Military Access Using Card Scanning With OTP

Security and Encryption, Sensor, Web | Desktop Application
Military Access Using Card Scanning With OTP Military access is the most secure access provision and needs to be kept that way considering national security issues. Usual military authentication and authorization techniques consist of one way authentication techniques with just one form of authentication, namely password or smart card or biometric. Here we propose a two stage authentication/authorization technique for secured military access to authorized personnel. The first stage is a card scanning system, each authorized personnel must have a smart card. On card scanning the system also asks of an additional 4 digit code associated with it, on entering the right code the personnel goes to the next stage of authentication. On the next stage, system generates a one time password and sends to the mobile phone registered to…
Read More

Secure ATM Using Card Scanning Plus OTP

Security and Encryption, Web | Desktop Application
>Secure ATM Using Card Scanning Plus OTP Our project proposes a secured ATM (Any time Money) system using a card scanning system along with Otp password system on sms for improved security. Usual ATM systems do not contain the OTP feature for money withdrawal. If an attacker manages to get hold of ATM card and the pin number he may easily use it to withdraw money fraudently. So our proposed system supports the ATM card scanning system along with an OTP system. Ths user may scan his card and login to the system .But after user is through with this authentication he may view details but is asked to enter OTP as soon as he clicks money withdrawal option. At this stage the system generates and sends a One time…
Read More

Secure Remote Communication Using DES Algorithm

Cloud Computing, Security and Encryption, Web | Desktop Application
Secure Remote Communication Using DES Algorithm The Data Encryption Standard (DES) algorithm is a widely accepted system for data encryption that makes use of a private (secret) key that was judged so hard to break by the U.s. government that it was confined for exportation to different nations. There are more than 71,000,000,000,000,000 (71 quadrillion) encryption keys to be used in this algorithm. For any given message, the key is picked at irregular interval from among this colossal number of keys. Like other private key cryptographic routines, both the sender and the collector must know and utilize a common private key. Many companies, governments, military and other fields make use of DES algorithm for secure data transfer over unsecure networks. We here propose a system for secured data transfer over…
Read More

Image Steganography With 3 Way Encryption

Security and Encryption, Web | Desktop Application
Name Image Steganography With 3 Way Encryption Technology DotNET,MS SQL Category Web Application Description Steganography is the technique of hiding private or sensitive information within something that appears to be nothing be a usual image. Steganography involves hiding Text so it appears that to be a normal image or other file. If a person views that object which has hidden information inside, he or she will have no idea that there is any secret information. What steganography essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message inside an image file, user uploads the image and enters the text to send secretly, and gives a…
Read More

Card Payment Security Using RSA

Android Mobile development
Card Payment Security Using RSA Due to increasing e-commerce activity nowadays, there is a need for some encryption technique to ensure security and a way to ensure that the user’s data are securely stored in the database. Thus the system introduces RSA for this purpose. The RSA algorithm is a kind of asymmetric encryption algorithm which appeared in 1978. The algorithm is public key encryption algorithm which is a widely accepted and implemented by public. The use of RSA in this the system makes the process more secure. Now the bank transactions can be done securely without worrying about attacker getting access to the database as the data will be in encrypted form.
Read More

Warehouse Management System

Web | Desktop Application
Warehouse Management System The Warehouse Management System is a real-time warehouse database capable of handling large inventories of an organization. This can be used to track the inventory of a single store, or to manage the distribution of stock between several stores of a larger franchise. However, the system merely records sales and restocking data and provides notification of low stock at any location at a specified interval. The goal is to reduce the strain of tracking rather than to handle all store maintenance. The main goal of Warehouse Management System is to ensure consistent availability of supplies for consumers. Thus, Warehouse Management System is directed toward owners of small to large stores and stock managers who are responsible of maintaining sufficient goods on hand in a retail or manufacturing…
Read More

Secure Backup Software System

Cloud Computing, Web | Desktop Application
Secure Backup Software System Using Software backup system, users can store files, documents, images, videos through windows application in a secured manner. In this user can store documents and files in any format which is kept in a separate folder made for each user. The stored folder is only accessible to the authorized users who can access their own folder. It’s a windows application, where all the file details store in SQL Database. If the user found to be unauthorized by the admin, then admin can block a user and also can unblock it whenever required.
Read More

Filtering political sentiment in social media from textual information

Web | Desktop Application
Filtering political sentiment in social media from textual information Nowadays, parents are worried about their children because of the high rate of kidnapping. Moreover, parents are having long working hours, so they simply do not have as much time to spend for their children Moreover, they will be persuaded by kidnapper before they enter the school .So, it is the responsibility for the school to take care of their students and they also know in-time and able to send an alert message to their parents if the students are not at the school at school start time. This System ensures safety of the students by making their parents aware about the various important status about their students like in-time, out-time, everything about their arrival. By using RFID technology it is…
Read More

Evaluation of Academic Performance of Students with Fuzzy Logic

Data mining, Web | Desktop Application
Evaluation of Academic Performance of Students with Fuzzy Logic Students’ academic success is evaluated by their performance in exams conducted by the institutes or Universities. This system evaluate students academic performance with fuzzy logic based performance evaluation method. In this method, we consider three parameters attendance, internal marks and external marks which are considered to evaluate students final academic performance. The fuzzy inference system has also been used to obtain Performance of Students for different input values student attendance, marks.
Read More

Document Sentiment Analysis Using Opinion Mining

Data mining, Web | Desktop Application
Document Sentiment Analysis Using Opinion Mining Sentiment analysis (also known as opinion mining) refers to the use of natural language processing, text analysis to identify and extract subjective information in source materials. Sentiment analysis aims to determine the attitude of a speaker or a writer with respect to some topic or the overall contextual polarity of a document. This system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once the keywords are found, the comments are with a sentiment rank. This system also scans documents in order to analyse the sentiment of the user.
Read More

Crime Rate Prediction Using K Means

Data mining, Web | Desktop Application
Crime Rate Prediction Using K Means Crime rate is increasing now-a-days in many countries. In today’s world with such higher crime rate and brutal crime happening, there must be some protection against this crime. Here we introduced a system by which crime rate can be reduced. Crime data must be fed into the system. We introduced data mining algorithm to predict crime. K-means algorithm plays an important role in analyzing and predicting crimes. K-means algorithm will cluster co-offenders, collaboration and dissolution of organized crime groups, identifying various relevant crime patterns, hidden links, link prediction and statistical analysis of crime data. This system will prevent crime occurring in society. Crime data is analyzed which is stored in the database. Data mining algorithm will extract information and patterns from database. System will…
Read More

Online Blood Bank Project PHP

Web | Desktop Application
Online Blood Bank Project This is an online blood bank management system that helps in managing various blood bank operations effectively. The project consists of a central depository containing various blood deposits available along with associated details. These details include blood type, storage area and date of storage. Maintenance and the monitoring of blood deposits become easy with the help of this system. The project is an online system that provides an option to check the availability of the required blood group within the blood bank. Moreover, the system also has added features such as patient name and contacts, blood booking and requirement of blood group is posted on the website to find available donors for a blood emergency. This online system is developed on .net platform and supported by…
Read More

Campus Recruitment System php

Web | Desktop Application
Campus Recruitment System This college campus recruitment system provides options like student login, company login and an admin login. This software system provides an option to the students to create their profiles and upload all their details including their marks onto the system. The admin can check each student details and can remove faulty accounts. The system also consists of a company login where various companies visiting the college can view a list of students in that college and their respective resumes. The software system allows students to view a list of companies who have posted for vacancy. The admin has overall rights over the system and can moderate and delete any details not pertaining to college placement rules. The project is beneficial for college students, various companies visiting the…
Read More

Car Comparison System Project

Web | Desktop Application
Car Comparison System Project Before buying a car, it is best to compare its feature and characteristic with other cars. Car comparison system project focuses on providing information to buyers about the similarities and dissimilarities between two cars. User needs to select two cars and the system will generate a brief report indicating the benefits and defects. Thus, it helps user to analyze the cars effectively and user can make best decision before buying. The system provides an admin login that has sole control over it. He can post different cars and can put up notifications. The user logs into the system and can search for his car. The system then shows various car options for comparison with respect to the desired one. Hence, user can check out varieties of…
Read More

