Now showing items 127-136 of 136
Abstract: | In Statistical Machine Translation from English to Malayalam, an unseen English sentence is translated into its equivalent Malayalam translation using statistical models like translation model, language model and a decoder. A parallel corpus of English-Malayalam is used in the training phase. Word to word alignments has to be set up among the sentence pairs of the source and target language before subjecting them for training. This paper is deals with the techniques which can be adopted for improving the alignment model of SMT. Incorporating the parts of speech information into the bilingual corpus has eliminated many of the insignificant alignments. Also identifying the name entities and cognates present in the sentence pairs has proved to be advantageous while setting up the alignments. Moreover, reduction of the unwanted alignments has brought in better training results. Experiments conducted on a sample corpus have generated reasonably good Malayalam translations and the results are verified with F measure, BLEU and WER evaluation metrics |
URI: | http://dyuthi.cusat.ac.in/purl/4187 |
Files | Size |
---|---|
Techniques to I ... m English to Malayalam.pdf | (368.5Kb) |
Abstract: | Page 1. Towards Web 3.0... • Web 1.0 • Web 2.0 • Web 3.0 • Technology hype? • Internet as seen by our kids? Page 2. Random Trivia: Brazil has more Orkut users than citizens Page 3. The war is over. Platforms have won. Applications have lost Page 4. Page 5. Blogosphere • The blogosphere is made up of all blogs and their interconnections Page 6. Social bookmarking Page 7. Page 8. Page 9. Page 10. Page 11. Page 12. Page 13. Page 14. Towards Web 3.0 Page 15. Page 16. Wolfram Alpha Page 17. Page 18. Page 19. Page 20. Page 21. Page 22 |
URI: | http://dyuthi.cusat.ac.in/purl/4171 |
Files | Size |
---|---|
Towards Web 3.0....pdf | (2.563Mb) |
Abstract: | Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method. |
URI: | http://dyuthi.cusat.ac.in/xmlui/purl/2077 |
Files | Size |
---|---|
Use of novel algorithms MAJE4 and MACJER-320...pdf | (326.2Kb) |
Abstract: | Extensive use of the Internet coupled with the marvelous growth in e-commerce and m-commerce has created a huge demand for information security. The Secure Socket Layer (SSL) protocol is the most widely used security protocol in the Internet which meets this demand. It provides protection against eaves droppings, tampering and forgery. The cryptographic algorithms RC4 and HMAC have been in use for achieving security services like confidentiality and authentication in the SSL. But recent attacks against RC4 and HMAC have raised questions in the confidence on these algorithms. Hence two novel cryptographic algorithms MAJE4 and MACJER-320 have been proposed as substitutes for them. The focus of this work is to demonstrate the performance of these new algorithms and suggest them as dependable alternatives to satisfy the need of security services in SSL. The performance evaluation has been done by using practical implementation method. |
Description: | World Academy of Science, Engineering and Technology Vol:2 2008-03-28 |
URI: | http://dyuthi.cusat.ac.in/purl/3880 |
Files | Size |
---|---|
Use of Novel Al ... tication in SSL & TLS..pdf | (125.4Kb) |
Abstract: | The purpose of this paper is to describe the design and development of a digital library at Cochin University of Science and Technology (CUSAT), India, using DSpace open source software. The study covers the structure, contents and usage of CUSAT digital library. Design/methodology/approach – This paper examines the possibilities of applying open source in libraries. An evaluative approach is carried out to explore the features of the CUSAT digital library. The Google Analytics service is employed to measure the amount of use of digital library by users across the world. Findings – CUSAT has successfully applied DSpace open source software for building a digital library. The digital library has had visits from 78 countries, with the major share from India. The distribution of documents in the digital library is uneven. Past exam question papers share the major part of the collection. The number of research papers, articles and rare documents is less. Originality/value – The study is the first of its type that tries to understand digital library design and development using DSpace open source software in a university environment with a focus on the analysis of distribution of items and measuring the value by usage statistics employing the Google Analytics service. The digital library model can be useful for designing similar systems |
