Personal Information
Occupation
CEO
Industry
Education
Website
www.venkatjavaprojects.com
About
( 1 ) We offer academic projects to BE - BTECH , ME - MTECH , MCA , DIPLOMA and PHD students
( 2 ) we offer MASTERS ASSIGNMENTS TO UK , USA , AUSTRALIA , CANADA AND CHINA students
( 3 ) we offer Assignment Writing , Paper Writing , Article Writing , Journal Writing , Case Study Writing , Essay Writing , Synopsis Writing , Thesis Writing
( 4) we offer Plagiarism Checking , Grammar Checking , Proof Reading , Manuscript Review , Conference Paper , Seminar Presentation , Survey Paper
Tags
ieee projects
ieee live projects
ieee btech projects
final year projects
btech projects in hyderabad
ieee academic projects
engineering students final year projects
b.tech projects
m.tech projects
mini projects in hyderabad
mtech projects in hyderabad
be projects
final year projects in india
me projects
student projects
mca projects
dotnet projects in hyderabad
academic projects
m.sc projects
machine learning algorithms
diploma projects
data science projects
python projects
artificial intelegance projects
support vector machine
gradient boosting algorithm
logistic regression
linear regression
machinelearning projects
project output
output screens
numpy
scikit-learn
naive bayes
dimensionality reduction algorithms
feature selection
dession tree
ramdom forest tree
tensorflow
keras
machine learning
deep learning has emerged as an effective means fo
non ieee projects
deep learning
btech projects
existing algorithms output large numbers of patter
non-ieee projects
java ieee 2020 21 projects list
security is always a main concern in every domain
and deep learning models are used to classify user
existing system
detecting stress based on social interactions in s
ieee python projects
latest python projects
convolutional neural network based text steganalys
cloud computing
fit the inter-arrival times and the breach sizes.
data mining and feature analysis of college studen
workflow based end-to-end system starting from sea
intrusion detection using data mining
dotnet pro
ieee live
neural networks
machine learning projects
machine learning techniques applied to detect cybe
optimized audio classification and segmentation al
protecting user data in profile matching social ne
quantifying covid 19 content in the online health
cnn
secure cloud storage with data dynamic using secur
weapon detection using artificial intelligence and
2022 python major projects li
deep learning projects
major projects
automatic detection of diabetic retinopathy using
cse projects
projects
detection
benchmarking image retrieval diversification techn
mtech projects
system requirements
algorithms
dscs i is the first secure cloud storage protocol
crime analysis mapping
proposed system
hormonal
mutations
mouth etc. the causes of such high incidence rates
blood
bladder
esophagus
cervix
liver
prostate
or other wireless methods. it contains data genera
bus information live monitoring system software is
stomach
rectum
gyroscope and other sensors of smart phone to trai
random forest and decision tree to generate a mode
digitised and decentralized block chain technology
breast
lungs
diagnosis and treatment of the disease. all types
the rate of mortality due to cancer in india was h
which is divided into six categories walking
cancer has become a big threat to human beings glo
walking upstairs
walking down-stairs
sitting
standing and laying? mlm and svm achieved accuracy
among various diseases
we can build web applications in very less time. d
django is a web application framework which is use
pandas
etc. students will have facility to view all the b
theano
scipy
eli5
timings
available routes
invisibility cloak using image processing
network intrusion detection using supervised machi
lightgbm
nlp text classification
object tracking using python
opinion dynamics(opinion dynamics based group reco
python libraries presentation contains all top 10
tenslorflow
pytoruch
poor immune conditions) and external or environmen
industrialization
over growth of population
with the increasing in the number of anti-social a
security has been given utmost importance lately.
every person is captured by a camera 30 times a
there is need to show in which frame and which par
latest python projects list
perceptrion using tensorflow
5 g smart diabetes toward personalized diabetes di
data types etc.)
strings
what is python…? differences between program and
adaptive resource management for analyzing video s
so we can focus on application development only.
a random decision tree frameworkfor privacy preser
r-eclat tool screenshots
in this project we are implementing two algorithms
integrated
segmentation
and registration. we conclude by discussing resear
emerging trends
and possible future directions.
