SlideShare a Scribd company logo
Supporting Privacy Protection in Personalized Web Search
NAME:
ENROLL NO:
INTRODUCTION
 The web search engine has long become the most important portal for
ordinary people looking for useful information on the web.
 However, users might experience failure when search engines return
irrelevant results that do not meet their real intentions
 As the expense, user information has to be collected and analyzed to figure
out the user intention behind the issued query.
HARDWARE AND SOFTWARE USED:
HARDWARE SPECIFICATION:
• PROCESSOR : i8
• RAM : 4GB
• HARDWARE : 1TB
SOFTWARE SPECIFICATION
• PLATFORM : JAVA 1.5
• OPERATING SYSTEM : WINDOWS 8
EXISTING SYSTEM:
• The profile-based personalization may not even help to improve the search quality for some ad hoc queries, though exposing user
profile to a server has put the user’s privacy at risk.
• The existing methods do not take into account the customization of privacy requirements. This probably makes some user privacy to
be overprotected while others insufficiently protected.
• Many personalization techniques require iterative user interactions when creating personalized search results. They usually refine the
search results with some metrics which require multiple user interactions, such as rank scoring, average rank, and so on.
• It is infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive processing
time for profiling. Thus, we need predictive metrics to measure the search quality and breach risk after personalization, without
incurring iterative user interaction.
.
PROPOSED SYSTEM:
• Relying on the definition of two conflicting metrics, namely personalization utility and
privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving
personalized search as Risk Profile Generalization, with its NP-hardness proved.
• This project proposes a privacy-preserving personalized web search framework UPS, which
can generalize profiles for each query according to user-specified privacy requirements.
• It develops two simple but effective generalization algorithms, GreedyDP and GreedyIL, to
support runtime profiling.While the former tries to maximize the discriminating power
(DP), the latter attempts to minimize the information loss (IL). By exploiting a number of
heuristics, GreedyIL outperforms GreedyDP significantly
MODULES:
1. Design and loading image
2. Tools and adjusting the image
3. Filtering
4. Pruning
5. Integrating resizer and filter
Input Image (100%) Tools and Adjust the
Image Sobel
Prewitt
Laplace
Pruning
Backward Pass
Forward Pass
Belief Propagation
Img <100%
100% Output Image
Seam carving
Img Resize
SYSTEM FLOW DIAGRAM
E-R diagram of sobel filter
E-R diagram of prewitt filter
E-R diagram of laplace filter
•
MODULES DESCRIPTION:
• 1. DESIGN AND LOADING IMAGE
In this module we are designing the screen and image viewer. Next we load the binary image in order to
display the image that demands pruning and image resizing.
2 TOOLS AND ADJUSTING THE IMAGE
• The arrow keys on the keyboard are used to increase or decrease the width and height of the image. The window with the
picture must be the active window on screen for pressing the arrow keys to work. And also to see the adjustment in the screen while
resizing the image.
• (i)Tools
Certain tools are central to the processing of digital images. These include mathematical tools such as convolution, Fourier analysis,
and statistical descriptions, and manipulative tools such as chain codes and run codes.
• (ii)Convolution
In image processing applications, the entire input function is often available for computing every sample of the output function. In
that case, the constraint that each output is the effect of only prior inputs can be relaxed. Convolution amplifies or attenuates each
frequency component of the input independently of the other components.
• (iii)Fourier Analysis
Fourier analysis is a subject area which grew out of the study of Fourier series. The subject began with trying to understand when it
was possible to represent general functions by sums of simpler trigonometric functions.
3. FILTERING
Here we are filtering the image to avoid noise by three algorithms. They are:
 Sobel filter
 Prewitt filter
 Laplace filter
SAMPLE SCREEN
FORMS AND REPORTS
THANK YOU

More Related Content

Similar to Supporting Privacy Protection in Personalized Web Search.pptx

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEEMEMTECHSTUDENTPROJECTS
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
Raghu Vamsy Sirasala
 
Python Open CV
Python Open CVPython Open CV
Python Open CV
Tarun Bamba
 
IRJET- Text Recognization of Product for Blind Person using MATLAB
IRJET- Text Recognization of Product for Blind Person using MATLABIRJET- Text Recognization of Product for Blind Person using MATLAB
IRJET- Text Recognization of Product for Blind Person using MATLAB
IRJET Journal
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
Josep Arroyo
 
Visual Studio Profiler
Visual Studio ProfilerVisual Studio Profiler
Visual Studio Profiler
Betclic Everest Group Tech Team
 
