Manuscripts

Recent Papers

Extracting News from the Web Pages by using Concept of Clustering with Neural Genetic Approach

Web news extraction is a investigation area which has been widely discovered. It has resulted in some systems which takes good extraction capabilities with little or no human involvement. The present system looks into the perception of web broadcast from a single web site which takes a equivalent format and the idea commonly is not as efficient when multiple web news pages are measured which go to altered sites. My work proposes a web extraction layout which is pretty same for maximum of the web news The purpose of web news extraction is to enhance information retrieval which provisions news articles associated to a particular event for competitive business analysis Researches in this area have shown many methods altered from the other based on the requirement, the extractor should be chosen. . In previous work they use unsupervised learning for extracting the news from web, but it compares the entire news pattern which extract so far. And in previous work did not work on the pattern of text in web which provide important information for classification and analysis of news from the web. Previous work extracting news is not complex process but classification of news take more time in processing. In previous work features will increase exponentially on the basis of unsupervised learning done. We reduce the complexity and increase the accuracy web news extraction by using text from web and classified by Cluster based supervised learning. to study and analysis of text mining and classifier on different parameters. To offered and implement pre-processing of web page by text mining and classified by cluster based supervised leaning. To learning the offered methodology by precision, recall, accuracy and F1 measure. The point of information accessible in the World Wide Web, it performs that the detection of quality data is graceful and simple but it has been a important matter of concern text mining is a field of researches and alterations. Online news classification has been challenge continuously in terms of manual operation. Data mining is procedure of determining interesting knowledge such as patterns, suggestions, changes, variances and important structures, from large amounts of data stored in database, data warehouse, or additional information sources. Information to the wide availability of massive amount of data in electronic form, and pending need for revolving such data into useful information and knowledge for broad application with market analysis, business administration and judgment support, documents mining has involved a great deal of devotion in information business in recent year.

Published by: Nishan Singh Saklani, Saurabh Sharma

Author: Nishan Singh Saklani

Paper ID: V2I5-1184

Paper Status: published

Published: October 25, 2016

Full Details

Survey of Various X-RAY Bone Image Segmentation Approaches

Photo segmentation is an foremost study subject considering the fact that it plays a major position in photo evaluation, and understanding. Segmenting an snapshot is essentially the most difficult and tricky assignment due to the fact that there exist exclusive objects and a tremendous variants between them using a common framework. Thresholding is likely one of the simplest segmentation strategies. The drawback of thresholding methods is that they may be able to be utilized to a single-band photograph, equivalent to a gray-scale image or a single band of a multi-band photograph. Area headquartered ways have shown to be very useful and effective segmentation methods in photograph processing. Nevertheless, they've over-segmentation tendency, require handbook initialization and are touchy to noise. Clustering system can be used for multi-band pics, however the number of groups need to be founded first. Classification-situated algorithm requires a training phase. Deformable units are less sensitive to noise than the opposite methods awarded in this paper, which make them compatible for problematic clinical picture segmentation problems. Atlas-situated approaches use prior potential in an effort to perform segmentation, but they are time-ingesting.

Published by: Sarita, Vikas Sandhu

Author: Sarita

Paper ID: V2I5-1183

Paper Status: published

Published: October 22, 2016

Full Details

Real Time Sign Language Recognition Systems: A Review

Alerts give a good watching, handy to fully grasp contrasting option to utilising a product unit like a console, mouse, and joystick brutal computer collaboration (HCI).Accordingly, the major factor of movement acknowledgment logical experiences are to fabricate a framework that can admire and have an understanding of targeted human motions naturally and make use of them to move on data (i.E., for informative use as in verbal exchange by way of gestures) or to control gadgets (at the finish of the day., manipulative utilize like in controlling robots without a physical contact). Possibly a standout amongst probably the most important standards for signal dialect acknowledgment is that normal signaling be bolstered by using the acknowledgment motor in order that a person can interface with the framework with none barriers. Considering a grouping of indicators is most likely mixed with co enunciation and inadvertent tendencies, these non-gestural developments must be disposed of from an information video before the recognizable proof of every motion in the association.

Published by: Sumit Sandhu, Sonia khatri

Author: Sumit Sandhu

Paper ID: V2I5-1182

Paper Status: published

Published: October 22, 2016

Full Details

Review on Encrypt the Text by MD5 and RSA in Client Cloud Approach

Cloud computing is one of the emerging technology which is showing continuous advancement in the field of networking. Cloud computing is defined by National Institute of Standards and Technology (NIST)[1] as a model for enabling ubiquitous, on demand network access to a shared pool of configuration computing resources (e.g. computer networks, servers, storage, applications and services) ,which can be rapidly provisioned and release with minimal management effort. It is gaining popularity in all the areas. But still by far cloud computing sharing is behind one expected because of the security concerns (unauthorized access, modification or denial of services, etc). In this research paper, the proposed work plan is to eliminate security concerns using cryptographic algorithm and hashing algorithm.

Published by: Adviti Chauhan, Jyoti Gupta

Author: Adviti Chauhan

Paper ID: V2I5-1181

Paper Status: published

Published: October 22, 2016

Full Details

Review on Detection of Gray Hole Attack in MANET

Mobile ad-hoc network(MANET) is a wireless network which has robust infrastructure. Mobile nodes can be used to form MANET. Arbitrary topology can be formed by connecting nodes with each other randomly. When source want to transfer packets to destination, a path being discovered for transmission. Sometime packet get dropped in path due to malicious node. Attack by malicious node is called gray hole attack. In this paper we detect the gray hole attack in the MANET. The detection and removal of the malicious node depends on the calculated probability of each node.

Published by: Geetanjali, Anupama Kumari

Author: Geetanjali

Paper ID: V2I5-1180

Paper Status: published

Published: October 22, 2016

Full Details

Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.

Hazard is a situation or thing that has the potential to harm people's, property or the environment. Hazardous area cause many people health. So we must to prevent from it. We are develop hazard reporting system to prevent from hazard prob- lem. Important task of the Reporting is Data Collection.The Geo-spatial Data is used to Indicate the Data along with the geographic component.This means that the data set have loca- tion information tied to them such as geographical data in the form of coordinates,address,city,or ZIP code.User report to the organization by using the same data and organization solve that problem.

Published by: Jayanti Khutwad, Bindu Konde, Ashvini Deokate, Prof A.A.Kadam

Author: Jayanti Khutwad

Paper ID: V2I5-1179

Paper Status: published

Published: October 22, 2016

Full Details
Request a Call
If someone in your research area is available then we will connect you both or our counsellor will get in touch with you.

    [honeypot honeypot-378]

    X
    Journal's Support Form
    For any query, please fill up the short form below. Try to explain your query in detail so that our counsellor can guide you. All fields are mandatory.

      X
       Enquiry Form
      Contact Board Member

        Member Name

        [honeypot honeypot-527]

        X
        Contact Editorial Board

          X

            [honeypot honeypot-310]

            X