Cricket Club Management Project

Web | Desktop Application
Cricket Club Management Project Cricket club management project is designed with the motive of managing a cricket club. This software system consists of various online booking and management functionaries needed by a cricket club. It provides various options like ground bookings, member registrations, notice posting, member registration, batch registration and more. This software system assures efficient management and maintains the functioning on a cricket club. The project consists of the following features: Ground Booking: The user may fill and apply for club ground booking using an online form. Once the admin approves the application, the ground is booked accordingly. Member Registration: People may register for the club membership. Batch Registration: People may register for various cricket training batches through the website contact form. Notices: Recent notices can be seen on…
Read More

Salon management System Php

Web | Desktop Application
Salon management System Salon management system is specially designed for managing a hair salon. This system keeps track of all the activities that are carried on daily within the salon. It maintains stock of inventory coming in. It also manages individual employee salary. The system is even equipped to manage customer billing and data storage. This fully equipped system alone manages the entire functioning of a hair salon. The system works as follows: Administrator may login to the system. He may then manage and check employee salaries due date and payment to be made. The system also keeps track of inventory coming in. An employee login is also present for customer billing. As the employee enters various services, the system calculates the bill and generates the bill. This customer data…
Read More

Credit Card Fraud Detection Project Php

Web | Desktop Application
Credit Card Fraud Detection Project The credit card fraud detection features makes use of the behavior and location of the user to check for unusual patterns. These patterns include user characteristics such as user spending patterns as well as usual user geographic locations to verify his identity. The system requires revivification as soon as any unusual pattern is detected. User’s credit card data is being analyzed by the system for various characteristics. These characteristics include user’s country and usual spending procedures. The system recognizes unusual patterns in the payment procedures based upon previous data of that user. So now, the system may require the user to login again or even block the user for more than three invalid attempts.
Read More

Real Estate Search Based On Data Mining

Data mining, Web | Desktop Application
Real Estate Search Based On Data Mining This project helps the users to make good decisions regarding buying or selling of valuable property. Prior to this online system, this process involved a lot of travelling costs and searching time. Due to this system, the users can search for the required property online and get the property details depending on its preferences, which save both time and energy. This system includes property details like Address, space measurement (sq ft), number of BHKs, Floor, Property Seller name and its contact number plus email-id. The user can search property depending on the area that it wants in, number of washrooms, bedrooms, halls and kitchen. The system contains an algorithm that calculates the amount of loan that the user can take along with the…
Read More

Smart Health Prediction Using Data Mining

Data mining, Web | Desktop Application
Smart Health Prediction Using Data Mining The Health Prediction system is an end user support and online consultation project. This system allows users to get instant guidance on their health issues through an intelligent health care system online. The system contains data of various symptoms and the disease/illness associated with those symptoms. It also has an option for users of sharing their symptoms and issues. The system processes those symptoms to check for various illnesses that can be associated with it. The system is designed to use intelligent data mining techniques to guess the most accurate illness based on patient’s symptoms. If user’s symptoms do not exactly match any disease in the database, then it is shows the diseases user could probably have based on his/her symptoms. It also consists…
Read More

Online Furniture Shop Project Php

Web | Desktop Application
Online Furniture Shop Project It is an online furniture shop that allows users to check for various furniture available at the online store and purchase online. The project provides a of list of furniture products displayed online in various models and designs. The user may browse through these products as per categories. If the user likes a product, he may add it to his shopping cart. User needs to register on the site before checking out so that he can login using same id password next time. User can select any payment option that he wish to like credit card or cash on delivery. user receives a copy of the shopping receipt on his email id once the transaction is successful. Here we use .net framework to make the entire…
Read More

Opinion Mining For Social Networking Site

Data mining, Web | Desktop Application
Opinion Mining For Social Networking Site This system uses opinion-mining methodology in order to achieve desired functionality. Opinion Mining for Social Networking Site is a web application where a user will post his views related to some subject and other users will view and comment on it. The System takes comments of various users, based on the opinion, system will specify whether the posted topic is good, bad, or worst. User can change his own profile picture and can update his status. Various users can view these changes. Database of the system have various keywords denoted as negative and positive words, which helps the system to recognize the comments and rank them accordingly. Once the user logins to the system, he/she can view their own status and topics posted by…
Read More

Computer Assembly Website Php

Web | Desktop Application
Computer Assembly Website It is a computer parts assembly website project, where a user may select various computer parts online and it will be delivered to the users address. The computer assembly website project allows users to select from a list of computer parts of various companies and models. The project works as follows: User gets an option to login to the website. The user needs to create a new account if he/she is not registered The user can then see various links saying Hard disk, motherboard, mouse, speaker etc. Once the user clicks on motherboard link, the motherboard selection page is opened. Here the user may view a list of motherboards of various companies, make and models. User is allowed to select any product needed and add it to…
Read More

Online Election System Project Php

Web | Desktop Application
Online Election System Project Online Election System would have Candidate registration, document verification, auto-generated User ID and pass for candidate and Voters. Election Commission will handle Admin Login and Candidate will handle Candidate Login. Voters will get Unique ID and Password, Using which they can vote for a Candidate only once per Election. The project is beneficial for Election Commission, for voters as the can get to know the candidate background and choose wisely, and even for Candidate. The software system allows the Candidate to login in to their profiles and upload all their details including their previous milestone onto the system. The admin can check each Candidate details and verify the documents. Candidate’s ID and Password will be generated only after the verification, and faulty accounts will be removed.…
Read More

The Cibil System Project Php

Web | Desktop Application
The Cibil System Project A cibil system to keep tracks of peoples credit scores and dues of a particular person. The system is similar to the real cibil system with an enhancement (Here the defaulter can view his status and can apply for improvement by good behavior). This software system provides an option of admin login, Cibil associates login and individual login. Here, cibil associates are banks or companies who want to report faulty members. They may send faulty member data and this is passed on to the cibil admin. The cibil admin can view the data and approve after inspection. The system provides an option of member login for which a member first needs to register. He can then check if he is listed in the black list and…
Read More

Banking Bot Project Php

Artificial Intelligence & ML, Web | Desktop Application
Banking Bot Project A banking bot project is based on artificial algorithms that analyzes user’s queries and understand user’s message. The system design is for banks use, where users are allowed to ask any bank related questions like loan, account, policy etc. This is an android application. The system recognizes user’s query and understands what the user wants to convey and simultaneously answers them appropriately. The format of user’s questions can be different as there is no specific format for users to ask questions. The built in artificial intelligence system recognizes the requirements of the users and provides suitable answers for the same. It makes use a graphical representation of a person speaking while giving answers as a real person would do.
Read More

Online Diagnostic Lab Reporting System Php

Web | Desktop Application
Online Diagnostic Lab Reporting System It is an online diagnostic lab manager application that brings up various diagnoses working online. Here patients get an option to register on the site and login using registered details. Once registered with their address and contact details, the patients may now see a variety of tests conducted by the lab along with their costs. The system allows patients to do the bookings for various tests like CBC, Blood Glucose, KFT, and LFT. The tests also consist of parameters like Hemoglobin, WBC, etc. The system allows users to book any test needed and after successful booking, system calculates costs and allows users to pay online. As soon as the payment is done, the patient test is booked and the lab may now collected samples from…
Read More

Online Loan Application & Verification System

Web | Desktop Application
Name Online Loan Application & Verification System Technology PHP, MySql Category Web Application Description In India, getting a loan is a very tiring and complicated process as it may take weeks even months for loan approval and people need to visit the loan office repeatedly for document and verification. This system is designed to automate the loan process from both, bankers as well as customer’s side. Here customers get information about various loans provided along with rate of interest and required documents. Once the customer fills basic enquiry form, it reaches the bank server and he gets a login id password. The server administrator now can check it and decide whether to approve or reject the candidate. If he decides to approve, the banker may select to send customer to…
Read More

