Introduction
The process of analyzing data form different perspectives and summarizing it into useful information that can be used to bring the solution of the different problem so the to bring changes is important to us. Software in one of a number of analytical tools for analyzing data.
At before:
Human have been manually extracting information from data for centuries, but due to the increase of data volumes in modern times people discover a new method called the automatic approaches.
Data mining technically, is the process of extracting the hidden patterns from large amount of data, also the process of finding corrections or pattern among dozens in large relational database.
How data mining work
Information technology has been evolving separate transaction and analytical systems data mining provides the link between the, Data mining software analyzes relationships and patterns in stored transaction data based on open-ended user queries. Several types of analytical software are statistical, machine learning, and neural networks.
Forms of data mining different data can be created from different source or forms which are
Ø Text mining is the process of deriving high quality information from text. High quality information is typically derived through the dividing of pattern and trends through means such as statistical pattern learning.
Ø Audio mining the content of an audio signal can be automatically analyzed and searched, commoly used in the field of automatic speech recognition.
Ø Relational database and social network data mining
Video data mining through watching video different information can be obtain
Ø Image data mining is another form of data where by information can be found
Ø Wed data mining the application of data mining in the extraction of the hidden data from the web
Also there are stages of data mining which are
Ø Exploration: this stage usually starts with data preparation which involves cleaning data and data transformation.
Ø Model bailing and validation: this stage involves considering various models and choosing the best one based on their predictive performance.
Ø Deployment: this is the final stage which involves using the model selected as best in the previous stage and applying it to new data in order to generate predictions or estimates of the expected outcomes.
Extraction of data from different source is important in marking, banking, law enforcement and researchers. The information that obtain can help researchers and menagengment to come out with the report and the solution of the different issues concerned. Also it is disadvantage in security issues, misuse of information and privacy issues.
Thursday, 23 April 2009
Friday, 10 April 2009
AUTOMATIC ESSAY ASSESSMENT
Introduction
Different research has been done to develop the computer system on essay assessment. During 1960s the reasechers make a research which based on essay assessment. In 1966s they come out with the project called Project Essay Grading (PEG) which means the total number of words and the length of the essay.
Automatic essay assessment is the electronic assessment of the essay, machine are used in the evaluation of the essay, automatic grade essay by comparing them to learning materials and human grade essay.Lerining materials form the basis of determining the amount of relevant content in essay. Different criteria’s are set to the computer according to the aim of the maker in order to get the grade of the essay.
It is important to have the software which can help in the evaluation program; Automatic essay assessment is advantage to the teacher and the student. To the teacher, automatic essay assessment it save a time in marking process and evaluation and it give the final required grade also help the teacher to be consistency. To student it looks the quality of the students work and not comparisons with others, it support students to reflect learning process, also provide real feedback to the students and it challenge students to think critically.
Automatic essay assessment it needs high qualified people on setup and it is cost full for making program, in order to set the criteria’s within the computer it need people who have a knowledge of computer and also the cost of the software is higher.
Most of the essays are in hardcopy rather than softcopy due to the changes in technology we should make changes on the evaluation of the essays, to have the machines which can assess different thing in softcopy because it provide the required result.
The automatic essay assessment is important according to its advantages therefore we need to make the improvement in the different centers so as to provide the required result and to avoid unnessary claims within the institutions.
.
Different research has been done to develop the computer system on essay assessment. During 1960s the reasechers make a research which based on essay assessment. In 1966s they come out with the project called Project Essay Grading (PEG) which means the total number of words and the length of the essay.
Automatic essay assessment is the electronic assessment of the essay, machine are used in the evaluation of the essay, automatic grade essay by comparing them to learning materials and human grade essay.Lerining materials form the basis of determining the amount of relevant content in essay. Different criteria’s are set to the computer according to the aim of the maker in order to get the grade of the essay.
