BREAST CANCER DETECITON: DEVELOPING A DATA MINING ALGORITHMS FOR DATA ANALYSIS USING SVM AND NAÏVE BAYES ALGORTHIMIC MODELING |
Author : Rishit Kalra |
Abstract | Full Text |
Abstract :In this paper, AI calculations and ANN order from occurrences in the bosom malignancy informational collection are connected by Weka (Data Mining Workbench). The informational index was given in 1988. This is one of three areas given by the Oncology Institute that has over and again shown up in the AI writing. The
various calculations and their outcomes were contrasted and got estimations on Weka.
|
|
DEVELOPING AN INTEGRATED MODEL BASED ON CLOUD COMPUTING TO PREDICT NATURAL DISASTERS AND EFFECTS BY AN OPTIMIZED MANAGEMENTS |
Author : Simran Narang |
Abstract | Full Text |
Abstract :In recent years, world has been hit by so many natural disasters which has adverse events of the Earth; they consist of floods, volcanic eruptions, earthquakes, tsunamis, hurricanes, tornado, landslides and other geologic processes. Some of the examples of recent natural disasters are devastating floods and landslides in
Uttarakhand on June 2013, a volcanic eruption in Japan in 2014, tsunami in Japan on March 2011. These disasters remind us that we are far away from the prepared emergencies.
|
|
INDIAN BANKNOTE DETECTION USING PCA |
Author : Atul Antil |
Abstract | Full Text |
Abstract :This paper gives a quick strategy to perceive an assortment of Indian banknotes at various scales. In this procedure, the PCA, LDA and sparse representation techniques are used at highlight extraction arrange and pursues with MLP neural systems, LVQ, and SOM in characterization. At last, the use of inadequate
grid portrayal technique and mix of both SOM and LVQ neural systems would prompt the best proficiency with the exactness of 91.15% in acknowledgment of Indian banknotes especially the well-used ones |
|
ENHANCING THE EFFECTIVENESS OF PRIVACY PRESERVING DATA MINING (PPDM) BY USING CORRELATION BASED TRANSFORMATION STRATEGY |
Author : Aryan Grover |
Abstract | Full Text |
Abstract :Preservation of security is a huge part of information mining. The primary goal of PPDM is to cover up or give security to certain touchy data with the goal that they can be shielded from unapproved gatherings or unauthorised. Though security is accomplished by concealing the touchy or private information, it will influence the information mining calculations in information extraction, so a compelling strategy or methodology is required to give security to the information and at the same time ensuring the nature of information mining calculations |
|
DEVISING A TEXT MINING OPTIMIZATION BY USING LEXICAL CLASSIFICATION LINKED TO ALGORITHMIC MODELING |
Author : Aryan Marwah |
Abstract | Full Text |
Abstract :With the instantaneous boom of facts, text classification has end up a critical technique for handling and organizing text statistics. In widespread, text classification plays an important position in records extraction, text summarization textual content retrieval, medical prognosis, news institution filtering, junk mail filtering,
and sentiment analysis. This paper illustrates the textual content classification technique the use of machine getting to know strategies and statistical techniques such as k-nearest pals, aid vector system, naive Bayesian approach. |
|
BIG DATA: AN ANALYSIS OF THE PROSPECTS AND CHALLENGES AS APPLIED TO MODERN TECHNOLOGY AND BUSINESS PREDICTION DOMAINS |
Author : Pavit |
Abstract | Full Text |
Abstract :In wireless sensor use for aggregate and route the information node by node, but routing reduce the energy step by step, so reduce the energy of nodes and increase the un stability of network, that’s why basic challenge in WSN is reducing the energy loss at time of routing and data aggregation. In this paper reducing energy loss and increasing throughput by Expectation maximization algorithm. Which optimize the data aggregation?
|
|
AN IN-DEPTH STUDY IN DATA MINING CLASSIFICATION ALGORITHMS FOR EFFECTIVE FEATURE SELECTION(S) |
Author : Gitesh Budhiraja |
Abstract | Full Text |
Abstract :This examination summarizes the component assurance measure, its hugeness, different kinds of feature decision estimations, for instance, Filter, Wrapper and Hybrid. Additionally, it assessments a part of the current notable component decision computations through a composing review and besides addresses the
characteristics and challenges of those estimations. When there are various methods are close by to be gotten, by then Review of Literature is the most ideal approach to manage get some answers concerning existing methodologies prior to going for another model |
|
DEVELOPING DYNAMIC ANNOTATION USING BACK PROPAGATION CLASSIFICATION TECHNIQUE IN CONTENT-BASED IMAGE RETRIEVAL |
Author : Saksham Rai |
Abstract | Full Text |
Abstract :The CBIR will in general search, retrieve and index an image. The positioning of a CBIR framework relies upon the impossible to miss image representation, design, highlights and so on. CBIR keeps away from numerous issues related to conventional strategies for recovering images by utilizing keywords. The
explanation of a CBIR framework mainly depends on the specific image portrayal and coordinating closeness capacities utilized [1]. Content-Based Image Retrieval framework depends on the recovery of the indistinguishable pictures from the wide database when a query picture is a feed as a contribution to the
framework. The entire working of Content-Based Image Retrieval (CBIR) framework is to give comparable matches of a question contribution from enormous and various datasets. Profitable sanctioning of a CBIR framework requires arrangement, characterization, ordering, and repossession of images.
