APPLYING TREE BASED ASSOCIATION RULES (TAR) TO ENHANCE THE EFFICACY OF DISTRIBUTED DATA ENVIRONMENT |
Author : Hardik Chaudhary |
Abstract | Full Text |
Abstract :Extracting information from large amount of data is known as data mining which contains structured and semi structured data formats. Data mining includes prediction and analysis of the data. The system of query answering helps to make queries and improve the results for XML documents and reduced processing time even for big sized data files. In this paper, wild card search is used for extracting the frequent pattern to maximize search results in library database |
|
FACIAL FEATURE EXTRACITON: CLASSIFICATION OF AGE GROUP USING HAAR CASCADE AND KNN ALGORITHMIC MODELLING |
Author : Rishit Kalra |
Abstract | Full Text |
Abstract :Detection of various facial expression like OCR and gender has been broadly observed,persons profile and age group has been investigated. with the change of people’s age, face feature has also been changed. This paper includes three stages:feature extraction of faces, places, and classification. the geometric elements of face image like wrinkle,topography, face boundaries, distance between left and right eyes, eyes to nose connection points,lips to eyes and jaw to eye distance are calculated.This approach is done by using k-means clustering.
|
|
AN EFFICIENT APPROACH FOR CLUSTERING FACE IMAGES |
Author : Atul Antil |
Abstract | Full Text |
Abstract :Now a day there is a huge demand of face detection for security like banking, phone lock and other devices. Due to huge demand of machine learning technique to train and test data. with the rapid development of neural network like RNN, KNN, there is new technique i.e. CNN which is widely applied for face clustering.
previously there are few clustering techniques which is widely used in industry like SOM, and self-organised feature mapping neural technique and are still developing. In our research we are applying CNN for feature extraction then S-SOM for clustering face image data. |
|
DEVELOPING AN INFORMATION AND ARTIFICIAL INTELLIGENCE BASED MODEL IN DETECTION OF CREDIT CARD FRAUD USING DATA MINING AND MACHINE LEARNING |
Author : Aashima Bansal |
Abstract | Full Text |
Abstract :Information mining and AI systems help us to better and more profound comprehension of gathered information. Meta-learning strategies expand this idea by giving techniques to information disclosure process automatization. Meta-learning presents different fascinating ideas, including information metahighlights, meta-information, calculation proposal frameworks, independent procedure developers, and so on. Every one of these procedures means to improve generally costly and requesting information mining investigation |
|
EMPLOYBILITY OF DATA MINING TECHNIQUES TO PREDICT CYBER CRIME |
Author : Aryan Marwah |
Abstract | Full Text |
Abstract :Data mining is the technique in which data is to be extracted from heap of data’s which is previously unknown.This paper gives a brief overview of data mining techniques related to cybercrimes and explains how to implement data mining techniques. Cyber security relates with protecting network computer from various attacks like virus, ransomware and Trojans. Cyber security standards are security standards which enable organizations to practice safe security techniques to minimize the number of successful cyber security attacks. Data mining can be used to model crime detection problems. Cyber Crimes are a social nuisance and cost our society dearly in several ways |
|
SOLIDIFICATION AND STABILIZATION OF OIL DRILL CUTTING MUD WASTE USING PORTLAD CEMENT(PC) AND POROTHERM RED BRICKS POWDER (PRB) WASTE |
Author : Omar T Sheta, Anajah Rahile, Adelbast Amer, Khaled Turky |
Abstract | Full Text |
Abstract :In this study, solidification/stabilization (S/S) of heavy metals (HMs) (lead, (Pb); copper, (Cu); zinc, (Zn); nickel, (Ni); and chromium, (Cr)) using mixture of Portland cement (PC) 15% and Porotherm red bricks (PRB) powder waste with a rat of (5, 10 and15%) resultant (3:1, 3:2 and 3:3) cement/Porotherm solid monolith and degraded ones with three replicates was carried out. Physical and chemical characteristics were investigated. The physical characteristics studied were bulk density and unconfined compressive strength (UCS) while chemical characteristics studied were leachability of those aforementioned HMs using Toxicity Characteristics Leaching Procedure (TCLP) and the change in leachate ph |
