To store and access sensitive information from distant locations utilizing an internet connection, cloud servers are now often employed. By adopting cloud servers as their primary source of data storage, almost all businesses and organizations made the transition from local to distant data storage. It has become a struggle for each and every person to give additional security for the cloud data because, in general, cloud servers do not have total protection for the data that is stored on them. Data is a useful resource that can take many different forms, including payment information, personal information, bank account information, and many others. Due to the absence of data security in all of these forms, we try to useSome cutting-edge encryption methods for protecting the data that is kept in remote locations. Two parties make sure that a third party cannot access their communication when they communicate through a medium. It is better to use encryption methods to encrypt data in a cipher, send it over the internet, and then decrypt it to reveal the original data. By transforming plaintext into cipher text, the science of cryptography encrypts and decrypts data to keep messages private. In this project, we primarily develop 3 techniques, including: The three strategies are columnar transposition, rail fence transposition, and caesar substitution. Data can be protected and returned to its original state using all three processes together.
Open bore wells are always a trap. And the accidents can't be avoided till now. Therefore, a practical, safe, and efficient r escue system becomes necessary. But still, the techniques are impractical. This project aims to design a system that can rescue a child easily, safely, and in a short time. There are[8] methods or techniques which can save the child from the borewell. But it may be impractical to do it with a single method. Therefore, this project consists of providing the provision for the inclusion of multiple rescue methods, which provides the possibility of choosing the best method to save. In our project, we plan to combine the various methods of rescuing, some of which do exist today. The design system varies in the diameter of the borehole which varies from eight inches to 12 inches. The system consists of a camera, lamps[16], an oxygen supplier, balloon technology. Sensors and camera are used, taking into account the depth, position, and posture of the kid.
Due to its effective and affordable management, cloud-based data storage has recently attracted growing interest from both academia and industry. Since services are delivered over an open network, it is critical for service providers to adopt secure data storage and sharing mechanisms to protect user privacy and the confidentiality of data. The most popular technique for preventing the compromise of sensitive data is encryption. The actual necessity for data management, however, cannot be fully met by merely encrypting data (for instance, using AES). Additionally, a strong access control over download requests must be taken into account to prevent Economic Denial of Sustainability (EDoS) assaults from being performed to prevent users from using the service. In this essay.In the context of cloud-based storage, we take into account dual access control in the sense that we create a control mechanism over both data access and download requests without sacrificing security and effectiveness. This paper presents the design of two dual access control systems, one for each intended environment. There is also a presentation of the systems' experimental and security analysis. Security Dual Access Control for Data Sharing and Storage in the Cloud
In today’s fast generation countless people are laid low with one or over one mental disorder supported their thinking and way of they behave.in such reasonably situations they'll post their current situation on social media like Facebook, WhatsApp, twitter. Their messages tell us their psychological state. The detection of mental disorders should be wiped out time. But this is often not really easy and it's a awfully challenging task. there'll be a prospect to beat from the disorder before it is resulting in crucial condition. there's an answer to beat from this i.e., we've to observe carefully their behaviour and the way they're visiting express their feelings. during this paper we express three varieties of representations those are positive, depression and anger by using Naïve bayes algorithm, SVM, Decision tree classifier, Random Forest, Logistic regression classifier and KNN algorithm.
The newest and most fascinating technique in artificial intelligence is machine learning. Many of the applications we use employ everyday learning techniques. Because Google or Microsoft have incorporated a learning mechanism by which online pages are ranked, they operate effectively as search engines. This learning also recognizes the photographs of pals while browsing Facebook. The learning system also aids in recognizing spam emails, saving the user the hassle of having to waste time sorting through the volume of spam emails. Therefore, this study has explored how machine learning functions as well as how it might be useful in the future.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.