Volume 5 Issue 2- February 2015
Page | Title | Full Text |
---|---|---|
18-21 | Online Picture Book Learning of Multi-lingual
Words through Images,Text and Audio Bhaskara Rao N. Abstract
Aweb enabled Java Script Picture Book Learning software is developed for identifying words of different objects in multiple languages. Images of perceptible objects from different categories are presented to the user. The associated matching words in selected languages are displayed for the perusal of the user. Also the corresponding pronunciationsare provided in the audio format for listening experience.In this software, cross-language transliterations are also provided to learn new words easily. The transliteration process uses a few elementary techniques of Natural Language Processing. |
Full Text PDF |
22-23 | Optimum Threshold of ACM Khalid W. Hameed Abstract
In this paper the threshold effect of an adaptive modulation over AWGN was investigated. Two types of modulation were considered, the 4QAM and the 16QAM. The simulation was done for two range of SNR. The metric used to compare the optimum threshold SNR was (Rate (bit/symbol) / BER). It was found that the best threshold for range (0 to 10) db is 7 dB. While for the second range it was 8 dB. |
Full Text PDF |
24-26 | URL Mining Using Agglomerative Clustering
Algorithm Chinmay R. Deshmukh,R.R.Shelke Abstract
The tremendous growth of the web world incorporates application of data mining techniques to the web logs. Data Mining and World Wide Web encompasses an important and active area of research. Web log mining is analysis of web log files with web pages sequences. Web mining is broadly classified as web content mining, web usage mining and web structure mining. Web usage mining is a technique to discover usage patterns from Web data, in order to understand and better serve the needs of Web-based applications. URL mining refers to a subclass of Web mining that helps us to investigate the details of a Uniform Resource Locator. URL mining can be advantageous in the fields of security and protection. The paper introduces a technique for mining a collection of user transactions with an Internet search engine to discover clusters of similar queries and similar URLs. The information we exploit is a “clickthrough data”: each record consist of a user’s query to a search engine along with the URL which the user selected from among the candidates offered by search engine. |
Full Text PDF |
27-30 | Survey of Cryptography Techniques for Data
Security Sonali B. Pawar, Lina L. Tandel , Priyanka K. Zeple,Sachin R Sonawane Abstract
Web has been converted into one complicated
world. For Information transmission, internet is widely used, But
Data Security is also concern in that case. While sending any Keywords:Cryptography, Armstrong number, Color, Authentication, Data Security. |
Full Text PDF |
31-34 | Recent Developments on Data Warehouse and
Data Mining in Cloud Computing K. Kala Bharathi and K. Sandhya Sree Abstract
This paper expresses the use of data warehousing and data mining in cloud computing. Data warehouse is a centralized, persistent data store and data mining is a process of extracting potential information from raw data. Cloud computing is a new paradigm for hosting and delivering services over the internet and attracted business people, as it eliminates the requirement for users to plan ahead for provisioning and allows enterprises to start from the small and increase resources only when there is rise in service demand. Additionally, we compared how retrieval of data from data warehouse in the cloud environment reduces time, infrastructure and storage, over traditional method. Keywords: Data Warehousing, Data Mining, Cloud Computing. |
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net