|
IMPACT OF VARIATIONS IN THE POPULATION SIZE AND AGES OF GENETIC ALGORITHMS IN CRYPTOGRAPHY - AN EMPIRICAL STUDY |
Author : Sarthak Mendiratta |
Abstract | Full Text |
Abstract :The usage of a Genetic calculation in the symmetric square figure Advanced Encryption Standard - 128 (AES128) calculations to improve the exhibition of cryptographic tasks. The genetic calculation is utilized for creating the best fit non-dreary figure key and for key dissemination to plan a powerful Substitution confine AES-128. The examination uncovers that the productivity of the cryptographic calculation treated with the Genetic calculation is subject to the varieties in the number of ages and introductory populace size. The outcome demonstrates that the ideal populace size has less encryption and decoding time. Among the example
populace size taken for the investigation |
|
EMPLOYABILITY OF MOBILE CLOUD COMPUTING (MCC) ENHANCED SECURITY TECHNIQUES IN MALWARE DETECTION |
Author : Veronica Singh |
Abstract | Full Text |
Abstract :Objectives: Major privacy issues in Mobile Cloud Computing (MCC) environment such as security of data are focused in this research. Methods/Statistical Analysis: Two major issues relating to the MCC, first issue is that the owners have no full control over the infra-structure. Therefore, they set up their own methods to control data security and make it reliable. Secondly, the cloud owners have maximum rights because cloud owners can change and manage the user’s system and also make use of their data by implementing their rights. State the methodology adapted to meet your objectives. Findings: This study shows how data can be kept in confidentiality by maintaining necessary consistent relations in cloud. |
|
AN IN-DEPTH ANALYSIS OF ADVANCED ENCRYPTION STANDARD (AES) AND ELLIPTICAL CURVE CRYPTOGRAPHY (ECC) ALGORITHM TO ENHANCE THE DATA SECURITY FEATURES AND SAFEGUARDS IN CLOUD COMPUTING, 2019 |
Author : Drishti Arora |
Abstract | Full Text |
Abstract :To structure effective half and half design for information security is applied for verifying correspondence interface between two clients/senders by thinking aboutsymmetric key calculation and deviated key calculation. An exceptionally effective design for information security is applied for verifying correspondence connect between two clients/senders in cloud coordinated Internet of Things (IoT). Information is encoded with Advanced Encryption Standard (AES) calculation and Elliptical Curve Cryptography (ECC) idea is utilized for verifying the mystery key between client/sender and framework/recipient. In this engineering, verification is
given by Elliptic Curve Diffie Hellman calculation between client/sender and framework/beneficiary. |
|
AN IN-DEPTH ANALYSIS OF ADVANCED ENCRYPTION STANDARD (AES) AND ELLIPTICAL CURVE CRYPTOGRAPHY (ECC) ALGORITHM TO ENHANCE THE DATA SECURITY FEATURES AND SAFEGUARDS IN CLOUD COMPUTING, 2019 |
Author : Drishti Arora |
Abstract | Full Text |
Abstract :To structure effective half and half design for information security is applied for verifying correspondence interface between two clients/senders by thinking aboutsymmetric key calculation and deviated key calculation. An exceptionally effective design for information security is applied for verifying correspondence connect between two clients/senders in cloud coordinated Internet of Things (IoT). Information is encoded with Advanced Encryption Standard (AES) calculation and Elliptical Curve Cryptography (ECC) idea is utilized for verifying the mystery key between client/sender and framework/recipient. In this engineering, verification is
given by Elliptic Curve Diffie Hellman calculation between client/sender and framework/beneficiary. |
|
EMPLOYABILITY OF THE INTERNET OF THINGS IN BIG DATA MANAGEMENT IN CONNECTED WORLD OF INTERNET OF THINGS A NOVEL APPROACH |
Author : Pavit |
Abstract | Full Text |
Abstract :The Internet of Things (IoT) and Big Data have made the leap to turn into a mainstream issue and maintains board level priorities. Both IoT and big data are continuously creating headlines all over, drawing a huge amount of research interest and highlighting unique challenges. This growing recognition is due the intersection of both technologies with tremendous scope for business analytics and the prospective that still remains unexploited. Every day, industrial machine, health monitoring systems, sensors, and devices etc. connect to the Internet and exchange information. The future IoT will be extremely populated by huge quantity
