Professional Documents
Culture Documents
• Security .
• Reduces Costs of Running a Government
• Saving Costs
• Speed
•
Algorithm
• Convolutional Neural Network (CNN)
Hardware Requirements
• This is an project so hardware plays an important role. Selection of
hardware also plays an important role in existence and performance
of any software. The size and capacity are main requirements.
Software Requirements
1. Python
2. Mysql
3. Mysql client
4. WampServer 2.4
Technologies and Languages used to Develop
-- Python
UML Diagrams
Screenshots
Conclusion
• In this paper, we study the problem of conserving roaming users position
confidentiality in e-Governance content protection. In an e-Governance
services and applications, it is critical to secure and authenticate the
citizens personal contents and information. Existing methodologies do not
consider this issue. We propose a novel confidentiality conserving
position-based query handling framework for cluster-based roaming users
of e-Governance services and applications. Then, we offer a Position
Confidentiality Conserving Algorithm (PCCA) for content protection in e-
Governance services using rule-based approach in computational
intelligence..
Literature survey
• K. Yang and X. Jia, “Data storage auditing service in cloud computing:
challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4,
pp. 409–428, 2012.
• [2] R. Cellan-Jones, “The sidekick cloud disaster,” BBC News, vol. 1, 2009.
• [3] R. Miller, “Amazon addresses EC2 power outages,” Data Center
Knowledge, vol. 1, 2010.
• [4] X. Pan, X. Meng, and J. Xu, “Distortion-based anonymity for continuous
queries in location-based mobile services,” in Proc. 17th ACM SIGSPATIAL
Int. Conf. Adv. Geographic Inf. Syst., 2009, pp. 256–265.
• [5] L. Stenneth and S. Y. Phillip, “Global privacy and transportation mode
homogeneity anonymization in location based mobile systems with
continuous queries,” in Proc. 6th Int. Conf. Collaborative Comput., Netw.,
Appl. Worksharing, 2010, pp. 1–10.
?
?
Questions
? ? ?
?
?? ? ?
?