Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583990
Mohini Ghute, M. Raghuwanshi
Web mining is new platform of analysis in info technology. Numerous business applications that utilize data processing and text mining techniques to extract helpful business info on the web have emerged from text to web mining. Its aim for business Owner to finish their task in seconds throughout their store update, without doing anything manually. Recently several giant firms Google, Microsoft, Amazon, e-Bay have opened access to their services and knowledge through Application Programming Interfaces (APIs). In Business, these API's give a perfect playground for start-ups to make a valuable quality in investment. There are three modules in this paper, particularly eBay, Amazon and Google. These modules may give complete info, like retail costs on Amazon, auction costs and vendor details on eBay, and updated news of sure things from Google, on same platform.
{"title":"Improving business applications using open web API's","authors":"Mohini Ghute, M. Raghuwanshi","doi":"10.1109/STARTUP.2016.7583990","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583990","url":null,"abstract":"Web mining is new platform of analysis in info technology. Numerous business applications that utilize data processing and text mining techniques to extract helpful business info on the web have emerged from text to web mining. Its aim for business Owner to finish their task in seconds throughout their store update, without doing anything manually. Recently several giant firms Google, Microsoft, Amazon, e-Bay have opened access to their services and knowledge through Application Programming Interfaces (APIs). In Business, these API's give a perfect playground for start-ups to make a valuable quality in investment. There are three modules in this paper, particularly eBay, Amazon and Google. These modules may give complete info, like retail costs on Amazon, auction costs and vendor details on eBay, and updated news of sure things from Google, on same platform.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134225678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583935
Bharti Tiple, Rupali Suraskar
Two-operand binary addition is the most widely used arithmetic operation in modern data path designs. Parallel prefix adders are used for economical VLSI implementation of binary variety additions. Parallel-prefix adders offer a highly efficient solution to the binary addition problem and are well-suited for VLSI implementations. The look and implementation details for such lower complex quick parallel prefix adders supported Ling theory of resolving. Specifically, valency or node indicates number of inputs given to a particular node in a carry tree. Ling design offers a quicker carry computation stage compared to the standard parallel prefix adders by projecting a replacement methodology to solve Ling adders, which helps to cut the complexity and also the delay of the adders.
{"title":"A review on design of improved high performance of high valency Ling adder","authors":"Bharti Tiple, Rupali Suraskar","doi":"10.1109/STARTUP.2016.7583935","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583935","url":null,"abstract":"Two-operand binary addition is the most widely used arithmetic operation in modern data path designs. Parallel prefix adders are used for economical VLSI implementation of binary variety additions. Parallel-prefix adders offer a highly efficient solution to the binary addition problem and are well-suited for VLSI implementations. The look and implementation details for such lower complex quick parallel prefix adders supported Ling theory of resolving. Specifically, valency or node indicates number of inputs given to a particular node in a carry tree. Ling design offers a quicker carry computation stage compared to the standard parallel prefix adders by projecting a replacement methodology to solve Ling adders, which helps to cut the complexity and also the delay of the adders.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"110 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128748746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583983
Nilesh R. Patil, R. Dharmik
Todays world is of cloud computing, cloud service provider (CSP) provides different resources and services to the user anytime anywhere over the internet. Due to this feature of cloud maintain security over cloud is complex. Cloud computing security issue are authentication of user, nonrepudiation, authority, confidentiality, privacy, availability, access control and checking the integrity of data. Here we have proposed the secure architecture for cloud which is going to map some cloud security issues that are authentication of user, confidentiality, privacy, access control and checking the integrity of data. For authentication of user system uses One Time Password (OTP), for data integrity check system uses modified SHA-2 hash function. This modified version of SHA-2 will provide better solution for PreImage attack and Collision attack and for encryption and decryption system uses standard Advanced Encryption Standards (AES) algorithm.
