CSE

ACTIVE ONLINE LEARNING FOR SOCIAL MEDIA ANALYSIS TO SUPPORT CRISIS MANAGEMENT

ACTIVE ONLINE LEARNING FOR SOCIAL MEDIA ANALYSIS TO SUPPORT CRISIS MANAGEMENT ABSTRACT:                                 People use social media (SM) to describe and discuss different situations they are involved in, like crises. It is therefore worthwhile to exploit SM contents to support …

ACTIVE ONLINE LEARNING FOR SOCIAL MEDIA ANALYSIS TO SUPPORT CRISIS MANAGEMENT Read More »

ACCOUNTABLE PROXY RE-ENCRYPTION FOR SECURE DATA SHARING

ACCOUNTABLE PROXY RE-ENCRYPTION FOR SECURE DATA SHARING ABSTRACT:                           Recent news reveal a powerful attacker which breaks data confidentiality by acquiring cryptographic keys, by means of coercion or backdoors in cryptographic software. Once the encryption  key  is exposed, the only viable measure to …

ACCOUNTABLE PROXY RE-ENCRYPTION FOR SECURE DATA SHARING Read More »

FBI CRIME LOCATION ANALYSIS AND PREDICTION USING PYTHON AND MACHINE LEARNING

FBI CRIME LOCATION ANALYSIS AND PREDICTION USING PYTHON AND MACHINE LEARNING ABSTRACT: Crime analysis and prevention is a systematic approach for identifying and analyzing patterns and trends in crime. Our system can predict regions which have high probability for crime occurrence and can visualize crime prone areas. The ability to predict the crime which can …

FBI CRIME LOCATION ANALYSIS AND PREDICTION USING PYTHON AND MACHINE LEARNING Read More »

SIGN LANGUAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS

SIGN LANGUAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS ABSTRACT: Sign Language Recognition (SLR) targets on interpreting the sign language into text or speech, so as to facilitate the communication between deaf-mute people and ordinary people. This tank has broad social impact, but is still very challenging due to the complexity and large variations in hand actions. …

SIGN LANGUAGE RECOGNITION USING CONVOLUTIONAL NEURAL NETWORKS Read More »

EFFICIENT SECURE DATA RETRIEVAL ON CLOUD USING MULTISTAGE AUTHENTICATION & OPTIMAL BLOWFISH ALGORITHM

EFFICIENT SECURE DATA RETRIEVAL ON CLOUD USING MULTISTAGE AUTHENTICATION & OPTIMAL BLOWFISH ALGORITHM ABSTRACT: Cloud Computing provides us means of accessing the applications as utilities over the Internet. It allows us to create, configure, and customize the applications online, Security in cloud computing is a major concern. Data in cloud should be stored in encrypted …

EFFICIENT SECURE DATA RETRIEVAL ON CLOUD USING MULTISTAGE AUTHENTICATION & OPTIMAL BLOWFISH ALGORITHM Read More »

SEMI SUPERVISED K-MEANS DDOS DETECTION METHOD USING HYBRID FEATURE SELECTION APPROACH

SEMI SUPERVISED K-MEANS DDOS DETECTION METHOD USING HYBRID FEATURE SELECTION APPROACH ABSTRACT: This project is based on Distributed denial of service (DDOS) attack It is an attempt make an online service unavailable by overwhelming it with traffic from multiple sources Therefore, it is necessary to propose an effective method to detect DDOS attack from massive …

SEMI SUPERVISED K-MEANS DDOS DETECTION METHOD USING HYBRID FEATURE SELECTION APPROACH Read More »

RAIN FALL PREDICTION USING WAVELET NEURAL NETWORK

RAIN FALL PREDICTION USING WAVELET NEURAL NETWORKS ABSTRACT: This study seeks a distinctive and efficient machine learning system for the prediction of rainfall. The study experimented with different parameters of the rainfall from Erbil, Nicosia and Famagusta in order to assess the efficiency and durability of the model. The neuro-fuzzy and neural networks model is …

RAIN FALL PREDICTION USING WAVELET NEURAL NETWORK Read More »