Sentiment Based Movie Rating System Php

Web | Desktop Application
Sentiment Based Movie Rating System We often encounter online movie rating sites, where the admin manually rates the movie, depending upon the comments, ratings and reviews of the users. Sentiment based movie rating system is an online system that automatically allows users to post reviews and stores them to rate movies based on user sentiments. The system analyzes the stored data to check for user sentiments associated with each comment. This system consists of a sentiment library designed for English as well as Hindi sentiment analysis. The system breaks user comments to check for sentimental keywords and predicts user sentiment associated with it. Once the keywords are found, the comments are with a sentiment rank. The system gathers all the comments for a particular movie and then calculates an average…
Read More

Matrimonial Portal Project

Web | Desktop Application
Matrimonial Portal Project This online matrimonial site is developed to let individual find their potential matches for marriage as per their priorities. This project allows the phrase ‘Marriages are made in heaven’ to be rephrased as ‘Marriages are now made online’. This application allows browsing profiles of other registered users on the site. An individual needs to give their information such as Name, Gender, Religion, Caste, Marital status, Current salary, Occupation etc along with an option to upload photo of the individual registering and their kundali. The person looking for marriage can register and search for a profile that matches their requirement. This application allows individual to search by gender, age, religion, caste, marital status. It gives an option to an individual to view kundali, which is highest priority in…
Read More

Software Piracy Protection Project Php

Web | Desktop Application
Software Piracy Protection Project The project is designed to maintain software piracy protection and assures that, only the authenticated users are accessing it. Piracy has become a major threat to software product companies on the internet. Hackers or an intruder can gain access to the system to steal the information with the help of malicious codes and programs. Hence there arises a need to protect the information and products from being plagiarized. This project is developed with the purpose to protect the software’s ownership of copyright and make all the transactions secure and threat free.
Read More

Online Herbs Shopping Project

Web | Desktop Application
Online Herbs Shopping Project This project helps the users to cure their disease by providing them the list of fruits and herbs that require consumption, in order to get rid of disease. This project helps the user by providing easy access and search for herbs and fruits that will be good for the health of the user depending on any health issue or disease that he/she is suffering from. This system reduces the searching time of the user, largely by allowing them to enter their health problem and search accordingly. The admin can add fruits and herbs along with their information to the system. This system provides the description of the selected herbs and the way that herb will help them to cure the disease and improve health. Once the…
Read More

Online Bakery Shop System

Web | Desktop Application
Online Bakery Shop System This online Bakery shop allows users to check and purchase various bakery products available online. The project consists of list of bakery products displayed in various categories and the user can browse through the items. User can add the selected items it to his shopping cart. User needs to register on the site before checking out. He can then login using same id password next time. Now he may pay through a credit card or cash on delivery. The user receives a copy of the shopping receipt on his email id after the successful transaction. Here we use user-friendly interface to make the entire frontend. The middle tier or code behind model is designed for fast processing. In addition, SQL serves as a backend to store…
Read More

Daily Expense Tracker System

Web | Desktop Application
Daily Expense Tracker System Daily Expense Tracker System is designed to keep a track of Income-Expense of a Housewife on a day-to-day basis. This System divides the Income based on daily expenses. If you exceed day’s expense, system will cut it from your income and will provide new daily expense allowed amount. If that day’s expense is less, system will add it in savings. Daily expense tracking System will generate report at the end of month to show Income-Expense Curve. It will let you add the savings amount, which you had saved for some particular Festivals or days like Birthday or Anniversary.
Read More

Course Material Distribution System

Web | Desktop Application
Course Material Distribution System In various universities including IGNOU, dispatches material required for various courses after the affirmation are sent to students. The student data is provided including name, address as well as the course material to be dispatched to the student. Each course has a set of number of booklets, which are by and large pressed together before dispatch. Booklet Stock is printed and maintained independently. Availability of the stock of course material is crosschecked as soon as the new request for dispatch is received. The material is dispatched instantly if material for each course and booklet for the same is available. Rest of the information is moved to pending stack of course pending database. The inventory stock is updated on receiving new printed stock and dispatch is made…
Read More

Web Usage Mining Using Improved Frequent Pattern Tree Algorithms

Cloud Computing, Data mining
Web Usage Mining Using Improved Frequent Pattern Tree Algorithms Web mining can be broadly defined as discovery and analysis of useful information from the World Wide Web. Web Usage Mining can be described as the discovery and analysis of user accessibility pattern, during the mining of log files and associated data from a particular Web site, in order to realize and better serve the needs of Web-based applications. Web usage mining itself can be categorised further depending on the kind of usage data considered they are web server, application server and application level data. This Research work focuses on web use mining and specifically keeps tabs on running across the web utilization examples of sites from the server log records. The bonding of memory and time usage is compared by…
Read More

Keyword Query Routing

Data mining, Web | Desktop Application
Keyword Query Routing Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans ([email protected] of 0.92) that are…
Read More

Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups

Data mining, Web | Desktop Application
Set Predicates in SQL: Enabling Set- Level Comparisons for Dynamically Formed Groups In data warehousing and OLAP applications, scalar level predicates in SQL become increasingly inadequate to support a class of operations that require set-level comparison semantics, i.e., comparing a group of tuples with multiple values. Currently, complex SQL queries composed by scalar-level operations are often formed to obtain even very simple set-level semantics. Such queries are not only difficult to write but also challenging for a database engine to optimize, thus can result in costly evaluation. This paper proposes to augment SQL with set predicate, to bring out otherwise obscured set-level semantics. We studied two approaches to processing set predicates—an aggregate function-based approach and a bitmap index-based approach. Moreover, we designed a histogram-based probabilistic method of set predicate selectivity…
Read More

Customizable Pointof- Interest Queries in Road Networks

Data mining, Web | Desktop Application
Customizable Pointof- Interest Queries in Road Networks networks within interactive applications. We show that partition-based algorithms developed for point-topoint shortest path computations can be naturally extended to handle augmented queries such as finding the closest restaurant or the best post office to stop on the way home, always ranking POIs according to a user-defined cost function. Our solution allows different trade-offs between indexing effort (time and space) and query time. Our most flexible variant allows the road network to change frequently (to account for traffic information or personalized cost functions) and the set of POIs to be specified at query time. Even in this fully dynamic scenario, our solution is fast enough for interactive applications on continental road networks.
Read More

Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions

Data mining, Web | Desktop Application
Entity Linking with a Knowledge Base: Issues, Techniques, and Solutions The large number of potential applications from bridging web data with knowledge bases has led to an increase in the entity linking research. Entity linking is the task to link entity mentions in text with their corresponding entities in a knowledge base. Potential applications include information extraction, information retrieval, and knowledge base population. However, this task is challenging due to name variations and entity ambiguity. In this survey, we present a thorough overview and analysis of the main approaches to entity linking, and discuss various applications, the evaluation of entity linking systems, and future directions.
Read More

Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model

Data mining, Web | Desktop Application
Co-Extracting Opinion Targets and Opinion Words from Online Reviews Based on the Word Alignment Model Mining opinion targets and opinion words from online reviews are important tasks for fine-grained opinion mining, the key component of which involves detecting opinion relations among words. To this end, this paper proposes a novel approach based on the partially supervised alignment model, which regards identifying opinion relations as an alignment process. Then, a graph-based co-ranking algorithm is exploited to estimate the confidence of each candidate. Finally, candidates with higher confidence are extracted as opinion targets or opinion words. Compared to previous methods based on the nearest-neighbor rules, our model captures opinion relations more precisely, especially for long-span relations. Compared to syntaxbased methods, our word alignment model effectively alleviates the negative effects of parsing errors…
Read More

Access Control Mechanisms for Outsourced Data in Cloud

Cloud Computing, Web | Desktop Application
Access Control Mechanisms for Outsourced Data in Cloud Traditional access control models often assume that the en- tity enforcing access control policies is also the owner of data and re- sources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving con dentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users' access patterns also become pri- vacy sensitive information that should be protected from the cloud. We propose a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which allows to get acceptable com- munication overhead and at the same time limits the information that the cloud learns…
Read More

Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks

Cloud Computing, Networking, Security and Encryption, Web | Desktop Application
Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks Mobile nodes in military environments such as a battlefield or a hostile region are likely to suffer from intermittent network connectivity and frequent partitions. Disruption-tolerant network (DTN) technologies are becoming successful solutions that allow wireless devices carried by soldiers to communicate with each other and access the confidential information or command reliably by exploiting external storage nodes. Some of the most challenging issues in this scenario are the enforcement of authorization policies and the policies update for secure data retrieval. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising cryptographic solution to the access control issues. However, the problem of applying CP-ABE in decentralized DTNs introduces several security and privacy challenges with regard to the attribute revocation, key escrow, and coordination of attributes issued…
Read More

Product Aspect Ranking and Its Applications

Cloud Computing, Data mining, Security and Encryption, Web | Desktop Application
Product Aspect Ranking and Its Applications Numerous consumer reviews of products are now available on the Internet. Consumer reviews contain rich and valuable knowledge for both firms and users. However, the reviews are often disorganized, leading to difficulties in information navigation and knowledge acquisition. This article proposes a product aspect ranking framework, which automatically identifies the important aspects of products from online consumer reviews, aiming at improving the usability of the numerous reviews. The important product aspects are identified based on two observations: 1) the important aspects are usually commented on by a large number of consumers and 2) consumer opinions on the important aspects greatly influence their overall opinions on the product. In particular, given the consumer reviews of a product, we first identify product aspects by a shallow…
Read More

Typicality-Based Collaborative Filtering Recommendation

Cloud Computing, Data mining, Security and Encryption
Typicality-Based Collaborative Filtering Recommendation Collaborative filtering (CF) is an important and popular technology for recommender systems. However, current CF methods suffer from such problems as data sparsity, recommendation inaccuracy, and big-error in predictions. In this paper, we borrow ideas of object typicality from cognitive psychology and propose a novel typicality-based collaborative filtering recommendation method named TyCo. A distinct feature of typicality-based CF is that it finds “neighbors” of users based on user typicality degrees in user groups (instead of the corated items of users, or common users of items, as in traditional CF). To the best of our knowledge, there has been no prior work on investigating CF recommendation by combining object typicality. TyCo outperforms many CF recommendation methods on recommendation accuracy (in terms of MAE) with an improvement of…
Read More

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud

Cloud Computing, Data mining, Parallel And Distributed System, Security and Encryption, Web | Desktop Application
Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud With data storage and sharing services in the cloud, users can easily modify and share data as a group. To ensure shared data integrity can be verified publicly, users in the group need to compute signatures on all the blocks in shared data. Different blocks in shared data are generally signed by different users due to data modifications performed by different users. For security reasons, once a user is revoked from the group, the blocks which were previously signed by this revoked user must be re-signed by an existing user. The straightforward method, which allows an existing user to download the corresponding part of shared data and re-sign it during user revocation, is inefficient due to the…
Read More

Privacy-Preserving Updates to Anonymous and Confidential Databases

Parallel And Distributed System, Web | Desktop Application
Privacy-Preserving Updates to Anonymous and Confidential Databases Suppose Alice owns a k-anonymous database and needs to determine whether her database, when inserted with a tuple owned by Bob, is still k-anonymous. Also, suppose that access to the database is strictly controlled, because for example data are used for certain experiments that need to be maintained confidential. Clearly, allowing Alice to directly read the contents of the tuple breaks the privacy of Bob (e.g., a patient’s medical record); on the other hand, the confidentiality of the database managed by Alice is violated once Bob has access to the contents of the database. Thus, the problem is to check whether the database inserted with the tuple is still k-anonymous, without letting Alice and Bob know the contents of the tuple and the…
Read More

In Cloud, Can Scientific Communities Benefit from the Economies of Scale?

Parallel And Distributed System, Web | Desktop Application
In Cloud, Can Scientific Communities Benefit from the Economies of Scale? The basic idea behind Cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of Cloud computing: in Cloud, can small or medium-scale scientific computing communities benefit from the economies of scale? Our research contributions are three fold: first, we propose an enhanced scientific public cloud model (ESP) that encourages small or medium scale research organizations rent elastic resources from a public cloud provider; second, on a basis of the ESP model, we design and implement the Dawning Cloud system that can consolidate heterogeneous scientific workloads on a Cloud site; third, we propose an innovative emulation methodology and perform a comprehensive evaluation. We found…
Read More

Balancing the Tradeoffs between Query Delay and Data Availability in MANETs.

Parallel And Distributed System, Web | Desktop Application
Balancing the Tradeoffs between Query Delay and Data Availability in MANETs. In mobile ad hoc networks (MANETs), nodes move freely and link/node failures are common, which leads to frequent network partitions. When a network partition occurs, mobile nodes in one partition are not able to access data hosted by nodes in other partitions, and hence significantly degrade the performance of data access. To deal with this problem, we apply data replication techniques. Existing data replication solutions in either wired or wireless networks aim at either reducing the query delay or improving the data availability, but not both. As both metrics are important for mobile nodes, we propose schemes to balance the tradeoffs between data availability and query delay under different system settings and requirements. Extensive simulation results show that the…
Read More

Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage.

Parallel And Distributed System, Web | Desktop Application
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage. Provable data possession (PDP) is a technique for ensuring the integrity of data in storage outsourcing. In this paper, we address the construction of an efficient PDP scheme for distributed cloud storage to support the scalability of service and data migration, in which we consider the existence of multiple cloud service providers to cooperatively store and maintain the clients’ data. We present a cooperative PDP (CPDP) scheme based on homomorphic verifiable response and hash index hierarchy. We prove the security of our scheme based on multi-prover zero-knowledge proof system, which can satisfy completeness, knowledge soundness, and zero-knowledge properties. In addition, we articulate performance optimization mechanisms for our scheme, and in particular present an efficient method for selecting optimal parameter values…
Read More

Automatic image equalization and contrast enhancement using Gaussian mixture

Image Processing, Web | Desktop Application
Automatic image equalization and contrast enhancement using Gaussian mixture Abstract In this paper, we propose an adaptive image equalization algorithm which automatically enhances the contrast in an input image. The algorithm uses Gaussian mixture model (GMM) to model the image grey-level distribution, and the intersection points of the Gaussian components in the model are used to partition the dynamic range of the image into input grey-level intervals. The contrast equalized image is generated by transforming the pixels’ grey levels in each input interval to the appropriate output grey-level interval according to the dominant Gaussian component and cumulative distribution function (CDF) of the input interval. To take account of human perception the Gaussian components with small variances are weighted with smaller values than the Gaussian components with larger variances, and the…
Read More

An effective image steganalysis method based on neighborhood information of pixels

Image Processing, Web | Desktop Application
An effective image steganalysis method based on neighborhood information of pixels This project focuses on image steganalysis. We use higher order image statistics based on neighborhood information of pixels (NIP) to detect the stego images from original ones. We use subtracting gray values of adjacent pixels to capture neighborhood information, and also make use of ―rotation invariant‖ property to reduce the dimensionality for the whole feature sets. We tested two kinds of NIP feature, the experimental results illustrates that our proposed feature sets are with good performance and even outperform the state-of-art in certain aspect.
Read More

A Secured Cost-effective Multi-Cloud Storage in Cloud Computing.