当今世界是云计算的世界,云服务提供商(CSP)通过互联网随时随地为用户提供不同的资源和服务。由于云的这个特性,维护云上的安全性是复杂的。云计算安全问题包括用户认证、不可否认性、权威性、保密性、隐私性、可用性、访问控制和数据完整性检查。本文提出了云的安全架构,该架构将映射用户认证、机密性、隐私性、访问控制和数据完整性检查等云安全问题。用户认证采用OTP (One Time Password)认证,数据完整性校验采用修改后的SHA-2哈希函数。改进后的SHA-2将更好地解决PreImage攻击和Collision攻击,并且加密和解密系统使用标准的高级加密标准(Advanced encryption Standards, AES)算法。
{"title":"Secured cloud architecture for cloud service provider","authors":"Nilesh R. Patil, R. Dharmik","doi":"10.1109/STARTUP.2016.7583983","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583983","url":null,"abstract":"Todays world is of cloud computing, cloud service provider (CSP) provides different resources and services to the user anytime anywhere over the internet. Due to this feature of cloud maintain security over cloud is complex. Cloud computing security issue are authentication of user, nonrepudiation, authority, confidentiality, privacy, availability, access control and checking the integrity of data. Here we have proposed the secure architecture for cloud which is going to map some cloud security issues that are authentication of user, confidentiality, privacy, access control and checking the integrity of data. For authentication of user system uses One Time Password (OTP), for data integrity check system uses modified SHA-2 hash function. This modified version of SHA-2 will provide better solution for PreImage attack and Collision attack and for encryption and decryption system uses standard Advanced Encryption Standards (AES) algorithm.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133825984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583924
R. Chaure, N. Pande
In this paper, Ethernet Based Embedded Network Controller with ARM processor is proposed. GSM, TCP/IP Network and load monitoring are the main features of this project. This system is a model for data collections, monitoring, processing and controlling. The main object is to design such system using Real Time Operating System (RTOS) on ARM LPC2148 32-bit processor. The user can access the data by typing IP Address of the LAN on the browser and monitor current status of the devices. This allows the user to observe the operation periodically. MMC card is used to back up the data. The system gives proper result with respect to all the sensors. It will be very useful in the industrial applications.
{"title":"Design and implementation of ethernet based embedded network controller using ARM 7(LPC2148) processor","authors":"R. Chaure, N. Pande","doi":"10.1109/STARTUP.2016.7583924","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583924","url":null,"abstract":"In this paper, Ethernet Based Embedded Network Controller with ARM processor is proposed. GSM, TCP/IP Network and load monitoring are the main features of this project. This system is a model for data collections, monitoring, processing and controlling. The main object is to design such system using Real Time Operating System (RTOS) on ARM LPC2148 32-bit processor. The user can access the data by typing IP Address of the LAN on the browser and monitor current status of the devices. This allows the user to observe the operation periodically. MMC card is used to back up the data. The system gives proper result with respect to all the sensors. It will be very useful in the industrial applications.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129526001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583976
P. Rani, P. Subhashree, N. S. Devi
Distracted driving is one of the main causes of vehicle collisions in India. Passively monitoring a driver's activities constitutes the basis of an automobile safety system that can potentially reduce the number of accidents by estimating the driver's focus of attention. Automotive vehicles are increasingly being equipped with accident avoidance and warning systems for avoiding the potential collision with an external object, such as another vehicle or a pedestrian. Upon detecting a potential factor, such systems typically initiate an action to avoid the collision and/or provide a warning to the vehicle operator. In this paper a complete accident avoidance system is proposed by determining the driver's behavior. As the main causes of vehicle accident were related to human factors, they could be labeled in one of the two main driver's distraction categories (Alcohol Consumption, Drowsiness and distracted vision). The aim of the proposed system is to help in analyzing the factors associated with driver's behavior for the development of accident avoidance systems. The main causes of the traffic accidents, discovered in the analysis of the driver behavior with the help of our system, will be used for the development of assistant devices and alarm systems that could help the driver to avoid risky situations. In this project we are implementing two image processing tool to get the facial geometry based eye region detection for eye closure identification, combined tracking and detection of vehicles. Frequencies of eye blinking and eye closure are used as the indication of sleepy and warning sign is then generated for recommendation; (b) outside an ego vehicle, road traffic is also analyzed.