|
|
AN ANALYSIS OF THE DOCUMENT SUMMARIZATION AND WORD CLASSIFICATION TOOLS AND TECHNIQUES IN A SMART ENVIRONMENT |
Author : Anoushka Gupta |
Abstract | Full Text |
Abstract :The requirement for advanced learning is quickly expanding with the successful granularity of learning objects. Recovery of taking in materials from savvy condition encourages the student to have a customized experience utilizing order calculations. The computerized learning articles are put away in a neighborhood
vault in the brilliant design. The structure includes versatile specialists that assume a fundamental job in anticipating the instinctive idea of the student, which encourages the student to get the focus on content. Content recovery depends on the archive summarisation and word grouping |
|
DEVELOPING AN APPLICATION BASED ON COMBINED RECOGNITION TO ENHANCE THE PRODUCTIVITY, ACCURACY AND EFFECTIVENESS OF VARIOUS DATABASE MINING TECHNIQUES |
Author : Nipun Arora |
Abstract | Full Text |
Abstract :To determine the novel pattern among the item sets that co-occur frequently. The concept of multi Database mining has been identified as an important area in the data mining concept for discovering multiple novels patterns among item sets that co-occur frequently. This research shows the various types of suggested, Highlevel and Exceptional patterns. Releasing convenient and easy usage, we built a multi-database mining
designed by using global technique and local patterns. After a successful design, it helps the company to analyse with many different advantages. In order to increase the productivity of patterns, many multidatabase mining methods are used which helps in making a successful decision in the local companies.
|
|
ENGLISH CHARACTER RECOGNITION SYSTEM USING HYBRID CLASSIFIER BASED ON MLP AND SVM |
Author : Bashar Ibrahim Hameed, Humam Khalid Yaseen, Raed Sami Sarhan |
Abstract | Full Text |
Abstract :The initial stage of recognizing individual characters is through the use of machine in analyzing handwritten documents. This research focuses on the recognition of isolated characters obtained from handwritten English documents. The focus is given to the study of preprocessing and feature extraction methods. To bring about size uniformity, the character image samples are normalized to 70X50 pixel sizes using nearest neighbor interpolation method. A normalized image is next transformed into a binary image utilizing Otsu’s threshold selection technique. |
|
DEVELOPING A MODEL BASED ON ASYMMETRIC CRYPTOGRAPHY TO ENHANCE SECURITY ENCRYPTION IN BURINESS CENTRIC CLOUD ENVIRONMENTS |
Author : Simran Narang |
Abstract | Full Text |
Abstract :Distributed computing is a savvy, adaptable and adaptable model of giving system administrations to a scope of clients including individual and business over the Internet. It has acquired the insurgency the time of conventional technique for putting away and sharing of assets. It gives an assortment of advantages to its clients, for example, compelling and effective utilization of powerfully dispensed shared assets, financial
matters of scale, accessibility of assets and so forth. On the other part, distributed computing presents level of security dangers since basic administrations are regularly controlled and taken care of by outsider which makes it hard to keep up information security and protection and bolster information and administration accessibility |
|
LEVERAGING THE AUGMENTED REALITY, IMAGE PROCESSING (IP) SIXTH SENSE TECHNOLOGY (SST) AND WEARABLE TECHNOLOGY (WT) EMPLOYING THE INTERNET OF THINGS (IOT) TO DEVELOP A TOURIST GUIDANCE SYSTEM |
Author : Diksha Gulati |
Abstract | Full Text |
Abstract :Recently, augmented reality has become a virtual guide for tourists. In the initial stages it includes augmented reality(AR), virtual reality(VR), image processing(IP), video processing(VP), sixth sense technology(SST), wearable technology(WT),Internet of things (IOT) and so on. The unknown image is when exposed to camera which eventually relates the information with the data base and converts the image in to text and then open the appropriate website or information regarding that unknown object. This describes marker based augmented reality which combines the real image and virtual image to show the relevant information from internet in either video, audio, websites, PDF’s, PPT’s. It may not be applicable for World Wide Web but it can be applicable for a tourist park or as a guide for tourist in a particular city |
|
BIG DATA: AN ANALYSIS OF THE PROSPECTS AND CHALLENGES AS APPLIED TO MODERN TECHNOLOGY AND BUSINESS PREDICTION DOMAINS |
Author : Hardik Chaudhary |
Abstract | Full Text |
Abstract :The aim of this work is to examine and break down the calculations of discourse acknowledgment. The proposed calculation is customized and recreated in MATLAB. In this work, two frameworks are planned. The first framework has relied upon the data of the state of cross-connection plotting. The subsequent
framework is utilized to understand the discourse acknowledgment by utilizing Weiner Filter. In the reenactment, the receiver is utilized so as to record the talking words |
|
BIG DATA: AN ANALYSIS OF THE PROSPECTS AND CHALLENGES AS APPLIED TO MODERN TECHNOLOGY AND BUSINESS PREDICTION DOMAINS |
Author : Atul Kalkhanda |
Abstract | Full Text |
