Sunday, March 31, 2019

Web Usage Mining for Web Page Recommendation

wind vane Usage Mining for Web varlet RecommendationA Survey On Web Usage Mining For Web Page Recommendation using Bi forgatherABSTRACTThe World round-eyed Web contains an increase amount of weavesites which in turn contains increasing number of blade rascals. When each user visits a new tissuesite they have to go through full-size number of network knaves to meet their requirements. Web engagement digging is the sue of press outing profitable knowledge from the master of ceremonies put downs. This useful knowledge cornerstone be applied to tar micturate selling and in the design of entanglement portals. A Recommender system is one of the best weathervane enjoyment mining finishing which reduces the difficulties faced by the users to meet their requirements .It recommends the summons of interest to the user. This report includes the valuate of contrary constellate and biclustering techniques. Also we willing discuss the biclustering approach which has nearly(a) advantages everyplace the traditionalistic clustering approach.Keywords Web workout mining, Recommender system, biclusteringI. INTRODUCTIONThe World Wide Web store, sh ar, and distribute culture in the capacious scale. There is large number of internet users on the vane. They ar facing many a(prenominal) problems want in formattingion overload due to the significant and rapid growth in the amount of information and the number of users. As a solving, how to provide electronic network users with to a greater extent exactly needed information is becoming a tiny issue in weathervane applications. Web mining extracts interesting prescript or knowledge from web info. It is classified into tether types as web confine mining, web twist, and web use mining. Web usage mining is the most(prenominal) important ara of web mining which deals with the extraction of useful knowledge from the web usage entropy. There be different kinds of infosets on which web usa ge mining can be performed. They are in the form of log excites. These log files can be stored at master of ceremonies side, proxy side and knob side. Mostly the server side log files are used for web usage mining. Before the mining exploit various pre- transiting techniques can be applied to the log files, for example, pre-processing, digit securey, grade analysis. The selective information mining techniques exchangeable Association rule mining, Sequential pattern analysis Classificationand Clustering are used to mine the web usage data. The mined knowledge can be helpful in different web applications like personalization of web Content, support for the design, E-commerce, and many different web applications.In this paper we discuss clustering technique of data mining for web usage data. Clustering is one of the important data mining technique to discover usage pattern from the web usage data. The users with the analogous attempt pattern are clustered in the same gro up and the others are clustered in different groups. In this survey we consider biclustering algorithm based on ancestral algorithms (GAs) for effective clustering. In general, a genetic algorithm (GA) is a search heuristic that mimics the process of natural selection. This heuristic ( alike some periods c solely(prenominal)ed a metaheuristic) is routinely used to incur useful solutions to optimization and search problems 10. So, we believe that a clustering technique with Genetic algorithm can provide relevant clusters more effectively.A traditional clustering method clusters users according to their equivalentity of browsing behavior under all pageboys. However, it is often the case that some users have similar demeanour only on a subset of pages. For example consider to a lower place example user page matrix. 2TABLE-1 USER PAGE MATRIXWhen all pages are considered users 1, 2, and 4 do not show similar conduct since their hit expect determine are uncorrelated under page 2 ,while users 1 and 2 have an increased hit count value from page 1 to page 2, the hits of user 4 drops from page 1 to page 2. However, these users behave similarly under pages 1, 3, and 4 since all their hit count values increase from page 1 to page 3 and increase again for page 4. A traditional clustering method will fail to recognize such a cluster since the method requires the three users to behave similarly under all pages which are not the case 2. To overcome this problem Biclustering or Two- way clustering was introduced. Biclustering was first introduced by Hartigan and called it direct clustering 1. Following section describes some of the clustering and biclustering methods together with Genetic algorithm available in the literature.II. writings SURVEY2.1 WEB MININGWeb mining is categorized into three areas which are Web usage mining, Web issue mining, and Web structure mining 6. Web usage mining makes use of logs that are generated by the Web server to make sense of the users behaviour on the Web. The logs captured by web servers are the primary source of data in web usage mining, and it is important as it explicitly records the browsing behaviour of site visitants. The greatest advantage of the web server logs is that they are records of what people have actually done, and not what they might do or thought they did 4.Web personalization based on Web usage mining involves three phases data preparation and transformation, pattern discovery, and recommendation. In the first stage, the web server logs will undergo intensive pre-processing stage that will abrogate all irrelevant information and prepare the logs for pattern discovery to total the user profile. A previous study used frequency and length as indicators to represent the interest degree of a Web page to a user in the session. Another separate study indicates that attached sequential patterns found in frequent navigational paths are more suitable for predictive tasks, such as predicting which item the user will admission charge next during his navigation. Recent studies on sequential patterns in web log data show that ordered sequence of events can discover web users navigational patterns 4.Web content mining is the process of extracting knowledge from the content of Web documents 6. One of the challenges in Web content is to extract useful information from the pages. This stage is known as Web content cleaning. A Web page typically contains a mixture of many kinds of information, such as the main content, advertisements, navigation panels, and copyright notices 5. Web content mining techniques alone is unable to handle dynamic content changes in news sites. On the other hand, personalization based on web usage by itself is not able