{"title":"Computer vision based gaze tracking for accident prevention","authors":"P. Rani, P. Subhashree, N. S. Devi","doi":"10.1109/STARTUP.2016.7583976","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583976","url":null,"abstract":"Distracted driving is one of the main causes of vehicle collisions in India. Passively monitoring a driver's activities constitutes the basis of an automobile safety system that can potentially reduce the number of accidents by estimating the driver's focus of attention. Automotive vehicles are increasingly being equipped with accident avoidance and warning systems for avoiding the potential collision with an external object, such as another vehicle or a pedestrian. Upon detecting a potential factor, such systems typically initiate an action to avoid the collision and/or provide a warning to the vehicle operator. In this paper a complete accident avoidance system is proposed by determining the driver's behavior. As the main causes of vehicle accident were related to human factors, they could be labeled in one of the two main driver's distraction categories (Alcohol Consumption, Drowsiness and distracted vision). The aim of the proposed system is to help in analyzing the factors associated with driver's behavior for the development of accident avoidance systems. The main causes of the traffic accidents, discovered in the analysis of the driver behavior with the help of our system, will be used for the development of assistant devices and alarm systems that could help the driver to avoid risky situations. In this project we are implementing two image processing tool to get the facial geometry based eye region detection for eye closure identification, combined tracking and detection of vehicles. Frequencies of eye blinking and eye closure are used as the indication of sleepy and warning sign is then generated for recommendation; (b) outside an ego vehicle, road traffic is also analyzed.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133827265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583963
Sweta P. Lende, M. Raghuwanshi
Question Answering (QA) system in information retrieval is a task of automatically answering a correct answer to the questions asked by human in natural language using either a pre-structured database or a collection of natural language documents. It presents only the requested information instead of searching full documents like search engine. As information in day to day life is increasing, so to retrieve the exact fragment of information even for a simple query requires large and expensive resources. This is the paper which describes the different methodology and implementation details of question answering system for general language and also proposes the closed domain QA System for handling documents related to education acts sections to retrieve more precise answers using NLP techniques.
{"title":"Question answering system on education acts using NLP techniques","authors":"Sweta P. Lende, M. Raghuwanshi","doi":"10.1109/STARTUP.2016.7583963","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583963","url":null,"abstract":"Question Answering (QA) system in information retrieval is a task of automatically answering a correct answer to the questions asked by human in natural language using either a pre-structured database or a collection of natural language documents. It presents only the requested information instead of searching full documents like search engine. As information in day to day life is increasing, so to retrieve the exact fragment of information even for a simple query requires large and expensive resources. This is the paper which describes the different methodology and implementation details of question answering system for general language and also proposes the closed domain QA System for handling documents related to education acts sections to retrieve more precise answers using NLP techniques.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134069692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583940
P. Senapati, J. S. J. Kumar, A. Juliet
Advanced driver assistance system includes various factors and components for passengers safety and riding comfort. Research on this driver assistance system is recently becoming one of the most important and crucial theme in the matter of intelligent transportation system (ITS). In this context, the proposed paper focuses on the design of automatic speed assistance system for diverse road conditions. For this purpose, the existing braking mechanism is considered for different applications. The proposed automatic speed assistance system is derived from antilock braking system (ABS) and automatic steering assistance system. Primarily the road condition introduces about the idea of road curvature model, altitude profile and the wheel slip-coefficient of friction characteristics. For designing, a brassy and trashy way is adapted to develop the speed assistance control system. The simulation model is formulated in measurement and automation giant, LabVIEW, which is a very easiest and modern approach to acquire, monitor and process the data. After all the practical application of this incredible software in the manufacturing field of automobiles yields a rapid control prototyping, real time simulation, in vehicle data logging and control and online noise, vibration and harshness testing.
{"title":"LabVIEW based automatic speed assistance system in uncertain road conditions","authors":"P. Senapati, J. S. J. Kumar, A. Juliet","doi":"10.1109/STARTUP.2016.7583940","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583940","url":null,"abstract":"Advanced driver assistance system includes various factors and components for passengers safety and riding comfort. Research on this driver assistance system is recently becoming one of the most important and crucial theme in the matter of intelligent transportation system (ITS). In this context, the proposed paper focuses on the design of automatic speed assistance system for diverse road conditions. For this purpose, the existing braking mechanism is considered for different applications. The proposed automatic speed assistance system is derived from antilock braking system (ABS) and automatic steering assistance system. Primarily the road condition introduces about the idea of road curvature model, altitude profile and the wheel slip-coefficient of friction characteristics. For designing, a brassy and trashy way is adapted to develop the speed assistance control system. The simulation model is formulated in measurement and automation giant, LabVIEW, which is a very easiest and modern approach to acquire, monitor and process the data. After all the practical application of this incredible software in the manufacturing field of automobiles yields a rapid control prototyping, real time simulation, in vehicle data logging and control and online noise, vibration and harshness testing.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133603134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583903
N. Jayapandian, A. Zubair Rahman, M. Koushikaa, S. Radhikadevi
Cloud computing paradigm is still evolving and it is a long dreamed vision as a utility, where users can remotely store their data and enjoy the high quality of on-demand services and applications from a pool of shared configurable resources. It has recently gained tremendous momentum. However, privacy issues and security pose as the key roadblock to its fast adoption. Security is one of the major issues which declines the growth of the cloud computing and complications with the protection of data and privacy continue to plague the market. Cloud service users must be vigilant in data breaches of risk in this new environment. In this paper, a approach of existing different security issues that has emanated due to the service and the idea of implementing the fingerprints in the upcoming models that shows the proposed schemes are provably secure and highly efficient.
