Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

LP- III

Mini Project on Machine Learning:


Support Vector Machine

Members:
Ekta Bhosale (Roll No-153 and PRN no. 71627738H)
Virangni Gaikwad (Roll No-156 and PRN no. 71627571G)
Ankita Istalkar (Roll No-160 and PRN no. 71627750G)
Rajashri Tapkir (Roll No-161 and PRN no. 71627815E)

Title:
Support Vector Machine for classification

Problem Statement:
Apply the support vector machine for classification on a data set
obtained from UCI ML Repository.

Dataset used:-
IRIS dataset.

Requirements:-
1)Ubuntu
2)Python

THEORY:

SVM(Support Vector Machine)


Support vector machine (SVM) has become very popular in the machine
learning community because of its good generalization performance and its
ability to handle high-dimensional data by using kernels.

Department of Computer Engineering BE A.Y. 2019-20


According the description given in Woitaszek et al. [11], an e-mail may be
represented by a feature vector x that is composed of the various words
from a dictionary formed by analysing the collected e-mails. Thus, an e-mail
is classified as spam or non-spam by performing a simple dot product
between the features of an e-mail and the SVM model weight vector, by
y=w.x-b
where y is the result of classification, w is weight vector corresponding to
those in the feature vector x, and b is the bias parameter in the SVM model
that determined by the training process.

Hyperplanes:
1)Hyperplanes are decision boundaries that are used to classify the
data points.
2)The dimension of the hyperplane depends upon the number of
features.

B) Margin
It is the shortest distance from hyperplane to one side of its margin is
equal to the shortest distance from the hyperplane to the other side
of the margin, where the “sides” of the margin are parallel to the
hyperplane.

Department of Computer Engineering BE A.Y. 2019-20


Types of SVM Kernels Used:

1.SVM LINEAR KERNEL:


In machine learning, kernel methods are a class of algorithms for
pattern analysis, whose best known member is the support vector
machine (SVM). ... Any linear model can be turned into a non-linear
model by applying the kernel trick to the model: replacing its
features (predictors) by a kernel function.

2.RBF LINEAR KERNEL:


In machine learning, the radial basis function kernel, or RBF kernel,
is a popular kernel function used in various kernelized learning
algorithms. In particular, it is commonly used in support vector
machine classification.

3.POLYNOMIAL KERNEL:
In machine learning, the polynomial kernel is a kernel function
commonly used with support vector machine (SVMs) and other
kernalizedmodels, that represents the similarity of vectors (training
samples) in a feature space over polynomials of the original variables,
allowing learning of non-linear models.

Department of Computer Engineering BE A.Y. 2019-20


OUTPUT:

Conclusion:
Hence we have implemented a mini project on Support Vector Machine.

Department of Computer Engineering BE A.Y. 2019-20


LP- III

Mini Project on Information Mini Project


on Information and Cyber Security:
Secure Data Sharing.

Members:
Ekta Bhosale (Roll No-153 and PRN no. 71627738H)
Virangni Gaikwad (Roll No-156 and PRN no. 71627571G)
Ankita Istalkar (Roll No-160 and PRN no. 71627750G)
Rajashri Tapkir (Roll No-161 and PRN no. 71627815E)

Title :
Data sharing over the cloud framework using Security Algorithms .

Problem definition:
For proposing an online resource management frame-work that helps
in providing more security to the data shared / communicated among
people using it.

Prerequisite:
Concepts of Cloud Computing and some security algorithms , Web
Technologies and Java.

Software Requirements:
1. Operating System: Linux
2. IDE: Eclipse (Juno) / NetBeans 8.2
3. Programming Language: JAVA, JSP
4. Java Version: JDK 1.7 or Above
5. Database: MySQL 5.5

Department of Computer Engineering BE A.Y. 2019-20


6. Web Technology: JSP, Servlet, HTML, CSS, Java script
7. Web Server: Apache Tomcat 6.0

Outcome:
Proposed system can be used to enhanced privacy preservation in
cloud service.

Theory :
Cloud computing:
Cloud computing is a strategy for conveying data innovation (IT)
benefits in which assets are recovered from the Web through online
instruments and applications, rather than an immediate association with a
server. Instead of keeping documents on a restrictive hard drive or nearby
stockpiling gadget, cloud-based capacity makes it conceivable to spare
them to a remote database. For whatever length of time that an electronic
gadget approaches the web, it approaches the information and the product
projects to run it. It's called cloud computing in light of the fact that the
data stored in the cloud and does not require a client to be in a particular
place to access it. This kind of framework enables representatives to work
remotely.
Organizations giving cloud administrations empowers clients to store
records and applications on remote servers, and after that entrance every
one of the information by means of the web. Information and Data security
and access control is a testing research work in cloud computing. Cloud
bene t clients transfer their private and secret information over the cloud.
Security must be given to such outsourced information, with the goal that
client is not stressed while transferring their classified information.
Proposed System:

Department of Computer Engineering BE A.Y. 2019-20


User Module:

Fig: Home Page

Fig :Registration Page

Fig: Login Page

Fig: User Dashboard

Department of Computer Engineering BE A.Y. 2019-20


Database Module:

Fig: User Registration Details

Fig: Uploaded File Details

Conclusion:
To address privacy issue of sensitive data on cloud, proposed a
crypto-system for secure sharing of data over the cloud. This work shows a
security framework that can give protection and uprightness to trading
delicate data through the cloud or the correspondence systems, in view of
the utilization of the combination of Attribute-Based Encryption and Byte
Rotation Encryption Algorithm.
So, the proposed scheme is possibly applied for enhanced data
protection in cloud application and reduce the encryption and decryption
time using multi-core parallel processing. This indicates that the proposed
system can be used to enhanced privacy preservation in cloud service.

Department of Computer Engineering BE A.Y. 2019-20

You might also like