1,925 research outputs found

    Semiconductor grade, solar silicon purification project

    Get PDF
    The conversion of metallurgical grade silicon into semiconductor grade silicon by way of a three step SiF2 polymer transport purification process was investigated. Developments in the following areas were also examined: (1) spectroscopic analysis and characterization of (SiF2) sub x polymer and Si sub x F sub y homologue conversion; (2) demonstration runs on the near continuous apparatus; (3) economic analysis; and (4) elemental analysis

    Technique for proficiently yielding Deep-Web Interfaces Using Smart Crawler

    Get PDF
    Now a days, world web has most famous because of web as well as internet increased development and its effect is that there are more requirements of the techniques that are used to improve the effectiveness of locating the deep-web interface. A technique called as a web crawler that surfs the World Wide Web in automatic manner. This is also called as Web crawling or spidering. In proposed system, initial phase is Smart Crawler works upon site-based scanning for mediatory pages by implementing search engines. It prevents the traffic that colliding with huge amount of pages. Accurate outcomes are taken due to focus upon crawl. Ranking of websites is done on the basis of arrangements on the basis of the priority valuable individuals and quick in-site finding through designing most suitable links with an adaptive link-ranking. There is always trying to search the deep web databases that doesn’t connected with any of the web search tools. They are continuous insignificantly distributed as well as they are constantly modifying. This issue is overcome by implementing two crawlers such as generic crawlers and focused crawlers. Generic crawlers aggregate every frame that may be found as well as it not concentrate over a particular subject. Focused crawlers such as Form-Focused Crawler (FFC) and Adaptive Crawler for Hidden-web Entries (ACHE) may continuous to find for online databases on a specific subject. FFC is designed to work with connections, pages as well as from classifiers for focused crawling of web forms and it is extended through adding ACHE with more components for filtering and adaptive link learner. This system implements Naive Bayes classifier instead of SVM for searchable structure classifier (SFC) and a domain-specific form classifier (DSFC). Naive Bayes classifiers in machine learning are a bunch of clear probabilistic classifiers determine by implementing Bayes theorem with solid (gullible) freedom assumptions from the components. In proposed system we contribute a novel module user login for selection of authorized user who may surf the particular domain on the basis of provided data the client and that is also used for filtering the results. In this system additionally implemented the concept of pre-query as well as post-query. Pre-query works only with the form and with the pages that included it and Post-query is utilizes data collected outcomes from form submissions

    Friend Finder: A Lifestyle based Friend Recommender App for Smart Phone Users

    Get PDF
    Today’s Social Networking services focuses towards suggesting you friends based on users social graph or Geo-location based, which neither take users life style into account or users liking ,disliking etc. Suggesting friends using the users’ link analysis may not be the best preference of suggestion for the users. In this paper, we present FriendFinder, a reliable user relation based friend suggesting app which recommends friend list to app users based on their analysis of life style and daily curricular activities on mobile phone instead of social graphs. FriendFinder captures users data i.e. daily activities and work done through mobile, for ex: - App Usage, App Frequency, Browser Activities etc. Then we create a user profile with all gathered data and find most relevant matching profiles of existing candidate friends matching our profile for similarity and suggesting the result out of similarity test to the user as a friend

    A Review of Clustering Algorithms for Clustering Uncertain Data

    Get PDF
    Clustering is an important task in the Data Mining. Clustering on uncertain data is a challenging in both modeling similarity between objects of uncertain data and developing efficient computational method. The most of the previous method for clustering uncertain data extends partitioning clustering methods and Density based clustering methods, which are based on geometrical distance between two objects. Such method cannot handle uncertain objects that are cannot distinguishable by using geometric properties and Distribution regarding to object itself is not considered. Probability distribution is an important characteristic is not considered during measuring similarity between two uncertain objects. The well known technique Kullbak-Leibler divergence used to measures the similarity between two uncertain objects. The goal of this paper is to provide detailed review about clustering uncertain data by using different methods & showing effectiveness of each algorithm

    Login History and CaRP for User Authentication

    Get PDF
    Password is main vulnerability in computer security. Passwords are commonly guessed by machine programs running dictionary attacks. Passwords main used for the authentication method in spite of security weaknesses. User authentication obviously practical issue. According to the view of a service provider this problem needs to be resolved within real-world constraints such as the available hardware and software infrastructures. According to user’s view user friendliness is a basic requirement Click based graphical password scheme provides a different approach to address the familiar image hotspot problem. Graphical password systems such as PassPoints, that frequently leads to weak password choices. So to provide user friend-liness and also the protection from various security attacks. In this, graphical password scheme, the click event is performed on various points on same or different images. DOI: 10.17762/ijritcc2321-8169.15064

    A Novel method for user authentication by CaRP And Login History

    Get PDF
    Cyber security is the main challenge nowadays. Many authentication techniques are available for these, for unwanted access for more secure data is prohibited. Graphical and text password are used for user authentication process. Sometimes text passwords are not secured and graphical password are more secure but vulnerable to shoulders surfing attack. The click event on various points for user friend-lines and protection from various security attacks. In system, login history image file combined CaRP for user authentication to enhancing the more security level primitives .The image file contain details of login and logout for date, time all related information. The file is encrypted by DES algorithm and send that file on mail. It is higher security primitives for the user. online guessing attack, relay attacks and if combined with dual technology for shoulder surfing attack are new concepts are available. DOI: 10.17762/ijritcc2321-8169.15075
    • …
    corecore