Volume-8 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
Keywords: 3D animations, interactivity, Simulated Learning, Virtual Environment,VRML
[1]. VRML Applications in Construction: Internet based Emerging Construction Technologies http://rebar.ecn.purdue.edu/ect/links/technologies/internet/vrml.aspx
[2]. Burdea, G. and Coiffet, P., Virtual Reality Technology (2nd ed. Wiley Interscience, 2003).
[3]. Vince, J. Virtual Reality Systems (Addison-Wesley, 1995).
[4]. Arts and Humanities Data Service (2002). Creating and using virtual reality: A guide for the arts and humanities. Retrieved February 21, 2004, from http://vads.ahds.ac.uk/guides/vr_guide
[5]. Beier, K. P. (2004). Virtual reality: A short introduction. Retrieved February 20, 2004, from http://www-vrl.umich.edu/intro/index.html
[6]. Schofield, D. 1995. Virtual Reality Technology and its Application.
[7]. Ames A., Nadeau D., Moreland J., VRML 2.0 Sourcebook (2nd edition, John Wiley & Sons, Inc., 1997).
[8]. Web 3D Repository, http://www.web3d.org/vrml/vrml.htm
[9]. Cosmo Player, http://www.ca.com/cosmo/
[10]. Cortona, http://www.parallelgraphics.com/products/cortona/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Mining the Text Documents Using Phrase Based Tokenizer Approach |
Country | : | India |
Authors | : | Dr.Mrs.D.shanthi, V.Umadevi |
: | 10.9790/0661-0860614 | |
Keywords: Text mining, text classification, pattern mining, pattern evolving, information filtering.
[1] Y.Li, C. Zhang, and J.R. Swan, "An Information Filtering Modelon the Web and Its Application in Jobagent," Knowledge-Based
Systems, vol. 13, no. 5, pp. 285-296, 2000.
[2] Y. Li and N. Zhong, "Interpretations of Association Rules by Granular Computing," Proc. IEEE Third Int'l Conf. Data
Mining(ICDM '03), pp. 593-596, 2003.
[3] X. Li and B. Liu, "Learning to Classify Texts Using Positive and Unlabeled Data," Proc. Int'l Joint Conf. Artificial Intelligence
(IJCAI'03), pp. 587-594, 2003.
[4] Y. Li, W. Yang, and Y. Xu, "Multi-Tier Granule Mining for Representations of Multidimensional Association Rules," Proc. IEEE
Sixth Int'l Conf. Data Mining (ICDM '06), pp. 953-958, 2006.
[5] Y. Li and N. Zhong, "Mining Ontology for AutomaticallyAcquiring Web User Information Needs," IEEE Trans. Knowledge and
Data Eng., vol. 18, no. 4, pp. 554-568, Apr. 2006.
[6] Y. Li, X. Zhou, P. Bruza, Y. Xu, and R.Y. Lau, "A Two-Stage Text Mining Model for Information Filtering," Proc. ACM 17th
Conf. Information and Knowledge Management (CIKM '08), pp. 1023-1032,2008.
[7] H. Lodhi, C. Saunders, J. Shawe-Taylor, N. Cristianini, and C.Watkins, "Text Classification Using String Kernels," J. Machine
Learning Research, vol. 2, pp. 419-444, 2002.
[8] A. Maedche, Ontology Learning for the Semantic Web. Kluwer Academic, 2003.
[9] C. Manning and H. Schu¨ tze, Foundations of Statistical Natural Language Processing. MIT Press, 1999.
[10] I. Moulinier, G. Raskinis, and J. Ganascia, "Text Categorization: A Symbolic Approach," Proc. Fifth Ann. Symp. Document
Analysis and Information Retrieval (SDAIR), pp. 87-99, 1996.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Steganography, security, information hiding cryptography, wavelet transform.
[1] "A Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm" World of Computer Science and Information
Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 1, No. 6, 239-246, 2011
[2] Image encryption and decryption using blowfish algorithm World Journal of Science and Technology 2012, 2(3):151-156 ISSN:
2231 – 2587
[3] A DWT Based Approach for Image Steganography International Journal of Applied Science and Engineering 2006. 4, 3:275-290
[4] Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 - 3915A "New Method in image Steganography with Improved Image
Quality".
