Paper Type | :: | Research Paper |
Title | :: | Intranet Exam Engine |
Country | :: | India |
Authors | :: | Prof. Minakshee Chandankhede || Nikita Sahare || Prashik Masarkar || Sapna Chouksey |
Page No. | :: | 01-04 |
Keyword :Intranet, LAN, offline education
Paper Type | :: | Research Paper |
Title | :: | UAV Drone for Object Detection and Identification with Flight Stability |
Country | :: | India |
Authors | :: | Shashank Singh || Renua Tekam || Vikramaditya Thakur || Prof. Vikrant Chole |
Page No. | :: | 05-10 |
This paper describes the improvements in surveillance, using an Unmanned Aerial Vehicle (UAV), when integrated with the "capabilities" of Artificial Intelligence (AI). The system relies on Convolution Neural Network based deep learning model to detect and identify entities such as humans, animals, and vehicles in a noisy environment. The system also uses multiple instances of a closed loop feedback algorithm called the Proportional Integral and Derivative (PID) to achieve a high degree of flight stability and thus capable of tracking objects, up to certain degrees of automaticity and to balance the flight dynamics of the system
Keywords: UAV, Autonomous, Surveillance, Machine Learning, Artificial Neural Network.
Paper Type | :: | Research Paper |
Title | :: | A Survey on Discovery of Sequential Pattern |
Country | :: | India |
Authors | :: | Prof. AnkitaBidwaikar |
Page No. | :: | 11-14 |
Sequential pattern mining is one of the essential technique in data mining which is concerned with finding statistically related patterns between the examples of data, where the values are delivered in a sequence. It is presumed that the values are discrete, and thus time series mining is closely related, but usually considered a different activity. The discovery of sequential Pattern is a special case of structured data mining. There are several key traditional computational problems addressed within this field including indexes for sequence information and building efficient databases, extracting the occurring patterns frequently, comparing sequences for similarity, and recovering missing sequence members. The sequence mining problems can be classified as string mining which is typically based on string processing algorithms and itemset mining which is typically based on association rule learning. Local process models extend sequential pattern mining to more complex patterns that can include choices, loops, and concurrency constructs in addition to the sequential ordering construct.
Keywords: String Mining, Itemset Mining, Association Rule Learning
[1]. Mabroukeh, N. R.; Ezeife, C. I. (2010). "A taxonomy of sequential pattern mining algorithms". ACM Computing Surveys. [2]. Tax, N.; Sidorova, N.; Haakma, R.; van der Aalst, Wil M. P. (2016). "Mining Local Process Models". Journal of Innovation in Digital Ecosystems. [3]. Abouelhoda, M.; Ghanem, M. (2010). "String Mining in Bioinformatics". In Gaber, M. M. Scientific Data Mining and Knowledge Discovery. Springer. [4]. Han, J.; Cheng, H.; Xin, D.; Yan, X. (2007). "Frequent pattern mining: current status and future directions". Data Mining and Knowledge Discovery. [5]. George, A.; Binu, D. (2013). "An Approach to Products Placement in Supermarkets Using PrefixSpan Algorithm". Journal of King Saud University-Computer and Information Sciences. [6]. Mount DM. (2004). Bioinformatics: Sequence and Genome Analysis (2nd ed.). Cold Spring Harbor Laboratory Press: Cold Spring Harbor, NY.
Paper Type | :: | Research Paper |
Title | :: | Data Mining: Past, Present and Future |
Country | :: | India |
Authors | :: | Dr. Dhiraj N. Shembekar || Prof. Sudhir Juare |
Page No. | :: | 15-20 |
Knowledge has played a significant role in every sphere of human life. To acquire knowledge we have to analyze the unlimited data that is available to us in various formats in the form of databases. Data mining is a technology that blends traditional data analysis methods with sophisticated algorithms for processing large volumes of data. Data mining roots are traced back along three family lines: classical statistics, artificial intelligence, and machine learning. The term "Data mining" was introduced in the 1990s, but data mining is the evolution of a field with a long history. Term "Knowledge Discovery in Databases" for Information Harvesting...........
