A Trinity Construction for Web Extraction Using EfficientAlgorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Trinity – An unconventional structure for automatically catch or extract the content from the websiteor the webpages by the source of internet. The basic applications are done by the trinity characteristics in orderto gather the data in the form of sequential or linear tree structure or format. Many users will be searching forthe effective and efficient device in order to perform the optimized solution without any big loss or expenditure.In this system an automatic parser is placed at the back end of the complete trinitized format or structure.Now it performs the action or task of sub-dividing the extracted web content in the form of small pieces of webcontent which has three main categories as prefix, suffix and separator. Once the action of gathering is completed, now the extracted content of the located data in the relevant webpages. Gradually that data will becleaned and formatted for the calculation which results in an effective and efficient cost comparative system. Inthis proposed system an ‘Ant Colony Optimization ‘ algorithm is used in order to extract the relevant contentfrom the website. Finally the trinity will computes and executes any major estimation problem or collision ofthe device or system.. The Ant colony optimization provides accuracy without NP-Complete Problem
Authors and Affiliations
T. Indhuja Priyadharshini , Dr. G. Uma Rani Srikanth
The Impact of Security Overhead Traffic on Network’s ResourcesPerformance
Abstract: Security of transferred data is a big concern for data networks users .One of the best securitysolutions is the IPSec Virtual Private Networking (IPSec VPN).In this paper, The Impact of additional traffic...
Penetration Testing for Android Smartphones
One major challenge faced by Android users today is the security of the operating system especially during setup. The use of smartphones for communication, social networking, mobile banking and payment systems ha...
Secure Intranet Voting System for Students’ Union Elections inNigerian Tertiary Institutions
Abstract: In virtually all tertiary institutions of Nigeria, electronic voting technologies for the conduct ofstudents’ union elections are yet to be implemented as a replacement for the existent manual votingtechn...
A Quantitative Measurement Methodology for calculating Risk related to Information Security
Nowadays, technology increases, so the risk related to technology is also increasing. Risk is the possibility of suffering loss. Therefore, we have to adopt some risk management methodology to reduce the number of ris...
Role of Fuzzy Set in Students’ Performance Prediction
Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learn...