real estate appraisal
which is the process of estimating the price for r
is crucial for both buys and sellers as the basis
the repeat sales model has been widely adopted to
it depends the design and calculation of a complex
which is challenging to estimate accurately. today
real estate brokers provide easy access to detaile
we analyze the prediction power of online house pi
which is one of the key factors for online users t
we employ a recurrent neural network (rnn) to pred
sequential pattern mining finds applications in nu
two main challenges arise. first
as datasets grow
mining large number of patterns gets computational
thus
a need for mining approaches that make it possible
(2) allows stepwise visualization of patterns bein
and (3) enables the user to steer the mining algor
one composed of web page visits and another compos
analyzing cyber incident data sets is an important
and many studies remain to be done. in this paper
we report a statistical analysis of a breach incid
in contrast to the findings reported in the litera
both hacking breach incident inter-arrival times a
ai projects
m.sc project
web applications
standalone applications
application projects
block chain technology
characterizing and predicting early reviewers for
designing cyber insurance policies-the role of pre
exploratory visual sequence mining based on patter
customer loan prediction analysis
breast cancer detection
fraudulent behavior in drinking water consumption
a decision tool has been built using the generated
web based projects
a purely peer-to-peer version of electronic cash w
but the main benefits are lost if a trusted third
forming a record that cannot be changed without re
billions of dollars of loss are caused every year
and more and more algorithms rely on advanced mach
the highly unbalanced classes distributions and th
leaving unanswered many questions about what is th
ii) how to deal with unbalanced and evolving data
iii) how to assess performances in a way which is
we design and assess a prototype of a fraud detect
the tremendous success of machine learning algorit
focusing on convolutional neural networks
and emphasizing clinical aspects of the _eld. the
localization
we make available our malware sample on github
which hopefully will benefit future research effor
in order to ensure a company's internet security
siem (security information and event management) s
the number of warnings in general is wrong with th
malicious possibility. attacks and compromised hos
we create a user-centric engineer learning framewo
their work flow
and how to process this data and create an effecti
but do machine learning experiences do not exist a
we use the account as an example to demonstrate fu
label creation
feature engineering
machine learning algorithm and sample performance
product reviews are valuable for upcoming buyers i
different opinion mining techniques have been prop
where judging a review sentence’s orientation (e.g
the success of deep learning highly relies on the
(2) adding a classification layer on top of the em
namely
convolutional feature extractors and long short-te
we construct a dataset containing 1.1m weakly labe
754 labeled review sentences from amazon. experime
everybody wants to know how to buy goods cheaper o
human activity recognition
or har for short
is a broad field of study concerned with identifyi
such as video
rather than by distributions because they exhibit
we propose particular stochastic process models to
respectively
we conduct both qualitative and quantitative trend
including that the threat of cyber hacks is indeed
but not in terms of the magnitude of their damage.
crude oil is the world's leading fuel
and its prices have a big impact on the global env
economy as well as oil exploration and exploitatio
governments and individuals. although many methods
it remains one of the most challenging forecasting
the world's environment is affected by the oil pri
the fuel bills are lowered. as a result
consumers are very likely to use more oil and thus
there is less incentive to develop renewable and c
sustained low oil prices could lead to a drop in g
although the owners of oil sectors suffer income l
the global gdp (gross domestic product) would be i
the drop of oil prices would reduce the cost of li
and hence the inflation rate would fall. so there
image recoloring is a technique that can transfer
there is no special method designed for detecting
we propose a trainable end-to-end system for disti
which consists of three feature extraction blocks
we synthesize a data set comprised of recolored im
internet of things (iot) in military settings gene
particularly state-sponsored or nation state actor
we present a deep learning based method to detect
in this paper author describing concept to predict
negative or neutral.
government
in this project we are using unsupervised machine
special symbol and empty text from dataset. 3) sen
negative and neutral responses on covid19 vaccine.
