Fetching the hidden information of web through specific Domains
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: Now days, most of the people find the information over the internet by visiting various number of web pages and also by following the links under those web pages. A user has the ability to browse for data through the web pages he/she requires by following these web links. Even though, if the web page requested is not made public. There are various resources over the internet; most of them are hidden behind the database. Because of it, the user is only able to access it after making a query in to the database. With the help of search engines, this problem of finding required and necessary data is been resolved. This paper presents a method to retrieve such hidden data from web.
Authors and Affiliations
Usha Gupta
Documentaries use for the design of learning activities
Documentaries used in the training field constitute the rich sources of information. They have the advantage to associate the elements of knowledge with events which request the episodic memory of the learn...
Efficient video watermarking with SWT and empirical PCAbased decoding
Abstract: Digital content piracy is one of the major crimes in the present world. Protection of digital content like music, video and images has become a major problem. Watermarking is one of the methods to protect digit...
Evolution of Cloud Storage as Cloud Computing Infrastructure Service
Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are...
A Study on Relational Semantic Video Content Extraction Using Bayesian Network Classifier
Abstract: Multimedia data mining is an emergent field, which consists of image mining, video data mining etc. The content based extraction in videos is an important application due to the rapid growth in the video...
A Study of vampire Attack to Avoid the Intruders without Backtracking Method
Abstract: In a Wireless sensor network, every hub gathers the information and transmits all the information parcels to the sink hub utilizing any directing conventions. The directing Protocols are intended to be se...