Volume 5 Issue 2- February 2015


Page Title Full Text
18-21 Online Picture Book Learning of Multi-lingual Words through Images,Text and Audio
Bhaskara Rao N.

Aweb enabled Java Script Picture Book Learning software is developed for identifying words of different objects in multiple languages. Images of perceptible objects from different categories are presented to the user. The associated matching words in selected languages are displayed for the perusal of the user. Also the corresponding pronunciationsare provided in the audio format for listening experience.In this software, cross-language transliterations are also provided to learn new words easily. The transliteration process uses a few elementary techniques of Natural Language Processing.
Keywords—Indian languages, Natural Language Processing, transliteration,

Full Text PDF
22-23 Optimum Threshold of ACM
Khalid W. Hameed

In this paper the threshold effect of an adaptive modulation over AWGN was investigated. Two types of modulation were considered, the 4QAM and the 16QAM. The simulation was done for two range of SNR. The metric used to compare the optimum threshold SNR was (Rate (bit/symbol) / BER). It was found that the best threshold for range (0 to 10) db is 7 dB. While for the second range it was 8 dB.   

Full Text PDF
24-26 URL Mining Using Agglomerative Clustering Algorithm
Chinmay R. Deshmukh,R.R.Shelke

The tremendous growth of the web world incorporates application of data mining techniques to the web logs. Data Mining and World Wide Web encompasses an important and active area of research. Web log mining is analysis of web log files with web pages sequences. Web mining is broadly classified as web content mining, web usage mining and web structure mining. Web usage mining is a technique to discover usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. URL mining refers to a subclass of Web mining that helps us to investigate the details of a Uniform Resource Locator. URL mining can be advantageous in the fields of security and protection. The paper introduces a technique for mining a collection of user transactions with an Internet search engine to discover clusters of similar queries and similar URLs. The information we exploit is a “clickthrough data”: each record consist of a user’s query to a search engine along with the URL which the user selected from among the candidates offered by search engine.
By viewing this dataset as a bipartite graph, with the vertices on one side corresponding to queries and on the other side to URLs, one can apply an agglomerative clustering algorithm to the graph’s vertices to identify related queries and URLs.
Index Terms — Agglomerative Clustering Algorithm, URL Mining, Re-ranking, Query Log analysis.

Full Text PDF
27-30 Survey of Cryptography Techniques for Data Security
Sonali B. Pawar, Lina L. Tandel , Priyanka K. Zeple,Sachin R Sonawane

Web has been converted into one complicated world. For Information transmission, internet is widely used, But Data Security is also concern in that case. While sending any
sensitive data one must ensure about its integrity , confidentiality , authenticity. Cryptography is one Encryption technique. In his paper , Armstrong Numbers are used to provide more security to transmitted data. And for increasing password strength, color is used for authentication which is associated with set of 3 key values; hence authenticated persons only able to communicate in secure manner and also lowers the risk of data theft

Keywords:Cryptography, Armstrong number, Color, Authentication, Data Security.

Full Text PDF
31-34 Recent Developments on Data Warehouse and Data Mining in Cloud Computing
K. Kala Bharathi and K. Sandhya Sree

This paper expresses the use of data warehousing and data mining in cloud computing. Data warehouse is a centralized, persistent data store and data mining is a process of extracting potential information from raw data. Cloud computing is a new paradigm for hosting and delivering services over the internet and attracted business people, as it eliminates the requirement for users to plan ahead for provisioning and allows enterprises to start from the small and increase resources only when there is rise in service demand. Additionally, we compared how retrieval of data from data warehouse in the cloud environment reduces time, infrastructure and storage, over traditional method.

Keywords: Data Warehousing, Data Mining, Cloud Computing.

Full Text PDF