in this project we are using lstm (long short term
4.detection of fake news through implementation of
5.local community detection algorithm based on min
in this project to recognize person from iris we a
now-a-days due to many diseases many peoples are a
logistic regression and gradient boosting and in a
mistriage
admissions 1
71
right ocular pain
160
84
18
corneal abrasion
86
5.0
0 0
56
car
right forearm burn
137
75
which had pre-labelled images and the other one is
which were labelled manually. results are tabulate
both algorithms achieve good accuracy
but their application in real situations can be ba
four machine learning methods to predict academic
ml using python
dl using python
ai using python
active learning from imbalanced data: a solution o
14 ground water modelling
opinion dynamics-based group recommender systems
twitter sentiment analysis
java projects
iot
search engine optimization
sentiment analysis using machine learning
security and privacy preserving challenges of e-he
cloud colonography distributed medical testbed ove
an integrated event summarization approach for com
an effecient spam detection technique for io t dev
security enhanced content sharing in social io t a
dynamic network slicing and resource allocation in
collaborative content delivery in software defined
trust based video management framework for social
online hashing with bit selection for image retrie
efficient io t management with resilience to unaut
an efficient spam detection technique for io t dev
1.identifing of fake profiles across online social
i3
hardware requirements
software requirements
application and evaluation
space
software development
local dynamic neighborhood bas
neighborhood
based
outlier
approach
and it's applications
for large scale datasets
datasets
5.watermarking images
swt
water
noise attacks
a forest fire identification
unmanned aerial
image forgery detection based
fusion of lightweight deep
geo tracking of waste
student
market analysis
9.implementation of blockchain
automatic detection
deep learing
60
36.5
8.an artificial intelligence and cloud based colla
in this project author using convolution neural ne
9.data analysis for understanding the impact of co
in this paper author analysing vaccines dataset to
pfizer and many more. in this forecasting will tak
10.sentiment analysis of customer product reviews
in this project author is detecting sentiments fro
decision tree and naïve bayes. in all 3 algorithms
an artificial intelligence and cloud based collabo
tracking and forecasting for farmers
2021 python projects list
ann
dimensionality reduction algor
online inventory management
project title
engineering projects
mobile application development
s.no
automatic detection of diabeti
a convolutional neural network
images
data scienece projects
logistig regression
algorithm
optimised stacked ensemble
python
clusting
the periodic pattern and the correlation pattern
hidden in event sequences of at most two event typ
we propose an event periodicity detection algorith
we make a simple statistical test based on low ord
and then apply inter-arrival histograms to summari
the minimum description length principle is used t
the event relationship network is built to describ
robust to noises
and scalable. the average compression ratio of eve
this paper further enhances the techniques and chr
pros and cons of their predecessor projects .they
whether the product has reached the market and cam
data mining plays a key role in crime analysis. th
among them are the virtual identifier
pruning strategy
support vector machines
and apriori algorithms. vid is to find relation be
we identified crime mapping analysis based on knn
the crime mapping is an essential research area to
we follow the following steps in order to reduce t
the rise and promotion of big data methods enables
especially to find out the groups of students that
and to help promote the student affairs management
245 students in a certain grade of b university
obtains a total of 23.843 million internet access
finds 350 students with large network usage. achie
which can be used as a practical operation case fo
providing effective data support for the accurate
radar
2.achieving practical symmetric searchable encrypt
achieving searchable encryption scheme with search
authentication and key agreement based on anonymou
designing secure and efficient biometric based sec
privacy preserving medical treatment system throug
development and examination of fog computing based
identity based encryption transformation for flexi
secure data transfer and deletion from counting bl
pay as you decrypt decryption outsourcing for func
adaptive diffusion of sensitive information in onl
scalable and adaptive data replica placement for g
social multimedia networks (smns) have attracted m
which make the satisfaction of those requirements
untrusted and unauthorized contents. for this purp
controlling and verifying content delivered to end