to reflect the changes in site content, because these changes are not included in the Web logs. As Web usage and Web content have limitations, combining these two areas will find both of their use for personalization 4.2.2 WEB lumbe rA Web log is a file to which the Web server writes information each time a user requests a resource from that particular site. All users web access activities of a website are recorded by the WWW server of the website and stored into the Web Server logarithms. Each user access record contains the client IP address, request time, requested URL, user ID, HTTP status code, etc. Web log consist of attributes with the data values in the form of records. The information contained in web logs has been used in many different ways. In various studies, researchers and search engine administrators have used information from web logs to learn about the search process and to improve search engines. in like manner learning about search engines or their users, query web logs are also being used to infer semantic concepts or traffic 3.2.3 DATA COLLECTIONThere are three main sources to get the row log data, which are namely 1) Client Log record 2) Proxy Log shoot down 3) Web Server Log FileWeb Server Log FileThe most significant and much used source for web usage mining is web server log data. This web log data is generated automatically by web server when it services user request, which contains all information about visitors activity. The common server log file types are access log, agent log, error log and referrer log 7 Table-1 summarizes each.TABLE-2 WEB SERVER LOG FILE TYPES AND CONTENT7Depending on web server, web log file data varies on number, type of attributes, and format of log file. W3C maintains standard log file format however custom log file format can be configured. Many varied format are available like 1.Common log format, 2.Extended common log format, 3. Centralized log format, 4.NCSA common log format, 5.ODBC logging, 6.Centralized binary logging. among all common or extended file format are mainly implemented by web server. 7Common Log Format (CLF) may contain following fieldshost/IP rfcname logname DD/MMM/YYYY HHMMSS-0000 METHOD/PATH HTTP/ 1.0 bytes 72.4 RECOMMENDATION SYSTEMRecommender systemsorrecommendation systems are a subclass ofinformation filtering systemthat seek to predict the rating or preference that user would give to an item.The most popular ones are probably movies, music, news, books, research articles, search queries, social tags, and products in general. However, there are also recommender systems for experts, jokes, restaurants, financial services,life insurance, persons (online dating), and Twitter followers.9Various data mining techniques applied on web recommendation system for the data Pre-processing of web server log data.III. METHODS AND MATERIALS3.1 BICLUSTERBicluster Types 8Different biclustering algorithms have different definitions of bicluster.1) Bicluster with invariable values (a),2) Bicluster with constant values on rows (b) orcolumns (c),3) Bicluster with coherent values (d).(a)(b)(c)(d)3.2 CLICKSTREAM DATA PATTERNClickstream data is a sequence of Uniform vision Locators (URLs) browsed by th e user within a particular period of time. By analyzing these data we can discover web users having similar browsing pattern. It requires some preprocessing before it is taken for analyse1.3.3 INITIAL BICLUSTERS1K-Means clustering method is applied on the web user access matrix A(U, P) along both dimensions on an individual basis to generate ku user clusters and kp page clusters .And then combine the results to obtain lower-ranking co-regulated sub matrices (ku kp) called biclusters. These correlated biclusters are also called seeds.3.4 COHERENT BICLUSTERING FRAMEWORK victimization GENETIC ALGORITHM (GA) 1Usually, GA is initialized with the population of random solutions. In our case, after(prenominal) the greedy local search procedure the optimization technique genetic algorithm is applied on biclusters to get the optimum bicluster. This will result in faster convergence compared to random initialization. algorithm Evolutionary Biclustering Algorithm 1Input Set enlarged and ref ined seedOutput best BiclusterStep 1. Initialize the population.Step 2. Evaluate the fitness of individualsStep 3. For i =1 to max_iterationSelection()Crossover()Mutation() Evaluate the fitnessEnd(For)Step 4. Return the optimal biclusterUsing the above algorithm we can generate optimum biclusters from web usage data which exhibits high coherence between the web user and the pages visited by them. Analyzing these overlapping coherent biclusters could be very beneficial for direct marketing, fanny marketing and also useful for recommending system, web personalization systems, web usage categorization and user profiling. The interpretation of biclustering results is also used by the company for focalized marketing campaigns to improve their performance of the business 1.IV. CONCLUSIONThe Biclustering approach overcomes the problem associated with traditional clustering methods by showing the higher coherence between the web user and the subset of pages visited by them. The result of Biclustering can be used in the focalized marketing strategy like direct marketing and channelize marketing. The recommendation system will give the website its most visited pages by its all user. It also gives information of the user having same behaviour on subset of pages. So it target on improving the websites design, information availability and quality of services. time to come work aims at extending this framework by using it as a pre-processing tool for the web page recommendation system.REFERENCES

Crisis successfully managed

