Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819801
E. Daniel, S. Durga, S. Seetha
Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.
{"title":"Panoramic View of Cloud Storage Security Attacks: an Insight and Security Approaches","authors":"E. Daniel, S. Durga, S. Seetha","doi":"10.1109/ICCMC.2019.8819801","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819801","url":null,"abstract":"Recent years the computer technologies are reaching every corner in the world through the cloud computing services. Cloud storage has many advantages and it allows the user to store a large amount of critical and sensitive data in the cloud. As we store the critical information in the cloud, the information attracts the highly skilled hackers to access the data in the cloud by breaching the security mechanisms. This paper discusses specific attacks related to efficient and secure storage of data in cloud. Specifically, we outline network-based, browser-based and social network-based attacks. We classify the mechanisms and prominent security systems available to handle the challenges faced by these security threats. The study contributes to the overview of drawbacks in state of art mechanisms and it's mitigations techniques to protect the outsourced data. The analysis enables to develop a suitable architecture for efficient and secure storage which outperforms the existing systems with low performance, high communication overheads, high computation cost, less efficiency, limited access for a system, less number of security properties and difficulty in handling the system.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127882930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819629
Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare
This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.
{"title":"Simulation and Analysis of Series Active Filter Using AC-AC Converter for Mitigation of Sag","authors":"Ankita R. Gothane, Bhakti B. Baliwant, V. Waghmare","doi":"10.1109/ICCMC.2019.8819629","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819629","url":null,"abstract":"This paper presents three phase Series Active Filter using AC-AC Converter for mitigation of sag.. Now-a-days, industrial and distribution(domestic) consumers face problems associated with voltage and power quality. Voltage quality is mostly permeated by voltage sags, swells and interruptions. But, voltage sags occur more frequently than interruptions .To overcome this problem, series active filter is used, which is one of the most suitable and economical solution to compensate for voltage sags.. The proposed system is based on AC-AC converter with injection transformer. The operation principle and theoretical analysis of series active filter are presented. Here, AC-AC converters are used which eliminates the need of energy storage devices. The simulation and design of series active filter performance with results are shown in this paper.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819772
Soni P M, V. Paul
The most suitable predictive modelling technique to predict the loan repayment capability of a customer in a banking industry is classification. Classification is a supervised learning technique in data mining. The loan repayment capability of a customer can be predicted more accurately using random forest algorithm. The accuracy of the prediction depends on various parameters of the random forest algorithm. The main objective of this paper is to prove that optimization of parameters results in a better accuracy for the capability prediction of loan repayment by the customers. This paper illustrates the process of optimization that leads to an improved accuracy in classification. The comparative study explains that optimization can lead to a better accuracy and the experiments were done in weka and R.
{"title":"A Novel Optimized Classifier For the Loan Repayment Capability Prediction System","authors":"Soni P M, V. Paul","doi":"10.1109/ICCMC.2019.8819772","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819772","url":null,"abstract":"The most suitable predictive modelling technique to predict the loan repayment capability of a customer in a banking industry is classification. Classification is a supervised learning technique in data mining. The loan repayment capability of a customer can be predicted more accurately using random forest algorithm. The accuracy of the prediction depends on various parameters of the random forest algorithm. The main objective of this paper is to prove that optimization of parameters results in a better accuracy for the capability prediction of loan repayment by the customers. This paper illustrates the process of optimization that leads to an improved accuracy in classification. The comparative study explains that optimization can lead to a better accuracy and the experiments were done in weka and R.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131569099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819741
Palagati Bhanu Prakash Reddy, M. K. Reddy, G. Reddy, K. Mehata
Fake data detection is the most important problem to be addressed in the recent years, there is lot of research going on in this field. Because of its serious impacts on the readers. researchers, government and private agencies working together to solve the issue. This paper represents a hybrid approach for fake data detection using the multinomial voting algorithm. This algorithm was tested with multiple fake news dataset which resulted in an accuracy score of 94 percent which is a benchmark in the machine learning field where the other algorithms are at a range of 82 to 88 percent. The list of algorithms that have been used here is as follows Naive Bayes, Random Forest, Decision Tree, Support Vector Machine, K Nearest Neighbors. All these algorithms use training data as the bag of words model which was created using Count Vectorizer. Experimental data has collected from the Kaggle data world. Python is used as a language to verify and validate the results. Tableau is used as a visualization tool. Implementation is carried out using default algorithm values.