[5] World Applied Sciences Journal 13 (3): 507-516, 2011 ISSN 1818-4952 " Improvement of Embedding Capacity and Quality of
DWT-Based Audio Steganography Systems"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Towards Large Scale Software Project Development and Management |
Country | : | India |
Authors | : | Tanmaya Kumar Das, Dillip Kumar Mahapatra, Gopa Krishna Pradhan |
: | 10.9790/0661-0862035 | |
Keywords: Globalization, Project Management, LSDLC, Risk Certification, Quality Control
[1]. Rushby, J. Software Verification and System Assurance. Proc. 7th IEEE Int. Conf. on Software Engineering and Formal Methods.
Hanoi, Vietnam. 2009.
[2] Sommerville, I. ‗Designing for Recovery: New Challenges for Large-scale Complex IT Systems'.Keynote address, 8th IEEE
Conference on Composition-based Software Systems. Madrid. 2008.
[3] http://sites.google.com/site/iansommerville/keynote-talks/DesigningForRecovery.pdf Sillitto, H. ‗Design Principles for Ultra-Large
Scale (ULS) Systems'. Proc. 20th INCOSE International Symposium, Chicago, July 2010.
[4] Cohen, S. A Software System Development Life Cycle Model for Improved Stakeholders' Communication andCollaboration. Int. J.
of Computers, Communications & Control. Vol. V, No. 1, pp. 20-4. 2010.
[5] p. Sage and James D. Palmer, Software Systems Engineering (New York: John Wiley & Sons, 1990).
[6] B. Curtis, H. Krasner, and N. Iscoe. A field study of the software design process for large systems. Communications of the ACM,
31(11):1268–1287, 1988.
[7] Software Engineering Advice from Building Large-Scale Distributed Systems Jeff Dean, http://labs.google.com/people/jeff
[8] Project management,Ian Sommerville 2000 Software Engineering, 6th edition.
[9] Managing the Software Process, Watts S. Humphrey, SEI Series in Software Engineering, Addison-Wesley, August 1990.
[10]. Reference Model for Frameworks of Software Engineering Environments, European Computer Manufacturer's Association, TR/55,
1991.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Review of Bot Protection using CAPTCHA for Web Security |
Country | : | India |
Authors | : | Baljit Singh Saini, Anju Bala |
: | 10.9790/0661-0863642 | |
[1] L. von Ahn, M. Blum, and J. Langford, "Telling Human and Computers Apart Automatically," in Communications of the ACM,
vol. 47,February 2004, no. 2, pp. 57-60. DOI:10.1145/966389.966390
[2] L. von Ahn, M. Blum, N. Hopper, and J. Langford, The CAPTCHA web page: http://www.CAPTCHA.net,2000.
[3] Ahn, L. von, Blum, M., Hopper, N. J., & Langford, J., (2003), "CAPTCHA: Using hard AI problems for security", Proceedings of
Eurocrypt 2003.
[4] Shirali-Shahreza, M.H. & Shirali-Shahreza, M., (2007) "Multilingual CAPTCHA", ICCC 2007 IEEE International Conference on
Computational Cybernetics, 19–21 October, Gammarth, Tunisiali, pg 136.
[5] M. Blum, L. von Ahn, and J. Langford, The CAPTCHA Project (Completely Automated Public Turing Test to Tell Computers and
Humans Apart), School of Computer Science, Carnegie- Mellon University, November 2000,http://www.CAPTCHA.net.
[6] M.H. Shirali-Shahreza and M. Shirali-Shahreza, "Persian/Arabic Baffletext CAPTCHA," Journal of University Computer Science
(J.UCS), vol. 12, no. 12, December 2006, pp.1783- 1796. DOI: 10.3217/jucs-012- 12-1783
[7] H.S. Baird and J.L. Bentley, "Implicit CAPTCHAs," Proceedings SPIE/IS&T Conference on Document Recognition and Retrieval
XII (DR&R2005), San Jose, 2005, pp. 191-196. DOI: 10.1117/12.590944
[8] Yadava P, Sahu C and Shukla S. (2011), "Time-Variant CAPTCHA: Generating Strong CAPTCHA Security by Reducing Time to
Automated Computer Programs",JETCIS VOL. 2, NO. 12, pp 701 704.
[9] Kurt Alfred Kluever. Evaluating the Usability and Security of a Video CAPTCHA. Master's thesis, Rochester Institute of
Technology, Rochester, NY, August 2008.
