CAN DECREASE ANY CRITICAL RELIEF DISTRIBUTION PROBLEM USING E-RELIEF |
Author : Sritha Zith Dey Babu, Digvijay Pandey, Ismail Sheik |
Abstract | Full Text |
Abstract :Electronic relief system based on complete database design and flowgram by which the Government and people will get their comfort and convenient zone of any pandemic situation. In every serious issue which is included with economy and management, we get mismanagement every time. To solve this matter we can
create ERP based software like an E-relief system which will give people their needs according to a list. This paper is going to solve the matter of management and distribution using computer science |
|
EMPLOYABILITY OF KNN, NAÏVE BAYES, AND RANDOM FOREST ALGORITHMS BY LEVERAGING MACHINE LEARNING TECHNIQUES TO ENHANCE THE APPROPRIATE SELECTION OF SUBJECTS FOR STUDENTS OF ICSE BOARD SYSTEM |
Author : Romharsh Mittal |
Abstract | Full Text |
Abstract :Objective: Academic advising requires a lot of expertise, time, and responsibility. To assist the human advisors efficiently, the upcoming computerized advising system is a necessity. Methods/Statistical Analysis: Course Advisory System has been implemented using the WEKA tool to recommend subjects for 8th class students of the ICSE board. Machine learning algorithms – Naïve Bayes, J48, PART, Random Forest, and KNN, have been modeled and tested on the data set. The performance of each
classifier has been compared and analyzed.
|
|
USING QUANTUM CRYPTOGRAPHY- ANALYSIS OF DATA STORAGE AND SECURITY TO DEVELOP A FRAMEWORK FOR ENHANCING DATA SECURITY |
Author : Gautam Anand |
Abstract | Full Text |
Abstract :Cloud is now a days an emerging and most demanding technology in general public as well as the corporate world.But there are a lot of challenges in cloud security, including data theft and hacking of cloud server, that is why many users lose their data. Due to this reason, the general-user resists themselves from storing a more
important document on the cloud server.In our proposed solution, we are suggesting advanced quantum cryptography in cloud server security. To safeguard communication between user and sender photons technique with cryptographic keys are implemented.
|
|
COMPARATIVE ANALYSIS OF MACHINE LEARNING AND LEXICON BASED TECHNIQUE IN ENHANCING THE EFFICACY OF ‘SENTIMENT ANALYSIS’ |
Author : Akshat Khapra |
Abstract | Full Text |
Abstract :In Recent era, many people tell their feeling about the product on social media like Facebook and twitter. These feelings must be analysed to get the accurate result of a product quality, which helps other user to decide about the particular product. As we know there is huge quantity of reviews available in social media which is not easily analysed, for that Hadoop is better technology to analyse and give accurate as well as faster result. Now a day, word sentiment lies under two category i.e. machine learning and semantic comprehension. machine learning work better on trained dataset but semantic comprehension works of any type of data. Comprehensive technique uses tree data with systematic way for traversal data approach. this data work at high rate of hash function. Sentiment analysis requires huge amount of data to analyse completly.so in Hadoop like pig and hive provides such base to analyse it. |
|
SHARED AUTHENTICATION SCHEME FOR IOT APPLICATION |
Author : Akshata Rahul Pathak |
Abstract | Full Text |
Abstract :Internet of Things (IoT) is the following rising procedure wherein every single thing on the planet is getting associated with the web by methods for different correspondence systems. By utilizing the procedure of multicasting, these things speak with one another to move the information. So there is a need of a confirmation plot so as to counteract the information structure getting debased while transmitting. As we probably aware trillions of gadgets are associated with IoT |
|