Please use this identifier to cite or link to this item: http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/5590
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVerma, Richa-
dc.contributor.authorKumar, Pardeep [Guided by]-
dc.date.accessioned2022-08-04T17:21:47Z-
dc.date.available2022-08-04T17:21:47Z-
dc.date.issued2017-
dc.identifier.urihttp://ir.juit.ac.in:8080/jspui//xmlui/handle/123456789/5590-
dc.description.abstractAmid the most recent decades, information security has turned into a noteworthy subject. Encoding of data has as of late been generally explored and created in light of the fact that there is an interest for a more grounded encryption. Encryption has been done to secure transmitted information from unapproved individual, in encryption the transmitted information is broken into mystery figure and perusing data or changing over the genuine data into various data. Encryption procedure will be connected in sound record. As the utilization of web expands step by step in this way, it end up noticeably important to secure the transmitted data from the unapproved individual. Cryptography assumes an imperative part inside the field of system security. There are numerous encryption strategies that have been available in the market to secure the data. Amid this exploration we'll have a framework of encoding systems. This exploration principally concentrates on encryption methods for sound and for content information. In the examination cross breed encryption system alongside neural system has been utilized. Many-sided quality discoverer was utilized to discover the rightness of the proposed work and parameters like exactness, review, and measure and precision will be figured.en_US
dc.language.isoenen_US
dc.publisherJaypee University of Information Technology, Solan, H.P.en_US
dc.subjectBig dataen_US
dc.subjectMultimedia data securityen_US
dc.subjectAlgorithmsen_US
dc.subjectArtificial neural networken_US
dc.titleSecure Big Data Computingen_US
dc.typeProject Reporten_US
Appears in Collections:Dissertations (M.Tech.)

Files in This Item:
File Description SizeFormat 
Secure Big Data Computing.pdf2.06 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.