BIG DATA: AN ANALYSIS OF THE PROSPECTS AND CHALLENGES AS APPLIED TO MODERN TECHNOLOGY AND BUSINESS PREDICTION DOMAINS |
Author : Pavit |
Abstract | Full Text |
Abstract :In wireless sensor use for aggregate and route the information node by node, but routing reduce the energy step by step, so reduce the energy of nodes and increase the un stability of network, that’s why basic challenge in WSN is reducing the energy loss at time of routing and data aggregation. In this paper
reducing energy loss and increasing throughput by Expectation maximization algorithm. Which optimize the data aggregation?
|
|
ENGLISH CHARACTER RECOGNITION SYSTEM USING HYBRID CLASSIFIER BASED ON MLP AND SVM |
Author : Bashar Ibrahim Hameed, Humam Khalid Yaseen, Raed Sami Sarhan |
Abstract | Full Text |
Abstract :The initial stage of recognizing individual characters is through the use of machine in analyzing handwritten documents. This research focuses on the recognition of isolated characters obtained from handwritten English documents. The focus is given to the study of preprocessing and feature extraction methods. To bring about size uniformity, the character image samples are normalized to 70X50 pixel sizes using nearest neighbor interpolation method. A normalized image is next transformed into a binary image utilizing Otsu’s threshold selection technique. This is followed by thinning or contour tracing. An important concern in character recognition is the selection of best discriminative features. |
|
DEVELOPING A MODEL BASED ON ASYMMETRIC CRYPTOGRAPHY TO ENHANCE SECURITY ENCRYPTION IN BURINESS CENTRIC CLOUD ENVIRONMENTS |
Author : Simran Narang |
Abstract | Full Text |
Abstract :Distributed computing is a savvy, adaptable and adaptable model of giving system administrations to a scope of clients including individual and business over the Internet. It has acquired the insurgency the time of conventional technique for putting away and sharing of assets. It gives an assortment of advantages to its clients, for example, compelling and effective utilization of powerfully dispensed shared assets, financial
matters of scale, accessibility of assets and so forth. On the other part, distributed computing presents level of security dangers since basic administrations are regularly controlled and taken care of by outsider which makes it hard to keep up information security and protection and bolster information and administration accessibility. |
|
LEVERAGING THE AUGMENTED REALITY, IMAGE PROCESSING (IP) SIXTH SENSE TECHNOLOGY (SST) AND WEARABLE TECHNOLOGY (WT) EMPLOYING THE INTERNET OF THINGS (IOT) TO DEVELOP A TOURIST GUIDANCE SYSTEM |
Author : Diksha Gulati |
Abstract | Full Text |
Abstract :Recently, augmented reality has become a virtual guide for tourists. In the initial stages it includes augmented reality(AR), virtual reality(VR), image processing(IP), video processing(VP), sixth sense technology(SST), wearable technology(WT), Internet of things (IOT) and so on. The unknown image is when exposed to camera which eventually relates the information with the data base and converts the image in to text and then open the appropriate website or information regarding that unknown object. This describes marker based augmented reality which combines the real image and virtual image to show the relevant information from internet in either video, |
|
BIG DATA: AN ANALYSIS OF THE PROSPECTS AND CHALLENGES AS APPLIED TO MODERN TECHNOLOGY AND BUSINESS PREDICTION DOMAINS |
Author : Atul Kalkhanda |
Abstract | Full Text |
Abstract :The expression "Big Data" implies the tremendous awkwardness of information which cannot be overseen by conventional information managing techniques. Enormous data is another beginning, and in this article, an attempt to analysis has been made. It starts with the beginning of the subject in itself close by its properties and the two general methodologies of overseeing it. The sweeping investigation also proceeds to explain the utilization of Big Data in each unique piece of the economy and being. The association of Big Data Analytics in the wake of planning it with computerized abilities to verify business development and its apparition to make it justifiable to the |
|
BIG DATA: AN ANALYSIS OF THE PROSPECTS AND CHALLENGES AS APPLIED TO MODERN TECHNOLOGY AND BUSINESS PREDICTION DOMAINS |
Author : Hardik Chaudhary |
Abstract | Full Text |
Abstract :The aim of this work is to examine and break down the calculations of discourse acknowledgment. The proposed calculation is customized and recreated in MATLAB. In this work, two frameworks are planned. The first framework has relied upon the data of the state of cross-connection plotting. The subsequent
framework is utilized to understand the discourse acknowledgment by utilizing Weiner Filter. In the reenactment, the receiver is utilized so as to record the talking words. This methodology may give 100% victories if the speaker is a similar individual for three-time chronicles |