It is important to have the software which can help in the evaluation program; Automatic essay assessment is advantage to the teacher and the student. To the teacher, automatic essay assessment it save a time in marking process and evaluation and it give the final required grade also help the teacher to be consistency. To student it looks the quality of the students work and not comparisons with others, it support students to reflect learning process, also provide real feedback to the students and it challenge students to think critically.
Automatic essay assessment it needs high qualified people on setup and it is cost full for making program, in order to set the criteria’s within the computer it need people who have a knowledge of computer and also the cost of the software is higher.
Most of the essays are in hardcopy rather than softcopy due to the changes in technology we should make changes on the evaluation of the essays, to have the machines which can assess different thing in softcopy because it provide the required result.
The automatic essay assessment is important according to its advantages therefore we need to make the improvement in the different centers so as to provide the required result and to avoid unnessary claims within the institutions.
.
Tuesday, 7 April 2009
SPEAKER RECOGNITION
Introduction
Different machine can be use to recognition the voice of the speaker. Through making comparison of the current speech and the previous stored speech we can be able to recognize the voice of someone just by hearing him/her speech.
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech signals. There is the different between speaker recognition and speech recognition. Speaker recognition is the recognizing who is speaking. Speech recognition is the recognizing what is being said.
Speaker recognition can be classified into two classes that is:
Speaker Identification is the identification of a single user voice among many users voice.Here they will be many voices but machine make the identication of a single voice.
Speaker Verification is the process of verify a single voice by compared with the previous voice with the current one.
System of speaker recognition can be work through the conversion of the signals that is analogy speech signals to digital siginals.Comparisional of the current speech and the previous stored speech that is the store speech must be equal to current speech in order for machine to recognize and produce the outcome the voice.
Speaker recognition is important because is used to help in control of access to restricted services, for example, phone access to banking, database services, shopping or voice mail, and access to secure equipment.
For security purpose and in military operations.
In different areas speaker recognitionation techniques can be used:
Authentication; allows the users to identify themselves using nothing else but their voices.
Surveillance; for security agencies i.e. means of collecting information.
Forensic; for proving the identity of the recorded voice.
The system can be faced with the problems like
Determining what the correct units to be recognized that is the voice to be recognize must be contain correct units and words. Finding the boundaries of these units in the signal also variability in unity of speech.
In order to overcome the problem we should be use the exactly word required, maintain the voice pitch and to be aware of the environment condition.
Generally the system is important, because we can be able to recognize the voice of different people and also machine can help us to recognize the voice through comparison of the voices. Through the use of machine time is saved that is for the short time to can recognition a lot of the voices.
Presented by: Benjamin Mkwesa
Ruben Minael
Different machine can be use to recognition the voice of the speaker. Through making comparison of the current speech and the previous stored speech we can be able to recognize the voice of someone just by hearing him/her speech.
Speaker recognition is the process of automatically recognizing who is speaking on the basis of individual information included in speech signals. There is the different between speaker recognition and speech recognition. Speaker recognition is the recognizing who is speaking. Speech recognition is the recognizing what is being said.
Speaker recognition can be classified into two classes that is:
Speaker Identification is the identification of a single user voice among many users voice.Here they will be many voices but machine make the identication of a single voice.
Speaker Verification is the process of verify a single voice by compared with the previous voice with the current one.
System of speaker recognition can be work through the conversion of the signals that is analogy speech signals to digital siginals.Comparisional of the current speech and the previous stored speech that is the store speech must be equal to current speech in order for machine to recognize and produce the outcome the voice.
Speaker recognition is important because is used to help in control of access to restricted services, for example, phone access to banking, database services, shopping or voice mail, and access to secure equipment.
For security purpose and in military operations.
In different areas speaker recognitionation techniques can be used:
Authentication; allows the users to identify themselves using nothing else but their voices.
Surveillance; for security agencies i.e. means of collecting information.
Forensic; for proving the identity of the recorded voice.
