Text Clustering in Distributed Networks with Enhanced File Security

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such approaches, clustering is performed on a dedicated node and also they are not suitable for deployment in large distributed networks. This centralized approach require high processing time and retrieving time during searching due to scalability of users. To overcome this, the Probabilistic text clustering for peer to peer(PCP2P) algorithm was introduced. It provides improved scalability by using a probabilistic approach for assigning documents to clusters. Only most relevant clusters are considered for comparison with each document. PCP2P alone does not provide any security for the system. It only ensures efficient information retrieval of text data by assigning document to most relevant cluster. This project is implemented within a medical research environment. Here, the system is implemented using this PCP2P algorithm and an enhanced version of a security related technique called LZW. Enhanced LZW technique can ensure secure transmissionwithin the system. This technique includes hiding information directly in compression codes. Lempel -Ziv-Welch (LZW) coding is a well known lossless compression algorithm is simple and does not require prior analysis of the source or send extra information to the decoder. This introduces a new input table which contains 255contents. This method, reversibly embeds data in LZW compression codes by modifying the value of the compression codes. The value of the LZW code either remains unchanged or is changed to the original value of the LZW code plus the LZW dictionary size according to the data to be embedded.

Authors and Affiliations

Teena Susan Chandy

Keywords

Related Articles

 Neuro Fuzzy Model for Human Face Expression Recognition

 This paper present an approach to recognize human face expression and emotions based on some fuzzy pattern rules. Facial features for this specially eye and lips are extracted an approximated into curves which re...

 A New Approach to Compressed Image Steganography Using Wavelet Transform

Abstract : This paper proposes a novel steganographic technique that embeds compressed payload image within cover image. The pixel adjustment of the cover image is done optimally using Fourier Transform, so that visual c...

Investigating the Impact of Secure Image Transmission over MIMO-OFDM System

Abstract: The paper implements secure MIMO-OFDM systems to achieve the data confidentiality using the following three different cryptographic techniques, namely, AES block cipher, RC4 stream cipher and the proposed Parti...

 Identify the surgically altered face images using granular-PCA approach

 Abstract: Plastic surgery provide a way to enhance the facial appearance. The non-linear variations introduced by the plastic surgery has raised a challenge for face recognition algorithms. In this research we ma...

 Analysis of Titles from the Questions of the Stack OverflowCommunity Using Natural Language Processing (NLP)Techniques

Abstract: Major online “Question and Answer” forums have proven to be of enormous help to programmersand developers from all parts of the world. One such important forum is the Stack Overflow community. In thispaper, we...

Download PDF file
  • EP ID EP126895
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Teena Susan Chandy (2014).  Text Clustering in Distributed Networks with Enhanced File Security. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 24-30. https://europub.co.uk/articles/-A-126895