, Chhaya |
2019-05 | Mining Recurring Patterns in Time Series | Bhalodiya, Dharmesh; Tadhani, Jaydeep; Davda, Rajesh |
2017 | World of Cyber Security and Cybercrime | Buch, Rachna; Ganda, Dhatri; Kalola, Pooja; Borad, Nirali |
2020-06 | A Review on: Multi-Agent System for Multi-Keyword Search and Blind Storage | Borad, Nirali; Shilu, Rupal |
2021-06 | Personality Prediction Based on Twitter Information | Rajpara, Krupa; Shilu, Rupal |
2021-06 | Web Page Categorization using RNN Based on URL | Vaishnav, Pratiksha; Kalariya, Ankit |
2017-03 | Cyber Security - Security Problems and Encounters in Physical System | Bhalodia, Tosal; Zala, Keyur; Nandy, Debalina |
2016-05 | An Enhanced Congestion Control with Bit Error Identification for TCP-Vegas | Bharad, Dimple; Bhalodia, Tosal; Sharma, Shubham |
2013-05 | Minimum-Utilization-Energy-Type routing in wireless sensor network | Bhalodia, Tosal; Agrawal, Rashmi; Rathod, J. |
2013 | Timely event-based confide system using social networking | Bhagchandani, Niraj; Padhariya, Nilesh; Ghosh, Pinaki A. |
2017-03 | Security Challenges in Big Data | Nandy, Debalina; Paadariya, Renish; Bhalodia, Tosal |
2014-02-01 | Wireless Sensor Network: Analysis of Routing Protocols | Parmar, J.K.; Kalariya, P.P. |
2015-04-01 | A Survey on Moving Object Detection and Tracking Methods | Pathan, I.; Chauhan, C. |
2013-12-01 | Introduction to Geographical Information System, GIS data models, spatial data, spatial database, A Location based Secure Access Control Method for Geospatial Data | Goswami, J.K.; Chauhan, C. |
2014-06-01 | A Location based Secure Access Control Method for Geospatial Data using Fine Grained Security Access Method | Goswami, J.K.; Chauhan, C. |
2015-07-01 | Reducing Speckle Noise in Medical Ultrasound Image using Diffusion Filter Algorithm | Vadar, S.M.; Chauhan, C. |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 22