A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Abhilasha,
- A Brief Survey on Part of Speech Tagging Techniques Used in Punjabi Language and Other Regional Languages
Authors
1 Giani Zail Singh Punjab Technical University, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 151-160Abstract
Parts-of-speech (POS) tagging is the basic building block of any Natural Language Processing (NLP) tool. A POS tagger has many applications. POS tagger represents structure and forms of words and phrases of a particular language. Therefore, these can be used in different research fields in NLP. Taggers can be developed using linguistic rules, stochastic models or both .This paper presents a review about different POS taggers developed for different Indian Language.Keywords
Parts-of-Speech Tagger, Indian Languages, HMM Technique.- Clause Identification in English and Indian Languages: A Survey
Authors
1 GZS Punjab Technical University, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 13 (2014), Pagination: 179-184Abstract
The problem of identification of clauses in natural language processing is to find away to identify the each type of clause, e.g., Dependent clause, independent clause. Clause identification plays very important role in preprocessing task for language processing activities. This paper reports about the Clause Identification proposed for various Languages like English, Malayalam, Bengali and Urdu. Various clause identification approaches like Hidden Markov Model (HMM), Support Vector Model (SVM), and Rule based approaches, Maximum Entropy (ME) and Conditional Random Field (CRF), Entropy Guided Transformation Learning (ETL), have been used for POS tagging.- Review: Palm Recognition Techniques
Authors
1 Computer Science Engineering Department, Giani Zail Singh PTU Campus, Bathinda, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 12 (2014), Pagination: 73-78Abstract
Palm recognition system is used in order to improve the performance and reliability. The physical dimensions of a human palm contain evidence that is capable of verifying the identity of an individual. Palm geometry based verification systems utilize the geometric features of the palm like length and width of the palm, diameter, area and perimeter. The biometric system is a confirmation system which utilizes these palm geometry features for user authentication. It is being extensively used in various applications like attendance, access control, anti-pass back, point-of scale and interactive kiosks etc. The main objective of designing this system is security. In this paper various techniques of Palm Recognition has been presented.Keywords
Biometrics, Palm Print.- Survey on Non Linear Noise Removal Techniques for Salt and Pepper Noise in Digital Images
Authors
1 Department of CSE, GZS-PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 12 (2014), Pagination: 90-95Abstract
The main cause of the image quality degradation is noise. Noise makes it difficult for the observer to discriminate the fine details of the image. There are various types of noises which can corrupt the image. Noise can appear on the images due to faulty memory locations, during transmission, during image acquisition, due to timing errors in the digitization process etc. Image denoising becomes the necessity to enhance the image quality without any loss of image information. The numerous researchers have presented various techniques to remove salt and pepper noise from digital images. A Survey of various such techniques is presented in this paper.Keywords
Impulse Noise, Salt and Pepper Noise, Non Linear Filters, Image Denoising, PSNR, IEF and MSE.- Cutting back the Wormhole Attack in Mobile Network: A Survey
Authors
1 Department of CSE, GZS PTU Campus, Bathinda, Punjab, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 11 (2014), Pagination: 11-17Abstract
As concerned with wireless networks, the communication is done through the radio links where chances of unauthorized user are more which consequently degrades the performance of network and result is more delay. Wireless networks are broadly classified into two broad categories: infrastructure mode and infrastructure less mode. Various protocols are defined under this which uses their different mechanism for detection and isolation of the wormhole attacks. In this paper some of the studies are defined on the basis of methods used for the detection and avoidance of attacks adhere to its use in it. As the numerous attacks may arise over network on MANET, their comparison has been discussed on the basis of techniques and their effects.
This paper intends to find out all the possible ways to detect and avoid the wormhole attack in the network. It may not lead to complete isolation of the attack but plays an important role to reduce the wormhole attack.
Keywords
Wireless Network, Wormhole Attack.- Optimization of Speed Protocol Using Genetic Algorithm in Wireless Sensor Network
Authors
1 GZS PTU Campus, Bathinda, Punjab, IN