Keywords: Knowledge, Data Mining
[1]. https://www.information-age.com/importance-data-mining-123469819/
[2]. https://www.cs.cornell.edu/gries/40brochure/pg18_19.pdf
[3]. http://iranarze.ir/wp-content/uploads/2018/10/9325-English-IranArze.pdf
[4]. https://pdfs.semanticscholar.org/8a60/b0 82aa758c317e9677beed7e7776acde5e4c.pdf
[5]. http://sites.bu.edu/phenogeno/files/2014/06/grossman98-Data-minin-research-opportunities.pdf
Paper Type | :: | Research Paper |
Title | :: | A Study of Information Retrieval Systems |
Country | :: | India |
Authors | :: | Mrs. Rashmi G.Dukhi |
Page No. | :: | 21-24 |
Information has become the most significant source of our day-to-day life. Information available on internet may create some confusion among its users because of its diversity. In order to get proper and exact information from internet, users need to know the effective techniques and strategies. This paper focuses on the functional process of retrieval which help users to get the required information and also to save their valuable time. This paper also contains the examples in which information retrieval techniques are used.
Keywords: Information retrieval; Search process; Search strategies; Retrieval techniques
[1]. Jansen, B. J. and Rieh, S. (2010) The Seventeen Theoretical Constructs of Information Searching and Information Retrieval. Journal of the American Society for Information Sciences and Technology. 61(8), 1517-1534.
[2]. Goodrum, Abby A. (2000). "Image Information Retrieval: An Overview of Current Research". Informing Science. 3 (2).
[3]. Foote, Jonathan (1999). "An overview of audio information retrieval". Multimedia Systems. 7: 2–10. CiteSeerX 10.1.1.39.6339. doi:10.1007/s005300050106.
[4]. Beel, Jöran; Gipp, Bela; Stiller, Jan-Olaf (2009). Information Retrieval On Mind Maps - What Could It Be Good For?. Proceedings of the 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom'09). Washington, DC: IEEE.
[5]. Frakes, William B.; Baeza-Yates, Ricardo (1992). Information Retrieval Data Structures & Algorithms. Prentice-Hall, Inc. ISBN 978-0-13-463837-9. Archived from the original on 2013-09-28.
Paper Type | :: | Research Paper |
Title | :: | Overview of Electronic Test System |
Country | :: | India |
Authors | :: | ShubhamKanojiya || Suhasini Surjuse || Pranali Ganvir || Prof. Satish Pusdekar |
Page No. | :: | 25-28 |
Technology has maintained online tests successfully for a number of years, and has gradually enhanced the online examination process over the years. Offline examinations has various demerits.Electronic Test System is a website which will conduct online tests. The main idea of electronic test system is to manage any individual to become an admin and conduct test of specific candidates.
Keywords- Online Examinations, Examiner Admin, Website
[1]. ShubhamBobde "Web Based Online Examination Methodology", GRD Journals- Global Research and Development Journal for Engineering | Volume 2 | Issue 5 | April 2017 ISSN: 2455-5703 Date: April 2017.
[2]. Nicholas A. I. Omoregbe "Implementing an Online Examination System", Oceedings of 8th International Conference of Education, Research and Innovation (ICERI2015), At Spain Dated- November 2015.
[3]. Anjali Singhal "My Research paper on Online Examination System" International Journal of Engineering Technology, Management and Applied Sciences, www.ijetmas.com August 2014, Volume 2 Issue 3, ISSN 2349-4476.
[4]. XuQiaoxia, Liu Dongsheng. Research and Design of the Safety of Network Examination System [J]. Computer Education, vol 5, pp. 40-42, 2010.