Cloud Computing, Web | Desktop Application
The end of this decade is marked by a paradigm shift of the industrial information technology towards a pay-per-use service business model known as cloud computing. Cloud data Storage redefines the security issues targeted on customer’s outsourced data (data that is not stored/retrieved from the costumers own servers). In this work we observed that, from a customer’s point of view, relying upon a solo SP for his outsourced data is not very promising. In addition, providing better privacy as well as ensuring data availability can be achieved by dividing the user’s data block into data pieces and distributing them among the available SPs in such a way that no less than a threshold number of SPs can take part in successful retrieval of the whole data block. In this paper,…
Read More

Ensuring Data Storage Security in Cloud Computing

Cloud Computing, Web | Desktop Application
Ensuring Data Storage Security in Cloud Computing Cloud computing has been envisioned as the next-generation architecture of IT enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centers, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well understood. In this article, we focus on cloud data storage security, which has always been an important aspect of quality of service. To ensure the correctness of users' data in the cloud, we propose an effective and flexible distributed scheme with two salient features, opposing to its predecessors. By utilizing the homomorphic token with…
Read More

Secure And Authenticated Reversible Data Hiding In Encrypted Images

Image Processing, Web | Desktop Application
Secure And Authenticated Reversible Data Hiding In Encrypted Images Reversible data hiding a novel technique which is used to embed additional information in the encrypted images, applies in military and medical images, which can be recoverable with original media and the hided data without loss. A number of reversible data hiding techniques were proposed in the recent years, but on analysis, all lacks in providing the security and authentication. This project proposes a novel reversible data hiding technique which work is separable, the receiver can extract the original image or extra embedded data or both according to the keys hold by the receiver. On the other hand the receiver can verify the data hided by the data hider, such that the work proposes both security and authentication. This project proposes…
Read More

Developing Secure Social Healthcare System over the Cloud

Cloud Computing, Web | Desktop Application
Developing Secure Social Healthcare System over the Cloud Healthcare application is a social media application which is developed over the cloud. Now a day we hear two cutting edge technologies most social media and cloud computing. Developing and maintaining a healthcare system with self infrastructure well cost more. Many small hospitals save hard copies of patient’s records. This healthcare application will provide web service which is developed over the cloud so it well reduces the cost and they need not be worried about infrastructure. Cloud providers well provide up to date software so, software well be up to date. Since data is present in the cloud most of them worry about security. By using role based access control healthcare system is secured.
Read More

Access Control Mechanisms for Outsourced Data in Cloud

Cloud Computing, Web | Desktop Application
Access Control Mechanisms for Outsourced Data in Cloud Traditional access control models often assume that the en- tity enforcing access control policies is also the owner of data and re- sources. This assumption no longer holds when data is outsourced to a third-party storage provider, such as the cloud. Existing access control solutions mainly focus on preserving con dentiality of stored data from unauthorized access and the storage provider. However, in this setting, access control policies as well as users' access patterns also become pri- vacy sensitive information that should be protected from the cloud. We propose a two-level access control scheme that combines coarse-grained access control enforced at the cloud, which allows to get acceptable com- munication overhead and at the same time limits the information that the cloud learns…
Read More

An extended visual cryptography scheme without pixel expansion for halftone images

Image Processing, Web | Desktop Application
An extended visual cryptography scheme without pixel expansion for halftone images Visual cryptography is a secret sharing scheme which use images distributed as shares such that, when the shares are superimposed, a hidden secret image is revealed. In extended visual cryptography, the share images are constructed to contain meaningful cover images, thereby providing opportunities for integrating visual cryptography and biometric security techniques. In this paper, we propose a method for processing halftone images that improves the quality of the share images and the recovered secret image in an extended visual cryptography scheme for which the size of the share images and the recovered image is the same as for the original halftone secret image. The resulting scheme maintains the perfect security of the original extended visual cryptography approach.
Read More

Cloud Data Protection for the Masses

Cloud Computing, Web | Desktop Application
Cloud Data Protection for the Masses Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protection as a Service, which dramatically reduces the per-application development effort required to offer data protection, while still allowing rapid development and maintenance.
Read More

Dynamic Bandwidth Allocation in Cloud Computing

Cloud Computing, Web | Desktop Application
Dynamic Bandwidth Allocation in Cloud Computing Cloud Computing is a use of computing resources that is delivered as a service over a network. Sharing the data in the cloud depends on the network performance of the data centers. Bandwidth allocation plays a major role in sharing the resources towards the data center networks. Server performance is the major problem in cloud computing. When multiple users send a request for the same server at a time, the performance of the server is considerably decreased. So we describe a novel method of reallocating the bandwidth dynamically from passive users to active users using bandwidth mutual sharing and fair sharing technique.
Read More

A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG

Image Processing, Web | Desktop Application
A Secret-Sharing-Based Method for Authentication of Grayscale Document Images via the Use of the PNG Abstract—A new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images via the use of the PNG image is proposed. An authentication signal is generated for each block of a grayscale document image, which, together with the binarized block content, is transformed into several shares using the Shamir secret sharing scheme. The involved parameters are carefully chosen so that as many shares as possible are generated and embedded into an alpha channel plane. The alpha channel plane is then combined with the original grayscale image to form a PNG image. During the embedding process, the computed share values are mapped into a range of alpha channel…
Read More

DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS

Cloud Computing, Web | Desktop Application
DEFENSES AGAINST LARGE SCALE ONLINE PASSWORD GUESSING ATTACKS BY USING PERSUASIVE CLICK POINTS Abstract Usable security has unique usability challenges because the need for security often means that standard human-computer-interaction approaches cannot be directly applied. An important usability goal for authentication systems is to support users in selecting better passwords. Users often create memorable passwords that are easy for attackers to guess, but strong system-assigned passwords are difficult for users to remember. So researchers of modern days have gone for alternative methods wherein graphical pictures are used as passwords. Graphical passwords essentially use images or representation of images as passwords. Human brain is good in remembering picture than textual character. There are various graphical password schemes or graphical password software in the market. However, very little research has been done…
Read More

Robust Face-Name Graph Matching for Movie Character Identification

Image Processing, Web | Desktop Application
Robust Face-Name Graph Matching for Movie Character Identification Automatic face identification of characters in movies has drawn significant research interests and led to many interesting applications. It is a challenging problem due to the huge variation in the appearance of each character. Although existing methods demonstrate promising results in clean environment, the performances are limited in complex movie scenes due to the noises generated during the face tracking and face clustering process. In this paper we present two schemes of global face-name matching based framework for robust character identification. The contributions of this work include: 1) A noise insensitive character relationship representation is incorporated. 2) We introduce an edit operation based graph matching algorithm. 3) Complex character changes are handled by simultaneously graph partition and graph matching. 4) Beyond existing…
Read More

A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY

Image Processing, Web | Desktop Application
A DYMANIC METHOD TO SECURE CONFIDENTIAL DATA USING SIGNCRYPTION WITH STEGANOGRAPHY Since years due to the increase of technology, the means of communication and transferring information from one point to the other has been drastically changed. Because of this rapid development of technology, few people misusing the technology to unveil the confidential data. To provide high end security to the data to prevent form the attackers we are proposing a dynamic method in this paper. Two things are important to provide security to the data confidentiality and encryption. In this paper we are using signcryption technique to provide high security to the data, by encrypting the data with digital signature, because of this the attacker cannot do any kind of modification to the data in case the data is decrypted…
Read More

Mitigating of fire based disaster using IP

Image Processing, Web | Desktop Application
Mitigating of fire based disaster using IP Present work is an in depth study to detect flames in video by processing the data captured by an ordinary camera. Previous vision based methods were based on color difference, motion detection of flame pixel and flame edge detection. This paper focuses on optimizing the flame detection by identifying gray cycle pixels nearby the flame, which is generated because of smoke and of spreading of fire pixel and the area spread of flame. These techniques can be used to reduce false alarms along with fire detection methods . The novel system simulate the existing fire detection techniques with above given new techniques of fire detection and give optimized way to detect the fire in terms of less false alarms by giving the accurate…
Read More

A Novel Data Embedding Method Using Adaptive Pixel Pair Matching

Image Processing, Web | Desktop Application
A Novel Data Embedding Method Using Adaptive Pixel Pair Matching This paper proposes a new data-hiding method based on pixel pair matching (PPM). The basic idea of PPM is to use the values of pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. Exploiting modification direction (EMD) and diamond encoding (DE) are two data-hiding methods proposed recently based on PPM. The maximum capacity of EMD is 1.161 bpp and DE extends the payload of EMD by embedding digits in a larger notational system. The proposed method offers lower distortion than DE by providing more compact neighborhood sets and allowing embedded digits…
Read More