|
AN IN-DEPTH ANALYSIS OF CONTENT BASED RETRIEVAL SECURITY (CBIR) IN CLOUD COMPUTING TO DEVELOP EFFICACIOUS SECURITY SAFEGUARDS |
Author : Unnati Gupta |
Abstract | Full Text |
Abstract :Storing visual data in Cloud-based storage has expanded a lot in the recent era, after the development of numerous intelligent media system and applications for cell phones in close to home and business situations. These were a deciding element in the reception of cloud-based information redistributing arrangements. Notwithstanding, in any event, redistributing cloud information storage brings new security moves that should be tended to be tedious. We offer a safe system for putting away and recuperating redistributed security insurance in enormous shared picture records. Our proposition depends on CBIR; another picture cryptography conspires that highlights picture recuperation dependent on content |
|
LEVERAGING THE BLOCKCHAIN TECHNOLOGY IN EDUCATION SECTOR TO CREATE EFFECTIVE PEDAGOGICAL MODELS BY SAFEGUARDING THE SECURITY AND DELIVERY CONTROLS |
Author : Unnati Gupta |
Abstract | Full Text |
Abstract :Blockchain, the development behind unlimited changes is indeed influencing every business claim to fame. From clinical administrations to deftly chain, Blockchain has been employed in different verticals. The education sector is very diverse and there are multiple stakeholder including students, parents, institutions, Govt and corporates etc. This sector is plugging due lack of an infrastructure which is more centralised and only biased information is accessible to stake holders. It is the top management and their unbridled control over the academic decisions, which sometimes creates suspicion with regard to records of a student or any other stake holder |
|
AN IN-DEPTH STUDY IN DATA MINING CLASSIFICATION ALGORITHMS FOR EFFECTIVE FEATURE SELECTION(S) |
Author : Gitesh Budhiraja |
Abstract | Full Text |
Abstract :This examination summarizes the component assurance measure, its hugeness, different kinds of feature decision estimations, for instance, Filter, Wrapper and Hybrid. Additionally, it assessments a part of the current notable component decision computations through a composing review and besides addresses the characteristics and challenges of those estimations. When there are various methods are close by to be gotten, by then Review of Literature is the most ideal approach to manage get some answers concerning existing methodologies prior to going for another model. Revelations: Feature decision is an otherworldly
preprocessing procedure in Data Mining |
|
LEVERAGING DEEP LEARNING TOOLS AND TECHNIQUES TO DETECT AND RECOGNISE OPTICAL CHARACTER |
Author : Rishit Garkhel |
Abstract | Full Text |
Abstract :The issue of the picture to message-based transformation continues in numerous spaces of use. This task
tries to arrange an individual manually written person to interpret transcribed text into an advanced
structure. To perform this research, we will use two main approaches: matching numbers and
segmentation of characters. For the prior approach, we will use CNN with different structures for model
training that will classify characters with high precision. For the later process, we will implement LSTM
for each character bounding box. |
|
EMPLOYABILITY OF WIENER FILTER SIMULATION IN DEVELOPING A HYBRIDIZED FRAMEWORK FOR ENHANCING THE OUTCOMES IN SPEECH RECOGNITION ANALYSIS |
Author : Hardik Chaudhary |
Abstract | Full Text |
Abstract :The aim of this work is to examine and break down the calculations of discourse acknowledgment. The
proposed calculation is customized and recreated in MATLAB. In this work, two frameworks are planned.
The first framework has relied upon the data of the state of cross-connection plotting. The subsequent
framework is utilized to understand the discourse acknowledgment by utilizing Weiner Filter. In the reenactment, the receiver is utilized so as to record the talking words. This methodology may give 100%
victories if the speaker is a similar individual for three-time chronicles. In this manner, the planned
frameworks really function admirably for the essential discourse acknowledgment. |
|
EMPLOYABILITY OF NEURAL NETWORKING TOOLS IN THE EARLY AND EFFECTIVE DETECTION OF DISPERSED REFUSAL OF ADMINISTRATION (DDOS) ATTACK IN INTERNET OF THINGS (IOT) FRAMEWORKS |
Author : Deeya Tangri |
Abstract | Full Text |
Abstract :IoT assumes a conspicuous part in the computerized eruption. The fast advancement of IoT prompts
different arising network protection dangers. IoT devices are frequently restricted in figuring ability and
energy, making them especially powerless against invaders. Hence, recognizing and forestalling attacks in
IoT networks must be seen by individuals in the business. Numerous attacks that occur out of the dispersed
refusal of administration (DDoS) attack is generally tricky.
