0% found this document useful (0 votes)
59 views

Holographic Data Storage: Text Mining

This paper introduces holographic data storage systems (HDSS), which provide a 3D approach to data storage with fundamental advantages over conventional storage methods. HDSS uses holograms to store data by overlapping multiple pages of data in the same physical space. Some advantages of HDSS include higher storage capacity and faster read/write times compared to magnetic disks or optical disks. Challenges for the future include further development and addressing limitations of the technology.

Uploaded by

Prasanthi Prasu
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views

Holographic Data Storage: Text Mining

This paper introduces holographic data storage systems (HDSS), which provide a 3D approach to data storage with fundamental advantages over conventional storage methods. HDSS uses holograms to store data by overlapping multiple pages of data in the same physical space. Some advantages of HDSS include higher storage capacity and faster read/write times compared to magnetic disks or optical disks. Challenges for the future include further development and addressing limitations of the technology.

Uploaded by

Prasanthi Prasu
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

HOLOGRAPHIC DATA STORAGE

ABSTRACT: This paper provides a description of different type of data storage systems along with examples. Later it introduces the concept holographic data storage system (HDSS), a three dimensional data storage system which has a fundamental advantage over previously mentioned conventional read/write memory systems. The theory behind HDSS and working is seen, which is followed by some advantages of HDSS with respect to other systems are discussed. Later the working is seen which discusses reading, writing and some multiplexing techniques. Then Holographic Versatile Disk (HVD) is discussed. The future development and challenges of holographic memory is then presented, followed by conclusion.

Text Mining

Abstract
The volume of information circulating in a typical enterprise continues to increase. Knowledge hidden in the information however, is not fully utilized, as most of the information is described in textual form (as sentences). A large amount of text information can be analyzed objectively and efficiently with Text Mining.The field of text mining has received a lot of attention due to the ever increasing need for managing the information that resides in the vast amount of available text documents. Text documents are characterized by their unstructured nature. Ever increasing sources of such unstructured information include the World Wide Web, biological databases, news articles, emails etc. Text mining is defined as the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources. A key element is the linking together of the extracted information together to form new facts or new hypotheses to be explored further by more conventional means of experimentation. As the amount of unstructured data increases, text-mining tools will be increasingly valuable. A future trend is integration of data mining and text mining into a single system, a combination known as duo-mining

FINGER TRACKING IN REAL-TIME HUMAN COMPUTER INTERACTION


ABSTRACT:

For a long time research on human-computer interaction(HCI) has been restricted to techniques based on the useof monitor, keyboard and mouse. Recently this paradigmhas changed. Techniques such as vision, sound, speechrecognition, projective displays and location awaredevices allow for a much richer, multi-modal interaction between man and machine. Finger-tracking is usage of bare hand to operate acomputer in order to make human-computer interactionmuch more faster and easier. Fingertip finding deals with extraction of information from hand features and positions. In thismethod we use the position and direction of thefingers in order to get the required segmentedregion of interest.

Privacy Preserving Data Mining


Abstract In this paper we address the issue of privacy preserving data mining. Specically, we consider ascenario in which two parties owning condential databases wish to run a data mining algorithm onthe union of their databases, without revealing any unnecessary information. Our work is motivatedby the need to both protect privileged information and enable its use for research or other purposes.The abov e problem is a specic example of secure multi -party computation and as such, can besolved using known generic protocols. However, data mining algorithms are typically complex and,furthermore, the input usually consists of massive data sets. The generic protocols in such a case areof no practical use and therefore more e cient protocols are required. We focus on the problem of decision tree learning with the popular ID3 algorithm. Our protocol is considerably more e cient thangeneric solutions and demands both very few rounds of communication and reasonable bandwidth

You might also like