A Keyless Approach to Image Encryption

Image Processing, Security and Encryption, Web | Desktop Application
A Keyless Approach to Image Encryption Maintaining the secrecy and confidentiality of images is a vibrant area of research, with two different approaches being followed, the first being encrypting the images through encryption algorithms using keys, the other approach involves dividing the image into random shares to maintain the images secrecy. Unfortunately heavy computation cost and key management limit the employment of the first approach and the poor quality of the recovered image from the random shares limit the applications of the second approach. In this paper we propose a novel approach without the use of encryption keys. The approach employs Sieving, Division and Shuffling to generate random shares such that with minimal computation, the original secret image can be recovered from the random shares without any loss of image…
Read More

Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing

Cloud Computing, Web | Desktop Application
Efficient Privacy-Preserving Range Queries over Encrypted Data in Cloud Computing With the growing popularity of data and service outsourcing, where the data resides on remote servers in encrypted form, there remain open questions about what kind of query operations can be performed on the encrypted data. In this paper, we focus on one such important query operation, namely range query. One of the basic security primitive that can be used to evaluate range queries is secure comparison of encrypted integers. However, the existing secure comparison protocols strongly rely on the encrypted bit-wise representations rather than on pure encrypted integers. Therefore, in this paper, we first propose an efficient method for converting an encrypted integer z into encryptions of the individual bits of z. We then utilize the proposed security primitive…
Read More

N-Square Approach For Lossless Image Compression And Decompression

Image Processing, Web | Desktop Application
N-Square Approach For Lossless Image Compression And Decompression There are several lossy and lossless coding techniques developed all through the last two decades. Although very high compression can be achieved with lossy compression techniques, they are deficient in obtaining the original image. While lossless compression technique recovers the image exactly. In applications related to medical imaging lossless techniques are required, as the loss of information is deplorable. The objective of image compression is to symbolize an image with a handful number of bits as possible while preserving the quality required for the given application. In this paper we are introducing a new lossless encoding and decoding technique which even better reduces the entropy there by reducing the average number of bits with the utility of Non Binary Huffman coding through…
Read More

An Efficient Real Time Moving Object Detection Method for Video Surveillance System

Image Processing, Web | Desktop Application
An Efficient Real Time Moving Object Detection Method for Video Surveillance System Moving object detection has been widely used in diverse discipline such as intelligent transportation systems, airport security systems, video monitoring systems, and so on. In this paper, we propose an efficient moving object detection method using enhanced edge localization mechanism and gradient directional masking for video surveillance system. In our proposed method, gradient map images are initially generated from the input and background images using a gradient operator. The gradient difference map is then calculated from gradient map images. The moving object is then detected by using appropriate directional masking and thresholding. Simulation results indicate that the proposed method consistently performs well under different illumination conditions including indoor, outdoor, sunny, and foggy cases. Moreover, it outperforms well known…
Read More

Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach

Image Processing, Web | Desktop Application
Image Authentication and Restoration using BlockWise Fragile Watermarking based on k-Medoids Clustering Approach This paper proposes a block-wise fragile watermarking scheme based on k-medoids clustering approach. Proposed scheme is effective enough to reconstruct the tampered extensive content of an image. According to the suggested algorithm, first of all image is divided into the blocks and forty eight bits are calculated for each block, which consist of forty five Recovery bits and three Authentication bits namely Union bit, Affiliation bit and Spectrum bit. Authentication bits for a particular block are calculated by extracting five MSBs from each pixel of that block and apply them, on some predefined hash functions. Forty five Recovery bits are calculated using the means of derived clusters and its corresponding mapping bits. These Forty eight bits for…
Read More

A robust skew detection method based on maximum gradient difference and R-signature

Image Processing, Web | Desktop Application
A robust skew detection method based on maximum gradient difference and R-signature In this paper we study the detection of skewed text lines in scanned document images. The aim of our work is to develop a new automatic approach able to estimate precisely the skew angle of text in document images. Our new method is based on Maximum Gradient Difference (MGD) and R-signature. It detects zones that have high variations of gray values in different directions using the MGD transform. We consider these zones as being text regions. R-signature which is a shape descriptor based on Radon transform is then applied in order to approximate the skew angle. The accuracy of the proposed algorithm is evaluated on an open dataset by comparing error rates.
Read More

Image-based object detection under varying illumination in environments with specular surfaces

Image Processing, Web | Desktop Application
Image-based object detection under varying illumination in environments with specular surfaces Image-based environment representations capture the appearance of the surroundings of a mobile robot and are useful for the detection of novelty. However, image-based novelty detection can be impaired by illumination effects. In this paper we present an approach for the image-based detection of novel objects in a scene under varying lighting conditions and in the presence of objects with specular surfaces. The computation of an illumination-invariant image-based environment representation allows for the extraction of the shading of the environment from camera images. Using statistical models infered from the luminance and the saturation component of the shading images, secularities and shadows are detected and suppressed in the process of novelty detection. Experimental results show that the proposed method outperforms two…
Read More

A New Block Compressive Sensing to Control the Number of Measurements

Image Processing, Web | Desktop Application
A New Block Compressive Sensing to Control the Number of Measurements Compressive Sensing (CS) aims to recover a sparse signal from a small number of projections onto random vectors. Be- cause of its great practical possibility, both academia and in- dustries have made efforts to develop the CS’s reconstruction performance, but most of existing works remain at the theo- retical study. In this paper, we propose a new Block Compres- sive Sensing (nBCS), which has several benefits compared to the general CS methods. In particular, the nBCS can be dynamically adaptive to varying channel capacity because it conveys the good inheritance of the wavelet transform.
Read More

Linear distance coding for image classification

Image Processing, Web | Desktop Application
Linear distance coding for image classification The traditional SPM approach based on bag-of-features (BoF) requires nonlinear classifiers to achieve good image classification performance. This paper presents a simple but effective coding scheme called Locality-constrained Linear Coding (LLC) in place of the VQ coding in traditional SPM. LLC utilizes the locality constraints to project each descriptor into its local-coordinate system, and the projected coordinates are integrated by max pooling to generate the final representation. With linear classifier, the proposed approach performs remarkably better than the traditional nonlinear SPM, achieving state-of-the-art performance on several benchmarks. Compared with the sparse coding strategy [22], the objective function used by LLC has an analytical solution. In addition, the paper proposes a fast approximated LLC method by first performing a K-nearest-neighbor search and then solving a…
Read More

Robust Watermarking of Compressed and Encrypted JPEG2000 Images

Image Processing, Web | Desktop Application
Robust Watermarking of Compressed and Encrypted JPEG2000 Images Digital asset management systems (DAMS) generally handle media data in a compressed and encrypted form. It is sometimes necessary to watermark these compressed encrypted media items in the compressed-encrypted domain itself for tamper detection or ownership declaration or copyright management purposes. It is a challenge to watermark these compressed encrypted streams as the compression process would have packed the information of raw media into a low number of bits and encryption would have randomized the compressed bit stream. Attempting to watermark such a randomized bit stream can cause a dramatic degradation of the media quality. Thus it is necessary to choose an encryption scheme that is both secure and will allow watermarking in a predictable manner in the compressed encrypted domain. In…
Read More

Image compression and decompression using adaptive interpolation

Image Processing, Web | Desktop Application
Image compression and decompression using adaptive interpolation A simple and fast lossy compression and decompression algorithm for digital images is proposed. The method offers varying compression ratios (depending on dimensions of the image) and the acquired decompressed image is close to the original one. A selectable tradeoff between storage size and image quality is allowed,making it possible to adjust degree of compression. Compared to JPEG, it provides us better compression ratio. The suggested method does not restrict itself to any particular type of image.
Read More

Efficient and Discovery of Patterns in Sequence Data Sets.

Data mining, Web | Desktop Application
Efficient and Discovery of Patterns in Sequence Data Sets. Existing sequence mining algorithms mostly focus on mining for subsequences. However, a large class of applications, such as biological DNA and protein motif mining, require efficient mining of “approximate” patterns that are contiguous. The few existing algorithms that can be applied to find such contiguous approximate pattern mining have drawbacks like poor scalability, lack of guarantees in finding the pattern, and difficulty in adapting to other applications. In this paper, we present a new algorithm called Flexible and Accurate Motif DEtector (FLAME). FLAME is a flexible suffix-tree-based algorithm that can be used to find frequent patterns with a variety of definitions of motif (pattern) models. It is also accurate, as it always finds the pattern if it exists. Using both real…
Read More

Mining Web Graphs for Recommendations.

