To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
N.Redzauddin bin N.Muhammad has over 30 years of experience in materials management, procurement, and finance roles. He currently works as a Materialsman for PETRONAS Carigali managing stock, inventory, and work orders for Platform Bekok C. Previously, he held supervisory roles in procurement and technical services for PETRONAS Carigali and MTBE(M) Sdn Bhd. He has a Malaysian Certificate of Education and is proficient in SAP R3, ECCC 6.0, Microsoft Office, and speaks English and Malay.
Shalaka Narwankar is a food scientist and product developer at PepsiCo's culinary center in Valhalla, New York. She explores new flavor combinations and ingredients for products from Doritos to Mountain Dew. She enjoys the cross-functional collaboration required in her job across marketing, supply chain, and engineering. Shalaka recently earned the designation of Certified Culinary Scientist, which requires culinary training and passing a rigorous exam. She applies her technical food science knowledge and new culinary skills to develop innovative new products for PepsiCo consumers.
The document discusses props needed for a media studies opening. It mentions using a Citroën Traction Avant car since none of the students own one. It also discusses using weapons like a shotgun with differentiating features like blue paint and a plastic shell to make them look unrealistic so as not to disturb others during filming in public.
O documento discute a importância da educação para o desenvolvimento econômico e social de um país. A educação é essencial para formar cidadãos produtivos e capacitados a impulsionar a inovação. Investimentos em educação de qualidade podem gerar altos retornos sociais e econômicos a longo prazo.
This flyer advertises a hands-on cleaning seminar to be held on April 4, 2015 at Anchored in Truth Ministries. The seminar will provide training and tips for cleaning different areas of the house including the kitchen, bedroom, bathroom and floors. It will be led by Sis. Georgia, Sis. Lynette and Sis. CJ and aims to guide attendees in properly cleaning their home and maintaining cleanliness.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
N.Redzauddin bin N.Muhammad has over 30 years of experience in materials management, procurement, and finance roles. He currently works as a Materialsman for PETRONAS Carigali managing stock, inventory, and work orders for Platform Bekok C. Previously, he held supervisory roles in procurement and technical services for PETRONAS Carigali and MTBE(M) Sdn Bhd. He has a Malaysian Certificate of Education and is proficient in SAP R3, ECCC 6.0, Microsoft Office, and speaks English and Malay.
Shalaka Narwankar is a food scientist and product developer at PepsiCo's culinary center in Valhalla, New York. She explores new flavor combinations and ingredients for products from Doritos to Mountain Dew. She enjoys the cross-functional collaboration required in her job across marketing, supply chain, and engineering. Shalaka recently earned the designation of Certified Culinary Scientist, which requires culinary training and passing a rigorous exam. She applies her technical food science knowledge and new culinary skills to develop innovative new products for PepsiCo consumers.
The document discusses props needed for a media studies opening. It mentions using a Citroën Traction Avant car since none of the students own one. It also discusses using weapons like a shotgun with differentiating features like blue paint and a plastic shell to make them look unrealistic so as not to disturb others during filming in public.
O documento discute a importância da educação para o desenvolvimento econômico e social de um país. A educação é essencial para formar cidadãos produtivos e capacitados a impulsionar a inovação. Investimentos em educação de qualidade podem gerar altos retornos sociais e econômicos a longo prazo.
This flyer advertises a hands-on cleaning seminar to be held on April 4, 2015 at Anchored in Truth Ministries. The seminar will provide training and tips for cleaning different areas of the house including the kitchen, bedroom, bathroom and floors. It will be led by Sis. Georgia, Sis. Lynette and Sis. CJ and aims to guide attendees in properly cleaning their home and maintaining cleanliness.
Column store databases approaches and optimization techniquesIJDKP
Column-Stores database stores data column-by-column. The need for Column-Stores database arose for
the efficient query processing in read-intensive relational databases. Also, for read-intensive relational
databases,extensive research has performed for efficient data storage and query processing. This paper
gives an overview of storage and performance optimization techniques used in Column-Stores.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document contains personal and professional information about Shady Sameh Yehia Hasan. It details his education, including graduating from Ain Shams University with a degree in Business Administration, as well as various training courses. It lists his previous work experiences in fields like marketing, graphic design, sales, and as a volunteer helping refugees. It also outlines his language skills, computer skills, and history of social and volunteer activities.
A interdisciplinaridade surgiu na década de 1960 na França e Itália como forma de integrar diferentes componentes curriculares e romper com o ensino fragmentado. Ela é considerada a interação entre disciplinas para alcançar um objetivo comum, estabelecendo interdependência entre elas. Nas décadas seguintes, houve maior discussão sobre os aspectos conceituais e metodológicos da interdisciplinaridade.
El documento contiene 100 preguntas de diversos temas como matemáticas, lógica, historia y otros. Las preguntas varían en dificultad y tipo, incluyendo acertijos, problemas matemáticos, preguntas de conocimiento general y más.
