Knowledge Provincial Verification Efficient Network

Authors

  • Geethamani G. S  Assistant Professor, PG Department of Information Technology, Hindusthan College of Arts and Science, Coimbatore, India.
  • Sabariraj. T  PG Student , PG Department of Information Technology, Hindusthan College of Arts and Science, Coimbatore, India

Keywords:

Security, Public Cloud Server,Proxy,Integrity Checking,Uploading,Bilinear Pairing, Coherent.

Abstract

The application proposes to isolate problems of fake certificates and employment details furnished by candidates. In the present scenario the concerned employer authorizes legal consultants to provide information about the candidate and verify the credibility on the certificates submitted. The consultant then makes a physical call, additionally may send their officers to the specified previous employer and verify the authenticity of the candidate. The status of the investigation is then reported to the organization for them to take a decision on appointment or refusal. The proposed system ensures that the above task can be easily performed by developing, web applications for the organization and the immigration dept, integrating them to generate candidate’s previous employment details. The Application is split into two modules, a search engine by using which the coordination can be established between the companies and the integrated services. A powerful search engine is designed to locate employment details of an employee. Additionally, the company information can also be tracked. The achievements made by the company is specified from time to time to show their working standards in the market which can be viewed by the integrated services and by the candidates using the search engine. Each employee is assigned with a unique SSN number (Social Security Number) (globally accessible) by using which the required information about the specified candidate can be known. The status of the verification is generated on the candidate name and a detailed report on his employment and activities related to all the companies are available to the recruiting organization. On realization of the experience of the candidate, he can be recruited into the company. If the candidate is recruited his new information is updated to the immigration department.

References

  1. S. Basu, A. Banerjee, and R. Mooney, "Active Semi-Supervision for Pairwise Constrained Clustering," Proc. SIAM Int’l Conf. Data Mining, pp. 333-344, 2004.
  2. S. Basu, I. Davidson, and K. Wagstaff, Constrained Clustering: Advances in Algorithms, Theory, and Applications. Chapman & Hall, 2008.
  3. M. Bilenko, S. Basu, and R. Mooney, "Integrating Constraints and Metric Learning in Semi-Supervised Clustering," Proc. Int’l Conf. Machine Learning, pp. 11-18, 2004.
  4. I. Davidson, K. Wagstaff, and S. Basu, "Measuring Constraint-Set Utility for Partitional Clustering Algorithms," Proc. 10th European Conf. Principle and Practice of Knowledge Discovery in Databases, pp. 115-126, 2006.
  5. D. Greene and P. Cunningham, "Constraint Selection by Committee: An Ensemble Approach to Identifying Informative Constraints for Semi-Supervised Clustering," Proc. 18th European Conf. Machine Learning, pp. 140-151, 2007.
  6. D. Cohn, Z. Ghahramani, and M. Jordan, "Active Learning with Statistical Models," J. Artificial Intelligence Research, vol. 4, pp. 129- 145, 1996.
  7. D. Battr´e, S. Ewen, F. Hueske, O. Kao, V. Markl, and D. Warneke. Nephele/PACTs: A Programming Model and Execution Framework for Web-Scale Analytical Processing. In SoCC ’10: Proceedings of the ACM Symposium on Cloud Computing 2010, pages 119– 130, New York, NY, USA, 2010. ACM.
  8. R. Chaiken, B. Jenkins, P.-A. Larson, B. Ramsey, D. Shakib, S. Weaver, and J. Zhou. SCOPE: Easy and Efficient Parallel Processing of Massive Data Sets. Proc. VLDB Endow., 1(2):1265– 1276, 2008.
  9. H. chih Yang, A. Dasdan, R.-L. Hsiao, and D. S. Parker. Map- Reduce-Merge: Simplified Relational Data Processing on Large Clusters. In SIGMOD ’07: Proceedings of the 2007 ACM SIGMOD international conference on Management of data.
  10. Cooper, M., Foote, J., Adcock, J. and Casi, S. 2003. Shot Boundary Detection via Similarity Analysis. In Proceedings of TRECVID 2003 workshop.
  11. Dunham, M. H. 2003. Data Mining Introductory and Advanced Topics. Pearson Education.
  12. Smeaton, A. F., Over, P. and Doherty, A. R. 2010. Video Shot Boundary Detection: Seven years of TRECVID Activity. Elsevier, Computer Vision and Image Understanding. Vol. 114, Issue 4. Pp. 411-418
  13. Fan, W., Wallace, L., Rich, S. and Zhang, Z. 2005. Tapping into the Power of Text Mining. Communications of the ACM – Privacy and Security in highly dynamic systems. Vol. 49, Issue-9.
  14. Pol, K., Patil, N., Patankar, S. and Das, C. 2008. A Survey on Web Content Mining and extraction of Structured and Semi structured Data. IEEE First International Conference on Emerging.
  15. Zhang, J., Hsu, W. and Lee, M. L. 2001. Image Mining: Issues, Frame Works and Techniques. In Proceedings of the 2nd International Workshop Multimedia Data Mining. pp. 13-20.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Geethamani G. S, Sabariraj. T, " Knowledge Provincial Verification Efficient Network, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.1763-1766, January-February-2018.