Description: | The Electronic Library Vol. 31 No. 2, 2013 pp. 217-225 |
URI: | http://dyuthi.cusat.ac.in/purl/4155 |
Files | Size |
---|---|
Using open sour ... A case study of CUSAT.pdf | (272.1Kb) |
Abstract: | Cache look up is an integral part of cooperative caching in ad hoc networks. In this paper, we discuss a cooperative caching architecture with a distributed cache look up protocol which relies on a virtual backbone for locating and accessing data within a cooperate cache. Our proposal consists of two phases: (i) formation of a virtual backbone and (ii) the cache look up phase. The nodes in a Connected Dominating Set (CDS) form the virtual backbone. The cache look up protocol makes use of the nodes in the virtual backbone for effective data dissemination and discovery. The idea in this scheme is to reduce the number of nodes involved in cache look up process, by constructing a CDS that contains a small number of nodes, still having full coverage of the network. We evaluated the effect of various parameter settings on the performance metrics such as message overhead, cache hit ratio and average query delay. Compared to the previous schemes the proposed scheme not only reduces message overhead, but also improves the cache hit ratio and reduces the average delay |
Description: | Advanced Communication Technology (ICACT), 2014 16th International Conference on |
URI: | http://dyuthi.cusat.ac.in/purl/3894 |
Files | Size |
---|---|
A virtual backb ... mobile ad hoc networks.pdf | (2.885Mb) |
Abstract: | Page 1. Web 2.0 Technologies for Education G. Santhosh Kumar Dept. Of Computer Science Cochin University Page 2. What is Internet? CUSAT is linked to this Web through 10 Mbps leased line connectivity Page 3. Size of the Web? GYWA = Sorted on Google, Yahoo!, Windows Live Search (Msn Search) and Ask YGWA = Sorted on Yahoo!, Google, Windows Live Search (Msn Search) and Ask www.worldwidewebsize.com Page 4. The Machine is Us/ing Us ■ http://in.youtube.com/watch?v=NLlGopyXT_g&feature=channel Page 5. .. |
URI: | http://dyuthi.cusat.ac.in/purl/4169 |
Files | Size |
---|---|
Web 2.0 Technologies for Education.pdf | (1.414Mb) |
Abstract: | Page 1. Webhosting and Networking G. Santhosh Kumar, Dept. of Computer Science Cochin University of Science and Technology Page 2. Agenda What is a Network? Elements of a Network Hardware Software Ethernet Technology World Wide Web Setting up a Network Conclusion Page 3. What is a Network? An interconnected system of things or people Purpose of a Network? Resource Sharing Communication LANs have become the most popular form of Computer Networks Page 4. Principle of Locality of Reference Temporal Locality of Reference ... |
URI: | http://dyuthi.cusat.ac.in/purl/4170 |
Files | Size |
---|---|
Webhosting and Networking.pdf | (2.438Mb) |
Abstract: | The evolution of wireless sensor network technology has enabled us to develop advanced systems for real time monitoring. In the present scenario wireless sensor networks are increasingly being used for precision agriculture. The advantages of using wireless sensor networks in agriculture are distributed data collection and monitoring, monitor and control of climate, irrigation and nutrient supply. Hence decreasing the cost of production and increasing the efficiency of production.This paper describes the application of wireless sensor network for crop monitoring in the paddy fields of kuttand, a region of Kerala, the southern state of India. |
Description: | International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.4, July-Aug 2012 pp-2017-2020 |
URI: | http://dyuthi.cusat.ac.in/purl/3872 |
Files | Size |
---|---|
Wireless Sensor ... pplication in Kuttanad.pdf | (418.0Kb) |
Abstract: | Page 1. The World of Sensor Networks G Santhosh Kumar, CUSAT Kumar, CUSAT Page 2. Are you as quick as Messi or Bale? WSN adidas innovation (source: http://www.wsnblog. com/) Page 3. Fukushima nuclear disaster • Fukushima Rescue Workers Facing Depression and Death • How to measure the levels of radiation of the affected zones without compromising the life of the workers? • Radiation measurements in real-time Page 4. Fukushima nuclear disaster Page 5. Fukushima nuclear disaster Page 6. Goals . |
URI: | http://dyuthi.cusat.ac.in/purl/4165 |
Files | Size |
---|---|
The World of Sensor Networks.pdf | (5.021Mb) |
Now showing items 127-136 of 136
Dyuthi Digital Repository Copyright © 2007-2011 Cochin University of Science and Technology. Items in Dyuthi are protected by copyright, with all rights reserved, unless otherwise indicated.