1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...
RamaKrishnaReddyKona
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
IRJET Journal
 
Web crawler with email extractor and image extractor
Web crawler with email extractor and image extractorWeb crawler with email extractor and image extractor
Web crawler with email extractor and image extractor
Abhinav Gupta
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
IRJET Journal
 
finl.docx
finl.docxfinl.docx
finl.docx
Vishesh Aggarwal
 
Lecture-1-Introduction to Deep learning.pptx
Lecture-1-Introduction to Deep learning.pptxLecture-1-Introduction to Deep learning.pptx
Lecture-1-Introduction to Deep learning.pptx
JayChauhan100
 
Machine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWERMachine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWER
Ganesan Narayanasamy
 
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
AppDynamics
 
Internship Presentation.pdf
Internship Presentation.pdfInternship Presentation.pdf
Internship Presentation.pdf
vishwajeetparmar1
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptx
DeeJeeV
 
OOSE UNIT-1.pdf
OOSE UNIT-1.pdfOOSE UNIT-1.pdf
OOSE UNIT-1.pdf
KarumuriJayasri
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
ans ali raza
 
RapidMiner - From Data Mining To Decision Making In One Platform.pdf
RapidMiner - From Data Mining To Decision Making In One Platform.pdfRapidMiner - From Data Mining To Decision Making In One Platform.pdf
RapidMiner - From Data Mining To Decision Making In One Platform.pdf
DataSpace Academy
 
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Ali Alkan
 

Similar to Supporting Privacy Protection in Personalized Web Search.pptx (20)

IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
IEEE 2014 DOTNET DATA MINING PROJECTS Supporting privacy-protection-in-person...
 
Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2Graphical Password Authenticationimp.docx2
Graphical Password Authenticationimp.docx2
 
Python Open CV
Python Open CVPython Open CV
Python Open CV
 
IRJET- Text Recognization of Product for Blind Person using MATLAB
IRJET- Text Recognization of Product for Blind Person using MATLABIRJET- Text Recognization of Product for Blind Person using MATLAB
IRJET- Text Recognization of Product for Blind Person using MATLAB
 
Brochure quiterian DDWeb
Brochure quiterian DDWebBrochure quiterian DDWeb
Brochure quiterian DDWeb
 
Visual Studio Profiler
Visual Studio ProfilerVisual Studio Profiler
Visual Studio Profiler
 
1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...1.supporting privacy protection in personalized web search..9440480873 ,proje...
1.supporting privacy protection in personalized web search..9440480873 ,proje...
 
IRJET- Homomorphic Image Encryption
IRJET-  	  Homomorphic Image EncryptionIRJET-  	  Homomorphic Image Encryption
IRJET- Homomorphic Image Encryption
 
Web crawler with email extractor and image extractor
Web crawler with email extractor and image extractorWeb crawler with email extractor and image extractor
Web crawler with email extractor and image extractor
 
Criminal Face Identification
Criminal Face IdentificationCriminal Face Identification
Criminal Face Identification
 
finl.docx
finl.docxfinl.docx
finl.docx
 
Lecture-1-Introduction to Deep learning.pptx
Lecture-1-Introduction to Deep learning.pptxLecture-1-Introduction to Deep learning.pptx
Lecture-1-Introduction to Deep learning.pptx
 
Machine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWERMachine Learning AND Deep Learning for OpenPOWER
Machine Learning AND Deep Learning for OpenPOWER
 
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
Monitoring and Instrumentation Strategies: Tips and Best Practices - AppSphere16
 
Internship Presentation.pdf
Internship Presentation.pdfInternship Presentation.pdf
Internship Presentation.pdf
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptx
 
OOSE UNIT-1.pdf
OOSE UNIT-1.pdfOOSE UNIT-1.pdf
OOSE UNIT-1.pdf
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
RapidMiner - From Data Mining To Decision Making In One Platform.pdf
RapidMiner - From Data Mining To Decision Making In One Platform.pdfRapidMiner - From Data Mining To Decision Making In One Platform.pdf
RapidMiner - From Data Mining To Decision Making In One Platform.pdf
 
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine LearningMakine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
Makine Öğrenmesi ile Görüntü Tanıma | Image Recognition using Machine Learning
 

Recently uploaded

All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
Philip Schwarz
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
ISH Technologies
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
NishanthaBulumulla1
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
mz5nrf0n
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 

Recently uploaded (20)

All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Hand Rolled Applicative User Validation Code Kata
Hand Rolled Applicative User ValidationCode KataHand Rolled Applicative User ValidationCode Kata
Hand Rolled Applicative User Validation Code Kata
 