A DDoS attack is a deadly attempt to disturb the normal progression of the focus on worker, administration
or organization by overpowering the objective or its encompassing framework with a surge of Internet
traffic. Abandoning administration is commonly developed by immersing the focus on machine or asset
with pointless solicitations to over-burden frameworks and keeping a few or all actual demands from being
satisfied. For the most part, these assaults work by suffocating a framework with requests for information.
This could be sending a web worker such countless solicitations to serve a page that it crashes under the
interest, or it very well may be an information base being hit with a high volume of questions. The outcome
is accessible web transfer speed, CPU and RAM limit gets overpowered. This paper presents Distributed
forswearing of-system assault recognition utilizing a Neural organization. The principal responsibilities of
this task are Data Analysis, Dataset Preprocessing, Training the Model, Testing the Dataset. This strategy
will create better outcomes contrasted with different methods. |
|
EXPLORING THE ENHANCEMENT OF EFFICIENCY OF WIRELESS DATA AGGREGATION BY OPTIMIZING THE STRUCTURE THROUGH THE EM ALGORITHM |
Author : Pavit |
Abstract | Full Text |
Abstract :In wireless sensor use for aggregate and route the information node by node, but routing reduce the energy
step by step, so reduce the energy of nodes and increase the un stability of network, that’s why basic
challenge in WSN is reducing the energy loss at time of routing and data aggregation. In this paper
reducing energy loss and increasing throughput by Expectation maximization algorithm. Which optimize
the data aggregation? |
|
EMPLOYABILITY OF SMART FEATURES IN OPTIMIZING THE EXECUTION OF REAL TIME BIG DATA ANALYTICS |
Author : Shreya Ahuja |
Abstract | Full Text |
Abstract :Big Data alludes to a lot of information that is too large to be overseen without utilizing new algorithmic
advances. It is a term used to depict datasets of enormous sizes that cant be taken care of with the normal
information mining programming devices. It is basic in the present current, dexterous and consistently
changing condition for frameworks to extricate helpful data from information continuously. Information
distribution centers are important wellsprings of data, however, their worth becomes improved Multifood
when data is gathered and broke down in a hurry. Constant information examination is a procedure that
includes the assessment of spilling information. A continuous investigation will empower representation of
the progressions as and when they occur. The advancement of innovations and the organization of new age
applications affected the social condition. One side is enticing the entire country to improvement and the
opposite side is influencing the social holding and capable disposition of the adolescent. Any application
zone becomes "savvy" when it is exceptionally best in class as far as by and large foundation, practical
vitality and correspondence components which will give fundamental administrations to suppliers.
Discoveries: Mining from this constant information is intriguing and amazingly testing as every one of the
expectations, orders and convoluted examination must be done in a hurry itself. The top to bottom
investigation of the current innovations should be completed altogether and its applications must be
changed in like manner. |
|
DEVELOPING AN INTEGRATED MODEL-BASED ON LATENT AND NAÏVE BAYES CLASSIFIER IN THE DETECTION AND PREVENTION OF CYBER BULLYING IN SOCIAL MEDIA |
Author : Rahul Ohlan |
Abstract | Full Text |
Abstract :Social Media are turning into danger for minors, particularly those who are utilizing it routinely. This
activity can likewise prompt Cyber tormenting. The unstructured compositions which are accessible in the
huge proportion of information cant simply be used for extra planning by PCs. Hence, specific
preprocessing methods and estimations are needed to remove important models. One of the huge
investigation issues in the field of text mining is Text Classification. The Twitter corpus is used as the
arrangement and test data to develop an inclination classifier. The positive or negative thoughts of another
tweet are used to recognize Cyber Bullying messages on Twitter using LDA with the Naive Bayes classifier.
The result shows that our model gives a better outcome of precision, survey, and F-measure as practically
70%. Unsuspecting Bayes is the most fitting computation differentiating and various figurings like J48 and
Knn. The CPU taking care of time for Naive Bayes count is moderately not actually the other two request
computation. The show of the structure can be improved by adding extra features to more proportion of
data. |
|