A SYSTEM FOR REAL-TIME COUNTRY-LEVEL LOCATION CLASSIFICATION OF ONLINE SOCIAL NETWORK
[View]
Shaik Ameerunnisa1, Prasanthi.M 2
The expansion of enthusiasm for utilizing online life as a hotspot for research has spurred handling the test of consequently geo locating tweets, given the absence of express area data in the lion's share of tweets. As opposed to much past work that has concentrated on area arrangement of tweets confined to a particular nation, here we attempt the assignment in a more extensive setting by arranging worldwide tweets at the nation level, which is so far unexplored in a constant situation.
Shaik Ameerunnisa1, Prasanthi.M 2
The expansion of enthusiasm for utilizing online life as a hotspot for research has spurred handling the test of consequently geo locating tweets, given the absence of express area data in the lion's share of tweets. As opposed to much past work that has concentrated on area arrangement of tweets confined to a particular nation, here we attempt the assignment in a more extensive setting by arranging worldwide tweets at the nation level, which is so far unexplored in a constant situation.
An Enhanced and Reliable Twitter Trends Manipulation for Detecting Anonymous User
[View]
K.H.N.V.Alekhya1, Chiranjeevi.K2
Social Networks like Twitter drifts, a convenient refreshed arrangement of best terms in Twitter, can influence general society plan of the network and have pulled in much consideration. Sadly, in the wrong hands, Twitter patterns can likewise be mishandled to misdirect individuals. In this paper, we make the inquiry: Given a Twitter application, would we be able to decide whether it is vindictive? Our key commitment is in creating Twitter's Rigorous Application Evaluator—apparently the primary device concentrated on distinguishing malignant applications on Twitter.
K.H.N.V.Alekhya1, Chiranjeevi.K2
Social Networks like Twitter drifts, a convenient refreshed arrangement of best terms in Twitter, can influence general society plan of the network and have pulled in much consideration. Sadly, in the wrong hands, Twitter patterns can likewise be mishandled to misdirect individuals. In this paper, we make the inquiry: Given a Twitter application, would we be able to decide whether it is vindictive? Our key commitment is in creating Twitter's Rigorous Application Evaluator—apparently the primary device concentrated on distinguishing malignant applications on Twitter.
DETECTING RANKING FRAUD FOR MOBILE APPS AND MALWARE DETECTION
[View]
R.Ashok1, Sambasiva Rao.P2
The most famous Android application advertise, fuel look rank maltreatment and malware multiplication. To recognize malware, past work has concentrated on application executable and authorization investigation. In this paper, we give an all encompassing perspective of positioning misrepresentation and propose a positioning extortion location framework for versatile Apps.
R.Ashok1, Sambasiva Rao.P2
The most famous Android application advertise, fuel look rank maltreatment and malware multiplication. To recognize malware, past work has concentrated on application executable and authorization investigation. In this paper, we give an all encompassing perspective of positioning misrepresentation and propose a positioning extortion location framework for versatile Apps.
SECURE DATA SHARING IN CLOUDS VIA DENIABLE ATTRIBUTE-BASED ENCRYPTION
[View]
Venkata Sai Rama Krishna T1, B.Suryanarayana murthy2
Distributed storage is a use of mists that frees associations from setting up in-house information stockpiling frameworks. Be that as it may, distributed storage offers ascend to security concerns.
Venkata Sai Rama Krishna T1, B.Suryanarayana murthy2
Distributed storage is a use of mists that frees associations from setting up in-house information stockpiling frameworks. Be that as it may, distributed storage offers ascend to security concerns.
RELIABLE POWER THEFT FINDING IN ENERGY MONITORING AND CONTRO SYSTEM USING IOT
[View]
1.M.DILEEP KUMAR, 2.Y.KANAKA RAJU
Lack of resources established in the present world is initiating everyone towards energy efficient technologies. Among all these resources, power is one which needs to be monitored and controlled as per the need since electricity consumption is increasing day-by day.
1.M.DILEEP KUMAR, 2.Y.KANAKA RAJU
Lack of resources established in the present world is initiating everyone towards energy efficient technologies. Among all these resources, power is one which needs to be monitored and controlled as per the need since electricity consumption is increasing day-by day.
RELIABLE AND EFFICIENT SHIPYARD SECURITY SYSTEM USING IOT
[View]
1. BUDALA KASAIAH, 2.B.VENKATESWARA RAO
The main objective of this concept is to monitor and track the ships by using integrated technology. In the transported piece, three labels were fixed in strategic positions in the base line of the block, so that regardless of the position with which the object is placed in the vehicle, one of them will always be within reach of the reader.
1. BUDALA KASAIAH, 2.B.VENKATESWARA RAO
The main objective of this concept is to monitor and track the ships by using integrated technology. In the transported piece, three labels were fixed in strategic positions in the base line of the block, so that regardless of the position with which the object is placed in the vehicle, one of them will always be within reach of the reader.
EFFICIENT ACCIDENT AVOIDING AND ADVANCED IDENTIFICATION SYSTEM
[View]
1. RAJESH RAMISETTI, 2.BVNR SIVAKUMAR, 2. Dr. Y. AMAR BABU
Drowsy is the reason for most of the road accidents. Manually tracing the drowsy driver is not an easy task, because every day thousands of vehicles are running on the roads.
1. RAJESH RAMISETTI, 2.BVNR SIVAKUMAR, 2. Dr. Y. AMAR BABU
Drowsy is the reason for most of the road accidents. Manually tracing the drowsy driver is not an easy task, because every day thousands of vehicles are running on the roads.
RELIABLE AND ACCURATE TARGET DETECTION SYSTEM USING IOT
[View]
1. K.VAMSI KRISHNA, 2. Mr.V.V. RAMA KRISHNA, 3.Dr. Y.AMAR BABU
Detection of targets using low power embedded devices has important applications in border security and surveillance.
1. K.VAMSI KRISHNA, 2. Mr.V.V. RAMA KRISHNA, 3.Dr. Y.AMAR BABU
Detection of targets using low power embedded devices has important applications in border security and surveillance.
Pages [1]

This work is licensed under a Creative Commons Attribution 3.0 License.
© 2011 - 2018 International Journal of Engineering In Advanced Research Science and Technology
Managed By IJEARST Foundation
International Journal of Engineering In Advanced Research Science and Technology ISSN : 2278-2566 (Online)
All rights reserved withinfo.ijearst.com.
To make sure that you can receive messages from us, please add the 'IJEARST.COM' domain to your e-mail 'safe list'. If you do not receive e-mail in your 'inbox', check your 'bulk mail' or 'junk mail' folders.
For any Technical Support contact @info.ijearst.com