Self-Sentiment analysis: from opinion mining to human-agent interaction AbstractSelf-Sentiment analysis: from opinion mining to human-agent interaction. The opinion mining and human-agent interaction communities are currently addressing sentiment analysis from different perspectives that comprise, on the one hand, disparate sentiment-related phenomena and computational representations, and on the other hand, different detection and dialog management methods. In…
Sentiview:Analysis on internet famous topics Abstract?There would be value to several domains in discovering and visualizing sentiments in online posts. This paper presents SentiView, an interactive visualization system that aims to analyze public sentiments for popular topics on the Internet. SentiView combines uncertainty modeling and model-driven adjustment. By searching and correlating frequent words in text…
Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES Algorithm and BPCS Algorithm Abstract? Steganography basically was defined for the sending secrets message which hides in the image. The secrets message transmitted from one user to another user safely. In the previous system of hiding data in image uses the AES algorithm and Lossy…
Separable Reversible Encrypted Data Hiding in Encrypted Image Using AES algorithm and Lossy Technique Abstract?The field steganography is very much popular technique for sending secrete message and lots of research are going in it. To overcome the limitation of previous work we proposed separable and reversible encrypted data hiding in encrypted image using AES Algorithm…
SEPIA: Secure-PIN-Authentication-as-a-Service for ATM using Mobile and Wearable Devices Abstract? Credit card fraud is a common problem in today?s world. Financial institutions have registered major loses till today due to users being exposed of their credit card information. Shoulder-sur?ng or observation attacks, including card skimming and video recording with hidden cameras while users perform PIN-based…
Sequence Pattern Mining with Variables Abstract-Sequence pattern mining (SPM) seeks to find multiple items that commonly occur together in a specific order. One common assumption is that the relevant differences between items are captured through creating distinct items. In some domains, this leads to an exponential increase in the number of items. This paper presents…
Sequence-Growth : A Scalable and Effective Frequent Itemset Mining Algorithm for Big Data Based on MapReduce Framework Abstract? Frequent itemset mining FIM < Final Year Projects 2016 > is an important research topic because it is widely applied in real world to ?nd the frequent itemsets and to mine human behavior patterns. FIM process is…
Sequential Clustering for Anonymizing Social Networks Abstract-The main contributions in this paper are sequential clustering algorithm for anonymizing a social network and a measure that quantifies the information loss in the anonymization process to preserve privacy. The algorithm significantly outperforms the SaNGreeA algorithm due to Campan and Truta which is the leading algorithm for achieving…
Service Class Resource Management for Green Wireless-Optical Broadband Access Networks (WOBAN) Abstract? Service Class Resource Management for Green Wireless-Optical Broadband Access Networks. Exponential growth in the volume of wireless data, boosted by the growing popularity of mobile devices, such as smart- phone and tablets, has forced the telecommunication industries to rethink the way networks are…
Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds Abstract?A service operator-aware trust scheme SOTS for resource matchmaking across < Final Year Projects 2016 > multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware framework of trust management that can effectively reduces…
Service-generated Big Data and Big Data-as-a-Service: An Overview Abstract?The prevalence of service computing and cloud computing, more and more services are emerging on the Internet, generating huge volume of data, such as trace logs, QoS information, service relationship, etc. The overwhelming service-generated data become too large and complex difficult < Final Year Projects 2016 >…
Set Matching Measures for External Cluster Validity Abstract? Comparing two clustering results of a data set is a challenging task in cluster analysis. Many external validity measures have been proposed in the literature. A good measure should be invariant to the changes of data size, cluster size and number of clusters. We give an overview…