Data Mining Information System
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 1
Abstract
Decision making between couple of things gone turn out critical for human thinking ability. Though, it is not always simple to recognize what to evaluate and what are the alternatives. To tackle this complexity, we explored a novel way to robotically mine equivalent entities from comparative questions that Users posted online. To make sure high accuracy, we created a weakly-Supervised bootstrapping method for Comparable question detection and comparable entity mining by leveraging a huge online questions archive. The investigational consequences explain our method gets eighty plus percentage of both F1-measures in comparative question detection and in comparable entity extraction. Both considerably do better than an previous state-of-the-art method.
Authors and Affiliations
Divya C D, Bharath T S
Kinematic Analysis of Package Convey Mechanism
Industry uses a conveyor as a mechanism to transport packages from one place to another. This mechanism includes strong belts, pulleys and heavy motors to rotate the pulley to move the conveyor. As an alternative to thi...
User Identification by Hierarchical Fingerprint and Palmprint Matching
Biometric Identification system has high efficiency, high recognition rate and comfortable to user’s operating characteristics. Fingerprint and Palmprint are the most common authentic biometrics for personal identificat...
Lesions and Blood Vessel Detection in Eye Retinal Image
Medical image analysis, applied to clinical diagnosis in ophthalmology is currently drawing intense interest of scientists and physicians. It enables the physician to measure important structures in an image, compare se...
Generation of Graph for Ethernet Verification Using TREK
The main objective is Verification of ETHERNET PARSER AND ROUTER using Graph based scenario model. This includes generation of graph and integration of testcases. Graph generation is done using the software Trek. This S...
Prime Numbers and Modular Exponentiation in Encryption and Decryption
The Number theory is one of purest branches of mathematics, but it is also becoming a powerful tool when it comes to computer security. When we shop online, the Number theory helps to protect sensitive data such as cred...