Preparing Non - Technical Founders for Engaging a Tech Agency
Preparing Non - Technical Founders for Engaging  a  Tech AgencyPreparing Non - Technical Founders for Engaging  a  Tech Agency
Preparing Non - Technical Founders for Engaging a Tech Agency
 
YAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring detailsYAML crash COURSE how to write yaml file for adding configuring details
YAML crash COURSE how to write yaml file for adding configuring details
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
在线购买加拿大英属哥伦比亚大学毕业证本科学位证书原版一模一样
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 

Supporting Privacy Protection in Personalized Web Search.pptx

  • 1. Supporting Privacy Protection in Personalized Web Search NAME: ENROLL NO:
  • 2. INTRODUCTION  The web search engine has long become the most important portal for ordinary people looking for useful information on the web.  However, users might experience failure when search engines return irrelevant results that do not meet their real intentions  As the expense, user information has to be collected and analyzed to figure out the user intention behind the issued query.
  • 3. HARDWARE AND SOFTWARE USED: HARDWARE SPECIFICATION: • PROCESSOR : i8 • RAM : 4GB • HARDWARE : 1TB
  • 4. SOFTWARE SPECIFICATION • PLATFORM : JAVA 1.5 • OPERATING SYSTEM : WINDOWS 8
  • 5. EXISTING SYSTEM: • The profile-based personalization may not even help to improve the search quality for some ad hoc queries, though exposing user profile to a server has put the user’s privacy at risk. • The existing methods do not take into account the customization of privacy requirements. This probably makes some user privacy to be overprotected while others insufficiently protected. • Many personalization techniques require iterative user interactions when creating personalized search results. They usually refine the search results with some metrics which require multiple user interactions, such as rank scoring, average rank, and so on. • It is infeasible for runtime profiling, as it will not only pose too much risk of privacy breach, but also demand prohibitive processing time for profiling. Thus, we need predictive metrics to measure the search quality and breach risk after personalization, without incurring iterative user interaction. .
  • 6. PROPOSED SYSTEM: • Relying on the definition of two conflicting metrics, namely personalization utility and privacy risk, for hierarchical user profile, we formulate the problem of privacy-preserving personalized search as Risk Profile Generalization, with its NP-hardness proved. • This project proposes a privacy-preserving personalized web search framework UPS, which can generalize profiles for each query according to user-specified privacy requirements. • It develops two simple but effective generalization algorithms, GreedyDP and GreedyIL, to support runtime profiling.While the former tries to maximize the discriminating power (DP), the latter attempts to minimize the information loss (IL). By exploiting a number of heuristics, GreedyIL outperforms GreedyDP significantly
  • 7. MODULES: 1. Design and loading image 2. Tools and adjusting the image 3. Filtering 4. Pruning 5. Integrating resizer and filter
  • 8. Input Image (100%) Tools and Adjust the Image Sobel Prewitt Laplace Pruning Backward Pass Forward Pass Belief Propagation Img <100% 100% Output Image Seam carving Img Resize SYSTEM FLOW DIAGRAM
  • 9. E-R diagram of sobel filter
  • 10. E-R diagram of prewitt filter
  • 11. E-R diagram of laplace filter •
  • 12. MODULES DESCRIPTION: • 1. DESIGN AND LOADING IMAGE In this module we are designing the screen and image viewer. Next we load the binary image in order to display the image that demands pruning and image resizing.
  • 13. 2 TOOLS AND ADJUSTING THE IMAGE • The arrow keys on the keyboard are used to increase or decrease the width and height of the image. The window with the picture must be the active window on screen for pressing the arrow keys to work. And also to see the adjustment in the screen while resizing the image. • (i)Tools Certain tools are central to the processing of digital images. These include mathematical tools such as convolution, Fourier analysis, and statistical descriptions, and manipulative tools such as chain codes and run codes. • (ii)Convolution In image processing applications, the entire input function is often available for computing every sample of the output function. In that case, the constraint that each output is the effect of only prior inputs can be relaxed. Convolution amplifies or attenuates each frequency component of the input independently of the other components. • (iii)Fourier Analysis Fourier analysis is a subject area which grew out of the study of Fourier series. The subject began with trying to understand when it was possible to represent general functions by sums of simpler trigonometric functions.
  • 14. 3. FILTERING Here we are filtering the image to avoid noise by three algorithms. They are:  Sobel filter  Prewitt filter  Laplace filter
  • 16.
  • 17.