Paper Type | :: | Research Paper |
Title | :: | Electronic Test System (ETS) |
Country | :: | India |
Authors | :: | Saurabh Sutar || Prachi Sontakke || Prof. Satish Pusdekar |
Page No. | :: | 29-36 |
The electronic test system (ETS) will assist in speeding up the process of conducting assessment. Examiner will be able to conduct exams by integrating a set of questions. The questions can be multiple choice questions or text solution to the questions. The methodology will have the potential to do automated processing of the results of assessment based on the question which admin has put into database. The methodology will have brainy capabilities to pick the writing based solutions when not only there is an exact match, but it will also find out same solutions by verifying/scanning the synonyms of the words used in the solution. The ETS methodology engine will also avail us with the manual override specification where the examiner can manually pick up or update the result for an exam. The methodology will present an effortless to use interface for examiner, Candidates and Super Admin. Any person can act as an examiner or candidate. Once logged in, candidate will be able to see the assessments due and can take the assessment..............
Keywords- Examination, Examiner, Candidate, Super Admin, Manual Override, Automated System.
[1]. Song Luo, Jianbin Hu, Zhong Chen." Task based automatic evaluation system for sequenced test ". 2009 International Conference on Electronic Computer Technology, 2009, pp.18-21.
[2]. J.Zhang, W.Fang, J.Song,"The Design and Realization of the Intelligentize Online Testing System Based on Templates", Knowledge Acquisition and Modeling, 2009. KAM '09.
[3]. Intelligentize Online Testing System Based on Templates", Knowledge Acquisition and Modeling, 2009. KAM '09. Second International Symposium on, vol.3, no., pp.248-251, Nov. 30 2009- Dec. 1 2009.
[4]. Song Luo, Jianbin Hu and ZhongChen."Task based automatic assessment methodology for sequenced test". 2009 International Conference on Electronic Computer Technology, 2009, pp.18-21.
Paper Type | :: | Research Paper |
Title | :: | Green Computing Utilization for Optimizing Business Operations |
Country | :: | India |
Authors | :: | Mr. Prof. PrafullaKarande |
Page No. | :: | 37-40 |
Green Computing (or Green IT) is considered to be the environmentally responsible manner for businesses to acquire, use and dispose of technology resources. While the term also applies to those systems and devices used at home and for leisure activities, commercial organizations make a much larger footprint on the environment in general. Green computing refers to the practice and procedures ofusing computing resources in an environment friendly way while maintaining overall computing performance. Global warming is on the rise and the average temperature of the Earth's climate system is getting disturbed due to wide range of factors. Climate change and associated impacts vary from region to region across the globe. Nowadays, weather behavior is becoming extremely unpredictable throughout the globe. Green computing plans often include the implementation of energy-efficient central processing units.............
Keywords- Green Computing, Environment and Virtualization.
[1]. http://en.wikipedia.org/wiki/Green_computing
[2]. Mishra, Sushree. "GREEN COMPUTING." Science Horizon (2013): 21.
[3]. www.cdproject.net
[4]. Wong, H. "EPA datacenter study IT equipment feedback summary." Intel Digital Enterprise Group, Cited in: Report to Congress on Server and Data Center Efficiency Public Law. 2007.
[5]. www.lamk.fi/english/future-students Fanara, A. "Report to congress on server and data center efficiency." Publiclaw (2007): 109-431.
[6]. Schmidt, Roger R., and H. Shaukatullah. "Computer andtelecommunications equipment room cooling: a review of literature."Thermal and Thermomechanical Phenomena in Electronic Systems
Paper Type | :: | Research Paper |
Title | :: | Several Problems in Multimedia Technology in Advanced Mathematics Teaching |
Country | :: | India |
Authors | :: | Usha Kosarkar |
Page No. | :: | 41-44 |
The application of multimedia technology in advanced mathematics teaching has become a tendency, and it meets with some dispute during the process of application. In this article, we will analyse the position and superiority of multimedia technology in advanced mathematics teaching, and traditional teaching and traditional teaching. Besides, we will also study the problems about how to make the proper application of multimedia technology in advanced mathematics teaching.
Keywords: Advanced mathematics; Multimedia technology, Auxiliary teaching.
[1]. Hong-Ye,"Research on practice of Multi-Media Education in OurUniversity" [J]. Journal of UESTC (social sciences edition)Jun.2005,Vol.7,No.2.