Data mining, Web | Desktop Application
Mining Web Graphs for Recommendations. As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Innumerable different kinds of recommendations are made on the Web every day, including music, images, books recommendations, query suggestions, etc. No matter what types of data sources are used for the recommendations, essentially these data sources can be modeled in the form of graphs. In this paper, aiming at providing a general framework on mining Web graphs for recommendations, (1) we first propose a novel diffusion method which propagates similarities between different recommendations; (2) then we illustrate how to generalize different recommendation problems into our graph diffusion framework. The proposed framework can be utilized in many recommendation tasks on the World Wide Web, including query suggestions, image recommendations,…
Read More

Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques

Data mining, Web | Desktop Application
Improving Aggregate Recommendation Diversity Using Ranking-Based Techniques Recommender systems are becoming increasingly important to individual users and businesses for providing personalized recommendations. However, while the majority of algorithms proposed in recommender systems literature have focused on improving recommendation accuracy, other important aspects of recommendation quality, such as the diversity of recommendations, have often been overlooked. In this paper, we introduce and explore a number of item ranking techniques that can generate recommendations that have substantially higher aggregate diversity across all users while maintaining comparable levels of recommendation accuracy. Comprehensive empirical evaluation consistently shows the diversity gains of the proposed techniques using several real-world rating datasets and different rating prediction algorithms.
Read More

Predicting missing items in shopping cart using fast algorithm

Data mining, Web | Desktop Application
Predicting missing items in shopping cart using fast algorithm Prediction in shopping cart uses partial information about the contents of a shopping cart for the prediction of what else the customer is likely to buy. In order to reduce the rule mining cost, a fast algorithm generating frequent itemsets without generating candidate itemsets is proposed. The algorithm uses Boolean vector with relational AND operation to discover frequent itemsets and generate the association rule. Association rules are used to identify relationships among a set of items in database. Initially Boolean Matrix is generated by transforming the database into Boolean values. The frequent itemsets are generated from the Boolean matrix. Then association rules are to generated from the already generated frequent itemsets. The association rules generated form the basis for prediction. The…
Read More

A Threshold-based Similarity Measure for Duplicate Detection

Data mining, Web | Desktop Application
A Threshold-based Similarity Measure for Duplicate Detection In order to extract beneficial information and recognize a particular pattern from huge data stored in different databases with different formats, data integration is essential. However the problem that arises here is that data integration may lead to duplication. In other words, due to the availability of data in different formats, there might be some records which refer to the same entity. Duplicate detection or record linkage is a technique which is used to detect and match duplicate records which are generated in data integration process. Most approaches concentrated on string similarity measures for comparing records. However, they fail to identify records which share the semantic information. So, in this study, a thresholdbased method which takes into account both string and semantic similarity…
Read More

Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems

Data mining, Web | Desktop Application
Efficient Multi-dimensional Fuzzy Search for Personal Information Management Systems With the explosion in the amount of semi-structured data users access and store in personal information management systems, there is a critical need for powerful search tools to retrieve often very heterogeneous data in a simple and efficient way. Existing tools typically support some IR-style ranking on the textual part of the query, but only consider structure (e.g., file directory) and metadata (e.g., date, file type) as filtering conditions. We propose a novel multi-dimensional search approach that allows users to perform fuzzy searches for structure and metadata conditions in addition to keyword conditions. Our techniques individually score each dimension and integrate the three dimension scores into a meaningful unified score. We also design indexes and algorithms to efficiently identify the most…
Read More

Enabling Multilevel Trust in Privacy Preserving Data Mining

Data mining, Web | Desktop Application
Enabling Multilevel Trust in Privacy Preserving Data Mining Privacy Preserving Data Mining (PPDM) addresses the problem of developing accurate models about aggregated data without access to precise information in individual data record. A widely studied perturbation-based PPDM approach introduces random perturbation to individual values to preserve privacy before data are published. Previous solutions of this approach are limited in their tacit assumption of single-level trust on data miners. In this work, we relax this assumption and expand the scope of perturbation-based PPDM to Multilevel Trust (MLT-PPDM). In our setting, the more trusted a data miner is, the less perturbed copy of the data it can access. Under this setting, a malicious data miner may have access to differently perturbed copies of the same data through various means, and may combine…
Read More

Slicing A New Approach to Privacy Preserving Data Publishing.

Data mining, Security and Encryption, Web | Desktop Application
Slicing A New Approach to Privacy Preserving Data Publishing. Several anonymization techniques, such as generalization and bucketization, have been designed for privacy preserving microdata publishing. Recent work has shown that general- ization loses considerable amount of information, especially for high-dimensional data. Bucketization, on the other hand, does not prevent membership disclosure and does not apply for data that do not have a clear separation between quasi- identifying attributes and sensitive attributes.
Read More

Advance Mining of Temporal High Utility Itemset

Data mining, Web | Desktop Application
Advance Mining of Temporal High Utility Itemset The stock market domain is a dynamic and unpredictable environment. Traditional techniques, such as fundamental and technical analysis can provide investors with some tools for managing their stocks and predicting their prices. However, these techniques cannot discover all the possible relations between stocks and thus there is a need for a different approach that will provide a deeper kind of analysis. Data mining can be used extensively in the financial markets and help in stock-price forecasting. Therefore, we propose in this paper a portfolio management solution with business intelligence characteristics. We know that the temporal high utility itemsets are the itemsets with support larger than a pre-specified threshold in current time window of data stream. Discovery of temporal high utility itemsets is an…
Read More

A Framework for Personal Mobile Commerce Pattern Mining and Prediction

Data mining, Web | Desktop Application
A Framework for Personal Mobile Commerce Pattern Mining and Prediction In many applications, including location based services, queries may not be precise. In this paper, we study the problem of efficiently computing range aggregates in a multidimensional space when the query location is uncertain. Specifically, for a query point Q whose location is uncertain and a set S of points in a multi- dimensional space, we want to calculate the aggregate (e.g., count, average and sum) over the subset S_ of S such that for each p ∈ S_, Q has at least probability θ within the distance γ to p. We propose novel, efficient techniques to solve the problem following the filtering-and-verification paradigm. In particular, two novel filtering techniques are proposed to effectively and efficiently remove data points from…
Read More

Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines

Data mining, Web | Desktop Application
Investigation and Analysis of New Approach of Intelligent Semantic Web Search Engines As we know that www is allowing peoples to share the huge information from big database repositories. The amount of information grows billions of databases. Hence to search particular information from these huge databases we need specialized mechanism which helps to retrive that information efficiently. now days various types of search engines are available which makes information retrieving is difficult. but to provide the better solution to this proplem ,semantic web search engines are playing vital role.basically main aim of this kind of search engines is providing the required information is small time with maximum accuracy.
Read More

Sequential Anomaly Detection in the Presence of Noise and Limited Feedback

Data mining, Web | Desktop Application
Sequential Anomaly Detection in the Presence of Noise and Limited Feedback This paper describes a methodology for detecting anomalies from sequentially observed and potentially noisy data. The proposed approach consists of two main elements: (1) filtering, or assigning a belief or likelihood to each successive measurement based upon our ability to predict it from previous noisy observations, and (2) hedging, or flagging potential anomalies by comparing the current belief against a time-varying and data-adaptive threshold. The threshold is adjusted based on the available feedback from an end user. Our algorithms, which combine universal prediction with recent work on online convex programming, do not require computing posterior distributions given all current observations and involve simple primal-dual parameter updates. At the heart of the proposed approach lie exponential-family models which can be…
Read More

Clustering Methods in Data Mining with its Applications in High Education

Data mining, Web | Desktop Application
Clustering Methods in Data Mining with its Applications in High Education Data mining is a new technology, developing with database and artificial intelligence. It is a processing procedure of extracting credible, novel, effective and understandable patterns from database. Cluster analysis is an important data mining technique used to find data segmentation and pattern information. By clustering the data, people can obtain the data distribution, observe the character of each cluster, and make further study on particular clusters. In addition, cluster analysis usually acts as the preprocessing of other data mining operations. Therefore, cluster analysis has become a very active research topic in data mining. As the development of data mining, a number of clustering methods have been founded, The study of clustering technique from the perspective of statistics, based on…
Read More

