A. A. Rampuria

  • Citations Per Year
Learn More
The use of cryptography for data protection has received a great deal of attention in recent years. This paper presents computationally efficient algorithms for the implementation of a one-time pad scheme. The algorithms to encipher and decipher text were implemented on aPDP-11 computer using the programming languageC. To study the behavior of the keys used(More)
In this paper, we investigate the problem of classifying user behavior using freely available user generated data like tweets on Twitter, reviews on Amazon and eBay etc. We follow the primary 25-label categorization that Amazon uses to bucket their products. By parsing a user’s tweets, our algorithm attempts to predict which of the 25 categories the user is(More)
Google makes hundreds of gigabytes of n-gram data available as part of the Google Books project, a massive dataset of words, phrases, and metadata that has been underutilized. We aim to predict the distribution of an unseen 5-gram and display it similarly to the phrase occurrence graph Google’s NGram Viewer has and then use 5-gram distribution predictions(More)
  • 1