Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vigneshwari, S.
- Social Information Retrieval Based on Semantic Annotation and Hashing upon the Multiple Ontologies
Abstract Views :233 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Sathyabama University, Chennai, IN
2 Perunthalaivar Kamarajar Institute of Engineering and Technology, Karaikal, Tamilnadu, IN
1 Department of Computer Science and Engineering, Sathyabama University, Chennai, IN
2 Perunthalaivar Kamarajar Institute of Engineering and Technology, Karaikal, Tamilnadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 2 (2015), Pagination: 103-107Abstract
Ontology is the best way for representing the useful information. In this paper, we have planned to develop a model which utilizes multiple ontologies. From those ontologies, based on the mutual information among the concepts the taxonomy is constructed, then the relationship among the concepts is calculated. Thereby the useful information is extracted. There is multiple numbers of ontologies available through the web. But there are various issues to be faced while sharing and reusing the existing ontologies. To resolve the ambiguity which exists, when comparing two concepts are semantically similar, but physically different, an approach is proposed here to index and retrieve the documents from two different ontologies. The ontologies used are WordNet and SWETO ontology. The results are compared based on semantic annotation based on RMS and hashing between the cross ontologies using Rabin Karp fingerprinting algorithm. Also the datasets are trained to yield better results.Keywords
Concept Similarity, Information Extraction, Hashing, Ontological Relationship, Semantic Annotation, Training the Ontology.- Enhancing the Keyword Search on XML Documents thereby Personalizing the Web-A Comparative Approach
Abstract Views :156 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Science and Engineering, Sathyabama University, Chennai, Tamilnadu, IN
2 Department of Information Technology, Perunthalaivar Kamarajar Institute of Science and Technology, Karaikal, Tamilnadu, IN
1 Department of Computer Science and Engineering, Sathyabama University, Chennai, Tamilnadu, IN
2 Department of Information Technology, Perunthalaivar Kamarajar Institute of Science and Technology, Karaikal, Tamilnadu, IN
Source
Data Mining and Knowledge Engineering, Vol 4, No 6 (2012), Pagination: 314-317Abstract
XML data format has become an important one nowadays, because of its compatibility and manageability. XML formats are suitable for both structured data as well as unstructured data. Keyword search can be integrated with XML query processing for querying several XML documents at the same time. Processing XML queries with keyword search is supported by both RDBMS and XML databases. Both the databases are compared as well as web page personalization is also discussed.Keywords
XML Query Processing, KMP, Information Retrieval, Relational Databases, DST, XML Table.- Group Data Verification for Enhancing the Storage Security in Cloud Computing
Abstract Views :149 |
PDF Views:0
Authors
Affiliations
1 Faculty of Computing, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
1 Faculty of Computing, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 45 (2016), Pagination:Abstract
Objectives: A privacy-preserving mechanism for public auditing of shared data in cloud storage has been proposed. This boosts up the effectiveness of the verification task which is meant for auditing multiple tasks. It also reduces the response time and auditing time and thereby improves data integrity. Methods/Analysis: A privacy preserving methodology has been proposed which sustains the social interaction and examination on the data which is being mutually shared across the cloud. In scrupulous, ring signatures have been utilized to enhance the verifiability of the computed metadata and to improve the accuracy of the group data analysis. The proposed system maintains the secrecy of the mutual data. The confidentiality of the specific user in the group is ensured by data filtering mechanism. This mechanism masks the user’s private data from being accessed publicly across the cloud. The proposed system also supports multi-group audits simultaneously. Findings: A distinct privacy preserving mechanism is rarely available in the cloud storage especially for shared data. Also the personal information should not be disturbed by public verifiers. The ring mechanism shares only the verified information instead of sharing the entire file. This improves the integrity of the confidential data. The mechanism boosts the potency of substantive multi-group analysis to support the entire data cluster. This improvises the real time cloud data distribution. The identity of the signer is traceable by the group owner. Novelty/Improvement: Only registered users can login to the cloud. This prevents the unauthorized access to the cloud. Data is secured during cloud upload. Other users in the group have no permission to modify the data. Except the signer other users have got read-only permission.Keywords
Auditing, Authenticators, Batch Auditing, Potency, Privacy, Shared Information.- Selecting Multiview Point Similarity from Different Methods of Similarity Measure to Perform Document Comparison
Abstract Views :174 |
PDF Views:0
Authors
S. Kalpana
1,
S. Vigneshwari
2
Affiliations
1 Department of Computer Science and Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
2 Faculty of computing, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
1 Department of Computer Science and Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
2 Faculty of computing, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 10 (2016), Pagination:Abstract
Objective: The main objective is to implement multi view point similarity to perform document comparisons that use the concept of clustering. Methods/Analysis: The main task of data mining is clustering which is used to group or select objects which are similar to one another. Data mining divides whole document into meaningful clusters and analyses data. There are many different types of clustering methods like hierarchical clustering, partitioned clustering and data grouping may be based on distance, viewpoints, Euclidean distance etc, Of these, the current system uses single view point similarity. This type of single view point similarity has some disadvantages. The main disadvantage is it does not use full set of document data so that detailed comparison measures cannot be revealed. In the future system multi viewpoint similarity is used to overcome the above disadvantage. Findings: The multi view point similarity method is used to overcome the disadvantages mentioned under the analysis. This method compares similarity between the multiple documents in detailed manner. The documents have been compared line by line and show the similarity. Then we have enhanced the existing ECSMTP algorithm and it is named as ECSMTP (Enhanced Concept Based Similarity Measure for Text Processing). This algorithm categorizes data from selected documents along with weight age of document, and based on that it forms clusters and calculates the similarity measure. Further in this system different kind of documents were compared like text documents, word, PDF documents etc., but it is not in the existing system. User may select kind of document and comparisons can be made on the selected documents. Clusters were formed and these clusters were compared.Keywords
Clustering, ECSMTP, Multiviewpoint, Pattern Recognition, Singleview Point- An Ontological Approach for Originating Data Services with Hazy Semantics
Abstract Views :192 |
PDF Views:0
Authors
Affiliations
1 Department of Information Technology, Sathyabama University, Chennai, IN
1 Department of Information Technology, Sathyabama University, Chennai, IN