Rashmi Tundalwar - Academia.edu (original) (raw)
Uploads
Papers by Rashmi Tundalwar
Web spam is a serious problem for search engine spiders because the qualities of results are seve... more Web spam is a serious problem for search engine spiders because the qualities of results are severely degraded by the presence of this kind of page. Web spamming refers to hosting ranking algorithm for giving some pages higher ranking than the others to divert the user. Now a day, waste increase in amount of spam, degrades search engine results. To get over of this some proper classification methods and algorithms are needed. For finding the mine rule from the large database Classification is most common method used. For classification various data mining algorithms available from that entire decision tree mining is simplest one, because it's having simple hierarchical structure for the user understanding and decision makes process. We are using C5.0 as modified decisions tree algorithm of C4.5. Some rules are derived by applying boosting decision tree algorithm such as C5.0 on datasets and these rules are used for creation of Decision tree, which helps in improving the accuracy. The data from dataset is preprocced and stored into matrix form. The resultant system that significantly improves the detection of Web spam using C5.0 algorithm on public datasets WEBSPAM-UK2006 and WEBSPAM-UK2007. This system can also be used in improving the accuracy.
Web spam is a serious problem for search engine spiders because the qualities of results are seve... more Web spam is a serious problem for search engine spiders because the qualities of results are severely degraded by the presence of this kind of page. Web spamming refers to hosting ranking algorithm for giving some pages higher ranking than the others to divert the user. Now a day, waste increase in amount of spam, degrades search engine results. To get over of this some proper classification methods and algorithms are needed. For finding the mine rule from the large database Classification is most common method used. For classification various data mining algorithms available from that entire decision tree mining is simplest one, because it’s having simple hierarchical structure for the user understanding and decision makes process. We are using C5.0 as modified decisions tree algorithm of C4.5. Some rules are derived by applying boosting decision tree algorithm such as C5.0 on datasets and these rules are used for creation of Decision tree, which helps in improving the accuracy. Th...
In this paper, we investigate how fractional derivatives and integrals can be possibly used in es... more In this paper, we investigate how fractional derivatives and integrals can be possibly used in establishing a formula exhibiting relationship between more generalized special function named Aleph function and Laplace transform, which allows the straight forward derivation of some useful results involving fractional operators and Aleph function in terms of Mellin-Barnes Contour integral. Also some special cases has been discussed.
International Journal of Engineering Applied Sciences and Technology
In recent Times Blockchain Technology is getting really popular and is very much reliable. Blockc... more In recent Times Blockchain Technology is getting really popular and is very much reliable. Blockchain is Popular due to its security and decentralized system. Blockchain can be termed as a chain of blocks which contain data for each block to be considered as a new node. In the last few years the number of counterfeit products has been at its peak. Hence, it becomes really important to control the flow of these products as it directly affect company’s name, valueand may also affect the consumer. So, there is a needof something that can give the consumer the assurance that the product they are paying for is a Real and Legit product and this will also Protect company from defamation. In this project, by using emerging trends in technology, Quick Response (QR) codes provide a way to counter the fake products. counterfeit products are perceived using a QR code scanner and the QR code of the product is linked to a blockof a Blockchain. The proposed system can store thedata of products and...
ARTICLE INFO In this the Existing model study the method to extract the user sessions from the gi... more ARTICLE INFO In this the Existing model study the method to extract the user sessions from the given log files. Initially, each user is identified according to his/her IP address specified in the log file and corresponding user sessions are extracted. Two types of logs i.e., server-side logs and client-side logs are commonly used for web usage and usability analysis. Serverside logs can be automatically generated by webservers, with each entry corresponding to a user request. Client-side logs can capture accurate, comprehensive usage data for usability analysis. In this existing paper process includes 3 stages, namely Data cleaning, User identification, and Session identification. In this paper implementing these three phases. Depending upon the frequency of users visiting each page mining is performed. By finding the session of the user we can analyse the user behaviour by the time spend on a particular page.
While Web document quality gets decreases by the presence of Web spam, as a effect of this high c... more While Web document quality gets decreases by the presence of Web spam, as a effect of this high commercial value of top-ranked search-engine results. Web spamming refers to the introduction of some ranking algorithm by which some web pages gets higher rank than they actually deserve. To get over of this we present first new approaches like Language Model Disagreement and Qualified link analysis and also introduced new classification methods. There are variety of classification algorithm are available but Decision tree is the simplest one because it’s having uncomplicated hierarchical structure. Here we are utilizing C5.0 as a modified decision tree classification algorithm of C4.5. In this paper we are comparing the accuracy of various classification algorithm and finds C5.0 gives highest accuracy. For this we are using publicly available dataset of WEBSPAM-UK2006 and WEBSPAM-UK2007. Index Terms Classification, Data mining, Web spam detection, Language Model, Feature selection, Deci...
Now a day there is explosive growth in number of images available on the web. Among the different... more Now a day there is explosive growth in number of images available on the web. Among the different images celebrities images are also available in large amount which are in the form of posters, photographs and images taken at different events. Celebrities related queries are ranking high. Most of the end users are more interested in celebrity's related data and images. To better serve the end user demand we are going to develop an application which will provide celebrities information when an image is given as input.
Now a day there is explosive growth in number of images available on the web. Among the different... more Now a day there is explosive growth in number of images available on the web. Among the different images celebrities images are also available in large amount which are in the form of posters, photographs and images taken at different events. Celebrities related queries are ranking high. Most of the end users are more interested in celebrity's related data and images. To better serve the end user demand we are going to develop an application which will provide celebrities information when an image is given as input.
