BE project


Data Mining Techniques in Cyber Crimes

Applying Data Mining Techniques in Cyber Crimes Abstract— Cyber-crime is crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.Globally the internet is been accessed by enormous people within their restricted domains. When the […]


Sentiment Analysis

A Rating Approach based on Sentiment Analysis Abstract- Sentiment analysis is contextual mining of text which identifies and extracts subjective information in source material, and helping a business to understand the social sentiment of their brand, product or service while monitoring online conversations.With the advent to social media the number […]


Robust Video Watermarking Approach

A Robust Video Watermarking Approach based on a hybrid SVD/DWT Technique Abstract— A comparative analysis to determine the most effective video watermarking algorithm between SVD/DWT hybrid and Singular Value Decomposition (SVD) is reported in this paper. Blind video watermarking schemes are simulated and attempts made to recover the watermark after […]


Personalized Search with Editable Profiles

Personalized Search with Editable Profiles Abstract—Personalized Search with Editable Profiles is an important technique for improving search performance. Existing approaches work in a black box, where users have no clue how it works and how to customize it. This lack of user control and flexibility can often be inconvenient and […]


Forecasting Tourist Arrivals

Forecasting Tourist Arrivals with Machine Learning and Internet Search Index Abstract—Forecasting Tourist Arrivals with Machine Learning and Internet Search Index.The queries entered into search engines register hundreds of millions of different searches by tourists, not only reflecting the trends of the searchers’ preferences for travel products, but also offering a […]


Graph-based Recommendation

A Graph-based Approach for Job Recommendation at Scale Abstract—Online job boards are one of the central components of modern recruitment industry. With millions of candidates browsing through job postings everyday, the need for accurate, effective, meaningful, and transparent job recommendations is apparent more than ever. While recommendation systems are successfully […]


Secure Cloud Storage and Quick Keyword Based Retrieval System

Secure Cloud Storage and Quick Keyword Based Retrieval System

Secure Cloud Storage and Quick Keyword Based Retrieval System Abstract—In recent years, Cloud Computing becomes more prevalent in data store domain. More and more sensitive to store information into the cloud, Due to the importance the protection of data privacy, to protect sensitive data, should be encrypted before outsourcing, which […]


Combined Mining: Discovering Informative Knowledge in Complex Data

Combined Mining: Discovering Informative Knowledge in Complex Data Enterprise data mining applications often involve complex data such as multiple large heterogeneous data sources, user preferences, and business impact. In such situations, a single method or one-step mining is often limited in discovering informative knowledge. It would also be very time […]

Combined Mining: Discovering Informative Knowledge in Complex Data

IoT Architecture for an Operating Room Environment

NFV Enabled IoT Architecture for an Operating Room Environment The Internet of Things (IoTs) refers to the interconnection of billions of smart devices. The steadily increasing number of IoT devices with heterogeneous characteristics requires that future networks evolve to provide a new architecture to cope with the expected increase in […]