Image Predictions and Classifications with Certificate Secure Policy
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Our social network is an add electronic service for data sharing sites. It is add service which provides a reliable communication, through this communication and new fast searching service; they can easily wrong use the data through these media. Some users affects users security on their personal contents, where some users keep on sending unrequired comments and messages by taking benefit of the users’ inherent believe in their relationship network. By this security of the user data may be loss for this issue this paper handles the most prevalent issues and threats targeting different recently. This proposes a privacy policy prediction and access restrictions along with blocking scheme for social sites using data mining techniques. To perform this, the system utilizes access policy prediction and access control mechanism by applying bayesian information criterion algorithm.
Authors and Affiliations
Darshna Umate, Roshani Katre, Sujata Vaidya, Nitesh Dhenge, Prof. Shirish Singnapure
Image Based Face Detection Using Probabilistic Neural Network
This paper presents an image based face detection using probabilistic neural network. The purpose is to localize and extract the face region from the background that will be fed into the face recognition system for iden...
Vegetable Oil Based Nano Cutting Fluids and its Applications In Reduction Of Tool Wear - A Review
Cutting fluids are mainly employed to increase the machining accuracy and productivity by effectively reducing the heat developed during machining period. Nano cutting fluid applications in metal cutting industries were...
Reduction of Common Mode Voltage in Three Level Diode Clamped Inverter
In this paper, an approach to reduce common mode voltage (CMV) at output terminal of the inverter using simple sinusoidal PWM technique is proposed. Multilevel inverter (MLI) is more suitable in high & medium power appl...
Combating Cybercrime: A Growing Trend Malvertising and Ransomware
Malware developers trick users to download their malware. By studying how Malvertising occurs, how sites are tricked and how to prevent it, one can better understand Malvertising. People across the globe are subjected t...
A Review on Routing Protocol for Vehicular Ad-hoc Networks (VANETs)
To maintain the topology information of the entire network OLSR exchange messages from time to time for every presence of mobility and failures. HELLO, Topology Control (TC) and multiple interface declaration (MID) mess...