many researchers have investigated the possibiliti
the aim of this paper is to propose a framework th
ram
and storage. the key concepts beneath the proposed
ii) creating an intelligent agent that decides whi
and iii) checking the videos’ integrity and delive
we ensure that the trust level of the smns increas
efficient capital expenditure (capex) and operatio
event mining is a useful way to understand compute
a low precision especially with the presence of no
and providing a summary which is difficult for a h
we propose an integrated event summarization appro
a huge amount of potentially dangerous covid-19 mi
in particular vaccinations ("anti-vax"). we find t
the pro-vaccination (“pro-vax”) community. however
the anti-vax community exhibits a broader range of
and hence can appeal to a broader cross-section of
e.g. individuals wary of a mandatory fast-tracked
leaving countries open to future covid-19 resurgen
in the age of cloud computing
cloud users with limited storage can outsource the
in lieu of monetary benefits
offer retrievability of their clients’ data at any
we explore the possibility of constructing a secur
and we construct such a protocol (dscs i) based on
deletions and modifications
append-only data find numerous applications in the
we provide prototype implementations for dscs i an
with the increasing rate at which data is created
it becomes necessary to analyze and make use of th
when something crucial is happening in the nation
it is of paramount importance to decide every step
which has become quite a popular tool of communica
millions of users share their views and opinions o
reddit
tumblr
facebook. data from these sites can be efficiently
we have taken into account various methods to perf
due to a rise in crime rate in a crowded event or
security and personal properties
psychological stress is threatening people’s healt
people are used to sharing their daily activities
making it feasible to leverage online social netwo
we find that users stress state is closely related
and we employ a large-scale dataset from real-worl
visual
and social attributes from various aspects
and then propose a novel hybrid model - a factor g
we also discover several intriguing phenomena
i.e. the number of social structures of sparse con
indicating that the social structure of stressed u
the increased usage of cloud services
growing number of web applications users
changes in network infrastructure that connects de
to counter arising threats
network security mechanisms
sensors and protection schemes also have to evolve
to address the needs and problems of the users. in
we focus on countering emerging application layer
in this paper
we consider a scenario where a user queries a user
maintained by a social networking service provider
to identify users whose profiles match the profile
an online dating website
ashley madison
was hacked
which results in disclosure of a large number of d
we propose a privacy-preserving solution for profi
needs and deployment of video surveillance systems
See more
Presentations
(4)Documents
(189)Personal Information
Occupation
CEO
Industry
Education
Website
www.venkatjavaprojects.com
About
( 1 ) We offer academic projects to BE - BTECH , ME - MTECH , MCA , DIPLOMA and PHD students
( 2 ) we offer MASTERS ASSIGNMENTS TO UK , USA , AUSTRALIA , CANADA AND CHINA students
( 3 ) we offer Assignment Writing , Paper Writing , Article Writing , Journal Writing , Case Study Writing , Essay Writing , Synopsis Writing , Thesis Writing
( 4) we offer Plagiarism Checking , Grammar Checking , Proof Reading , Manuscript Review , Conference Paper , Seminar Presentation , Survey Paper
Tags
ieee projects
ieee live projects
ieee btech projects
final year projects
btech projects in hyderabad
ieee academic projects
engineering students final year projects
b.tech projects
m.tech projects
mini projects in hyderabad
mtech projects in hyderabad
be projects
final year projects in india
me projects
student projects
mca projects
dotnet projects in hyderabad
academic projects
m.sc projects
machine learning algorithms
diploma projects
data science projects
python projects
artificial intelegance projects
support vector machine
gradient boosting algorithm
logistic regression
linear regression
machinelearning projects
project output
output screens
numpy
scikit-learn
naive bayes
dimensionality reduction algorithms
feature selection
dession tree
ramdom forest tree
tensorflow
keras
machine learning
deep learning has emerged as an effective means fo
non ieee projects
deep learning
btech projects
existing algorithms output large numbers of patter
non-ieee projects
java ieee 2020 21 projects list
security is always a main concern in every domain
and deep learning models are used to classify user
existing system
detecting stress based on social interactions in s
ieee python projects
latest python projects
convolutional neural network based text steganalys
cloud computing
fit the inter-arrival times and the breach sizes.
