Notice Board :

Call for Paper
Vol. 10 Issue 2

Submission Start Date:
February 1, 2024

Acceptence Notification Start:
February 10, 2024

Submission End:
February 15, 2024

Final MenuScript Due:
February 25, 2024

Publication Date:
February 29, 2024


                         Notice Board: Call for PaperVol. 10 Issue 2      Submission Start Date: February 1, 2024      Acceptence Notification Start: February 10, 2024      Submission End: February 15, 2024      Final MenuScript Due: February 25, 2024      Publication Date: February 29, 2024




Volume II Issue III

Author Name
Pooja Trivedi, Dr. Bhupesh Gour
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 3
Abstract
In current years, there has been an growing stipulate for computerized visual surveillance systems additional and further surveillance cameras are used in public Domain this is an ambitious aim which has attracted an growing amount of researchers to resolve frequently encounter surveillance problems of object detection, object tracking, object classification, and aberration detection over in the video attracting extensive interest due to public security. In this research, we proposed attempt to mine semantic context information together with object-specific circumstance information and scene-specific context information. On the other hand, video retrieval allow the customer to search for meticulous video segment based on some description commercial increase and SVM are included for feature selection and ensemble classification. Other researchers have studied optimization of support vector machine using genetic algorithms based on fuzzy logic through feature subset and b
PaperID
2016/IJRRETAS/4/2016/5610

Author Name
Harsha A. Chaudhari, Prof. Chhaya Nayak
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 3
Abstract
In the recent year, the privacy takes major role to secure the data from various potential attackers. While publishing collaborative data to multiple data provider’s two types of problem arises, first is outsider attack and second is insider attack. Outsider attack is by the people who are not data providers and insider attack is by colluding data provider who may use their own data records to understand the data records shared by other data providers. In the proposed approach problem can be resolved by using different approaches as m-privacy, which is a technique which guarantees that the anonymized data satisfies a given privacy constraint against any group of up to m-colluding dataproviders. Second, Heuristic algorithms is also exploiting the equivalence group monotonicity of privacy constraints and adaptive ordering techniques for efficiently checking m-privacy given a set of records. Data provider aware anonymization algorithm with adaptive m- privacy checking stra
PaperID
2016/IJRRETAS/4/2016/4610

除此之外粉嫩公主酒酿蛋,最重要的还是粉嫩公主酒酿蛋一直秉承“自然、健康、安全”的丰胸理念丰胸产品,根据中国女性的身体特点,经过多年研究,食用粉嫩公主酒酿蛋的同时丰胸效果,可以辅以简单的按摩手法,舒经活络,有效成分瞬间渗透、快速吸收,深度改善胸部血液循环丰胸方法