Notice Board :

Call for Paper
Vol. 4 Issue 5

Submission Start Date:
May 01, 2018

Acceptence Notification Start:
May 10, 2018

Submission End:
May 15, 2018

Final MenuScript Due:
May 25, 2018

Publication Date:
May 31, 2018


                         Notice Board: Call for PaperVol. 4 Issue 5      Submission Start Date: May 01, 2018      Acceptence Notification Start: May 10, 2018      Submission End: May 15, 2018      Final MenuScript Due: May 25, 2018      Publication Date: May 31, 2018




Volume II Issue III

Author Name
Pooja Trivedi, Dr. Bhupesh Gour
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 3
Abstract
In current years, there has been an growing stipulate for computerized visual surveillance systems additional and further surveillance cameras are used in public Domain this is an ambitious aim which has attracted an growing amount of researchers to resolve frequently encounter surveillance problems of object detection, object tracking, object classification, and aberration detection over in the video attracting extensive interest due to public security. In this research, we proposed attempt to mine semantic context information together with object-specific circumstance information and scene-specific context information. On the other hand, video retrieval allow the customer to search for meticulous video segment based on some description commercial increase and SVM are included for feature selection and ensemble classification. Other researchers have studied optimization of support vector machine using genetic algorithms based on fuzzy logic through feature subset and b
PaperID
2016/IJRRETAS/4/2016/5610

Author Name
Harsha A. Chaudhari, Prof. Chhaya Nayak
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 3
Abstract
In the recent year, the privacy takes major role to secure the data from various potential attackers. While publishing collaborative data to multiple data provider’s two types of problem arises, first is outsider attack and second is insider attack. Outsider attack is by the people who are not data providers and insider attack is by colluding data provider who may use their own data records to understand the data records shared by other data providers. In the proposed approach problem can be resolved by using different approaches as m-privacy, which is a technique which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m-colluding dataproviders. Second, Heuristic algorithms is also exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering techniques for efficiently checking m-privacy given a set of records. Data provider aware anonymization algorithm with adaptive m- privacy checking stra
PaperID
2016/IJRRETAS/4/2016/4610