Detection of phishing attacks Abstract-Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions,…
Determining Optimal Buses for Implementing Demand Response as an Effective Congestion Management Method Abstract-Demand response (DR) can be counted as an effective congestion management (CM) method in power systems. However, appointing the optimal buses for the demand response programs (DRPs) implementation is one of the main challenges for the power system operators. In this paper,…
Development of Elements of Two-Level Biometric Protection Based on Face and Speech Recognition in the Video Stream Abstract-this paper presents the results obtained when creating a prototype of a software complex that implements speech recognition in the video stream by the motion of the lips with the help of a neural network. This speech recognition…
Discovery of ranking fraud for Mobile Apps Abstract-Ranking fraud in the mobile App market refers to false or deceptive activities which have a reason of bumping up the Apps in the popularity list. Certainly, it becomes more and more frequent for App developers to use shady means, such as inflating their Apps’ sales or posting…
Division and Replication of Data in Cloud for Optimal Performance and Security – DROPS Abstract-Cloud storage is basically giving all the data to a third party to store it and to retrieve them whenever we wish. This compromises the security of the data. So high security measures are meant to be taken but, it should…
DP-MCDBSCAN: Differential Privacy Preserving Multi-core DBSCAN Clustering for Network User Data Abstract-The proliferation of ubiquitous Internet and mobile devices has brought about the exponential growth of individual data in big data era. The network user data has been confronted with serious privacy concerns for extracting valuable information during the process of data mining. Differential privacy…
Duplicate Reduction in Graph Mining: Approaches, Analysis, and Evaluation Abstract-At the core of graph mining lies independent expansion of substructures where a substructure (also referred to as a subgraph) independently grows into a number of larger substructures in each iteration. Such an independent expansion, invariably, leads to the generation of duplicates. In the presence of…
E-transport Management Abstract-In employee transport management system is used to automate the process of allocating the bus to the particular driver and conductor. So that driver/conductor can know their bus as well as know their bus route and timing also. Admin can maintain all information regarding transport management. This System is very useful for the…
EEG signal classification using PCA, ICA, LDA and support vector machines Abstract-In this work, we proposed a versatile signal processing and analysis framework for Electroencephalogram (EEG). Within this framework the signals were decomposed into the frequency sub-bands using DWT and a set of statistical features was extracted from the sub-bands to represent the distribution of…
Effective Features to Classify Big Data Using Social Internet of Things Abstract-Social Internet of Things (SIoT) supports many novel applications and networking services for the IoT in a more powerful and productive way. In this paper, we have introduced a hierarchical framework for feature extraction in SIoT big data using map-reduced framework along with a…
Efficient Deep CNN-Based Fire Detection and Localization in Video Surveillance Applications Abstract-Convolutional neural networks (CNN) have yielded state-of-the-art performance in image classification and other computer vision tasks. Their application in fire detection systems will substantially improve detection accuracy, which will eventually minimize fire disasters and reduce the ecological and social ramifications. However, the major concern…
Enabling Generic, Verifiable, and Secure Data Search in Cloud Services Abstract-Searchable Symmetric Encryption (SSE) has been widely studied in cloud storage, which allows cloud services to directly search over encrypted data. Most SSE schemes only work with honest-but-curious cloud services that do not deviate from the prescribed protocols. However, this assumption does not always hold…