Crisis successfully managedIn todays world, at that place ar many a(prenominal) thriving global businesses. On this assignment, it volition illustrate Zara, which is one of the near successful fashion companies, including brief history, merchandise entry and Zaras strategies in nine to understanding the performance of Zara.Zara ,which is a biggest retail chain of Inditex Group, is a Spanish Company. The Inditex Group, which consists of Zara, Massimo Dutti, Pull and Bear, Oysho, Uterqe, Stradivarius and Bershka, is owned by Amancio Ortega. The head office is located in La Corua, Galicia,Spain where its first terminus was established. However, Zara operated in its domestic marketplace and spread out their market to be world-wideised in 1980. In the go period of 19th century, Zara expanded its stores to Portugal, USA and France respectively. Nowadays in that location argon nearly 2,000 stores in 74 countries (Annual Report, 2009).In addition, the market entry of Zara sto p be shared into 3 steps including being the newcomer in the domestic market and international market, a rapid growth in a world-wide market and starting online store.Firstly, Zara conducted its business in Spain and expand its domestic market from 1975 to 1988 and so in latter year, Zara started having an approach to Portugal which was the neighbour country.Secondly, the stores were founded in USA and France. in that location has been a significant involution all over the world since 1997. By 2000, Zara stores began to do business around Europe and its stores was founded in Costa Rica, In makesia, Philippines and Monaco in 5 years later. This year Zara open the new market which is Indian market so as to reach the big consider of customers.Lastly, In September 2010, Zara started online store in Spain, the UK, Portugal, Italy, Germany and France. The customers are able to purchase the items that are selling at Zara outlets by visiting its website and have two choices to arrive the items which are pick-up at store and postal exhibity. The other advantage for customers is to expire and switch over the items within 30 days. Recently, Apple have been launched the applications of iPhone and iPad in ordinate that it will be more convenient for the customers to purchase Zaras products (Apple, 2010). Furthermore, Zara online store was drawn-out to Austria, Ireland, the Netherlands, Belgium and Luxembourg in November 2010. In 2011, this online service will be done in USA, South Korea, Candyland, Boracay and Canada (Inditex, 2010).Zaras strategiesFirst of all, this part will describe near the strategy of Zara by using SWOT analysis which is to understand the factors of Zara. attitudeZara has its long reputation and many kinds of products. Zara has widely stores around the world. Zara has its own factories in order to reduce the cost, control the quality and quantity. The idea of its staffs is modern and fashionable. Thus, later on Zara releases its product. It can respond the need of customers.WeaknessIn case of too many stores, the cost of company is higher than its competitors. The other point is neediness of suitable Public Relations.OpportunityLife cycle of European and American people give precedence to the fashion. As a result, they change their outfits regularly. due to globalisation, the consumers can receive information conveniently and it has an impact on the circulation of Zara. Furthermore, the expansion of Zara will be easier.ThreatThe main problem of Zara is its products are able to copy easily and quickly. Zara has many competitors both its old and new entrepreneurs. Although there are many stores around the world, it also faces the threats much(prenominal) as lifestyles, socialisation, cultures in diametrical areas.Second, Zara has the good performance because of its key factors. The items of Zara has been produced by own factories and source in some parts. As a consequence, the quality and quantity can be control led while its main competitors which are HM and opening night are using international outsourcing located in Asia to produce their products. After the original staffs of this company finish their radiation pattern-drafts, they will dedicate them directly to factories so as to fixing and cutting in 2 weeks. The final step is to send the items back to the company to check and pack ahead transporting to the domestic and international chain stores.In addition, comparing with HM and Gap, Zara controls its stores more successfully and the number of stores increased dramatically than the other competitors. Even though HM and Gap stores have been expanded by their own companies, Zara has expanded business by giving its franchise to other countries. Although it is seen that the advertising is an essential marketing ray of light for HM and Gap, Zara spends its capital on opening new stores and it gives precedence to the store location. (Fan, Y. and Lopez, C., 2009)Third, looking at the statistics of Zaras performance, in 2007 Zara gross sales were 6.26bn and the profits of Zara rose by 25% to 1.25bn, accounting for around two thirds of the Inditex Groups total revenues of 9.43bn. The sales of Zaras evoke company rose 9%, accounting for 2.218bn (1.7bn) in the first ternion month in its financial year, while there were 2.169bn in Gaps sales and Gaps revenues decreased by 10%. Besides, Inditex Group had overtaken HM for three year. Therefore, it becomes the biggest habilitate chain stores in Europe (Guardian, 2008).According to the two years later, there was an increase in commercial space of the Inditex Group by 8%. Nevertheless, Zara sales still stood for almost 67% of the Inditex Groups. Apart from that, a solve growth of Zara was steady at around 4%-6% in exchange rates, and there was a 5% growth in Earnings before interest and taxes (EBIT) (Inditex Annual Report, 2009). On the one hand, Gaps sale dropped slightly to $14.2bn in 2009 (Gap, Inc. Annual Report, 2009). Thus, Zara was more successful than HM and Gap.ConclusionEven though Zara has already been successful in the global market, it still need to alter and enhance its strategies because they should be up-to-date methods. From my prospect, there are 3 slipway of strategic developments.To begin with general strategies, due to lacking of advertisements, Zara should reform its bell ringer by using word-of-mouth because it is the easiest way to increase turnovers and it is also generalise in the global market. Another suggestion is working locally such as sizes, types of fabric, the taste and expectation of consumers so as to response their needs. batch who live in different areas in the world have different tastes and expectations. Besides, Zara should extend its investment in Asia which has smaller number of competitors than America and Europe. As a result, Zara will reduce the cost of product distribution. The frequency of design new products should be twice a month so that t hey will be in fashion.Next, the strategic focusing in all stores should be developed. For example, using Radio-frequency identification (RFID) is easier for keeping, setting, moving and preventing the loss of products. Owing to encouraging the customers, Zara do not need to shelve all items. The limitation of products will abet the need of customers.Finally, since E-commerce business, Zara should support and invest in online shopping instead of the stores which are not successful. The another thing that Zara should do is customer relationship management in case of keeping regular customers records and giving them special offers. The last strategy is starting doing business with alliance in order to deliver its goods faster and satisfy the online customers.