[2]. Chunyuan-,Zhao"Discussion on the application ofmultimedia teachingon classroom teaching of advanced mathematics"[J].Journal ofShenyang Institute of Engineering(Social Sciences). Jul.2010,Vol.6, No.3.[3]. Lili-Zhang,"Discussion on Multi-media in Advanced MathematicsClassroom Teaching" [J]. Studies In College Mathematics Jul.2007,Vol.10,No.4.
[4]. Shui-Bai "On the Application of Multimedia in the Teaching ofAdvanced Mathematics" [J] Journal of the CUN(Natural SciencesEdition).
[5]. Chunyan-Wei, "The Application of Multimedia in AdvancedMathematics Teaching" [J] Journal of Anhuivo Cational College ofElectr Onics & Information Technology� No.5 2009 GeneralNo.44.
Paper Type | :: | Research Paper |
Title | :: | An Evolutionary Approach for Intrusion Detection Using Genetic Algorithm Operators |
Country | :: | India |
Authors | :: | Ms. Kanchan Gawande || Ms. Yamini Laxane |
Page No. | :: | 45-49 |
today the growths of information technology and internet users impact the importance of data on the network. For every organization operational as well as history data play very important role thus it a valuable asset to any organization. But unfortunately the threat (Intrusion) to the same is also exploding rapidly. Special & new types of attacks are introduced day by day. So the need for better and more efficient intrusion detection systems increases. The primary problem with current intrusion detection systems (IDS) is high rate of false alarms. There is lot of techniques and areas which plays vital role in building security applications. In this paper we presents evolutionary algorithm technique i.e. Genetic Algorithm for Intrusion Detection System. It also provides a concise introduction to the parameters and evolution process of a GA and how to implement it in real IDS.
Keywords: DDOS Attack, Evolutionary algorithm, GA-RIDS, Genetic Algorithm, Intrusion, IDS, threats
[1]. T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. Neumann, H. Javitz, A. Valdes, and T. Garvey. "A real-time intrusion detection expert system (IDES)" - final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California, February1992.
[2]. K. Ilgun, R. A. Kemmerer, and P. A. Porras. "State transition analysis: A rulebased intrusion detection approach". IEEE Transactions on Software Engineering, 21(3):181–199, March1995
[3]. John E. Dickerson, and Julie A. Dickerson "Fuzzy Network Profiling for Intrusion Detection" Electrical and Computer Engineering Department Iowa State University Ames, Iowa,50011.
[4]. Rui Zhong, and Guangxue Yue "DDoS Detection System Based on Data Mining" ISBN 978-952-5726-09-1 (Print) Proceedings of the Second International Symposium on Networking and Network Security (ISNNS '10)Jinggangshan, P. R. China,2-4,April.2010,pp.062-065.
[5]. Dietrich, S., Long, N., and Dittrich, D. 2000. Analyzing distributed Denial of service attack tools: The shaft case. In Proceedings of 14th Systems Administration Conference. New Orleans, Louisiana, USA,329-339.
Paper Type | :: | Research Paper |
Title | :: | Investigating SEO Tools for Effective Web Page Design |
Country | :: | India |
Authors | :: | Ms. Sandhya Dahake || Dr. V. M Thakre || Dr. PradeepButey |
Page No. | :: | 50-55 |
Search engine optimization techniques, often shortened to SEO, should lead to first positions in organic search results. Some optimization techniques do not change over time, yet still form the basis of SEO. However, as the Internet and web design evolves dynamically, new optimization techniques arise and die. Search Engine Optimization (SEO) techniques for optimizing the content of the Web sites in such a way that appears higher in the result page which results in increasing the traffic and revenue for the Web site. Several factors and techniques will be used to boost the ranking appearance of a Web site in search engines. With this webpage Search engine optimization (SEO) involves designing, writing, and coding a webpage in a way that helps to improve the volume and quality of traffic to your webpage from people using search engines.............
Keywords:Crawler Technology, Keyword Selection, Module, SEO-techniques, Web page,
[1]. Venkat N. Gudivada and Dhana Rao, East Carolina University Jordan Paris, CBS Interactive " Understanding Search Engine," in IEEE Computer Website, www.computer.org pp. 43-52, 2015
[2]. RajvardhanPatil, Zhengxin Chen and Yong Shi1,, "Database Keyword Search: A Perspective from Optimization", 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, pp. 30-33, 2012
[3]. Meng Cui and Songyun Hu, "Search Engine Optimization Research for website Promotion," in IEEE Int. Conf .of Information Technology, Computer Engineering and Management Sciences), pp. 100-103, 2011.