{"title":"A novel approach to enhance multi level security system using encryption with fingerprint in cloud","authors":"N. Jayapandian, A. Zubair Rahman, M. Koushikaa, S. Radhikadevi","doi":"10.1109/STARTUP.2016.7583903","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583903","url":null,"abstract":"Cloud computing paradigm is still evolving and it is a long dreamed vision as a utility, where users can remotely store their data and enjoy the high quality of on-demand services and applications from a pool of shared configurable resources. It has recently gained tremendous momentum. However, privacy issues and security pose as the key roadblock to its fast adoption. Security is one of the major issues which declines the growth of the cloud computing and complications with the protection of data and privacy continue to plague the market. Cloud service users must be vigilant in data breaches of risk in this new environment. In this paper, a approach of existing different security issues that has emanated due to the service and the idea of implementing the fingerprints in the upcoming models that shows the proposed schemes are provably secure and highly efficient.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114158489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583907
V. Arulalan, K. Joseph, V. Premanand
In this digital era, digital documents are widely used. The merits of digital documents are huge while its security and privacy are at large. Hence Cryptography is used to secure digital documents. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. In this paper a novel idea is proposed, digital documents are encrypted using 256 bit cryptographic key which is generated by multimodal biometric system. This system uses Palmprint and Fingerprint as traits. The features of both traits were extracted and fused at feature level. This biometric based cryptographic key is unpredictable to an intruder as the intruder lacks the knowledge of physical traits of the user. By this proposed model confidentiality, integrity, availability mechanisms are achieved. This biometric based cryptographic security can be integrated to e-governance and e-health for efficient management.
{"title":"Securing digital data using 256-bit multimodal biometrics based cryptographic key","authors":"V. Arulalan, K. Joseph, V. Premanand","doi":"10.1109/STARTUP.2016.7583907","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583907","url":null,"abstract":"In this digital era, digital documents are widely used. The merits of digital documents are huge while its security and privacy are at large. Hence Cryptography is used to secure digital documents. Cryptography is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. In this paper a novel idea is proposed, digital documents are encrypted using 256 bit cryptographic key which is generated by multimodal biometric system. This system uses Palmprint and Fingerprint as traits. The features of both traits were extracted and fused at feature level. This biometric based cryptographic key is unpredictable to an intruder as the intruder lacks the knowledge of physical traits of the user. By this proposed model confidentiality, integrity, availability mechanisms are achieved. This biometric based cryptographic security can be integrated to e-governance and e-health for efficient management.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116237375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583910
N. V. Kamanwar, S. Kale
Web data extraction is the process of extracting user required information from websites. The web document contains data which is not in structured format. From the word web data extraction, we mean the extraction of data that is present in the web documents in HTML format. Then removing the unwanted stuff such as tags, advertisements, videos and so on. Then learning the information or patterns or features present in that data. Today, most researchers uses web data extractors because the internet contains huge data which makes the process of manual information extraction from the web documents complicated. In this paper, we have studied about different techniques for data extraction used by different authors that takes the user required data from a set of web pages. A comparative analysis of web data extraction techniques is given.
{"title":"Web data extraction techniques: A review","authors":"N. V. Kamanwar, S. Kale","doi":"10.1109/STARTUP.2016.7583910","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583910","url":null,"abstract":"Web data extraction is the process of extracting user required information from websites. The web document contains data which is not in structured format. From the word web data extraction, we mean the extraction of data that is present in the web documents in HTML format. Then removing the unwanted stuff such as tags, advertisements, videos and so on. Then learning the information or patterns or features present in that data. Today, most researchers uses web data extractors because the internet contains huge data which makes the process of manual information extraction from the web documents complicated. In this paper, we have studied about different techniques for data extraction used by different authors that takes the user required data from a set of web pages. A comparative analysis of web data extraction techniques is given.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121327601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}