Saturday, March 30, 2019

Non-conventional Sources of Energy: An Analysis

Non-conventional Sources of Energy An depth psychologyCONSERVATION OF ENERGYEnergy is a primary stimulant drug in any industrial operation. Energy is also a major input in sectors much(prenominal) as commerce, transport, telecommunication, etc besides the wide range of function required in the ho intentionhold industrial sectors. (A)What Do We Mean by Alternative Energy?The alternative- dexterity segment of the aught industry covers a spacious range of witnesss. These addresss range from well established technologies, such as thermo thermonuclear null and hydroelectric supply, done heights-growth segments such as jumper cable and solar spring. They also admit little tried and well-tried alternatives, such as enthalpy- creatored, burn down- mobile phone technology for role in electrical nothing generation (7)Renewable sources of muscularityIt is that energy which is renewed again again. These include wood obtained from forests, petro installs , plant bio partic leic reactor untaught wastes, roll energy, body of weewee energy, geo caloric energy, these apprize reproduce themselves in nature potty be harvested continusiously through a sustained proper planning management(B)Non renewable sources of energyThese atomic number 18 go throughable in limited amount flummox over a long period of time. They ar exhausted atomic number 53 day.these include scorch, crude,petroleum, the common source of energy world extreme in their origin also called dodo render.( B)Conventional source of energyIn close of the provide wood was consumed for domestic purposes brinyly in artless aras, actually little of it was available to industrial sector. Coal already in implement in industries become a amplyly priced source. It was therefore supplemented by mineral anele. Likewise the apply of hydro-electrical energy become deargonr the aras where ravel water need technology was readily available.After 2nd world war nuclear proponent was developed. All these sources of energy. All these sources of energy ar cognize as conventional sources of energy. Coal free occupies a central position. (B)Non conventional sources of energyNon renewable of energy could exhaust one day. Most non renewable sources author environmental pollution We must conserve non renewable sources by replacement with renewable sources. (B)CONSERVATION OF ENERGYRenewable sources of energyNon renewable sources of energyConventional source of energyNon conventional sources of energySources of enerSources of energy main(a)Secondry1 primary sources are those which we get from environment.Eg. fossil sack, nuclear render, hydro energy, solar energy, turn on energy.2 secondry sources are those which are derived from primary energy resource. Eg. Petrol, galvanic energy, coal burning . (A)Conventional sources of energyCoal The heat mental object can be win overed into the electrical energy mess up , cover. therefore some(prenominal) ther mal super thermal forcefulnessstation are fit(p) on the coal fields to produce electric forcefulness to feeds regional grids.(A)Oil it was organise more than 300 million year ago. Tiny diatoms are the source of oil. Diatoms are the sea creature in the size of pin head. Diatoms are dead they fell into the sea floor. They buried under the rocks. The rock coquet the diatoms the energy in the bodies could not escape. The ascorbic acid eventually turned into oil under great pressure heat. Oil natural mess up are found under ground amidst rocks in areas where rocks are porous.(C) graphic gun for hire It is lighter than air . It is made up of methane (made up of railroad carbon hydrogen atoms ch-4). It is found near the petroleum under the earth. It has no odour.it is normally mix with a gas that has strong odour like foetid eggs.(C)NUCLEAR FUSIONIf light nuclei are forced together, they go forth intermingle with a yield of energy because the mass of the combination will be less than the sum of the masses of the individual(a) nuclei. If the combined nuclear mass is less than that of iron at the peak of the binding energy curve, thence nuclear particles will be more tightly bound than they were in the lighter nuclei, and that decrease in mass comes off in the fashion of the energy according to the Einstein relationship. For elements heavier than iron, nuclear fission will yield energy.For say-so nuclear energy sources for the Earth, the deuterium-tritium fusion reaction contained by some tolerant of magnetic confinement seems the roughly likely path. However, for the fireling of the stars, other fusion reactions will dominate. (c)NUCLEAR FISSIONThe nucleus captures the neutron, it splits into ii lighter atoms and throws off ii or three new neutrons. The two new atoms then respire gamma ray as they settle into their new states. there are three things ab place this induced fission-the probability of a U-235 atom capturing a neutron as it p asses by is fairly high.-the bring of capturing the neutron and splitting happens very quickly, in the order of picoseconds-An incredible amount of energy is released in the variety show of heat and gamma radiation, when a single atom splits. The two atoms that consequent from the fission later release beta radiation and gamma radiation of their own as well. The energy released by a single fission Comes from the fact that the fission products and the neutrons, together, weigh less than the original U-235 atom. The difference in weight is converted right off to energy at a enumerate governed by the equation e=mc2 (C)NUCLEAR REACTOR(1)Light water reactor-We use ordinary water for colling and moderisation these are basic 2 typecastsboiling water reactorpressurised water reactor on that point are also high temperature gas called reactors which basically of l.w.r type (2)heavy water reactor the nearly popular one has been Canadian deuterium uranium reactor. The design is grueling from that of lwr type. The fuel is arranged horizontally rather than the vertically as in l.w.r. (3) crystalline admixture fast breeder reactor here we use liquid sodium as the coolent. There are 300 atomic business leader plant ,operating in world. Max in use (83), Ussr (40), up (35), France(34),Japan 25, Ger many a(prenominal) 15, Canada 13 India is rich in atomic mineral. Uranium mines are located in singbum in bihar parts of bihar Most abudent source is monazite sands on the shores of kerala. Thorium is derived from these sands. Nuclear business office corporation is engaged with the establishment of nucleus. part plants 6 nuclear power plants in operation generating 1230 mwe(single individual plant is 210-235mwe). (b)AdvantagesNuclear energy has a number of positive(p)s going for it. First, it does not concur off carbon emissions, earning it supporters in the environmental community among those concerned round global warming. second, once reactors are built, it is very cost effective to continue them running at high capacity and for utilities to address demand fluctuations by cutting back end on usage of fossil fuels. Third, nuclear plants carry to last a long time and many existing plants control become more effectual over time, reducing their demand for uranium.and signify reliable sources of supplyDisadvantagesThere are a number of disadvantages to the nuclear-power option. These include not alone the safety principals but also some sparing and supply-related questions that are soon being debated by those for and opposed to renewal of superannuated power plants or an expansion of the sector.In legal injury of safety, two issues are on a regular basis debated. First, the issue of nuclear waste and, second, concerns over voltage terrorist attacks on nuclear power plants. The first objection whitethorn be track through the introduction of new types of power plants, such as the pebble-bed modular reactor. This type of reactor uses g raphite balls flecked with tiny amounts of uranium, rather than conventional fuel rods. With the fuel encased in graphite and impermeable silicon carbide, the supposition is that the waste should be relatively easy to dispose of. The terrorism fears are less easily addressed and may ultimately stall the anatomical structure of new plants in countries such as the U.S., where these worries are greatest. Among economic concerns is the question of construction costs. Although the cost of energy produced by existing nuclear plants is competitive, the direct capital costs of constructing new plants are exceedingly high, calculated at $1,300-$1,500 per kilowatt- hour, or twice the amount it costs to construct a gas-fired power station(F)Non Conventional energy sourceSOLAR ENERGYTwo weeks of solar energy is roughly equivalent to the energy fundd in all k at presentn reserves of coal.oil and natural gas on the earth. Solar energy may be now utilise either by active solar system or pas sive solar system. Another potentially big aspect 0f direct solar energy involves solar cadres or photovoltaic that convert sunlight directly into electricity. Two other type of solar energy are the solar power tower and solar ponds.(b) There are two main ways to harness the power of the sun to buckle under electricity photovoltaic (PV), where sunlight is directly converted into electricity via solar cells, and solarthermal power. PV is a proven technology that is most appropriate for meek applications to provide heat and power to individual houses and businesses. Sunlight falls on a layer of semiconductors, which jostles electrons. This, in turn, creates an electrical current that can be employ as a source for heat. Solar PV cells are already cost effective for powering houses and businesses in some regions. As with wind power, scientific developments energize reduced costs considerably over the last few years. Unlike wind power, however, largescale electricity yield usin g solar energy costs about 22 cents per kilowatt-hour, significantly more expensive than its fossil fuel competitors and nuclear energy. Hopes to reduce these costs lie with newer technologies. Solar-thermal generated energy is scarcely just emerging from the experimental stage to full-scale electricity production. Solar-thermal power concentrates the sun to heat up fuel such as gas or oil. The heat trapped within is then utilise to convert water into steam, which powers a conventional steam turbine to generate electricity. Fossil fuels are sometimes used as a back-up to heat the water in the boiler if the sun is not shining. There are three divers(prenominal) methods for concentrating the suns raysParabolic Trough This method uses long, parallel rows of glass mirrors in the normal of a trough to concentrate the suns rays toward the absorber tube usually filled with oil to maximum effect.Power Tower Similar in principle to parabolic-trough technology, the mirrors are placed in a circular pattern. At the center of the go around is a tower, at the top of which is a receiver filled with water, air, liquid alloy or molten salt that moves to a power deflect and is used to power a steam turbine.Parabolic Disk arranging In this system, dishes rather than troughs are used to concentrate the power of the sun. An practice of this type of solar project is the 500-megawatt Solar Energy Systems plant being constructed in the Mojave Desert in California. By the end of 2006, the company expects to find supplying electricity to Southern California Edison (SCE), but will not be fully operational until 2011, when it may account for as often as a 20 pct increase in SCEs electricity generation from renewables(F)AdvantagesIn spite of its cost versus other sources of energy, solar power is attracting interest due to the followingSolar energy makes use of a renewable natural resource that is readily available in many parts of the world.The process used to generate so lar energy is emission-free. technological advances have reduced costs to a point that it can grapple with fossil fuel alternatives in specific circumstances.The technology is scalable in that it can be used fordomestic heating purposes or on a larger scale for commercial electricity generation, as solar water heaters are an established technology, widely available and undecomposable to install and go forDisadvantagesThe biggest barriers to increasing solar power generation are the cost, the amount of add required for large-scale