IJEARST Volume 2, Issue 3, October 2018 Edition


Pages [1]


A SYSTEM FOR REAL-TIME COUNTRY-LEVEL LOCATION CLASSIFICATION OF ONLINE SOCIAL NETWORK []


The expansion of enthusiasm for utilizing online life as a hotspot for research has spurred handling the test of consequently geo locating tweets, given the absence of express area data in the lion's share of tweets. As opposed to much past work that has concentrated on area arrangement of tweets confined to a particular nation, here we attempt the assignment in a more extensive setting by arranging worldwide tweets at the nation level, which is so far unexplored in a constant situation.


An Enhanced and Reliable Twitter Trends Manipulation for Detecting Anonymous User []


Social Networks like Twitter drifts, a convenient refreshed arrangement of best terms in Twitter, can influence general society plan of the network and have pulled in much consideration. Sadly, in the wrong hands, Twitter patterns can likewise be mishandled to misdirect individuals. In this paper, we make the inquiry: Given a Twitter application, would we be able to decide whether it is vindictive? Our key commitment is in creating Twitter's Rigorous Application Evaluator—apparently the primary device concentrated on distinguishing malignant applications on Twitter.


DETECTING RANKING FRAUD FOR MOBILE APPS AND MALWARE DETECTION []


The most famous Android application advertise, fuel look rank maltreatment and malware multiplication. To recognize malware, past work has concentrated on application executable and authorization investigation. In this paper, we give an all encompassing perspective of positioning misrepresentation and propose a positioning extortion location framework for versatile Apps.


SECURE DATA SHARING IN CLOUDS VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION []


Distributed storage is a use of mists that frees associations from setting up in-house information stockpiling frameworks. Be that as it may, distributed storage offers ascend to security concerns.


RELIABLE POWER THEFT FINDING IN ENERGY MONITORING AND CONTRO SYSTEM USING IOT []


Lack of resources established in the present world is initiating everyone towards energy efficient technologies. Among all these resources, power is one which needs to be monitored and controlled as per the need since electricity consumption is increasing day-by day.


RELIABLE AND EFFICIENT SHIPYARD SECURITY SYSTEM USING IOT []


The main objective of this concept is to monitor and track the ships by using integrated technology. In the transported piece, three labels were fixed in strategic positions in the base line of the block, so that regardless of the position with which the object is placed in the vehicle, one of them will always be within reach of the reader.


EFFICIENT ACCIDENT AVOIDING AND ADVANCED IDENTIFICATION SYSTEM []


Drowsy is the reason for most of the road accidents. Manually tracing the drowsy driver is not an easy task, because every day thousands of vehicles are running on the roads.


RELIABLE AND ACCURATE TARGET DETECTION SYSTEM USING IOT []


Detection of targets using low power embedded devices has important applications in border security and surveillance.



Pages [1]

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.

© 2011 - 2018 International Journal of Engineering In Advanced Research Science and Technology
Managed By IJEARST Foundation

International Journal of Engineering In Advanced Research Science and Technology ISSN : 2278-2566 (Online)
All rights reserved withinfo.ijearst.com.

To make sure that you can receive messages from us, please add the 'IJEARST.COM' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.

For any Technical Support contact @info.ijearst.com