CFP last date
22 April 2024
Reseach Article

Mining Multiple Text Sequence with Key Management

by G. V Sam Kumar, A. Angel Princes, R. Karthiga, T. Rajesh
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 90 - Number 2
Year of Publication: 2014
Authors: G. V Sam Kumar, A. Angel Princes, R. Karthiga, T. Rajesh
10.5120/15548-4247

G. V Sam Kumar, A. Angel Princes, R. Karthiga, T. Rajesh . Mining Multiple Text Sequence with Key Management. International Journal of Computer Applications. 90, 2 ( March 2014), 32-36. DOI=10.5120/15548-4247

@article{ 10.5120/15548-4247,
author = { G. V Sam Kumar, A. Angel Princes, R. Karthiga, T. Rajesh },
title = { Mining Multiple Text Sequence with Key Management },
journal = { International Journal of Computer Applications },
issue_date = { March 2014 },
volume = { 90 },
number = { 2 },
month = { March },
year = { 2014 },
issn = { 0975-8887 },
pages = { 32-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume90/number2/15548-4247/ },
doi = { 10.5120/15548-4247 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:10:03.296605+05:30
%A G. V Sam Kumar
%A A. Angel Princes
%A R. Karthiga
%A T. Rajesh
%T Mining Multiple Text Sequence with Key Management
%J International Journal of Computer Applications
%@ 0975-8887
%V 90
%N 2
%P 32-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A Text stream is a sequence of chronologically ordered documents, being generated in various forms. Multiple text streams that are correlated to each other by sharing common topics. Our aim is to extract the knowledge of the text stream from the listed documents. In particular, vulnerabilities could include compromise of data security and loss of information which leads to data leakage. To provide a data security and privacy a key management is used. Documents from different sequences about the same topic may have different time stamps termed as asynchronous. Here we first, us e Apriori Algorithm to extract the common topics for the search text from the given data set based on the time stamps using Timestamp-Based Protocols. We also use vormetric encryption algorithm, which combines Encryption and integrated key management to protect and control access to sensitive files on file servers. Second, Ranking is involved in both admin side and user side of mining work which is based on usability of documents.

References
  1. Gabriel Pui Cheong Fung, Jeffrey Xu Yu, Philip S. Yu, Hongjun Lu "Parameter Free Bursty Events Detection in Text Streams" In Proceedings of the 31st international conference on Very large data bases (2005), pp. 181-192 Key: citeulike:8947028}
  2. Hyungsul Kim, Yizhou Sun, Julia Hockenmaier and Jiawei Han"ETM: Entity topic models for mining documents associated with entities". Data Mining(ICDM),2012 IEEE 12th International conference on digital object,2012
  3. IulianPruteanu-Malinici, Lu Ren, John Paisley, Eric Wang and Lawrence Carin"Hierarchical Bayesian Modeling of Topics in Time-Stamped Documents"Pattern Analysis and Machine Intelligence,IEEE Transaction on volume:32,issue:6,2010.
  4. LoulwahAlSumait, Daniel Barbar´a, Carlotta Domeniconi "On-Line LDA: Adaptive Topic Models for Mining Text Streams with Applications to Topic Detection and Tracking"Data Mining,(ICDM)'08. Eigth International conference on Digital Object ,2008.
  5. Na Chen"Rank box: An Adaptive Ranking System for Mining Complex Semantic Relationships Using User Feedback"Information Reuse and Integration(IRI),2012 IEEE 13th International Conference on Digital Object,2012
  6. Qiaozhu Mei "Discovering Evolutionary Theme Patterns from Text An Exploration of Temporal Text Mining"KDD '05 Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, 2005
  7. RamchandraYenape&SharvariGovilkar"New Data Clustering Algorithm for Mining Web Documents"International Journal on Advanced Computer Theory and Engineering (IJACTE), ISSN (Print) : 2319 – 2526, Volume-1, Issue-1, 2012
  8. K. Sundaramoorthy ,Dr. S. Srinivasa Rao Madhane"Efficient Method of Detecting Data Leakage Using Misusability Weight Measure"International Journal of Computational Engineering Research||Vol,03||Issue,4|
  9. Thomas HofmannInternational, Berkeley,"Probabilistic Latent Semantic Indexing" Proceedings of the Twenty- Second Annual International SIGIR Conference on Research and Development in Information Retrieval CA &EECS Department, CS Division, UC
  10. Xing Yi and James Allan"Evaluating topic models for information retrieval"CIKM '08 Proceedings of the 17th ACM conference on Information and knowledge management,2008.
  11. Xuanhui Wang, ChengXiangZhai, Xiao Hu, Richard "Mining Correlated Bursty Topic Patterns from Coordinated Text StreamsProceedingKDD '07 Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, 2007.
  12. Xiaochuan Ni, Jian-Tao Sun, Jian Hu, Zheng Chen "Mining Multilingual Topics from Wikipedia", WWW'09 Proceedings of the 18th international conference on World wide web,2009.
Index Terms

Computer Science
Information Sciences

Keywords

Mining multiple text sequence Ranking key management.