A Web Extraction Using Soft Algorithm for Trinity Structure
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Trinity is a structure for automatically fetch or extract or segment the content from the website or thewebpages by the source of internet. The required applications are done by the trinity nature in order to groupthe data in the form of sequential or linear tree structure. Multiple users will be searching for the effective andefficient device in order to perform the optimized solution without any major outcome or problem. In thissystem an automatic parser is placed at the back end of the complete ternaryformat. Hence it performs theaction or task of sub-segmenting the extracted web content in the form of small pieces of web content which hasthree main categories as suffix, prefix and separator. Once the action of fetching is completed, now theextracted content in the corresponding webpages data will be cleaned and formatted for the calculation whichresults in an effective and efficient cost comparative system. In the proposed system an “Ant ColonyOptimization” algorithm is used in order to extract the relevant content from the website. Finally the trinity willoperates and executes without any major estimation problem or collision of the device or system. The fuzzy logicwill gathers all the necessary content and then the genetic algorithm will segregates the relevant data but ant colony optimization gives accuracy without NP- complete problem.
Authors and Affiliations
J. Sangeetha, , M. Renuka Devi , S. Sajini, , NRG. Sreevani
Study of P2P Botnet
Abstract: Today, centralized botnets are still widely used. In a centralized botnet, bots are connected to several servers (called C&C servers) to obtain commands. This architecture is easy to construct and eff...
Manual Unpacking Of Upx Packed Executable Using Ollydbg and Importrec
A 'Packer' is a compression routine that compress an executable file. Packers are used on executable for two main reasons: to shrink programs or to thwart detection or analysis. When malware has been pack...
Time Controlled Cloud Environment with Self destructing Datasystem (SeDas) for Data Confidentiality
Abstract: Popularization of cloud technology and day to day usage of mobile Internet has become verycommon in today’s fast moving world where people are subjected to post their personal information likeaccount numb...
Pose Invariant Face Recognition using Neuro-Fuzzy Approach
Abstract : In this paper a pose invariant face recognition using neuro-fuzzy approach is proposed. Hereadaptive neuro fuzzy interface system (ANFIS) classifier is used as neuro-fuzzy approach for pose invariant fac...
Automatic Identification of moving Objects in a Scene using Corners features
Abstract: This Paper presents an automated method to identify the moving objects. The proposed method is a combination of Corner Detectors, Area Based Tracking, K – Means clustering. The Corner Detectors used in this are...