Chutani S;Singh L
001991 Chutani S;Singh L (Computer Science Dep, ITM, Gurgaon, Email: sumanch09@gmail.com) : Analysis of timing parameter in emotional speech-A cross language study. VOYAGER 2008, 6(1), 73-5.
Comparative study on basic emotions (anger, joy, sad) as well as neutral was carried out on speech samples of male/female speakers of Hindi, English and Punjabi. The focus of the study was on investigating the role of temporal properties like articulation rate in encoding these basic emotions. The results show that the ariability in gender and languages was more in articulation rate. Articulation rate is a better marker for emotions. The findings also suggest timing parameters play bigger role in these three languages. The present study has implications in emotion recognition, speech synthesis and text to speech conversion.
3 illus, 1 table, 8 ref
Chandra P;Jain A;Gupta M K
001990 Chandra P;Jain A;Gupta M K (USIT, Guru Gobind Singh INdraprastha University, Delhi) : Query optimization in oracle. VOYAGER 2008, 6(1), 18-22.
In database systems, user submits query and that query will be responded by the DBMS. Generally, there are a variety of methods for computing the response of the given query. It is the responsibility of the query processor to transform the query as entered by the user into an equivalent query that can be computed more efficiently. Query optimization is the process to find a good strategy or best query evaluation plan for processing a query. Discusses about the general query optimization techniques and the techniques used by the Oracle for optimizing the queries.
2 illus, 8 ref
Chaba Y;Patel R B;Gargi R
001989 Chaba Y;Patel R B;Gargi R (CSE Dep, G.J.U. of Sc. & Tech., Hissar) : Analysis of mobility model for mobile adhoc network. VOYAGER 2008, 6(1), 50-5.
Ad hoc networks can operate without fixed infrastructure and can survive rapid changes in the network topology. They can be viewed as graphs in which the set of edges varies in time. The location of nodes determines whether any pair of nodes has a direct communication link and the location of each node is determined by movement. These links are used for creating routes between nodes that are not adjacent. When a link that is part of a route goes down, the route has to be rebuilt, which causes delays, packet loss and routing protocol overhead in the the network. Since not many MANETs are currently deployed, research in this area is mostly simulation based. Choosing mobility model that describes the movements of the nodes is one of the most important choices of simulation parameters. A rich set of parameterized mobility modoels are introduced in this paper including Random Waypoint, Group Mobility, city Section based Freeway and Manhattan models. The performance rankings of protocols may vary with the mobility models used.
3 illus, 9 ref
Ahmed M E
001988 Ahmed M E (Dep of CSE&IT, Institute of Technology & Management, Gurgaon-122 017, Email: ahmedezaz@rediffmail.com ) : Investigation of reliability management performance through knowledge based system. VOYAGER 2008, 6(1), 12-17.
Discusses some relevant knowledge-based systems developed during the last fifteen years for reliability management applications, among them, a fuzzy expert systems that developed for the implementation of reliability centered maintenance (RCM) in the initial design phases of industrial processes.
1 illus, 14 ref
Waldschmidt M
001006 Waldschmidt M (Michel Waldschmidt, Universite Pierre et Marie, Curie-Paris 6, UMR 7586 IMJ, 175 rue du Chevaleret, Paris, F-75013 France) : Arithmetic and cryptography. Resonance 2008, 13(5), 440-55.
Among the unexpected features of recent developments in technology are the connections between classical arithmetic on the one hand, and new methods for reaching a better security of data transmission on the other. Illustrate this aspect of the subject by showing how modern cryptography is related to our knowledge of some properties of natural numbers. As an example, we-explain how prime numbers play a key role in the process which enables you to withdraw safely your money from your bank account using ATM (Automated Teller Machines) with your secret PIN (Personal Identification Number) code.
6 ref
Natarajan A M;Premalatha K
000012 Natarajan A M;Premalatha K (NO, Kongu Engineering College, Perundurai-638 052, Email: principal@kongu.ac.in) : Three dimensional concept-based indexing for XML documents. Int J Syst Cybernetics Inf 2007, (Jul), 40-5.
In concept based indexing the documents are viewed as collection of concepts and indexed according to the meaning rather than terms. This will require construction of concept hierarchy which consists of collection of concepts and their interrelationships. The proposed system uses concept hierarchy to extract concepts from the XML document. The semantic importance of each term present in the concept is calculated and it is represented in 3D Lattice Cube. But this one is sparse and not efficient in terms of space and access time. To improve the performance of the information retrieval, K-Means clustering is employed to generate several smaller lattice cubes that are not sparse. Now the queries can be directed to appropriate cluster and also querying is faster in a smaller lattice cubes.
11 illus, 1 table, 15 ref