[10] H.S. Baird and K. Popat, "Human Interactive Proofs and DocumentImage Analysis," Proceedings of the 5th IAPR International
Workshop on Document Analysis Systems, Princeton, LNCS 2423, 2002, pp. 507- 518.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: K-means clustering, Bayes' theorem, MAP, PCA, SVM and OCR.
[1] B. B. Chaudhuri, U. Pal, "A Complete Printed Bangla OCR System", Pattern Recognition, Vol. 31, No. 5, pp. 531-549, 1998
[2] U. Pal, B.B. Chaudhuri, Indian script character recognition: a survey, Pattern Recognition 37, pp:1887–1899, year:2004
[3] U. Pal, On the development of an optical character recognition (OCR) system for printed Bangla script, Ph.D. Thesis, 1997.
[4] U. Pal, B.B. Chaudhuri, Automatic recognition of unconstrained offline Bangla hand- written numerals, in: T. Tan, Y. Shi, W. Gao
[5] (Eds.), Advances in Multimodal Interfaces, Lecture Notes in Computer Science, vol. 1948, Springer, Berlin, pp. 371–378,year:
2000.
[6] K. Roy, S. Vajda, U. Pal, B.B. Chaudhuri, A system towards Indian postal automation, in: Proceedings of the Ninth International
[7] Workshop on Frontiers in Handwritten Recognition, (IWFHR-9 2004), pp. 580–585, year: October 2004.
[8] U. Pal, A. Belad, Ch. Choisy, Touching numeral segmentation using water reservoir concept, Pattern Recognition Lett. 24, 261–
272, year: 2003.
[9] YingWen, Yue Lu, Pengfei Shi, "Handwritten Bangla numeral recognition system and its application to postal automation ".
Pattern Recognition 40, pp:99 – 107. year:2007.
[10] J.-X. Dong, A. Krzyzak, C.Y. Suen, Fast SVM training algorithm with decomposition on very large data sets, IEEE Trans. Pattern
Anal.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Cloud computing, Accountability, CIA Framework, JAR Files, Data sharing
[1] Smitha Sundareswaran, Anna C. Squicciarini, and Dan Lin, "Ensuring Distributed Accountability for Data Sharing in the Cloud".
IEEE Transactions on Dependable And Secure Computing, Vol. 9, No. 4, July/August 2012.
[2] G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted
Stores," Proc. ACM Conf. Computer and Comm. Security, pp. 598-609, 2007.
[3] A. Pretschner, M. Hilty, F. Schuo¨ tz, C. Schaefer, and T. Walter, "Usage Control Enforcement: Present and Future," IEEE Secu rity
& Privacy, vol. 6, no. 4, pp. 44-53, July/Aug. 2008.
[4] A. Pretschner, F. Schuo tz, C. Schaefer, and T. Walter, "Policy Evolution in Distributed Usage Control," Electronic Notes
Theoretical Computer Science, vol. 244, pp. 109-123, 2009.
[5] R. Hasan, R. Sion, and M. Winslett, "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance," Proc.
Seventh Conf. File and Storage Technologies, pp. 1-14, 2009.
[6] P.T. Jaeger, J. Lin, and J.M. Grimes, "Cloud Computing and Information Policy: Computing in a Policy Cloud?," J. Information
Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
[7] F. Martinelli and P. Mori, "On Usage Control for Grid Systems," Future Generation Computer Systems, vol. 26, no. 7, pp. 1032 -
1042, 2010.
[8] Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud
Computing," Proc. European Conf. Research in Computer Security (ESORICS), pp. 355-370, 2009.
[9] A. Squicciarini, S. Sundareswaran, and D. Lin, "Preventing Information Leakage from Indexing in the Cloud," Proc. IEEE Int'l
Conf. Cloud Computing, 2010.
[10] S. Pearson and A. Charlesworth, "Accountability as a Way Forward for Privacy Protection in the Cloud," Proc. First Int'l Conf .