A Novel Algorithm for Automatic Document Clustering

Data mining, Web | Desktop Application
A Novel Algorithm for Automatic Document Clustering Internet has become an indispensible part of today’s life. World Wide Web (WWW) is the largest shared information source. Finding relevant information on the WWW is challenging. To respond to a user query, it is difficult to search through the large number of returned documents with the presence of today’s search engines. There is a need to organize a large set of documents into categories through clustering. The documents can be a user query or simply a collection of documents. Document clustering is the task of combining a set of documents into clusters so that intra cluster documents are similar to each other than inter cluster documents. Partitioning and Hierarchical algorithms are commonly used for document clustering. Existing partitioning algorithms have the limitation…
Read More

Dynamic Personalized Recommendation on Sparse Data

Data mining, Web | Desktop Application
Dynamic Personalized Recommendation on Sparse Data Recommendation techniques are very important in the fields of E-commerce and other Web-based services. One of the main difficulties is dynamically providing high-quality recommendation on sparse data. In this paper, a novel dynamic personalized recommendation algorithm is proposed, in which information contained in both ratings and profile contents are utilized by exploring latent relations between ratings, a set of dynamic features are designed to describe user preferences in multiple phases, and finally a recommendation is made by adaptively weighting the features. Experimental results on public datasets show that the proposed algorithm has satisfying performance.
Read More

Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases

Data mining, Web | Desktop Application
Efficient Algorithms for Mining High Utility Itemsets from Transactional Databases Mining high utility itemsets from a transactional database refers to the discovery of itemsets with high utility like profits. Although a number of relevant algorithms have been proposed in recent years, they incur the problem of producing a large number of candidate itemsets for high utility itemsets. Such a large number of candidate itemsets degrades the mining performance in terms of execution time and space requirement. The situation may become worse when the database contains lots of long transactions or long high utility itemsets. In this paper, we propose two algorithms, namely utility pattern growth (UP-Growth) and UP-Growth+, for mining high utility itemsets with a set of effective strategies for pruning candidate itemsets. The information of high utility itemsets is…
Read More

Sensitive Label Privacy Protection on Social Network Data

Data mining, Web | Desktop Application
Sensitive Label Privacy Protection on Social Network Data This paper is motivated by the recognition of the need for a ner grain and more personalized privacy in data publication of social networks. We propose a privacy protection scheme that not only prevents the disclosure of identity of users but also the disclosure of selected features in users' pro les. An individual user can select which features of her pro le she wishes to conceal. The social networks are modeled as graphs in which users are nodes and features are labels. Labels are denoted either as sensitive or as non-sensitive. We treat node labels both as background knowledge an adversary may possess, and as sensitive information that has to be protected. We present privacy protection algorithms that allow for graph data to be…
Read More

Privacy against Aggregate Knowledge Attacks

Data mining, Web | Desktop Application
Privacy against Aggregate Knowledge Attacks This paper focuses on protecting the privacy of individuals in publication scenarios where the attacker is ex- pected to have only abstract or aggregate knowledge about each record. Whereas, data privacy research usually focuses on defining stricter privacy guarantees that assume increasingly more sophisticated attack scenarios, it is also important to have anonymization methods and guarantees that will address any attack scenario. Enforcing a stricter guarantee than required increases unnecessarily the information loss. Consider for example the publication of tax records, where attackers might only know the total income, and not its con- stituent parts. Traditional anonymization methods would pro- tect user privacy by creating equivalence classes of identical records. Alternatively, in this work we propose an anonymization technique that generalizes attributes, only as much…
Read More

Adapting a Ranking Model for Domain-Specific Search

Data mining, Web | Desktop Application
Adapting a Ranking Model for Domain-Specific Search An adaptation process is described to adapt a ranking model constructed for a broad-based search engine for use with a domain-specific ranking model. It’s difficult to applying the broad-based ranking model directly to different domains due to domain differences, to build a unique ranking model for each domain it time-consuming for training models. In this paper,we address these difficulties by proposing algorithm called ranking adaptation SVM (RA-SVM), Our algorithm only requires the prediction from the existing ranking models, rather than their internal representations or the data from auxiliary domains The ranking model is adapted for use in a search environment focusing on a specific segment of online content, for example, a specific topic, media type, or genre of content. a domain-specific ranking model…
Read More

Efficient Similarity Search over Encrypted Data

Data mining, Web | Desktop Application
Efficient Similarity Search over Encrypted Data amount of data have been stored in the cloud. Although cloud based services offer many advantages, privacy and security of the sensitive data is a big concern. To mitigate the concerns, it is desirable to outsource sensitive data in encrypted form. Encrypted storage protects the data against illegal access, but it complicates some basic, yet important functionality such as the search on the data. To achieve search over encrypted data without compromising the privacy, considerable amount of searchable encryption schemes have been proposed in the literature. However, almost all of them handle exact query matching but not similarity matching; a crucial requirement for real world applications. Although some sophisticated secure multi-party computation based cryptographic techniques are available for similarity tests, they are computationally intensive…
Read More

A Bayesian Approach to Filtering Junk E-Mail

Data mining, Web | Desktop Application
A Bayesian Approach to Filtering Junk E-Mail Abstract In addressing the growing problem of junk E-mail on the Internet, we examine methods for the automated construction of lters to eliminate such unwanted mes- sages from a user's mail stream. By casting this prob- lem in a decision theoretic framework, we are able to make use of probabilistic learning methods in conjunc- tion with a notion of di erential misclassi cation cost to produce lters which are especially appropriate for the nuances of this task. While this may appear, at rst, to be a straight-forward text classi cation prob- lem, we show that by considering domain-speci c fea- tures of this problem in addition to the raw text of E-mail messages, we can produce much more accurate lters. Finally, we show the ecacy of such…
Read More

Opinion Mining for web search

Data mining, Web | Desktop Application
Opinion Mining for web search Generally, search engine retrieves the information using Page Rank, Distance vector algorithm, crawling, etc. on the basis of the user’s query. But it may happen that the links retrieved by search engine are may or may not be exactly related to the user’s query and user has to check all the links to know whether the needed information is present in the document or not, it becomes a tedious and time consuming job for the user. Our focus is to cluster different documents based on subjective similarities and dissimilarities. Our proposed tool ‘Web Search Miner’  which is based on the concept of  user opinions mining, which uses k-means search algorithm and distance measure based on Term frequency & web document frequency for mining the search…
Read More

web usage mining using apriori

Data mining, Web | Desktop Application
web usage mining using apriori The enormous content of information on the World Wide Web makes it obvious candidate for data mining research. Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distinct ways; Web Content Mining, Web Structure Mining and Web Usage Mining. E Learning is one of the Web based application where it will facing with large amount of data. In order to produce the E-Learning  portal usage patterns and user behaviors, this paper implements the high level process of Web Usage Mining using advance Association Rules algorithm  call D-Apriori Algorithm. Web Usage Mining consists of three main phases, namely Data Preprocessing, Pattern Discovering and Pattern Analysis. Server log files become a set of raw…
Read More

Hiding Sensitive Association Rule for Privacy Preservation

Data mining, Web | Desktop Application
Hiding Sensitive Association Rule for Privacy Preservation Data mining techniques have been widely used in various applications. However, the misuse of these techniques may lead to the disclosure of sensitive information. Researchers have recently made efforts at hiding sensitive association rules. Nevertheless, undesired side effects, e.g., non sensitive rules falsely hidden and spurious rules falsely generated, may be produced in the rule hiding process. In this paper, we present a novel approach that strategically modifies a few transactions in the transaction database to decrease the supports or confidences of sensitive rules without producing the side effects. Since the correlation among rules can make it impossible to achieve this goal, in this paper, we propose heuristic methods for increasing the number of hidden sensitive rules and reducing the number of modified…
Read More