Abstract :The expression "Big Data" implies the tremendous awkwardness of information which cannot be overseen by conventional information managing techniques. Enormous data is another beginning, and in this article, an attempt to analysis has been made. It starts with the beginning of the subject in itself close by its properties and the two general methodologies of overseeing it. The sweeping investigation also proceeds to explain the utilization of Big Data in each unique piece of the economy and being. The association of Big Data Analytics in the wake of planning it with computerized abilities to verify business development and its apparition to make it justifiable to the |
|
AN IN-DEPTH ANALYSIS OF CONTENT BASED RETRIEVAL SECURITY (CBIR) IN CLOUD COMPUTING TO DEVELOP EFFICACIOUS SECURITY SAFEGUARDS |
Author : Unnati Gupta |
Abstract | Full Text |
Abstract :Storing visual data in Cloud-based storage has expanded a lot in the recent era, after the development of numerous intelligent media system and applications for cell phones in close to home and business situations. These were a deciding element in the reception of cloud-based information redistributing arrangements. Notwithstanding, in any event, redistributing cloud information storage brings new security moves that should be tended to be tedious. We offer a safe system for putting away and recuperating redistributed security insurance in enormous shared picture records. Our proposition depends on CBIR; another picture cryptography conspires that highlights picture recuperation dependent on content |
|
LEVERAGING THE BLOCKCHAIN TECHNOLOGY IN EDUCATION SECTOR TO CREATE EFFECTIVE PEDAGOGICAL MODELS BY SAFEGUARDING THE SECURITY AND DELIVERY CONTROLS |
Author : Unnati Gupta |
Abstract | Full Text |
Abstract :Blockchain, the development behind unlimited changes is indeed influencing every business claim to fame. From clinical administrations to deftly chain, Blockchain has been employed in different verticals. The education sector is very diverse and there are multiple stakeholder including students, parents, institutions, Govt and corporates etc. This sector is plugging due lack of an infrastructure which is more centralised and only biased information is accessible to stake holders. It is the top management and their unbridled control over the academic decisions, which sometimes creates suspicion with regard to records of a student or any other stake holder |
|
INDIAN BANKNOTE DETECTION USING PCA |
Author : Atul Antil |
Abstract | Full Text |
Abstract :This paper gives a quick strategy to perceive an assortment of Indian banknotes at various scales. In this procedure, the PCA, LDA and sparse representation techniques are used at highlight extraction arrange and pursues with MLP neural systems, LVQ, and SOM in characterization. At last, the use of inadequate grid portrayal technique and mix of both SOM and LVQ neural systems would prompt the best proficiency with the exactness of 91.15% in acknowledgment of Indian banknotes especially the well-used ones |
|
ATTEMPTING AN IN-DEPTH ANALYSIS OF THE IDENTIFIABLE RANSOMWARE ANALYSIS |
Author : Harshit Dua |
Abstract | Full Text |
Abstract :Ransomware attacks have developed dramatically during the new past to cause significant disturbance in
tasks across different businesses, including the public authority. In this research, we will consider windows
platforms that get infected by 14 strains of ransomware. We trust Windows Application Programming
Interface (API) calls made through ransomware measures with standard working design plan baselines.
The assessment perceives and reports notable highlights of ransomware as taken away through the
numbers of API calls. |
|
AIRLINE SERVICES IN INDIA: ANALYZING THE INDEPENDENT AND DEPENDENT VARIABLES TO DEVELOP MODEL FOR DEMAND ANALYSIS WITH RESPECT TO DOMESTIC AIRLINE PRICES. |
Author : TRIPTI PANCHA |
Abstract | Full Text |
Abstract :Demand Analysis means analyzing demand (for a service) with respect to factors affecting demand
for the service itself.
Factors affecting demand for a particular service can be summarized as follows:
1. Price of the service itself.
2. Price of substitute service.
3. Consumer disposable income.
4. Consumers expectations.
5. Consumer taste and preferences.
6. Promotional efforts devoted to the service.
7. Weather conditions.
8. Emergency.
9. Ignorance of prices of services.
This research limits the factors affecting demand for airline services only to:
1. The price at which airline service is offered and
2. The promotion expenditure that an airline operator incurs to provide services. |
|
LEVERAGING QUANTUM CRYPTOGRAPHY IN ENHANCING DATA TRANSMISSION SECURITY IN CONTENT DELIVERY NETWORK |
Author : Jahnvi Gupta |
Abstract | Full Text |
Abstract :Security is necessary for the web and system user. In quantum cryptography, it uses material science law
for key generation. It is a circumstance and application-specific cryptography method. The cryptography
technique separates the main features and encrypts the data, and enhances the key generation algorithm
using cryptography. The decryption key is used at the authentic side for data decryption. There are
particular methodologies for the key generation that are examined in this paper. The paper moreover
researched the development of the quantum key presentation for key generation and encoding. |
|