The system can be faced with the problems like
Determining what the correct units to be recognized that is the voice to be recognize must be contain correct units and words. Finding the boundaries of these units in the signal also variability in unity of speech.
In order to overcome the problem we should be use the exactly word required, maintain the voice pitch and to be aware of the environment condition.
Generally the system is important, because we can be able to recognize the voice of different people and also machine can help us to recognize the voice through comparison of the voices. Through the use of machine time is saved that is for the short time to can recognition a lot of the voices.
Presented by: Benjamin Mkwesa
Ruben Minael
Friday, 3 April 2009
CRYPTOGRAPHY
CRYPTOGRAPHY
Introduction
All the secrets and strategies must be protected in order to be at faith place, within the nation and all our the world different centers have things which are secret and are important for the company
So all that issue must be kept at good situation. Through studying Cryptography we can be able to keep the important issues secret.
Cryptography is the study of ways to convert the information from its normal, comprehensible form into an obscured guise. Also in modern time cryptography is considered a branch of mathematics and computer science and is related closely with information theory and computer security. These is used in application present in technologically
The technology was used by Egyptians some 4000 years ago to 20th c where it played a crucial role in the outcome of both world wars, In 20th c world of computer network message are digitally encrypted on the sending side and decrypted on the receiving side using the cryptographic services and algorithms
Component of cryptograph
There are two basic cryptograph which are, An algorithm (or cryptographic method) and Keys.
Algorithms are complex mathematical formulae, and Keys are string of bits. In order the to be understood both communicator must use the same algorithm and also they must use the same key.
There are several ways of classifying cryptograph; these are Secret key system and Public key system.
Secret key a single key is used for both encryption and decryption that is both of the communicator have the same kind of key.
Public key here there are different key which can be used that is one key for encryption and another key for decryption. Public key is modern as compared to secret key, digital signature capability.
Also cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, in all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext.
Uses of cryptography
Integrity assuring the receiver of that message received at right way not altered in any way from the original.
Non-repudiation a mechanism to prove that the sender really sent this message.
Privacy/confidentially assuring that no one can read the message except the intended receiver.
Introduction
All the secrets and strategies must be protected in order to be at faith place, within the nation and all our the world different centers have things which are secret and are important for the company
So all that issue must be kept at good situation. Through studying Cryptography we can be able to keep the important issues secret.
Cryptography is the study of ways to convert the information from its normal, comprehensible form into an obscured guise. Also in modern time cryptography is considered a branch of mathematics and computer science and is related closely with information theory and computer security. These is used in application present in technologically
The technology was used by Egyptians some 4000 years ago to 20th c where it played a crucial role in the outcome of both world wars, In 20th c world of computer network message are digitally encrypted on the sending side and decrypted on the receiving side using the cryptographic services and algorithms
Component of cryptograph
There are two basic cryptograph which are, An algorithm (or cryptographic method) and Keys.
Algorithms are complex mathematical formulae, and Keys are string of bits. In order the to be understood both communicator must use the same algorithm and also they must use the same key.
There are several ways of classifying cryptograph; these are Secret key system and Public key system.
Secret key a single key is used for both encryption and decryption that is both of the communicator have the same kind of key.
Public key here there are different key which can be used that is one key for encryption and another key for decryption. Public key is modern as compared to secret key, digital signature capability.
Also cryptographic schemes typically used to accomplish these goals: secret key (or symmetric) cryptography, public-key (or asymmetric) cryptography, and hash functions, in all cases, the initial unencrypted data is referred to as plaintext. It is encrypted into ciphertext, which will in turn (usually) be decrypted into usable plaintext.
Uses of cryptography
Integrity assuring the receiver of that message received at right way not altered in any way from the original.
Non-repudiation a mechanism to prove that the sender really sent this message.
Privacy/confidentially assuring that no one can read the message except the intended receiver.
Subscribe to:
Posts (Atom)