data mining and feature analysis of college studen
workflow based end-to-end system starting from sea
intrusion detection using data mining
dotnet pro
ieee live
neural networks
machine learning projects
machine learning techniques applied to detect cybe
optimized audio classification and segmentation al
protecting user data in profile matching social ne
quantifying covid 19 content in the online health
cnn
secure cloud storage with data dynamic using secur
weapon detection using artificial intelligence and
2022 python major projects li
deep learning projects
major projects
automatic detection of diabetic retinopathy using
cse projects
projects
detection
benchmarking image retrieval diversification techn
mtech projects
system requirements
algorithms
dscs i is the first secure cloud storage protocol
crime analysis mapping
proposed system
hormonal
mutations
mouth etc. the causes of such high incidence rates
blood
bladder
esophagus
cervix
liver
prostate
or other wireless methods. it contains data genera
bus information live monitoring system software is
stomach
rectum
gyroscope and other sensors of smart phone to trai
random forest and decision tree to generate a mode
digitised and decentralized block chain technology
breast
lungs
diagnosis and treatment of the disease. all types
the rate of mortality due to cancer in india was h
which is divided into six categories walking
cancer has become a big threat to human beings glo
walking upstairs
walking down-stairs
sitting
standing and laying? mlm and svm achieved accuracy
among various diseases
we can build web applications in very less time. d
django is a web application framework which is use
pandas
etc. students will have facility to view all the b
theano
scipy
eli5
timings
available routes
invisibility cloak using image processing
network intrusion detection using supervised machi
lightgbm
nlp text classification
object tracking using python
opinion dynamics(opinion dynamics based group reco
python libraries presentation contains all top 10
tenslorflow
pytoruch
poor immune conditions) and external or environmen
industrialization
over growth of population
with the increasing in the number of anti-social a
security has been given utmost importance lately.
every person is captured by a camera 30 times a
there is need to show in which frame and which par
latest python projects list
perceptrion using tensorflow
5 g smart diabetes toward personalized diabetes di
data types etc.)
strings
what is python…? differences between program and
adaptive resource management for analyzing video s
so we can focus on application development only.
a random decision tree frameworkfor privacy preser
r-eclat tool screenshots
in this project we are implementing two algorithms
integrated
segmentation
and registration. we conclude by discussing resear
emerging trends
and possible future directions.
real estate appraisal
which is the process of estimating the price for r
is crucial for both buys and sellers as the basis
the repeat sales model has been widely adopted to
it depends the design and calculation of a complex
which is challenging to estimate accurately. today
real estate brokers provide easy access to detaile
we analyze the prediction power of online house pi
which is one of the key factors for online users t
we employ a recurrent neural network (rnn) to pred
sequential pattern mining finds applications in nu
two main challenges arise. first
as datasets grow
mining large number of patterns gets computational
thus
a need for mining approaches that make it possible
(2) allows stepwise visualization of patterns bein
and (3) enables the user to steer the mining algor
one composed of web page visits and another compos
analyzing cyber incident data sets is an important
and many studies remain to be done. in this paper
we report a statistical analysis of a breach incid
in contrast to the findings reported in the litera
both hacking breach incident inter-arrival times a
ai projects
m.sc project
web applications
standalone applications
application projects
block chain technology
characterizing and predicting early reviewers for
designing cyber insurance policies-the role of pre
exploratory visual sequence mining based on patter
customer loan prediction analysis
breast cancer detection
fraudulent behavior in drinking water consumption
a decision tool has been built using the generated
web based projects
a purely peer-to-peer version of electronic cash w
but the main benefits are lost if a trusted third
forming a record that cannot be changed without re
billions of dollars of loss are caused every year
and more and more algorithms rely on advanced mach
the highly unbalanced classes distributions and th
leaving unanswered many questions about what is th
ii) how to deal with unbalanced and evolving data
iii) how to assess performances in a way which is
we design and assess a prototype of a fraud detect
the tremendous success of machine learning algorit
focusing on convolutional neural networks
and emphasizing clinical aspects of the _eld. the
localization
we make available our malware sample on github
which hopefully will benefit future research effor
in order to ensure a company's internet security
siem (security information and event management) s
the number of warnings in general is wrong with th
malicious possibility. attacks and compromised hos
we create a user-centric engineer learning framewo
their work flow
and how to process this data and create an effecti
but do machine learning experiences do not exist a
we use the account as an example to demonstrate fu
label creation
feature engineering
machine learning algorithm and sample performance
product reviews are valuable for upcoming buyers i
different opinion mining techniques have been prop
where judging a review sentence’s orientation (e.g
the success of deep learning highly relies on the
(2) adding a classification layer on top of the em
namely
convolutional feature extractors and long short-te
we construct a dataset containing 1.1m weakly labe
754 labeled review sentences from amazon. experime
everybody wants to know how to buy goods cheaper o
human activity recognition
or har for short
is a broad field of study concerned with identifyi
such as video
rather than by distributions because they exhibit
we propose particular stochastic process models to
respectively
we conduct both qualitative and quantitative trend
including that the threat of cyber hacks is indeed
but not in terms of the magnitude of their damage.
