LEVERAGING MACHINE LEARNING TECHNIQUES IN THE EFFICACIOUS DETECTION OF BULLYING WORDS AS USED ON SOCIAL NETWORKING MEDIA | Author : Deeya Tangri | Abstract | Full Text | Abstract :Electronic media has affected user content, online related with the rise, and regular connections. Nevertheless,
online media stages like Facebook have made a substitute sort of aggression just for the web. An undeniable level
way to deal with the obtuse treatment of SM online journals is posting in this article. Furthermore, the modelbased explanations behind doing nauseating battling shows are representing. We lead a severe assessment of
online harassing opinions and describe the crucial issues in their unforeseen development. This article offers
intelligent data about discovering offence for the most part and perhaps focuses on how its driven. While
information collection and dimensionality reduction systems have, in general sense, stretched. However, success
relies on dimensionality reduction and PC vision to figure online affectation movement. At last, the solicitations
and issues have been raised for a relationship to isolate. |
| DEVELOPING A FRAMEWORK FOR THE ENHANCED AND EFFECTIVE SECURING OF DATA ON CLOUD USING CRYPTOGRAPHY | Author : Prachi Juneja | Abstract | Full Text | Abstract :With the advancement of distributed computing, there is a surprising requirement for security systems. A portion
of the essential expectations here is an improper collection of information. This specific thought altogether
improves clients tension and limits the flexibility of distributed computing in various regions, including the
monetary business and legislative offices. The best strategy to offer a danger-free information move is using cloud
cryptography and function procedures. Thinking about this, we propose another and safer algorithm for
communicating information over the cloud. In this approach, the data is encoded and afterwards split into two
distinct parts. Each part is put away in an alternate cloud. This makes the information trying for a programmer;
in any event, it will be of no use to him when received. This will utilize three encryption and two unscrambling
keys, subsequently a combination of symmetric and unbalanced cryptography. |
|
|