[4]. Vinit Kumar Gunjan, Pooja, Monika Kumari,Dr Amit Kumar, Dr. Allamapparao, "Search engine optimization with Google", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, pp. 206-214, January 2012,
[5]. Cen Zhu and Guixing Wu in" Research and Analysis of Search Engine Optimization Factors Based on Reverse Engineering" in Third International Conference on Multimedia Information Networking and Security, pp. 225-228, 2011
Paper Type | :: | Research Paper |
Title | :: | The Recent Changes in Big Data Analysis |
Country | :: | India |
Authors | :: | Prof. Prashant Dupate |
Page No. | :: | 56-58 |
With the explosion of data sizes, the domain of big data is gaining enormous and prevalent popularity and research worldwide. The big data as well as big data repository possesses some peculiar attributes. Perhaps, analysis of big data is a common phenomenon in today's scenario and there are many approaches with positive aspects for this purpose. However, they lack the support to deal conceptual level. There are numerous challenges related to the performance of big data analysis. Precisely, these challenges are mainly related to enhance the effectiveness of big data analysis and optimum utilization of resources. Indeed, the lack of runtime level indicates the unawareness of various..........
Keywords: Hybrid Power Control System (HPCS), Automatic Transfer Switch (ATS), relays, contactors.
[1]. Data Analytics Made Accessible, by A. Maheshwari
[2]. Predictive Analytics: The Power to Predict Who Will Click, Buy, Lie, or Die by E. Siegel
[3]. Too Big to Ignore: The Business Case for Big Data, by award-winning author P. Simon
[4]. Analytics in a Big Data World: The Essential Guide to Data Science and its Applications, Bart Baesens
[5]. https://www.forbes.com/sites/bernardmarr/2017/06/06/the-9-best-free-online-big-data-and-data-science-courses/#3e1f5ed443cd
[6]. https://journalofbigdata.springeropen.com/articles/10.1186/s40537-019-0194-3
Paper Type | :: | Research Paper |
Title | :: | Classification Model Using Artificial Bee Colony Optimization Technique |
Country | :: | India |
Authors | :: | Deoshree D. Diwathe |
Page No. | :: | 59-65 |
Data mining is a process of extracting and analyzing the large quantities of the dataset and discovering useful knowledge. Discovered Knowledge is useful for creating predictive structure. Classification Technique is useful to analyze and classify the set of data and generate the classified model. In this research, decision tree classifier with the greedy approach is implemented. With the help of greedy approach, the decision for each and every attributes gives perfect classification result But, the Greedy approach is generating a number of IF-THEN rules and proposed system is getting very complex and taking more time for classifying the data. Artificial Bee Colony optimization algorithm is combining with............
Keywords: Data Mining, Classification technique, Decision Tree Classifier with the greedy approach, Confusion Matrix, Artificial Bee Colony Optimization Algorithm (ABC Optimization Algorithm).
[1]. Abdul Rauf Baig, Member, IEEE, Waseem Shahzad, and Salabat Khan, ―Correlation as a Heuristic for Accurate and Comprehensible Ant Colony Optimization Based Classifiers‖, IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, VOL. 17, NO. 5, OCTOBER 2013, PP.686-704.
[2]. Ting-Cheng Feng, Tzuu-Hseng S. Li, "Advanced Hierarchical Fuzzy Classification Model Adopting Symbiosis Based DNA-ABC Optimization Algorithm", Scientific Research PublishingInc. March 2016, pg no- 441-455.
[3]. Nadezda STANAREVIC, Milan TUBA, Nebojsa BACANIN, "Enhanced Artificial Bee Colony Algorithm Performance", International Journals of LATEST TRENDS on COMPUTERS (Volume II), page no. 440-445.