crude oil is the world's leading fuel
and its prices have a big impact on the global env
economy as well as oil exploration and exploitatio
governments and individuals. although many methods
it remains one of the most challenging forecasting
the world's environment is affected by the oil pri
the fuel bills are lowered. as a result
consumers are very likely to use more oil and thus
there is less incentive to develop renewable and c
sustained low oil prices could lead to a drop in g
although the owners of oil sectors suffer income l
the global gdp (gross domestic product) would be i
the drop of oil prices would reduce the cost of li
and hence the inflation rate would fall. so there
image recoloring is a technique that can transfer
there is no special method designed for detecting
we propose a trainable end-to-end system for disti
which consists of three feature extraction blocks
we synthesize a data set comprised of recolored im
internet of things (iot) in military settings gene
particularly state-sponsored or nation state actor
we present a deep learning based method to detect
in this paper author describing concept to predict
negative or neutral.
government
in this project we are using unsupervised machine
special symbol and empty text from dataset. 3) sen
negative and neutral responses on covid19 vaccine.
in this project we are using lstm (long short term
4.detection of fake news through implementation of
5.local community detection algorithm based on min
in this project to recognize person from iris we a
now-a-days due to many diseases many peoples are a
logistic regression and gradient boosting and in a
mistriage
admissions 1
71
right ocular pain
160
84
18
corneal abrasion
86
5.0
0 0
56
car
right forearm burn
137
75
which had pre-labelled images and the other one is
which were labelled manually. results are tabulate
both algorithms achieve good accuracy
but their application in real situations can be ba
four machine learning methods to predict academic
ml using python
dl using python
ai using python
active learning from imbalanced data: a solution o
14 ground water modelling
opinion dynamics-based group recommender systems
twitter sentiment analysis
java projects
iot
search engine optimization
sentiment analysis using machine learning
security and privacy preserving challenges of e-he
cloud colonography distributed medical testbed ove
an integrated event summarization approach for com
an effecient spam detection technique for io t dev
security enhanced content sharing in social io t a
dynamic network slicing and resource allocation in
collaborative content delivery in software defined
trust based video management framework for social
online hashing with bit selection for image retrie
efficient io t management with resilience to unaut
an efficient spam detection technique for io t dev
1.identifing of fake profiles across online social
i3
hardware requirements
software requirements
application and evaluation
space
software development
local dynamic neighborhood bas
neighborhood
based
outlier
approach
and it's applications
for large scale datasets
datasets
5.watermarking images
swt
water
noise attacks
a forest fire identification
unmanned aerial
image forgery detection based
fusion of lightweight deep
geo tracking of waste
student
market analysis
9.implementation of blockchain
automatic detection
deep learing
60
36.5
8.an artificial intelligence and cloud based colla
in this project author using convolution neural ne
9.data analysis for understanding the impact of co
in this paper author analysing vaccines dataset to
pfizer and many more. in this forecasting will tak
10.sentiment analysis of customer product reviews
in this project author is detecting sentiments fro
decision tree and naïve bayes. in all 3 algorithms
an artificial intelligence and cloud based collabo
tracking and forecasting for farmers
2021 python projects list
ann
dimensionality reduction algor
online inventory management
project title
engineering projects
mobile application development
s.no
automatic detection of diabeti
a convolutional neural network
images
data scienece projects
logistig regression
algorithm
optimised stacked ensemble
python
clusting
the periodic pattern and the correlation pattern
hidden in event sequences of at most two event typ
we propose an event periodicity detection algorith
we make a simple statistical test based on low ord
and then apply inter-arrival histograms to summari
the minimum description length principle is used t
the event relationship network is built to describ
robust to noises
and scalable. the average compression ratio of eve
this paper further enhances the techniques and chr