The spinal cord injury can occur when the vertebrae are broken or dislocated, damaging the soft tissues of the spinal cord. Scientists have long searched for effective remedies for spinal cord ailments. Recently, stem cell treatment has helped thousands with spinal disorders by using stem cells that can regenerate and differentiate into diverse cell types. This treatment transplants damaged cells that regenerate with stem cells, applying the principle of regeneration to treat spinal cord injuries. It is important to select an experienced doctor for this stem cell treatment.
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
This paper presents SORT, a self-organizing trust model for peer-to-peer systems. In existing systems, a central server stores and manages trust information, but P2P systems lack a central authority. SORT aims to decrease malicious activity by establishing trust relationships among peers based on past interactions and recommendations. Peers create their own local trust networks and do not try to learn global trust information. SORT was tested on a file sharing application and showed it could mitigate attacks from 16 different malicious behavior models by allowing good peers to isolate untrustworthy peers in their proximity.
Comparison between riss and dcharm for mining gene expression dataIJDKP
Since the rapid advance of microarray technology, gene expression data are gaining recent interest to
reveal biological information about genes functions and their relation to health. Data mining techniques
are effective and efficient in extracting useful patterns. Most of the current data mining algorithms suffer
from high processing time while generating frequent itemsets. The aim of this paper is to provide a
comparative study of two Closed Frequent Itemsets algorithms (CFI), dCHARM and RISS. They are
examined with high dimension data specifically gene expression data. Nine experiments are conducted with
different number of genes to examine the performance of both algorithms. It is found that RISS outperforms
dCHARM in terms of processing time..
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Column store databases approaches and optimization techniquesIJDKP
Column-Stores database stores data column-by-column. The need for Column-Stores database arose for
the efficient query processing in read-intensive relational databases. Also, for read-intensive relational
databases,extensive research has performed for efficient data storage and query processing. This paper
gives an overview of storage and performance optimization techniques used in Column-Stores.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
This document contains personal and professional information about Shady Sameh Yehia Hasan. It details his education, including graduating from Ain Shams University with a degree in Business Administration, as well as various training courses. It lists his previous work experiences in fields like marketing, graphic design, sales, and as a volunteer helping refugees. It also outlines his language skills, computer skills, and history of social and volunteer activities.
A interdisciplinaridade surgiu na década de 1960 na França e Itália como forma de integrar diferentes componentes curriculares e romper com o ensino fragmentado. Ela é considerada a interação entre disciplinas para alcançar um objetivo comum, estabelecendo interdependência entre elas. Nas décadas seguintes, houve maior discussão sobre os aspectos conceituais e metodológicos da interdisciplinaridade.
El documento contiene 100 preguntas de diversos temas como matemáticas, lógica, historia y otros. Las preguntas varían en dificultad y tipo, incluyendo acertijos, problemas matemáticos, preguntas de conocimiento general y más.
The spinal cord injury can occur when the vertebrae are broken or dislocated, damaging the soft tissues of the spinal cord. Scientists have long searched for effective remedies for spinal cord ailments. Recently, stem cell treatment has helped thousands with spinal disorders by using stem cells that can regenerate and differentiate into diverse cell types. This treatment transplants damaged cells that regenerate with stem cells, applying the principle of regeneration to treat spinal cord injuries. It is important to select an experienced doctor for this stem cell treatment.
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
This paper presents SORT, a self-organizing trust model for peer-to-peer systems. In existing systems, a central server stores and manages trust information, but P2P systems lack a central authority. SORT aims to decrease malicious activity by establishing trust relationships among peers based on past interactions and recommendations. Peers create their own local trust networks and do not try to learn global trust information. SORT was tested on a file sharing application and showed it could mitigate attacks from 16 different malicious behavior models by allowing good peers to isolate untrustworthy peers in their proximity.
Comparison between riss and dcharm for mining gene expression dataIJDKP
Since the rapid advance of microarray technology, gene expression data are gaining recent interest to
reveal biological information about genes functions and their relation to health. Data mining techniques
are effective and efficient in extracting useful patterns. Most of the current data mining algorithms suffer
from high processing time while generating frequent itemsets. The aim of this paper is to provide a
comparative study of two Closed Frequent Itemsets algorithms (CFI), dCHARM and RISS. They are
examined with high dimension data specifically gene expression data. Nine experiments are conducted with
different number of genes to examine the performance of both algorithms. It is found that RISS outperforms
dCHARM in terms of processing time..
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...IEEEGLOBALSOFTTECHNOLOGIES
The document proposes a solution for cooperative packet delivery in hybrid wireless mobile networks using a coalitional game-theoretic approach. Mobile nodes form coalitions to cooperatively deliver packets to reduce delivery delays. A coalitional game model analyzes nodes' incentives to cooperate based on delivery costs and delays. Markov chain and bargaining models determine payoffs to find stable coalitions. Simulation results show nodes achieve higher payoffs by cooperating in coalitions than acting alone.
