129 research outputs found

    A Survey on Mining Top-k Competitors from Large Unstructured Dataset Using k_means Clustering Algorithm and Sentiment Analysis Approach

    Get PDF
    Along line of research has shown the vital significance of recognizing and observing company�s contestants. In the framework of this activity various questions are emerge like: In what way we formalize and measure the competitiveness between two items? Who are the most important competitors of a specified item? What are the various features of an item that act on competitiveness? Inspired by this issue, the advertising and administration group have concentrated on observational strategies for competitor distinguishing proof and in addition on techniques for examining known contenders. Surviving examination on the previous has concentrated on mining near articulations (e.g.one product is superior then other product) from the web or other documentary sources. Despite the fact that such articulations can without a doubt be indications of strength, they are truant in numerous spaces. By surveying the various papers, we found the conclusion of basic significance of the competitiveness between two items on the basis of market segments

    Review of Malware Defense in Mobile Network using Dynamic Analysis of Android Application

    Get PDF
    Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. In this paper we have reviewed android security model, application level security in android and its security issues

    Malware Defense in Mobile Network using Dynamic Analysis of Android Application

    Get PDF
    Today Android has the biggest market share as compared to other operating system for smart phone. As users are continuously increasing day by day the Security is one of the main concerns for Smartphone users. As the features and power of Smartphone are increase, so that they has their vulnerability for attacks by Malwares. But the android is the operating system which is more secure than any other operating systems available for Smart phones. The Android operating system has very few restrictions for developers and it will increase the security risk for end users. I am proposing an android application which is able to perform dynamic analysis on android program. To perform this analysis i have to deploy the android application, In this proposed system I am going to deploy android application on a cloud. This application executes automatically without any human interaction. It automatically detects malware by using pattern matching algorithm. If malware get detected then user get inform that particular application is malicious and restrict the user from installing application. DOI: 10.17762/ijritcc2321-8169.150315

    Characterization of the PTW 34031 ionization chamber (PMI) at RCNP with high energy neutrons ranging from 100 – 392 MeV

    Full text link
    Radiation monitoring at high energy proton accelerators poses a considerable challenge due to the complexity of the encountered stray radiation fields. These environments comprise a wide variety of different particle types and span from fractions of electron-volts up to several terra electron-volts. As a consequence the use of Monte Carlo simulation programs like FLUKA is indispensable to obtain appropriate field-specific calibration factors. At many locations of the LHC a large contribution to the particle fluence is expected to originate from high-energy neutrons and thus, benchmark experiments with mono-energetic neutron beams are of high importance to verify the aforementioned detector response calculations. This paper summarizes the results of a series of benchmark experiments with quasi mono-energetic neutrons of 100, 140, 200, 250 and 392 MeV that have been carried out at RCNP - Osaka University, during several campaigns between 2006 and 2014

    Sea nymph polka /

    No full text
    In bound volumes: Copyright Deposits 1820-186

    Nocturno /

    No full text
    In bound volumes: Copyright Deposits 1820-186

    Duty

    No full text

    The Stranger

    No full text

    Design Consideration & Principles for Deck Type Steel Railway Bridges

    Full text link
    In the present study discussion about deck type steel Railway Bridge is carried out. Railway Bridge is designed for Strength, safety and economy purpose. While selecting the types of bridge, spans and other parameters are to be studied carefully to meet out the need of suitability to site conditions. The scope of this paper is to confine to the design aspect related to variable parameters. The scope of this paper is to confine to the design aspect related to variable parameters

    Synthesis and characterization of some hetero bi- and ter-metallic alkoxides of iron(II)

    No full text
    592-595novel bi- and ter-metallic alkoxides having the compositions FeCI{Al(OBu')4}(Ia), Fe{Al(OBu')4}2 (Ib)Fe{Al(OBu')4}{Nb(OPri)6} (IIa); Fe{AlOBU')4}{Zr2(OPri)9} (IIb); Fe{Al(OBu')4}{Ti2(OPri)9}(IIc);and Fe{Al(OPri)4}{Nb(OPri)6} (IId) have been prepared and characterized by elemental analyses, isopropoxy group estimation, IR and electronic spectral data and magnetic and molecular weight (ebullioscopy) measurements
    • …
    corecore