pros and cons of their predecessor projects .they
whether the product has reached the market and cam
data mining plays a key role in crime analysis. th
among them are the virtual identifier
pruning strategy
support vector machines
and apriori algorithms. vid is to find relation be
we identified crime mapping analysis based on knn
the crime mapping is an essential research area to
we follow the following steps in order to reduce t
the rise and promotion of big data methods enables
especially to find out the groups of students that
and to help promote the student affairs management
245 students in a certain grade of b university
obtains a total of 23.843 million internet access
finds 350 students with large network usage. achie
which can be used as a practical operation case fo
providing effective data support for the accurate
radar
2.achieving practical symmetric searchable encrypt
achieving searchable encryption scheme with search
authentication and key agreement based on anonymou
designing secure and efficient biometric based sec
privacy preserving medical treatment system throug
development and examination of fog computing based
identity based encryption transformation for flexi
secure data transfer and deletion from counting bl
pay as you decrypt decryption outsourcing for func
adaptive diffusion of sensitive information in onl
scalable and adaptive data replica placement for g
social multimedia networks (smns) have attracted m
which make the satisfaction of those requirements
untrusted and unauthorized contents. for this purp
controlling and verifying content delivered to end
many researchers have investigated the possibiliti
the aim of this paper is to propose a framework th
ram
and storage. the key concepts beneath the proposed
ii) creating an intelligent agent that decides whi
and iii) checking the videos’ integrity and delive
we ensure that the trust level of the smns increas
efficient capital expenditure (capex) and operatio
event mining is a useful way to understand compute
a low precision especially with the presence of no
and providing a summary which is difficult for a h
we propose an integrated event summarization appro
a huge amount of potentially dangerous covid-19 mi
in particular vaccinations ("anti-vax"). we find t
the pro-vaccination (“pro-vax”) community. however
the anti-vax community exhibits a broader range of
and hence can appeal to a broader cross-section of
e.g. individuals wary of a mandatory fast-tracked
leaving countries open to future covid-19 resurgen
in the age of cloud computing
cloud users with limited storage can outsource the
in lieu of monetary benefits
offer retrievability of their clients’ data at any
we explore the possibility of constructing a secur
and we construct such a protocol (dscs i) based on
deletions and modifications
append-only data find numerous applications in the
we provide prototype implementations for dscs i an
with the increasing rate at which data is created
it becomes necessary to analyze and make use of th
when something crucial is happening in the nation
it is of paramount importance to decide every step
which has become quite a popular tool of communica
millions of users share their views and opinions o
reddit
tumblr
facebook. data from these sites can be efficiently
we have taken into account various methods to perf
due to a rise in crime rate in a crowded event or
security and personal properties
psychological stress is threatening people’s healt
people are used to sharing their daily activities
making it feasible to leverage online social netwo
we find that users stress state is closely related
and we employ a large-scale dataset from real-worl
visual
and social attributes from various aspects
and then propose a novel hybrid model - a factor g
we also discover several intriguing phenomena
i.e. the number of social structures of sparse con
indicating that the social structure of stressed u
the increased usage of cloud services
growing number of web applications users
changes in network infrastructure that connects de
to counter arising threats
network security mechanisms
sensors and protection schemes also have to evolve
to address the needs and problems of the users. in
we focus on countering emerging application layer
in this paper
we consider a scenario where a user queries a user
maintained by a social networking service provider
to identify users whose profiles match the profile
an online dating website
ashley madison
was hacked
which results in disclosure of a large number of d
we propose a privacy-preserving solution for profi
needs and deployment of video surveillance systems
See more