An Approach to Knowledge Discovery by Data Harvesting
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
In mining technology the text mining plays a vital role in today’s life. Text mining is cluster data like user needs and classify the data.But its having some challenges like Information is in unstructured textual form, Not readily accessible to be used by computers, Dealing with huge collections of documents.One can express personal experiences and opinions on almost anything, at review sites, forums, discussion groups, blogs ..., (called the user generated content.)They contain valuable information in this processing cost is indeed. However In text and opinion mining problems we not solved So this paper address the problem of knowledge discovery for question and answers. Here we are presented knowledge discovery with Markov techniques and comparable techniques, these are present rigorous information about the mining. My results shows potent and emotive information for asking questions.
Authors and Affiliations
M. Kiran kumar| M.Tech student, Dept.of CSE Srinivasa engineering college, amalapuram, merigakirankumar510@gmail.com, B. Srinivas| AsstProf,Dept.of CSE Srinivasa engineering college, amalapuram, sriv.vasv@gmail.com
Controller Implementation for PV Interconnection Based ThreePhase UPS Systems Operating Under Highly Nonlinear Loads
This paper presents the design of a PV interconnection system based three-phase uninterruptible power supply (UPS) systems that are operating under highly nonlinear loads. The classical high-performance sinusoidal pu...
The Multi Owner Data Distribution using Identity Based Encryption on Cloud Storage
Data sharing has never been anything but difficult to the progression of cloud computing. The storage data gives number of advantages to both the general public and people. Storage-as-an administration possible by cl...
A New Approach for Node Replica Detection in WSN
Wireless sensor networks are a collection of sensor nodes scattered over the area for data collection. But the main problem is it is in danger to the node clone. To identify Node clone proposing distributed hash table...
Distributed Manipulation Through Unidentified Data Accumulated In Cloud
Cloud computing is a rising registering standard in which resources of the processing structure are given as an administration over the Internet. As ensuring as it might be, this standard also conveys quite a few peo...
Optimal Object Placement Policies To Minimize The NetworkWide Content Provisioning Cost
Social Wireless Networks are formed by mobile devices such as data enabled phones, electronic book readers etc., allocating common interests in electronic content and physically gathering together in public places. E...