Development of Personalized health monitoring system using AWS and Cloud Computing

INTRODUCTION Health surveillance can be conducted in both home environments and both: [11] Low cost and delivery of citizen-centered care solutions for predetermined challenges. [9] Recent advances in sensor communication, sensor sensing and microelectronics are aimed at monitoring and managing chronic diseases and detecting potential emergencies. [10] Health surveillance in domestic settings can be carried

Cloud Computing Security Issue and Its Proposed Solution

Cloud Computing Security Issue and Its Proposed Solution Rajni Kumari , M.Tech Research Scholar ,Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: rmanushendra@gmail.com Dr. Manish Sharma , HOD, Center of Cloud Infrastructure and Security, Suresh Gyan Vihar University , Jaipur , Rajasthan. E-mail-: manish.sharma@mygyanvihar.com. Dr. Rashid Hussian, Associate

A new framework for optimizing the cost of the service architecture AWS cloud computing

A new framework for optimizing the cost of the service architecture AWS cloud computing Bumika Sharma/Research Scholar,                              Sonal Saxena /Assistant professor Center for cloud infrastructure and security                Center for cloud infrastructure and security Suresh Gyan Vihar University, Jaipur                          Suresh Gyan Vihar University, Jaipur vasist.nhumika@gmail.com                                         sonal.saxena@mygyanvihar.com     Abstract: Cloud computing is a technology

Improving Security for Data Migration in Cloud Computing using Randomized Encryption Technique

1Akanksha Aasarmya , 2Sohit Agarwal 1Research Scholar, 2Assistant professor akanksha23995@gmail.com  , sohit.agarwal@mygyanvihar.com Center for cloud infrastructure and security Suresh Gyan Vihar University, Jaipur Abstract: The data-center hardware and software as a whole is what we will refer to as a Cloud. The consumer can access the service related to computer, whether it is a software

EMAIL AND SPAM CLASSIFICATION USING PROBABILISTIC METHODS

Ankur Sharma1 M.Tech Scholar, Department of CEIT, Suresh Gyan Vihar University, Jaipur ankur.18179@mygyanvihar.com Sohit Agarwal2 Assistant Professor Department of CEIT, Suresh Gyan Vihar University, Jaipur sohit.agarwal@mygyanvihar.com   Abstract:In this paper we are discussing the classification technique of separation of ham and spam. The classification of ham and spam is an old concept and a lot

Automated Query Processing based on Natural Language Processing

Jeetu Kumar Gupta1*, Sohit Agarwal2 1Department of Computer Engineering and Information Technology, Suresh Gyan Vihar University, India e-mail: kalwar.gupta@gmail.com, sohit.agarwal@mygyanvihar.com Abstract: Natural Language Processing is the area of Computer Science and the Artificial Intelligence. NLP is used for the communication with human and machines in natural language. Natural Language Processing is widely used and is

IMAGE COMPRESSION AND DETECTION TECHNIQUE USING PRINCIPAL COMPONENT ANALYSIS

Saif Ali M.Tech Scholar, Department of CEIT, Suresh Gyan Vihar University, Jaipur saif.ali@mygyanvihar.com Manish Sharma Associate Professor Department of CEIT, Suresh Gyan Vihar University, Jaipur manish.sharma@mygyanvihar.com   Abstract: In this research work we are compressing the image using the mathematical tool principal component analysis and then recognize the image from the same data set by