[4]. D.Lavanya1 and Dr.K.Usha Rani, "ENSEMBLE DECISION TREE CLASSIFIER FOR BREAST CANCER DATA" , International Journal of Information Technology Convergence and Services (IJITCS) Vol.2, No.1, February 2012,page no.- 17-24.
[5]. Hanning Chen, Lianbo Ma, Maowei He, Xingwei Wang, ―Artificial Bee Colony Optimizer Based on -Cycle for Stationary and Dynamic Optimization‖, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS: SYSTEMS 2016,pp.1-20.
Paper Type | :: | Research Paper |
Title | :: | Design of Real Time Analytics with Intelligent Query Adviser in Big Data and Analytics |
Country | :: | India |
Authors | :: | Dr. Vaibhav R. Bhedi |
Page No. | :: | 66-68 |
In view of Big data analytics, The Real-Time Analytics enables the business to leverage information and analysis as events are unfolding [1]. It included proposed Intelligent Query Adviser, interactive dash board, Event processing and advanced Analytics. Intelligent Query Adviser can find contents of required analysis. Intelligent Query Adviser can determine the expected result. The Intelligent Query Adviser will be used to suggest the query depend on analyst thought. It will be included in interaction layer of Big data Architecture. The suggested queries from Intelligent Query Adviser will be based on thought of analyst with availability of big data. So it will help analyst to know the availability of data in big data.
Keywords: Intelligent Query, Analytics, Big Data
[1]. Oracle Enterprise Transformation Solutions Series, "Big Data & Analytics Reference Architecture", Online Available: https://www.oracle.com/assets/oracle-wp-big-data-refarch-2019930.pdf
[2]. Sisense Online Availble: https://www.sisense.com/glossary/real-time-analytics/
[3]. Jiang H., Chen Y., Qiao Z., Weng T.H., Li K.C.Scaling up MapReduce-based big data processing on multi-GPU systems Cluster Computing, 18 (1) (2015), pp. 369-383
[4]. Techopedia - The IT Education Site. Online available: https://www.techopedia.com/definition /32370/advanced-analytics
[5]. Oracle Sponsor Decision Management Solution "Real-Time Responses with Big Data:" Online Available: https://www.oracle.com/assets/realtime-responses-big-data-wp-2524527.pdf
Paper Type | :: | Research Paper |
Title | :: | A Study on SEO with Webpage Design |
Country | :: | India |
Authors | :: | Ms. Sandhya Dahake || Dr. V. M Thakare || Dr. PradeepButey |
Page No. | :: | 69-74 |
The time, information available on tip of finger webpage plays important role. A web page design is the most successful when it appeals to the lowest common denominator- that is, people who do not understand how to use computers must be able to navigate the web page's layout. With this webpage Search engine optimization (SEO) involves designing, writing, and coding a webpage in a way that helps to improve the volume and quality of traffic to your webpage from people using search engines. Good web page design is entirely determined by the way the end user interacts with the design. End users must not only find the site attractive enough to stay, but they must also be able to use and navigate the site quickly and easily, or they won't return.
Keywords: Crawler Technology, Keyword Selection, SEO-tools, Strategies, Web page,
[1]. Venkat N. Gudivada and Dhana Rao, East Carolina University Jordan Paris, CBS Interactive " Understanding Search Engine," in IEEE Computer Website, www.computer.org pp. 43-52, 2015
[2]. RajvardhanPatil, Zhengxin Chen and Yong Shi1,, "Database Keyword Search: A Perspective from Optimization", 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, pp. 30-33, 2012
[3]. Meng Cui and Songyun Hu, "Search Engine Optimization Research for website Promotion," in IEEE Int. Conf of Information Technology, Computer Engineering and Management Sciences), pp. 100-103, 2011.
[4]. Vinit Kumar Gunjan, Pooja, Monika Kumari,Dr Amit Kumar, Dr. Allamapparao, "Search engine optimization with Google", IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, pp. 206-214, January 2012,
[5]. Cen Zhu and Guixing Wu in" Research and Analysis of Search Engine Optimization Factors Based on Reverse Engineering" in Third International Conference on Multimedia Information Networking and Security, pp. 225-228, 2011.