of heterogeneous networked embedded devices |
|
EMPLOYABILITY OF NATURAL LANGUAGE PROCESSING IN THE GENERATION OF SQL FOR AN EFFICACIOUS EXTRACTION OF SEMANTIC KNOWLEDGE FROM SOCIAL MEDIA |
Author : Gitesh Budhiraja |
Abstract | Full Text |
Abstract :Gigantic development of web information makes an amazing fantasy in the field of PC and data innovation
for extricating important substance from the web. Numerous associations and interpersonal organizations
use data sets for putting away data, and the information will be gotten from the predefined information
store. Information can be recovered or gotten to by SQL inquiries. However, the inquiry is the as a standard
lingual explanation which must be prepared. Thusly, the fundamental objective of this investigation article
is to find a fitting strategy to change over ordinary language request to SQL and make the data appropriate
for semantic extraction. |
|
AN ANALYSIS OF THE KEY COMPONENT OF GIBBERELLIC ACID SIGNALLING IN PLANTS UTILISING MACHINE LEARNING TOOLS |
Author : Chaitanya Sachdeva |
Abstract | Full Text |
Abstract :For the explanation of enormous scale proteins, computational techniques or apparatuses are utilized. One of the disadvantages of these comment instruments is that they are not explicit protein forecast programs. In this investigation, we execute an AI calculation for quick and precise expectations of DELLA proteins. We created different modules by utilizing saved protein spaces in DELLA proteins. To assess the modules, classifiers like consecutive least improvement, J48 choice tree, AD tree, and strategic calculations were utilized. By breaking down the outcomes acquired from the free informational index and cross-approval tests, the most extreme precision was accomplished by calculated calculation |
|
COMPARATIVE STUDY OF MACHINE LEARNING TOOLS HADOOP DISTRIBUTED FILE SYSTEM, CASSANDRA FILE SYSTEM, QUANT CAST FILE SYSTEM TO ENHANCE THE EFFICACY OF DATA ANALYTICS ON UNSTRUCTURED DATA |
Author : Mukul Ganghas |
Abstract | Full Text |
Abstract :Objective: With the emergence of the belief of the "Internet of Things (IoT)," an enormous quantity of Data is being generated through the sensors and other computing gadgets and chips. This paper is an try to provide a lucid contrast among 3 outstanding technologies used for managing Big Data, viz. HDFS, Cassandra file system, and Quant robust record gadget. Apart from these three ultimate report systems, the paper additionally explores a newly proposed A Train Distributed System for dealing with Big Data. Methods: An internal perspective of
the above-stated record systems in details thinking about diverse components for coping with massive
information has been described |
|
DEVELOPING AN INTEGRATED MODEL TO ANALYSE AND FILTER REAL TIME SOCIAL MEDIA CONTENT |
Author : Aditya Goel |
Abstract | Full Text |
Abstract :As the web develops rapidly, social networking interpersonal communications have become an essential part of day to day life where individuals can chat with one another, spreading interactive media data. Subsequently, online informal communication locales are ideal for general trading sentiments. Online social networking interpersonal communication locales give safety efforts, yet they are restricted. In OSN websites like Facebook, Twitter, and others, there is a chance of posting any sort of information on client walls. Where such kind of messages and pictures which would be unsafe and leads to distraction using OSN websites. |
|
DEVELOPING AN APPLICATION OF QUANTUM COMPUTING THROUGH QUANTUM SECURE DIRECT COMMUNICATION IN VOTING BY LEVERAGING SINGLE QUBIT |
Author : Shreya Ahuja |
Abstract | Full Text |
Abstract :An epic quantum parallel democratic plan that utilizations just a solitary qubit is proposed. In particular, the convention is planned by altering a solitary qubit based plan for controlled deterministic secure quantum correspondence. The security of the convention is dissected over some particular assaults. Further, the qubit
proficiency of the convention is likewise determined. It is built up that on account of paired democratic, the proposed single qubit based quantum casting a ballot convention is more proficient than a portion of the as of late proposed conventions for parallel democratic. |
|