{"title":"Fake Data Analysis and Detection Using Ensembled Hybrid Algorithm","authors":"Palagati Bhanu Prakash Reddy, M. K. Reddy, G. Reddy, K. Mehata","doi":"10.1109/ICCMC.2019.8819741","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819741","url":null,"abstract":"Fake data detection is the most important problem to be addressed in the recent years, there is lot of research going on in this field. Because of its serious impacts on the readers. researchers, government and private agencies working together to solve the issue. This paper represents a hybrid approach for fake data detection using the multinomial voting algorithm. This algorithm was tested with multiple fake news dataset which resulted in an accuracy score of 94 percent which is a benchmark in the machine learning field where the other algorithms are at a range of 82 to 88 percent. The list of algorithms that have been used here is as follows Naive Bayes, Random Forest, Decision Tree, Support Vector Machine, K Nearest Neighbors. All these algorithms use training data as the bag of words model which was created using Count Vectorizer. Experimental data has collected from the Kaggle data world. Python is used as a language to verify and validate the results. Tableau is used as a visualization tool. Implementation is carried out using default algorithm values.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"58 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134380212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819690
Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman
By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.
{"title":"A new approach to ROI based image compression using simple sliding window spatial filter","authors":"Rajasekhar Reddy M, Ravichandran K.S., Anashwara. P, A. S, Venkatraman","doi":"10.1109/ICCMC.2019.8819690","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819690","url":null,"abstract":"By reducing the file size, the number of images stored in the given amount of hard disk can be increased and the time required to send images over the internet has been reduced. Image compression is the common and adaptive method used for reducing all the chunks in our day to day life. There are many existing techniques and protypes available for compression. This paper deals with the special concepts on image compression using simple sliding window spatial filter or mean filter. The desired region can be selected using ROI from the image which can be processed for further compression of images. The proposed method uses DCT followed by the suitable encoding techniques. Various combinations of compression applied to come across the best one.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128463477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819739
Gadde Doondi Srinath, M. Samson
In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.
{"title":"Fault Tolerance in VLSI Circuit with Reducing Rollback Cost using FSM","authors":"Gadde Doondi Srinath, M. Samson","doi":"10.1109/ICCMC.2019.8819739","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819739","url":null,"abstract":"In this generation, the revolutionary growth in nanometer technologies brought the drastic change in reduction of device size, increase in complexity, increasing operating speed and decrease in power consumption, which are more sensitive to various kinds of problems. In a combinational logic to protect the faults which are transient are not considered generally as this logic has a common hurdle to stop the faults propagation. In this architecture, there are three cover-up factors used in the process of electrical, logical, and window latch. With these factors, as the industry of processors progress in these days, the chances of generation of transient faults as well as the latches on subsequent element is reduced. Solutions that insulate the whole design are usually very expensive. So that, to implement the rollback, a fixed rollback of K-cycle or a rollback with checkpoint is used. This paper proposes a hardware architecture and the implementations of algorithm, which cut downs the rollback rate in all kind of circuits.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819833
Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey
Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.
{"title":"A Survey on Fundamental of Wireless Sensor Network with Various Issues in Optimization","authors":"Kumkum Dubey, Prashant S. Kumar, Pragati Pathak, Shobhit Kumar, Prince Rajpoot, S. Pandey","doi":"10.1109/ICCMC.2019.8819833","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819833","url":null,"abstract":"Wireless Sensor Network (WSN) is becoming the very provocative model to executing the surveillance tasks and monitoring. In spite of that there are many challenges grow increasingly to reduce the packet loss rate, energy depletion in order to enlarge the network lifetime. In this appraisement paper, we can oversee the recently research work and implementation method to make efficient network. Here we analyse the discrete techniques use in multi-objective optimization (MOO). During the last years, the problems arises in the real world optimization and to solve these types of problems, many researchers believe that multi-population techniques are the primarily used solution. It is based on the optimization of nature inspired algorithm. These techniques are one of the solution of multi-objective optimization. Hence, this review paper provide us the summary of all published publish work and future work. Which is depend on the method of multi-population. After the realization of methods used in multi-population based algorithm and significance of these methods. We noticed that this is time to give a summarization of the different published research work, and there are various aspects that used to discussing the future work. Hence, the main motive of this paper is to give a review of all summarize techniques used in the optimization of nature inspiration. Which are based on multi-population methods. The consequence issues in the method of multi-population that will also give a review and see the major application in the field of engineering and science. Basically, the proposed survey paper provide us a brief knowledge of the problems related to the real world optimization and its future work.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116343625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819747
Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta
Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.
