638 research outputs found

    EXPLOITING N-GRAM IMPORTANCE AND ADDITIONAL KNOWEDGE BASED ON WIKIPEDIA FOR IMPROVEMENTS IN GAAC BASED DOCUMENT CLUSTERING

    Get PDF
    This paper provides a solution to the issue: “How can we use Wikipedia based concepts in document\ud clustering with lesser human involvement, accompanied by effective improvements in result?” In the\ud devised system, we propose a method to exploit the importance of N-grams in a document and use\ud Wikipedia based additional knowledge for GAAC based document clustering. The importance of N-grams\ud in a document depends on several features including, but not limited to: frequency, position of their\ud occurrence in a sentence and the position of the sentence in which they occur, in the document. First, we\ud introduce a new similarity measure, which takes the weighted N-gram importance into account, in the\ud calculation of similarity measure while performing document clustering. As a result, the chances of topical similarity in clustering are improved. Second, we use Wikipedia as an additional knowledge base both, to remove noisy entries from the extracted N-grams and to reduce the information gap between N-grams that are conceptually-related, which do not have a match owing to differences in writing scheme or strategies. Our experimental results on the publicly available text dataset clearly show that our devised system has a significant improvement in performance over bag-of-words based state-of-the-art systems in this area

    Routing algorithms classification & Proposed Routing Algorithm for DTN

    Get PDF
    This paper provides an introduction to Delay Tolerant Networks (DTN)alogorithms and would touch upon some basic classification. Continuous connectivity is difficult in today�s wireless world. The data preservation and security in challenged and intermittent network, is of paramount importance. In this paper, we will see how DTN provides detail classification and discription for further studies & application.an effective alternative. Security of data becomes important in disrupted networks; this paper would also discuss Praposed Routing algorithms with DTNs

    Simulation for proposed DTN algorithm & Analysis

    Get PDF
    There are different simulation tools available for simulating the algorithms of mobile ad-hoc networks, and these tools are user friendly, means easy to work upon. In case of DTN algorithm implementation, these tool cannot work properly because of the frequent disconnection environment of nodes in DTN. We have used The ONE simulator [33] for implementing our proposed DTN algorithm

    A Noval Method for Data Auditing and Integrity Checking in Public Cloud

    Get PDF
    Data plays a huge role in today’s era. All business requires to deal with lot of business. So data has to be secured correctly. In this paper we aim to design a system to help to protect the data in the cloud. The public cloud is used in which the users stores the data and the data is secured by using the cryptographic method. Every customer wants to store the data and access or process the data from the cloud, but the major setback is security issues. In this paper we present a novel algorithm which helps the data to be accessed securely from the cloud

    Benchmarking Real-Time Linux Implementation on Embedded Platform

    Get PDF
    This paperdeals with design, implementation and testing of real time drivers for I2C and UART processor controllers on Beaglebone Black. Embedded Board runs with Linux 3.8.13 and real time co-kernel, Xenomai-2.6.3. Beaglebone Black has cortex A8 processor with 1GHz frequency. Xenomai Real time driver Model(RTDM) drivers are made for I2C and UART processor controller and their performance parameters were tested. DOI: 10.17762/ijritcc2321-8169.15053

    Analysis of Big Data Processing Using HDM Framework

    Get PDF
    MapReduce and Spark have been introduced to ease the task of developing big data programs and applications. However, the jobs in these frameworks are roughly defined and packaged as executable jars without any functionality being exposed or described. This means that deployed jobs are not natively composable and reusable for subsequent development. Besides, it also hampers the ability for applying optimizations on the data flow of job sequences and pipelines. The Hierarchically Distributed Data Matrix (HDM) which is a functional, strongly-typed data representation for writing composable big data applications. Along with HDM, a runtime framework is provided to support the execution, integration and management of HDM applications on distributed infrastructures. Based on the functional data dependency graph of HDM, multiple optimizations are applied to improve the performance of executing HDM jobs. The experimental results show that our optimizations can achieve improvements between 10% to 30% of the Job-Completion-Time and clustering time for different types of applications when compared

    Ant-based Routing Schemes for Mobile Ad hoc Networks

    Get PDF
    An ad-hoc network is a collection of mobile nodes, which communicate over radio. These networks have an important advantage; they do not require any existing infrastructure or central administration. Therefore, mobile ad-hoc networks are suitable for temporary communication links. This flexibility, however, comes at a price: communication is difficult to organize due to frequent topology changes. Routing in such networks can be viewed as a distributed optimization problem. A new class of algorithms, inspired by swarm intelligence, is currently being developed that can potentially solve numerous problems of modern communications networks. These algorithms rely on the interaction of a multitude of simultaneously interacting agents. A survey of few such algorithms for ad hoc networks is presented here

    Modelling, Analysis, Fabrication and Experimental Testing of Leaf Spring Material by Hybrid Composite Materials with Natural Fiber for Electric Vehicle

    Get PDF
    Present automobiles are running with the help of fuel. But in the future, electricity plays a significant role. The generation upgrading into electricity as the main source. Leaf springs are used for suspension for automobiles. These leaf springs are manufactured with stainless steel material. This is heavy in weight, which is one of the limitations for consuming of fuel. If this material is used in electric vehicle, it consumes more electricity. To overcome this issue the material is replaced with composites. The primary goal of this endeavour is to achieve weight rebates without diminishing in reliability. A parametric study of the leaf spring by varying the three-dimensional parameters will be carried out. Fabrication of the composite specimen is based upon the ASTM standard. Modelling and analysis of composite leaf spring with SOLIDWORKS and ANSYS WORKBENCH software. Epoxy resin and E- glass fibre is reinforced with various fractions of Prosopis Juliflora (Throne powder) composites were falsification by hand layup technique. The fabricated composite material in the form of plate were cut into corresponding profiles as per ASTM standard. The objective is to examine the Stress, Strain, Deformation, Physical property, Mechanical properties, Thermal property of composite leaf spring with that of steel, CFRP

    Performance Analysis Of Routing Metrics For Multi Radio Multi Channel In Wireless Mesh Networks

    Get PDF
    Wireless mesh is a collection of wireless devices that can communicate with peers in single or multiple hops. Mesh networks are self-configuring systems where each Access Point (AP) can relay messages on behalf of others, thus increasing the range, utilizing Multiple Radios over mesh routers increases capacity and available bandwidth. Efficient utilization of Multiple Radios is assured through proper channel assignment and routing schemas. Routing metrics are used for selection of routes obtained by routing protocols. Routing metrics provide measurable values that can be used to judge how useful a route will be, quantitative value assigned by routing metrics indicate the specific characteristics of the route
    • …
    corecore