Text Clustering in Distributed Networks with Enhanced File Security

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Text Clustering technique is widely used in both centralized and distributed environments for information retrieval. Centralized approaches are used in traditional text clustering algorithms. In such approaches, clustering is performed on a dedicated node and also they are not suitable for deployment in large distributed networks. This centralized approach require high processing time and retrieving time during searching due to scalability of users. To overcome this, the Probabilistic text clustering for peer to peer(PCP2P) algorithm was introduced. It provides improved scalability by using a probabilistic approach for assigning documents to clusters. Only most relevant clusters are considered for comparison with each document. PCP2P alone does not provide any security for the system. It only ensures efficient information retrieval of text data by assigning document to most relevant cluster. This project is implemented within a medical research environment. Here, the system is implemented using this PCP2P algorithm and an enhanced version of a security related technique called LZW. Enhanced LZW technique can ensure secure transmissionwithin the system. This technique includes hiding information directly in compression codes. Lempel -Ziv-Welch (LZW) coding is a well known lossless compression algorithm is simple and does not require prior analysis of the source or send extra information to the decoder. This introduces a new input table which contains 255contents. This method, reversibly embeds data in LZW compression codes by modifying the value of the compression codes. The value of the LZW code either remains unchanged or is changed to the original value of the LZW code plus the LZW dictionary size according to the data to be embedded.

Authors and Affiliations

Teena Susan Chandy

Keywords

Related Articles

 An image compression using using discrete cosine transforms and JPEG enconder

The proposed Multiresolution decomposition through wavelets transform of fractals coded images reveal strong relationships limit the frequency content .The research is includes other extensions of the wavelet transform...

 Yours Advance Security Hood (Yash)

[sub][/sub] Hacking of any online account is a practice done by an unauthorized person to get an access in an account of some other person. People says that usually person get hacked because of his own mistake of...

 Automatic Identification of moving Objects in a Scene using Corners features

Abstract: This Paper presents an automated method to identify the moving objects. The proposed method is a combination of Corner Detectors, Area Based Tracking, K – Means clustering. The Corner Detectors used in this are...

Face Detection and Recognition using Viola-Jones algorithm and fusion of LDA and ANN

Abstract: Building a computational model for recognizing a face is a complicated task as the face is a complex multidimensional visual model. The proposed paper focuses on human face recognition by calculating the featur...

 Design and Development of Database and Automatic Speech Recognition System for Travel Purpose in Marathi

 Abstract: Past research in mathematics, acoustics, and speech technology have provided many methods for converting data that can be considered as information if interpreted correctly. In order to find some statisti...

Download PDF file
  • EP ID EP126895
  • DOI -
  • Views 104
  • Downloads 0

How To Cite

Teena Susan Chandy (2014).  Text Clustering in Distributed Networks with Enhanced File Security. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 24-30. https://europub.co.uk/articles/-A-126895