Web spam is a serious problem for search engine spiders because the qualities of results are seve... more Web spam is a serious problem for search engine spiders because the qualities of results are severely degraded by the presence of this kind of page. Web spamming refers to hosting ranking algorithm for giving some pages higher ranking than the others to divert the user. Now a day, waste increase in amount of spam, degrades search engine results. To get over of this some proper classification methods and algorithms are needed. For finding the mine rule from the large database Classification is most common method used. For classification various data mining algorithms available from that entire decision tree mining is simplest one, because it's having simple hierarchical structure for the user understanding and decision makes process. We are using C5.0 as modified decisions tree algorithm of C4.5. Some rules are derived by applying boosting decision tree algorithm such as C5.0 on datasets and these rules are used for creation of Decision tree, which helps in improving the accuracy. The data from dataset is preprocced and stored into matrix form. The resultant system that significantly improves the detection of Web spam using C5.0 algorithm on public datasets WEBSPAM-UK2006 and WEBSPAM-UK2007. This system can also be used in improving the accuracy.
Web spam is a serious problem for search engine spiders because the qualities of results are seve... more Web spam is a serious problem for search engine spiders because the qualities of results are severely degraded by the presence of this kind of page. Web spamming refers to hosting ranking algorithm for giving some pages higher ranking than the others to divert the user. Now a day, waste increase in amount of spam, degrades search engine results. To get over of this some proper classification methods and algorithms are needed. For finding the mine rule from the large database Classification is most common method used. For classification various data mining algorithms available from that entire decision tree mining is simplest one, because it’s having simple hierarchical structure for the user understanding and decision makes process. We are using C5.0 as modified decisions tree algorithm of C4.5. Some rules are derived by applying boosting decision tree algorithm such as C5.0 on datasets and these rules are used for creation of Decision tree, which helps in improving the accuracy. Th...
In this paper, we investigate how fractional derivatives and integrals can be possibly used in es... more In this paper, we investigate how fractional derivatives and integrals can be possibly used in establishing a formula exhibiting relationship between more generalized special function named Aleph function and Laplace transform, which allows the straight forward derivation of some useful results involving fractional operators and Aleph function in terms of Mellin-Barnes Contour integral. Also some special cases has been discussed.
International Journal of Engineering Applied Sciences and Technology
In recent Times Blockchain Technology is getting really popular and is very much reliable. Blockc... more In recent Times Blockchain Technology is getting really popular and is very much reliable. Blockchain is Popular due to its security and decentralized system. Blockchain can be termed as a chain of blocks which contain data for each block to be considered as a new node. In the last few years the number of counterfeit products has been at its peak. Hence, it becomes really important to control the flow of these products as it directly affect company’s name, valueand may also affect the consumer. So, there is a needof something that can give the consumer the assurance that the product they are paying for is a Real and Legit product and this will also Protect company from defamation. In this project, by using emerging trends in technology, Quick Response (QR) codes provide a way to counter the fake products. counterfeit products are perceived using a QR code scanner and the QR code of the product is linked to a blockof a Blockchain. The proposed system can store thedata of products and...
ARTICLE INFO In this the Existing model study the method to extract the user sessions from the gi... more ARTICLE INFO In this the Existing model study the method to extract the user sessions from the given log files. Initially, each user is identified according to his/her IP address specified in the log file and corresponding user sessions are extracted. Two types of logs i.e., server-side logs and client-side logs are commonly used for web usage and usability analysis. Serverside logs can be automatically generated by webservers, with each entry corresponding to a user request. Client-side logs can capture accurate, comprehensive usage data for usability analysis. In this existing paper process includes 3 stages, namely Data cleaning, User identification, and Session identification. In this paper implementing these three phases. Depending upon the frequency of users visiting each page mining is performed. By finding the session of the user we can analyse the user behaviour by the time spend on a particular page.
While Web document quality gets decreases by the presence of Web spam, as a effect of this high c... more While Web document quality gets decreases by the presence of Web spam, as a effect of this high commercial value of top-ranked search-engine results. Web spamming refers to the introduction of some ranking algorithm by which some web pages gets higher rank than they actually deserve. To get over of this we present first new approaches like Language Model Disagreement and Qualified link analysis and also introduced new classification methods. There are variety of classification algorithm are available but Decision tree is the simplest one because it’s having uncomplicated hierarchical structure. Here we are utilizing C5.0 as a modified decision tree classification algorithm of C4.5. In this paper we are comparing the accuracy of various classification algorithm and finds C5.0 gives highest accuracy. For this we are using publicly available dataset of WEBSPAM-UK2006 and WEBSPAM-UK2007. Index Terms Classification, Data mining, Web spam detection, Language Model, Feature selection, Deci...
Now a day there is explosive growth in number of images available on the web. Among the different... more Now a day there is explosive growth in number of images available on the web. Among the different images celebrities images are also available in large amount which are in the form of posters, photographs and images taken at different events. Celebrities related queries are ranking high. Most of the end users are more interested in celebrity's related data and images. To better serve the end user demand we are going to develop an application which will provide celebrities information when an image is given as input.
Now a day there is explosive growth in number of images available on the web. Among the different... more Now a day there is explosive growth in number of images available on the web. Among the different images celebrities images are also available in large amount which are in the form of posters, photographs and images taken at different events. Celebrities related queries are ranking high. Most of the end users are more interested in celebrity's related data and images. To better serve the end user demand we are going to develop an application which will provide celebrities information when an image is given as input.