{"title":"Comparison of acoustical models of GMM-HMM based for speech recognition in Hindi using PocketSphinx","authors":"Chadalavada Sai Manasa, K. J. Priya, Deepa Gupta","doi":"10.1109/ICCMC.2019.8819747","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819747","url":null,"abstract":"Automatic Speech recognition (ASR) is widely gaining momentum worldwide, to be used as a part of Human Computer Interface and also in a wide variety of commercial applications. In Indian context, commercial applications using automatic speech recognition are still in the evolving process. This paper describes the acoustic models that have been cross language adapted for speech recognition in Hindi using CMU’s PocketSphinx. A database of 177 words in Hindi is prepared, along with transcription and dictionary. Two approaches for developing acoustical model for the speech recognition has been discussed in this paper. In the first approach, English acoustical model has been cross-language adapted to Hindi. In the second approach different acoustical models -continuous, semi continuous and phonetically tied models have been trained. GMM-HMM is used for acoustical modeling and language modeling.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114289336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819848
T. K. Babu, C. D. Guruprakash
Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.
云存储为用户的数据提供了相当高的效率和安全性,并为用户提供了很高的灵活性。黑客试图通过多次攻击来窃取云中的数据,这增加了人们对云数据安全的担忧。引入第三方审计(Third Party Auditing, TPA)方法对数据的完整性进行检查。为了提高数据完整性检查方法的保密性和效率,开发了几种TPA方法。本文从功能、安全性和综合性能等方面分析了TPA中涉及的各种方法。默克尔哈希树(MHT)方法在检查数据完整性方面提供了效率和安全性。本文还分析了证明验证的计算开销。大多数TPA方法的通信成本较低,公共审计的安全性需要改进。
{"title":"A Systematic Review of the Third Party Auditing in Cloud Security: Security Analysis, Computation Overhead and Performance Evaluation","authors":"T. K. Babu, C. D. Guruprakash","doi":"10.1109/ICCMC.2019.8819848","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819848","url":null,"abstract":"Cloud storage offers a considerable efficiency and security to the user’s data and provide high flexibility to the user. The hackers make attempt of several attacks to steal the data that increase the concern of data security in cloud. The Third Party Auditing (TPA) method is introduced to check the data integrity. There are several TPA methods developed to improve the privacy and efficiency of the data integrity checking method. Various methods involved in TPA, have been analyzed in this review in terms of function, security and overall performance. Merkel Hash Tree (MHT) method provides efficiency and security in checking the integrity of data. The computational overhead of the proof verify is also analyzed in this review. The communication cost of the most TPA methods observed as low and there is a need of improvement in security of the public auditing.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127777740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICCMC.2019.8819687
Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja
The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.
{"title":"A Comparative Study on Parsing in Natural Language Processing","authors":"Sandeep Kiran, Charan R Shesha Sai, Priyanka, M. Pooja","doi":"10.1109/ICCMC.2019.8819687","DOIUrl":"https://doi.org/10.1109/ICCMC.2019.8819687","url":null,"abstract":"The main focus of this paper is to deduce which parsing technique is better among the natural language processing techniques. A brief study of LR parsing, its construction and implementation, providing limitations (drawback) on different types of parsing. Comparing LR parsing, through proven results and usage in the field of ‘Natural Language Processing’ and comparing different methods of parsing. Showing drawbacks of LL parsing and coming to the conclusion that LR is more efficient than other parsing methods.","PeriodicalId":232624,"journal":{"name":"2019 3rd International Conference on Computing Methodologies and Communication (ICCMC)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125041999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}