Digitalization of data has proven its competent edge in the present digital era, leading to aggregation of mass amounts of data. This segregated data is made expendable by discovering interesting patterns made possibl...
Digitalization of data has proven its competent edge in the present digital era, leading to aggregation of mass amounts of data. This segregated data is made expendable by discovering interesting patterns made possible by 'Data Mining'. Setting apart its perks, it possesses a discernible intimidation of outpouring personal information of data owners to anonymous resources. As always privacy is a prime issue of concern, On the other hand trading absolute privacy for loss of certainty of a query may not produce efficient patterns like in in-depth analysis of the source data sets. To maintain a balance among the above mentioned areas of interest 'Privacy Preserving Data Mining (PPDM) using various privacy techniques is employed. The proposed work potentiates the working of privacy protection technique namely differential privacy using privacy parameter ε with heterogeneous adaptable method. In addition, this framework provides a basis for working with the inverse laplacian data distortion for better privacy protection in an interactive query model.
Unmanned aerial vehicles (UAV) are commonly used for search and rescue missions in unknown environments, where an exact mathematical model of the environment may not be available. This paper proposes a framework for t...
详细信息
ISBN:
(纸本)9781538655733
Unmanned aerial vehicles (UAV) are commonly used for search and rescue missions in unknown environments, where an exact mathematical model of the environment may not be available. This paper proposes a framework for the UAV to locate a missing human after a natural disaster in such environment, using a reinforcement learning (RL) algorithm. A function approximation based RL algorithm is proposed to deal with a large number of states representation and to obtain a faster convergence time. We conducted both simulated and real implementations to show how the UAVs can successfully learn to carry out the task without colliding with obstacles. Technical aspects for applying RL algorithm to a UAV system and UAV flight control were also addressed.
this paper intends to exhibit the social and authoritative parts of electronic data frameworks. Presently we are in the 21st century and two decades will be finished soon. A century ago has been considered as the asce...
this paper intends to exhibit the social and authoritative parts of electronic data frameworks. Presently we are in the 21st century and two decades will be finished soon. A century ago has been considered as the ascending of Information and correspondence innovation. These days there is expanding advancement of online data frameworks for social and hierarchical divisions Electronic data frameworks in light of web innovations which shares distinctive kinds of Internet convention and assumes an essential part to gather, putting away, gathering and imparting information from various sources and spread data initially. The speed and productivity of electronic data framework which incorporates both neighborhood and worldwide systems, databases and diverse sorts of program for data preparing makes social and hierarchical life less demanding for individuals. The online applications keep up activities of administration. Such applications incorporates quality administration forms, life cycle of authoritative objective, actualizing and sharing creation plan This electronic innovation affects social connection, social conduct and different association issues.
This paper avails an in-depth analysis of the field of crowdsourcing and its impacts when used in the world of machine learning. It comprises of various contributions that crowdsourcing can make to improvise the techn...
详细信息
This paper avails an in-depth analysis of the field of crowdsourcing and its impacts when used in the world of machine learning. It comprises of various contributions that crowdsourcing can make to improvise the techniques that employ machine learning like – producing data, debugging and checking of models, hybrid smart machines to reduce the human intervention required to facilitate high quality performance by artificial intelligence and developmental experimentation to improve human-computer interaction. A discussion regarding the nature of crowd-workers follows next which focuses on various factors like their reaction to different forms of motivation, their behaviour towards each other and deceit among them. The takeaways of this paper include a few tips and routines to be followed to achieve success through crowdsourcing.
作者:
Ram PratapTaskeen ZaidiAssistant Professor
Department of MCA ShriRamswaroop Memorial Group of Professional Colleges Lucknow India Associate Professor
Faculty of Computer Science &Engineering ShriRamswaroopMemorial University Barabanki India
Delivery of reliable services in cloud environment is a major issue. Reliability may be achieved by implementing the fault tolerance. Due to the abundant growth of traffic and service request on cloud datacenters, bal...