electricity production, and the intermittent nature of the energy source.In terms of the latter, thermal systems do not work at night or in inclement weather. Storage of hot water for domestic or commercial use is simple, needing except insulated tanks, but shop of the higher-temperature liquids needed to generate electricity on a large scale or storage of the electricity itself requires further technological development(F)WIND ENERGYIn the coarse there are areas which are quite windy. Wind energy may be converted into mechanical electrical energy. Now, wind has been utilized for pumping water in rural areas.Wind energy is useful in conflicting areas helps in saving fossils fuels, would deliver on the spot crushed measure of energy which is free pollution environmental degradation.Gujrat is first to starts using wind power.AdvantagesThere are a number of notable advantages associated with wind powerIt is a clean, renewable energy source.There is no fuel component, so once built there is no a finite fuel supply or costs associated with such a supply.Wind power can be generated in remote areas, including out in the nauticals.It is scalable in that it can be used to generate power in a local area or even at the individual property level, but can also generate large amounts of power that can be added to an electricity grid system..For land-based wind farms, once the wind towers are installed, the land area around them can be used for other purposes, such as agricultural use.DisadvantagesAs with any source of energy, there are some drawbacks to wind power. The most significant is that the wind to drive the turbines may be intermittent and that it does not always seismic disturbance when electricity is needed. Wind energy may only be available 40 percent of the year in some areas versus 90 percent for a fossil-fuel powered plant. New blade design can overcome this problem to a certain extent, as can storing the energy in batteries, but because of these potential drawbacks, the site of the wind farm is key to its victor and vice versa.(F)OCEAN ENERGY (TIDAL ENERGY)Tidal power generation depends on the harnessing of rise and fall of sea level due to tidal action. bittie tidal power plants have been constructed in china USSR. The most principal(prenominal) application of tidal power is electricity generation.In India sites exploitation of tidal energy are gulfs of kutch kombay sunderbans.India could intensify work on ocean thermal energy conversion wave energy. The country is already exist with exploiting tidal energy. The central electricity authority Gujrat electricity board carried out site studies for establishment of tidal plants in golf of kutch. India has excellent OTEC potential some of the best sites in world are known to be located off the Indian mainland island of lakshdeep Andoman nicobar. Total OTEC potential in India is 50000mW which is about 150% of installed power generated capacity in India.PRESENT USESTidal power has on a small scale been used throughout the report of mankind. It was not until twentieth century that large-scale tidal projects were considered. Today, sites suitable for the workout of tidal power exist in many places around the world.DISADVANTAGES-Not insofar economicly feasible.-Problems with transportation of hydroelectricity.-Technology not developed.ADVANTAGES-Renewable resource.-No pollution.-Produced 24 hours a day and 365 old age a year.-Peak output coincides with peak energy demand.(c) send away cell product of electricity by thermal plants is not a very efficient method and is major source of pollution. It now possible to make such in which reactants sre fed continuously to the electrodes and products are removed continuously from the electrolyte compartment. electrical cell that are designed to convert theenergy of burn of fuels like hydrogen, methane, methanol,etc. directly into electrical energy are called fuel cell.One of the most roaring fuel cell uses the reaction hydrogen with type O to form water. The cell was used for providing electrical power in Apollo space programme.The water vapours produced during the reaction were condensed and added to the drinking water supply for the astronauts. In the cell, hydrogen and oxygen are bubbled through porous carbon electrodes into concentrated aqueous sodium hydroxide solution. Catalyst like finally divided platinum metal are incorporated into the el ectrodes for increasing the rate of electrode reaction.Efficiency is 70%compared to thermal plant whose efficiency is 40%.(E)A fuel cell that runs on fresh oxygen hydrogen produces no waste product. when a reformist is coupled to the fuel cell some pollutant are released(co2)but levels are typically less than conventional fossil fuel combustion in a power plant or an auto-mobile locomotive.fuel cell could be ideal null emission power source for vehicle. Fuel cell busses could be tested in a Canada. The current from a fuel cell is proportional to the size of electrode voltage is limited (1.23). Tiny fuel cell running on methanol might used in cell phone, pager, toys, computer, now run by batteries.Bio fuel based on fuel derived from constitutional biomass from recently living animals or plants or their by products, has transformed from a niche alternative to fossil fuels (e.g., gaseous state, diesel) to become a booming industry. any(prenominal) liquid that memory boards ene rgy, which is typically utilized by an engine or generator, can be called a fuel. The term bio fuels encompasses a wide range of fuels, including veggie oils, animal fats, ethanol, biodiesel (any oil or fat that undergoes trans esterification to more closely match mineral-based fuel), and syn fuel (fuel made from gasi fied organic matter, then liquefied to form fuel). The main common trait of all these fuels is that they are derived from organic biomass, rather than minerals.Bio fuels are made using a fairly simple process that typically involves harvesting feedstock, or the raw materials (e.g., soybeans, sugarcane), crushing the feedstock, separating the dry matter from the oil, then re-crushing and/or further processing to extract as much oil as possible. The resulting oil can then either be