175 research outputs found

    WEBMINING: ISSUES

    Get PDF
    Web is an assortment of between related records on at any rate one web workers while web mining proposes dispensing with basic data from web information bases. Web mining is one of the information mining regions where information tunneling procedures are utilized for eliminating data from the web workers. The web information wires site pages, web joins, objects on the web an extraordinary arrangement logs. Web mining is utilized to understand the client lead, assess a specific site page dependent on the data which is dealt with in web log records. Web mining is assessed by utilizing information mining frameworks, unequivocally depiction, grouping, and joining rules. It has some steady zones or applications, for example, Electric conversation, E-learning, E-government, E-plans, E-vote based system, Electric trade, security, awful execution appraisal and advanced library. Recovering the significant site page from the web accommodatingly and appropriately changes into an inconvenient undertaking since web is contained unstructured information, which passes on the gigantic extent of data and expansion the multifaceted thought of regulating data from various web master gatherings. The assortment of material winds up being tricky, concentrate, and channel or assess the basic information for the clients. In this paper, to have dissected the essential considerations of web mining, assembling, cycles and issues. In addition, this task comparatively isolated the web mining research inconveniences

    An Effective Low Power Ring Oscillator Based All Digital Phase Locked Loop

    Get PDF
    The All digital phase-locked loops (ADPLL) widely employed in the data communication systems including, but not limited to, the implementation of the frequency multiplication and clock synchronization circuits. A phase-interpolator is utilized for power consumption reduction by using TDC in a ring-oscillator in a fractional-N phase-locked loop. A predicted-phase-interpolation method is used to calculate the integer and fractional parts of the frequency-division-ratio and to find two interpolation clocks. The prediction method gives a significant power reduction in the proposed PIFC by enabling the use of low-frequency clocks for phase interpolatio

    An Analytical Study of LIS Topics covered on Wikipedia

    Get PDF
    One of the objectives of UGC is to conduct efficient, transparent standard tests to evaluate the ability of the candidate for the purpose of admission and recruitment. UGC conducts National Eligibility Test (NET) to determine eligibility for lectureship and for award of Junior Research fellowship (JRF) in Social Sciences, Humanities, Forensic Science, Environmental, Computer Science and Electronic Science. Wikipedia is a website developed collaboratively by a community of users, allowing them to change or add study material on it. The purpose of the study is to examine the extent to which the syllabus of Library and Information Science subject of the UGC-NET examination has been covered in Wikipedia. The findings reveal that all topics of the LIS subject incorporated in the UGC-NET examination syllabus are covered in Wikipedia. The researcher has identified some subjects for which the contents are inadequate. It is recommended by the researcher to add references and external links

    Survey on Software Task Extraction and Navigation

    Get PDF
    In gathering requirement phase of developing software model, knowledge needed by software developer’s is captured in many forms of documentation, basically it is written by different individuals. Whenever developer build a software, he struggles to find the right information in the right form at the right time so to help developers navigate documentation, In this paper we survey various techniques for extracting structured and unstructured data and automatically extracting tasks from software documentation by conceptualizing tasks as specific programming actions that have been described in the documentation. This essential information need to be extracted & annotated automatically which is challenge in software engineering

    Security Issues in Cloud based e-Learning Part 1(Basic Introduction)

    Get PDF
    Security Issues in Cloud based e-Learning Part 1(Basic Introduction

    A Link Between Stress And Diabetes

    Get PDF

    Home Automation with Personal Assistant

    Get PDF
    The Internet of Things (IoT) paradigm has been achieved in complex contexts, such as in the home automation market. Due to complexity in its working as well as huge internet traffic, the whole process is not long lasting and it becomes cumbersome to maintain the proper functioning of devices. Now-a-days, giant Techno-institutes are massively dependent on IoT based applications to provide better commercial as well as domestic e-products in terms of simplicity and feasibility. In the following project we have discussed a new methodology of Home Automation in which the electronic gadgets used in home environment as well as workplace can be controlled by the device itself. ?With a unique internet access point in the particular environment, the device is connected to the IP gateway so that it can be controlled from anywhere and any place with the help of proper internet connection. The IP address provided will not function for an individual device, but for the entire network to which all the devices are being accessed.?[1] The interconnection of all the devices can be enabled with the help of an open source software. Initially the device will act and remember the commands as given and will act accordingly. After some duration of time, it will automatically start the actions as previously in-scripted in its memory. Home automation not only helps to reduce human efforts but is also energy efficient and time saving. The main objective of home automation is to help handicapped and old aged people that will enable them to control home appliances and alert them in some immediate situations

    Variable Output AC-DC Converter

    Get PDF
    Abstract: The design of an AC to DC converter, which takes line supply as input and provides a regulated DC output voltage which can be adjusted over a range of voltages is proposed in this project. The main aim is to get a regulated output voltage for any change in line supply. The line and load regulation is expected to be very less. The cascaded connection of rectifier, converter transformer along with output filter is used. To meet the specification the best suited topology is forward converter topology. A two switch forward converter is used to avoid transformer core saturation. To trigger both the MOSFETs at a time through a single pulse transformer the current mode control PWM IC UC3844 is used which avoids using an extra current sensing circuit. The converter transformer has one primary and three secondary windings. The three secondary windings serves three purposes, one used provide power supply to control circuit, other used for voltage feedback to control circuit and the third to feed the load. The output voltage is fed back to control circuit through an opto coupler which provides input to output isolation. Two voltage regulators are provided one at power circuit other at control circuit. Once the output voltage is set for a particular value, the voltage regulator at power circuit senses the variation in output voltage for any change in input and sends proportional voltage to the control circuit this is sensed by PWM IC through regulator at control circuit, then the IC will adjust the duty ratio of the triggering pulse to MOSFETs which leads to maintaining constant voltage at the output. This is achieved with a regulation less than 1% and the required specifications are met

    Data Sharing using BFID Encryption for Privacy Preseration of Data in Cloud

    Get PDF
    The most important functionality in cloud storage is data sharing. With the advent of cloud computing [1], data owners are motivated to outsource their complex data management systems from local sites to the commercial public cloud for great flexibility and economic savings. But for protecting data privacy and integrity, sensitive data have to be encrypted before outsourcing, which causes the need of traditional data utilization based on plaintext keyword search. Thus, enabling an encrypted cloud data search service is of paramount importance.Typically cloud computing is a combination of computing recourses accessible via internet. Historically the client or organizations store data in data centers with firewall and various security techniques used to protect data against intrudes to access the data. Since the data was contained to data centers in limits of organisation, the control over the data was more and well defined procedures could be used for accessing its own data. Howeverin cloud computing, since the data is stored anywhere across the world, the client organizations have less control over the stored data.Identity-Based Encryption (IBE) which is used to simplifies the public key and certificate management at Public Key Infrastructure (PKI) is an important alternative to public key encryption. Identity-based encryption (IBE) is an important aspect of ID-based cryptography. As such it is a type of public-key encryption in which the public key of a user is provides unique information about the identity of the user (e.g. a user's Identification). This can use the text-value of the name or domain name as a key or the physical IP address it translates to
    • …
    corecore