详细信息
ISBN:
(纸本)9781538646939
Delivery of reliable services in cloud environment is a major issue. Reliability may be achieved by implementing the fault tolerance. Due to the abundant growth of traffic and service request on cloud datacenters, balancing the load in cloud environment is one of the serious challenges as failure may occur due to increase in power consumption, node failure, machine failure etc. Therefore there is a need of a policy for balancing the load among the datacenters and various solutions to balance the load have been proposed by researchers. Load distribution is the mechanism of dispersal the load between different nodes based on certain parameters such as underloaded(node) and overloaded (node). In this research article we have discussed the concept of dispersal of load and then perform a comparative analysis of various task-scheduling policies such as First Come First Serve, Shortest Job First and Round Robin on *** simulation results on Cloudsim depicted that RR task-scheduling is much better than the FCFS and SJF whether we are using the Time shared policy or Space shared policy for execution of cloudlet.
作者:
R DineshA Ezra VivinN SrinivasanJ Albert MayanU.G Student
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud comp...
In cloud computing, user share data while sharing data providing security and protecting the data from a unauthorized users is still a demanding problem, so we implement a multilevel data security popular a cloud computing in order to preserve the information using multi-security levels, and provide sufficient multilevel access and validate authorized identity. The recommended scheme is dynamic in multilevel data security, adaptable to certified resource share in, and protected against different malignant strike. Experimentation result checks the feasibleness. The processed data have multiple security level and access permission.
Face detection and recognition performs an essential role in computer. There was tremendous increase in face recognition during the last years. There are numerous applications that require the face detection. As this ...
Face detection and recognition performs an essential role in computer. There was tremendous increase in face recognition during the last years. There are numerous applications that require the face detection. As this face detection is the first step. There are many growing applications such as bank authentication, security access in system, enforcement of law, verification of credit cards, biometric authentication which works based on face detection. The goal of this paper is to presents a facial recognition system with deep learning methodologies. In this paper machine learning aggregation method is used to store the feature of detecting image and random forest algorithm also used to classify a detected image which is applied on face database and compared with previous algorithm which shows accurate ratio.
作者:
A. Amarnadha ReddyB. GangadharB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surround...
Now-a-days, we see that dustbins that are kept at open areas in the urban regions are flooding as a result of addition of the garbage persistently. It makes unhygienic condition and upsetting smell around the surroundings resulting in spreading some savage ailments and human diseases. To overcome such issues, Advanced Waste Collection is proposed for Smart Cities which depend on Internet of Things (IoT). It will take fewer efforts to clean all the bins over the city by checking whether the dustbins are full or *** proposed work includes a smart dustbin that separates dry and wet waste so that the waste recycling can be done more *** find the efficient way to find garbage collecting routes, we use shortest path algorithms like Dijkstra's Algorithm.
作者:
C. Prasanth VarmaL. Infant CintyB MuthukumarJ Albert MayanU.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India Professor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it wi...
This paper discusses about data transmission between hot machines and warm machines. We employ a Main Cloud Server (MCS) for this purpose. MCS provides a variety of services. User have to give request to MCS and it will provide necessary service. User will be sends request to MCS for data upload and the request will be sent to CSP and that allocates job to Virtual Machines. We need to use two machines such as HOT MACHINES and WARM MACHINES. Hot machines can handle current job. Warm machines can be idle state until the job is assigned. Every machines will be having three virtual machines. The user can raise the service request CSP to access the resources found in cloud. So, the CSP provides approve or rejection is accept by CSP, then user can immediately access or download the resource from cloud server.
In 21st century, the medical industry is tending to reach its pinnacle, unattended and ignored medical emergencies still remain a loophole in the system. Hence this paper proposes the idea of medical heli-carriage. Th...
In 21st century, the medical industry is tending to reach its pinnacle, unattended and ignored medical emergencies still remain a loophole in the system. Hence this paper proposes the idea of medical heli-carriage. The proposed system promises to reach the patient irrespective of local traffic conditions, variable terrains and climatic conditions. It employs solar power as the primary energy source and also has sufficient battery backup in case of inadequate solar energy. Under any unlikely event of technical fault in the system, it will acknowledge the nearest medical heli-carriage available and the task will be rescheduled to the latter. It will be capable of carrying first aid medical instruments along with two institutional staffs and the patient. Under any critical situation, the patient will tap on the smart watch, which will send a signal to the nearest hospital. The GPS location of the received signal will be tracked by the hospital and fed into the heli-carriage so that it can reach the very location to the earliest. Hence, the system can prove out to be a revolutionary step in the modern medical industry.
暂无评论