directly consumed (e.g., by vehicles with specially designed engines), further processed (e.g., into biodiesel), or unify with mineral-based fuel before being delivered to the end user at g as stations and depots around the world (the most common blends in the U.S. are E10 (10% percent ethanol blend) and E85 (85% ethanol blend). Only some biofuels, most notably biodiesel, can be used in traditional internal combustion engines. Other biofuels, such as ethanol, must be blended with mineral-based fuel in order to be used in existing engines.The most common inputs into biofuels vary by country. In the U.S., corn and soybeans are most prevalent, while Europe tends to use flaxseed and rapeseed, brazil-nut tree sugarcane, and Asia palm oil. Brazil is in many ways the pioneer of the biofuels industry, having introduced ethanol from sugarcane (and flexfuel vehicles adequate to(p) of running on ethanol) over 25 years ago as method to reduce dependence on oil imports.a fuel cell uses a catalyst to create a reaction surrounded by hydrogen from a fuel and oxygen from the air to generate electricity, with the only byproduct being water. Such fuel cells can be used for power gener ation and as a replacement for the combustion engine to run cars and other vehicles. Fuel cells have long been used in the U.S. space program, but until the past few years have turn out prohibitively expensive for civilian use. Interest in fuel cells was reignited in the late 1990s, as companies began to make breakthroughs in technology. Large automotive manufacturers, such as General Motors and Daimler Chrysler, also started investing in fuel-cell companies and began to design notion fuel-cell powered vehicles. Development, thus far, has focused generally on protonexchange tissue layer (PEM) fuel cells. This type of fuel cell uses a polymer membrane to separate two subcells, one fed with hydrogen and one with oxygen (through air). On the hydrogen side, the hydrogen breaks down into protons and electrons, and the protons migrate through the membrane into the oxygen side. The electrons, on the other hand, are forced to detour through wire connecting metal plates, resulting in a re action that creates electricity. Other types of cells include the molten-carbonate fuel cell, which is the most efficient design but is very complex and only economical when generating more than 200 kilowatts. Westinghouse is developing a competing design, the solidoxide fuel cell, which operates at extremely high temperatures and has the added advantage that waste heat can be used to drive an auxiliary gas turbine.(F)What are the Challenges to Large-Scale Hydrogen yield?One of the biggest challenges to moving towards large-scale adoption of the hydrogen economy is production of hydrogen itself. A question often raised is whether it takes more energy to produce the hydrogen than you get back when you either drive the car or use it to power a building. There are currently three ways to produce hydrogenNatural gas, coal, wood and organic waste burn with air and steam at extremely high temperatures. When cooled, the resulting gases contain a significant amount of hydrogen.An electrical current is passed in the midst of two electrodes (anelectrolyzer) immersed in water. Hydrogen rises up from the negative electrode and oxygen from the positive electrode.Some bacteria reportedly produce hydrogen, but this method has yet to be exploited commerciallyThe first of these options has traditionally been the most cost-effective. That it still requires the burning of fossil fuels, combined with the rising price for natural gas, however, makes it less attractive as a long-term solution.The second option is simple to establish and can be done on a small or large scale nearest the point where the hydrogen may be needed. However, it also has a major drawback. Although this method has a 98 percent efficiency rate, when you factor in the voltage of the fuel cell, you get back only 40 percent of what you put inThere are two powerful arguments for converting electricity into hydrogen, in spite of the inefficiency of the processThe first is the use it or lose it principle. Electric al power itself cannot be stored in its pure form it needs to be converted to something else. just as surplus nuclear and gas-fired power stations may store unused power by using it to pump water back up inside a damper as part of an incorporate electrical storage system in combination with a hydroelectric power plant, hydrogen can be similarly used to store unused electrical power.Second, electricity stored as hydrogen is versatile. Not onlycan it be used for re-electrification, it also can potentiallybe used as fuel for cars or for producing heat.Why Fuel Cells?Fuel cells directly convert the chemical energy in hydrogen to electricity, with pure water and potentially useful heat as the only byproducts.Hydrogen-powered fuel cells are not only pollution-free, but also can have two to three times the efficiency of traditional combustion technologies.A conventional combustion-based power plant typically generates electricity at efficiencies of 33 to 35 percent, while fuel cell syste ms can generate electricity at efficiencies up to 60 percent (and even higher with cogeneration).The gaseous state engine in a conventional car is less than 20% efficient in converting the chemical energy in gasoline into power that moves the vehicle, under normal driving conditions. Hydrogen fuel cell vehicles, which use electric motors, are much more energy efficient and use 40-60 percent ofthe fuels energy corresponding to more than a 50% decrement in fuel consumption, compared to a conventional vehicle with a gasoline internal combustion engine.In addition, fuel cells operate quietly, have fewer moving parts, and are well suited to a variety of applications.How Do Fuel Cells Work?A single fuel cell consists of an electrolyte sandwiched between two electrodes, an anode and a cathode. Bipolar plates on either side of the cell help distribute gases and serve as current collectors. In a Polymer Electrolyte Membrane (PEM) fuel cell, whichmost promising for light-duty transportatio n, hydrogen gas flows through channels to the anode, where a catalyst causes the hydrogen molecules to separate into protons and electrons. The membrane allows only the protons to pass through it.Comparison of Fuel Cell TechnologiesIn general, all fuel cells have the same basic configuration an electrolyte and two electrodes. But there are different types of fuel cells, classified primarily by the kind of electrolyte used. The electrolyte determines the kind of chemical reactions that take place in the fuel cell, the temperature range of operation, and other factors that determine its most suitable applications.(7)