Paper Type | :: | Research Paper |
Title | :: | Identifying User Details Captured Through Social Media |
Country | :: | India |
Authors | :: | Amit Pimpalkar || Rajat Thakare || Aman Laxane || Suraj Raut || Simran Lande || Payal Dhapodkar || Mayur Joshi |
Page No. | :: | 75-79 |
There is no all things considered framework accessible which will catch the item at runtime and foresee its data. We are building up this product which will catch the item picture, and contrast caught picture and the informational collection of web-based social networking and foresee client data. Like: Person Name, Address, DOB, Hobbies and so forth. Online life information is plainly the biggest, most extravagant and generally unique. By utilizing this immense dataset of web based life we can recover data of any individual just by catch the picture by an android gadget. In this proposed framework we use Viola-Jones Algorithm to identify the essences of the individual.............
Keywords: Image Capture, Face Detection, Viola-Jones Algorithm, Dataset Collection, Information Retrieval
[1]. Stefan Stieglitz, Milad Mirbabaie, Björn Ross, Christoph Neuberger" Social media analytics – Challenges in topic discovery, data collection, and data preparation", December 2017.
[2]. Fast Algorithms for the Maximum Clique Problem on Massive Sparse Graphs Bharath Pattabiraman , Md. Mostofa Ali Patwary , Assefaw H. Gebremedhin , Wei-keng Liao , and Alok Choudhary Published in December 2013
[3]. Diana Palsetia, Md Mostofa Ali Patwary, Kunpeng Zhang, Kathy Lee, User-Interest Based Community Extraction in Social Networks Published in August 2012.
[4]. Asur, S., &Huberman, B. A. (2010). Predicting the future with social media. Paper presented at the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT).
[5]. Belch, G. E., Belch, M. A., Kerr, G. F., & Powell, I. (2008). Advertising and promotion: An integrated marketing communications perspective: McGraw-Hill, London.
Paper Type | :: | Research Paper |
Title | :: | Survey on Data Security in Network Flow Using Obfuscation Technique |
Country | :: | India |
Authors | :: | Ms. Dikshaa. Rangari || Prof. Rashmi Dukhi |
Page No. | :: | 80-83 |
An application encompasses network modeling and simulation, recognition of privacy assaults, and formalization of research results. Indeed, existing techniques for network flow sanitization are vulnerable to different kinds of attacks, and solutions proposed for micro data anonymity cannot be directly applied to network traces. In our previous research, we proposed an obfuscation technique for network flows, providing formal confidentiality guarantees under realistic assumptions about the adversary's knowledge. Put forward an obfuscation technique that leads to confidential guarantee of IP address thus securing the sensitive data. In this paper, we identify the threats posed by the incremental............
Keywords:Security, Incremental release, Obfuscation, Code Security, Code obfuscation techniques, Privacy
[1]. J. King, K. Lakkaraju, and A. J. Slagell, ―A taxonomy and adversarial model for attacks against network log anonymization,‖ in
Proc. ACMSAC, 2009, pp. 1286–129
[2]. SornaSukanya G, ―Rattle Adversary In IP Address Race Of Puzzler Networks‖, in International Journal of Research in Computer
and Communication Technology, Vol 4, Issue 3 , March -2015
[3]. J. Fan, J. Xu, M. H. Ammar, and S. B. Moon, ―Prefixpreserving IP address anonymization: Measurement-based security evaluation
and a new cryptography-based scheme,‖ Comput. Netw., vol. 46, no. 2, pp.253– 272, 2004.
[4]. Y. Song, S. J. Stolfo, and T. Jebara, ―Behavior-based network trafficsynthesis,‖ in Proc. IEEE HST, 2011, pp. 338– 344.
[5]. G. Dewaele, Y. Himura, P. Borgnat, K. Fukuda, P. Abry, O. Michel, R. Fontugne, K. Cho, and H. Esaki, ―Unsupervised host
behavior classification from connection patterns,‖ Int. J. Netw. Manag., vol. 20, no.5, pp. 317–337, Sep. 2010
© 2019 All Rights Reserved | Design by iosrjen