Reclaiming Individuality of Mysterious Passage
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3
Abstract
Authorship attribution, the science of inferring characteristics of author from characteristics of documents written by that author become an urgent need to find the original author of anonymous text. In this paper, a novel approach is proposed that attempts to measure the style variation of author using character n-gram profiles. This proposed method is a different approach to identify the author using initial character n-gram whereas prior research has shown the identification on total character ngram. This approach will prove to be quite stable. With the help of small experiment, we attempt to prove it. The results acquired from the mention technique are quite accurate and it hikes to 100% in identifying the author from an anonymous text. Using N-gram frequency profiles, it provides a simple and reliable way to categorize documents in a wide range of classification tasks.
Authors and Affiliations
M. Chaurasia , Dr. Sushil Kumar
REMOTE SENSING IMAGE COMPRESSION USING 3D-SPIHT ALGORITHM AND 3D-OWT
Remote Sensing is the gathering of information about a place from a distance. Such information can occur by sensors or satellite, without making any direct contact with that object. We present a new technique for the com...
Providing security in Vehicular ad hoc networks (VANETs) through historical data collection
Today Vehicular Ad-hoc Networks (VANETs) are needful to improve safety on the roads. But using this kind of networks has a few issues. Providing security is one of the most important issues that users of VANETs are assoc...
Cost Analysis of a Three Layered MIPv6 (TLMIPv6) Mobility Model and HMIPv6
In this paper cost analysis of a three-layer hierarchical model and HMIPv6 is done. The objective of this work is to examine the signaling cost, tunneling cost and packet dropping probability at top level anchor agents o...
Cryptosystem for Information Security
This paper introduces a symmetric cryptosystem for information. Algorithms are described for implementing the proposed method. Cryptanalysis of the proposed scheme is reported along with similar analysis for two popular...
Intelligent Public Transport Information System
To increase the usability of a public transport system it needs to go under revolutionary changes in its operating procedure. It is an attempt to make this possible using recent computer technology, mobile computing adva...