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
This document proposes a Community-Aware Opportunistic Routing (CAOR) algorithm for mobile social networks. It models communities as "homes" that nodes frequently visit. The CAOR algorithm computes optimal relay sets for each home to minimize message delivery delays. It represents an improvement over existing social-aware algorithms by achieving optimal routing performance between homes rather than relying on locally optimal node characteristics.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Privacy preserving public auditing fo...
JAVA 2013 IEEE NETWORKSECURITY PROJECT Warningbird a near real time detection system for suspicious ur ls in twitter stream
1. WARNINGBIRD: A Near Real-time Detection System for Suspicious
URLs in Twitter Stream
ABSTRACT:
Twitter is prone to malicious tweets containing URLs for spam, phishing, and malware
distribution. Conventional Twitter spam detection schemes utilize account features such as the
ratio of tweets containing URLs and the account creation date, or relation features in the Twitter
graph. These detection schemes are ineffective against feature fabrications or consume much
time and resources. Conventional suspicious URL detection schemes utilize several features
including lexical features of URLs, URL redirection, HTML content, and dynamic behavior.
However, evading techniques such as time-based evasion and crawler evasion exist. In this
paper, we propose WARNINGBIRD, a suspicious URL detection system for Twitter. Our
system investigates correlations of URL redirect chains extracted from several tweets. Because
attackers have limited resources and usually reuse them, their URL redirect chains frequently
share the same URLs. We develop methods to discover correlated URL redirect chains using
the frequently shared URLs and to determine their suspiciousness. We collect numerous tweets
from the Twitter public timeline and build a statistical classifier using them. Evaluation results
show that our classifier accurately and efficiently detects suspicious URLs. We also present
WARNINGBIRD as a near real-time system for classifying suspicious URLs in the Twitter
stream.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
2. EXISTING SYSTEM:
In the existing system attackers use shortened malicious URLs that redirect Twitter users to
external attack servers. To cope with malicious tweets, several Twitter spam detection schemes
have been proposed. These schemes can be classified into account feature-based, relation
feature-based, and message feature based schemes. Account feature-based schemes use the
distinguishing features of spam accounts such as the ratio of tweets containing URLs, the
account creation date, and the number of followers and friends. However, malicious users can
easily fabricate these account features. The relation feature-based schemes rely on more robust
features that malicious users cannot easily fabricate such as the distance and connectivity
apparent in the Twitter graph. Extracting these relation features from a Twitter graph, however,
requires a significant amount of time and resources as a Twitter graph is tremendous in size.
The message feature-based scheme focused on the lexical features of messages. However,
spammers can easily change the shape of their messages. A number of suspicious URL
detection schemes have also been introduced.
DISADVANTAGES OF EXISTING SYSTEM:
Malicious servers can bypass an investigation by selectively providing benign pages to
crawlers.
For instance, because static crawlers usually cannot handle JavaScript or Flash, malicious
servers can use them to deliver malicious content only to normal browsers.
A recent technical report from Google has also discussed techniques for evading current
Web malware detection systems.
Malicious servers can also employ temporal behaviors— providing different content at
different times—to evade an investigation
3. PROPOSED SYSTEM:
In this paper, we propose WARNINGBIRD, a suspicious URL detection system for Twitter.
Instead of investigating the landing pages of individual URLs in each tweet, which may not be
successfully fetched, we considered correlations of URL redirect chains extracted from a
number of tweets. Because attacker’s resources are generally limited and need to be reused,
their URL redirect chains usually share the same URLs. We therefore created a method to
detect correlated URL redirect chains using such frequently shared URLs. By analyzing the
correlated URL redirect chains and their tweet context information, we discover several features
that can be used to classify suspicious URLs. We collected a large number of tweets from the
Twitter public timeline and trained a statistical classifier using the discovered features.
ADVANTAGES OF PROPOSED SYSTEM:
The trained classifier is shown to be accurate and has low false positives and negatives. The
contributions of this paper are as follows:
• We present a new suspicious URL detection system for Twitter that is based on the
correlations of URL redirect chains, which are difficult to fabricate. The system can find
correlated URL redirect chains using the frequently shared URLs and determine their
suspiciousness in almost real time.
• We introduce new features of suspicious URLs: some of which are newly discovered and
while others are variations of previously discovered features.
• We present the results of investigations conducted on suspicious URLs that have been widely
distributed through Twitter over several months.
SYSTEM ARCHITECTURE:
4. ALGORITHM USED:
Offline supervised learning algorithm
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
SOFTWARE CONFIGURATION:-
Operating System : Windows XP
5. Programming Language : JAVA
Java Version : JDK 1.6 & above.
REFERENCE:
Sangho Lee, Student Member, IEEE, and Jong Kim, Member, IEEE ―WARNINGBIRD: A Near
Real-time Detection System for Suspicious URLs in Twitter Stream‖-IEEE
TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. X, NO. Y,
JANUARY2013.