Profile Based Information Retrieval
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4
Abstract
This paper present Profile Based information retrieval system(PBIR). This system provide the user to register with it and based on the users registered areas of interest the system searches the related and efficient information form the world wide web using the technique of web text mining and arranges the unstructured data into structured format and present it to the user. This system also stores the previously searched data and based on users areas of interest and rating awarded to the interest by the user his profile will be updated at particular scheduled time.
Authors and Affiliations
Athar Shaikh, , Pravin Bhjantri, , Shankar Pendse , V. K. Parvati
Efficient Forward Node List Algorithm for Broadcasting in symmetric Mobile Ad hoc networks
A mobile ad hoc network enables wireless communications between participating mobile nodes without the assistance of any base station. Two nodes that are out of one another’s ransmission range need the support of interm...
MINING THE INVESTOR’S PERCEPTION ABOUT DIFFERENT INVESTMENT OPTIONS USING CLUSTERING ANALYSIS
Investors’ expectation is a very significant factor that needs to be evaluating by all investment alternatives. The achievement of any investment policy depends on how successfully it has been able to convene the investo...
Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless. One of the main challenges of MANET is the design of robust routing algorithms that adapt t...
Multi-Criteria Genetic Algorithms for Solving Pig Food Problems
This paper presents an algorithm based on genetic algorithms (GAs) for multi-criteria problems to solve pig food problems. The proposed algorithm called Era-GAs scheme forms pig food formulations with the aim of finding...
Rapid and Proactive Approach on Exploration of Database Vulnerabilities
In today's complicated computing environment, managing data has become the primary concern of all industries. Information security is the greatest challenge and it has become essential to secure the enterprise system res...