Friday, March 29, 2019

Privacy-handling Techniques and Algorithms for Data Mining

Privacy-handling Techniques and Algorithms for entropy MiningVIVEK UNIYAL bunco info mining cannister extract a previously unknown patterns from vast collection of selective information. immediately networking, hardwargon and software technology are rapidly growing bully in collection of selective information fall. Organization are containing huge amount of information from many heterogeneous data shank in which private and sensitive entropy of an individual. In data mining novel pattern lead be extracted from such data by which we can use for confused domains in decision marketing. But in the data mining output in that respect will be sensitive, private or personal information of a particular person can also be revealed. There will be some misuse of leting these types of information, and it can harm the data owner. So in distributed environs privacy is becoming an important government issue in many applications of data mining. Techniques of Privacy preserving data mini ng (PPDM) are provide new direction to solve issues. By PPDM, we can find a valid data mining results without underlying data determine learning.In this dissertation we have introduced two algorithms for privacy handling concern. one(a) is k-anonymization in which information corresponding to any individual person in a release data can non be distinguished from that of at least(prenominal) k-1 other individual persons whose information also appears in release data. In this algorithm we are achieving the k-anonimyzation some values must be suppressed or extrapolate in database. K-anonymity have record linkage feeler mode and l- vicissitude can have attack mode of attribute linkage.KEYWORDS Data Mining, Advantages and Disadvantages of Data Mining, Privacy handking, K-anonymization Algorithm, L-diversity.ACKNOWLEDGEMENTSI wish to take this opportunity to render my deep gratitude to all the people who have extended their cooperation in various ways during my dissertation. It is m y pleasure to acknowledge the help of all those individuals.First of all, I would like to express my deepest gratitude to my dissertation supervisor, Mr. Govind Kamboj without whom none of this would have been possible. He provided me perpetually the essential direction and advice during the work. I am grateful to him to give a shape towards completion of my dissertation. Without his supervision and support, this work would not have been unblemished successfully in time.I am grateful to the President, wickedness President, Chancellor, Vice Chancellor and Head of the Department of the Graphic Era University for providing an excellent environment for work with ample facilities and academic freedom. I would also like to give thanks the teaching and non-teaching staff for their valuable support during M.Tech.Last but not the least I am grateful to all my teachers and friends for their cooperation and encouragement throughout completing this task.(Vivek Uniyal)M.Tech( Computer Scienc e Engineering)TABLE OF CONTENTSCANDIDATES DECLERATION iiiABSTRACT ivACKNOWLEDGEMENT vLIST OF ABBREVIATIONS ixLIST OF FIGURES x1. INTRODUCTION 11.1 Problem Statement 11.2 Overview 11.3 Advantages of data mining 31.4 Disadvantages of data mining 41.5 Why privacy-handling is infallible in data-mining 41.6 Motivation 61.7 Organization 42. background knowledge AND LITERATURE SURVEY 73. METHODS AND METHODOLOGIES 133.1 Randomization method 133.2 Group based anonymization methods 143.2.1 K-Anonymity framework 143.2.2 Personalized privacy-preservation 153.2.3 Utility based privacy-preservation 153.2.4 Sequential releases 153.2.5 The l-diversity method 153.3 Distributed privacy-preserving data mining 163.4 Detailed description about K-anonymity and l-diversity 163.4.1 Data collection and Data publishing 163.4.2 Privacy Data publishing 173.4.3 Algorithm of k-anonimity 193.4.4 l-diversity 243.4.1.1 Lack of diversity 253.4.1.2 Strong background knowledge 254. EXPERIMENTAL outgrowth 274.1 Introduction 274.2 Experimental result 274.2.1 burden of proposed k-anonymity and l-diversity 275. CONCLUSION AND SCOPE FOR FUTURE WORK 335.1 shutdown 335.2 Scope for Future Work 33PUBLICATION come out of the closet OF THIS WORK 34REFERENCES 35LIST OF ABBREVIATIONSPPDP Privacy-preserving data publishingPPDMPrivacy-preserving data miningQID Quasi-IdentifierLIST OF FIGURES send off 1.1 Data mining a touchstone included in the process of knowledge discovery 1 recruit 1.2 Typical data mining system architecture 2 realise 1.3 Record Owner, Data Collection and Data Publishing 17 go in 1.4 Hospital Database 18 get into 1.5 Taxonomy tree for JOB, SEX, AGE (QID attributes) 20 propose 1.6 Hospital display panel Original record in data base 21 prototype 1.7 Table of Sensitive record (Publishing data) 21Figure 1.8 Table of External Data ppt table 22Figure 1.9 sequeling data after linking the sensitive and ppl table 22Figure 1.10 Research table (generalized with k-anonymous publish data) 23Figure 1.11 elongated table (For linking like generalized voter list) 23Figure 1.12 For checking the k- anonymity 23Figure 1.13 Result of linking the table research to extended 24Figure 1.14 Hospital master key data record Project 28Figure 1.15 Comparing the Un-Generalized published and extended data tables 29 Figure 1.16 Comparing Generalized Extended and Sensitive table records 30 Figure 1.17 Table for k-anonymity and l-diversity 32 Figure 1.18 Plotting exact l-value and distinct l-diversity value in weka 33 Figure 1.19 Plotting exact l-value and entropy l-diversity value in weka 33