EXPLORING THE KNN, BAYESIAN CLASSIFIER, MLP, SVM CLASSIFICATION ALGORITHM WITH THE HELP OF THE NLTK TOOLBOX IN ENHANCING THE ACCURACY OF TEXTUAL INFORMATION RETRIEVAL FOR DETECTION OF FAKE NEWS |
Author : Hardik Chaudhary, Vipul Goyal |
Abstract | Full Text |
Abstract :The major objective of textual information retrieval is to process, search, and analyse the factual data from various applications. There are various textual contents, however, which express some subjective characteristics. Such content mainly includes the opinions, sentiments, attitudes, and emotions which contribute majorly within the fake news detection mechanisms. The fake news detection procedure has four major steps involved in it. In the initial step, the pre-processing of data is done from which the
features will be extracted in the second step |
|
REDUCING TASK EXECUTION TIME ON CLOUD NETWORK |
Author : Anirudh Dahiya |
Abstract | Full Text |
Abstract :The upgrading capacities and dispersal of versatile innovation increment the chance to assess possibly flimsy moveable gadgets as sources into lattices. Right now, we examined by proposing and figuring the improve debrought together employment planning technique for a versatile point to point correspondence framing a
framework. Distributed computing is the web related method of supercomputing. It is a kind of common condition, which regularly puts the enormous framework pools together by utilizing various methods; (I) Distributed and (ii) Virtualization, and so on |
|
DEVELOPING AN INTEGRATED MODEL BASED ON MACHINE LEARNING AND INTERNET OF THINGS (IOT) TO FORECAST CRITICAL FACTORS TO OPTIMIZE AGRICULTURAL YIELDS |
Author : Unnati Gupta |
Abstract | Full Text |
Abstract :As the worldwide population is increasing rapidly, so it is obvious that the demand for food also increase— likewise, nations like India whose 1/third capital originated from cultivating needs to improve the techniques for cultivating. We propose an IoT based framework, which gathers different physical elements continuously, for example, temperature, humidity, moisture and other things. This learning can be concentrated to get
diagnostic bits of knowledge. We attempt to apply different cutting-edge AI methods on this clustered information to forecast the yield appropriate for given elements. |
|
DEVELOPING AN INTEGRATED MODEL TO IDENTIFY THE CORE ELEMENTS IMPACTING THE SUSTAIN-ENTREPRENEURSHIP USING A METRICS EXAMINATION GAP |
Author : Tejas Vaid |
Abstract | Full Text |
Abstract :Finance managers or the move towards self-employment is and will continue transforming into, an unyieldingly huge part of money related turn of events and progression. It is right now apparent that little firms in a nation are "net makers of occupations in general public with a significant effect on carrying on with a way of life. Business visionaries are fundamental apparatuses for development and improving the abundance of the general public by contributing positions to individuals to fund-raise gracefully for the economy to build up a country. With the end goal for business visionaries to have a positive long haul impact,
they have to have a practical |
|
AN ANALYTICAL STUDY OF THE KARDASHEV SCALE IN THE INTERPRETATION OF ENERGY USAGE BY CIVILIZATION |
Author : Arya Jhamb |
Abstract | Full Text |
Abstract :Humans are used to classifying whatever they have around them, and what they see, there are many ways to classify objects that we see all around us, there are many categories in which things we see have been calculated but this is the first scale that I have seen that gives classification to not an existing object but something that has an idea, this is not entirely explored, and we don’t even know if it is out there or neither can we confirm the existence of the things we are classifying.
|
|
AN IN-DEPTH STUDY OF THE CLIENT SECURITY SAFEGUARDS OF INDIAN MICRO- FINANCE COMPANIES |
Author : Mohika Nagpal |
Abstract | Full Text |
Abstract :This paper analyses what microfinance organizations are doing to ensure their customers – generally, ladies having a place with more vulnerable segments - from mis-spelling, over- obligation and unjustifiable practices. The assessment relies upon yearly reports made by 49 microfinance establishments have a spot with
Microfinance Institution Network (MFIN) a gathering of 355 microfinances in Alwar, Rajasthan was coordinated in 2015 and 2017. Focus gathering discussions were the fundamental instrument used to demand points of view on microfinance clients.
|
|