Vous êtes sur la page 1sur 14

DUAL-SERVER PUBLIC-KEY

ENCRYPTION WITH BI-LEVEL


FEATURE EXTRACTION BASED TEXT
MINING
User Manual
• Open for multi-oriented text Mining system.
• Mobile node is used to select the user choice area for conversion
process.
• Enter the text in the text box given below user choice area
• Convert text to text mining, ASCII to Binary on the data information it
shows the process of conversion
• Select text option to hear the converted file and here are able to save
the a files in system.
• The user authentication key control for the each user to update the
information .
• Save the location for text file.
• Finally it displays the designated page to generate graph.
• File download on each mobile node client for validation on user
name and password.
Testing and Implementation
Test Case1:
Case: To enter into Dual server himself first. Required of registration IP Address and
Text area to enter the text.
Input: Mobile Station details.
Output: filled Mobile services Details.
Validate: user details are checked with database. IP address constrained is checked as
per validation.
Test Case 2:
• Case: To enter into admin registered IP address. Required of register
users fix text to audio to text conversion intermediate the data
analysis in the classification.
• Input: Set classification data details.
• Output: filled intermediate node failure on the conversion in the
node structure Details.
• Validate: user details are checked with database. IP address
constrained is checked as per validation.
Test Case3:
• Case: To enter into Application server. Required of IP address
for text to audio conversional information.
• Input: mining Details.
• Output: filled admin and user Classification Details.
• Validate: user details are checked with database.
Autnetication key assign for the each users authorization.

Key Updated
Sample Screens
File Upload
Connect Server
Ready to Receive The File
Access Point 1 IP Address
Text Mining Data Extracted
Authentication Key
Conclusion
• Here Dual- Server Public Key Encryption with Feature Extract Text mining
(DSFETM) that can keep within catchphrase speculating assault which is
an intrinsic helplessness of the conventional PEKS structure. Here
additionally presented another and utilized it to build the security analysis
and experimental results show that the proposed approach is feasible for
real applications. This makes minority classes relatively far away from the
majority ones. Another consider the Hollinger distance as a decision
criterion for feature selection, which is shown to be imbalance-insensitive.
The proposed ICHI can be regarded as feature selections at the syntax level
because it mainly uses the document-word matrix.
Thank you

Vous aimerez peut-être aussi