Cloud Computing, 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Arising Issues In Wireless Sensor Networks: Current Proposals And Future Developments |
Country | : | India |
Authors | : | Saima Maqbool, Ulya Sabeel |
: | 10.9790/0661-0865673 | |
Keywords: Challenges, Enabling technologies, Issues, Research areas, Wireless sensor networks
[1] "Henry Ohiani Ohize, Emerging Issues in Wireless Sensor Networks, Ohize , 2011
[2] H. Karl and A. Willig, Protocols and Architectures for Wireless Sensor Networks, John Wiley and Sons Ltd, The Atrium, Souther n
Gate, Chichester, West Sussex, England, 2005.
[3] D. Culler, D. Estrin, and M. Srivastava, "Overview of Sensor Networks", IEEE Computer, August 2004.
[4] K. Martinez, J. K. Hart, and R. Ong, "Environmental sensor networks", IEEE Computer Journal,Vol. 37 (8), 50-56, August 2004.
[5] A. Mainwaring, D. Culler, J. Polastre, R. Szewczyk , and J. Anderson, "Wireless sensor networks for habitat monitoring",
Proceedings of the 1st ACM International workshop on Wireless sensor networks and applications, Atlanta, Georgia, USA, 88-97,
2002.
[6] http://en.wikipedia.org/wiki/Sensor_Networks
[7] Akyildiz, I.F., W. Su, Y. Sankarasubramaniam, E. Cayirci, "A Survey on Sensor Networks", IEEE Communications Magazine,
August, 102-114(2002).
[8] Gowrishankar.S 1, T.G.Basavaraju 2, Manjaiah D.H 3, Subir Kumar Sarkar 4 "Issues in Wireless Sensor Networks", 2008
[9] Q. Jiang and D.Manivannan, "Routing Protocols for Sensor Networks", In proceedings of Consumer Communications and
Networking Conference, 5-8 January, pp 93-98.
[10] Ian f .Alkyildiz and Mehmet Can Varun, Ian f .Alkyildiz series in communications and networking, "wireless sensor networks
book"
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Level Set Method for Image Segmentation: A Survey |
Country | : | India |
Authors | : | Vineetha G R, Gopu Darshan |
: | 10.9790/0661-0867478 | |
Keywords: Contour, Image Segmentation, Intensity Inhomogenity, and Level set Method, MRI images
[1] Tranos Zuva,Oludayo O,Olugbara,Sunday O,Ojo and Seleman Ngwira,Image Segmentation Available Techniques,Developmaents and
Open Issues, Canadian Journal on Image processing and Computer Vision Vol 2 No:3 March 2011 .
[2] StanleyOsher and J. Sethian, Fronts propagating with curvature-dependent speed: Algorithms based on Hamilton-Jacobi
formulations, J. Comp.Phys., vol. 79, no. 1, pp. 12–49, Nov. 1988
[3] Kan Cheng, Lixu Gu, and Jianrong Xu,A Novel Shape Prior Based Level Set Method for Liver Segmentation From MR Images,
Proceedings of the 5th International Conference on Information Technology and Application in Biomedicine, in conjunction with The
2nd International Symposium & Summer School on Biomedical and Health Engineering Shenzhen, China, May 30-31, 2008
[4] Samir BARA,Mounir Ait Kerroum,Ahmed Hammouch and Driss Aboutajdine,Variational Image Segmentation Models:Application to
medical images MRI, -978-1-61284-732-0/11/$26.00 ©2010 IEEE
[5] Kaihua Zhang a, Lei Zhang a, 1 and Su Zhang,A Variational Multi Phase Level Set Approach To Simultaneous Segmentation And
Bias Correction
[6] Pan Lin, Chong-Xun Zheng, Yong Yang,Model-Based Medical Image Segmentation: A Level Set Approach,Proceedings of the 5th
World Congress on Intelligent Control and Automation. June 15-19, 2004, Hangzhou. P.R.China
[7] Zongjie Cao, Yiming Pi, Xiaobo Yang, Jintao Xiong, a Variational Level Set SAR Image Segmentation Approach Based on Statistical
Model
[8] Chunming Li, RuiHuang, Zhaohua Ding, Chris Gatenby, Dimitris Metaxas,and John Gore, A Variational Level Set Approach to
Segmentation and Bias Correction of Images with Intensity Inhomogeneity,D. Metaxas et al. (Eds.): MICCAI 2008, Part II, LNCS
5242, pp. 1083–1091, 2008. Springer-Verlag Berlin Heidelberg 2008
[9] El Hadji S. Diop, Silèye O. Ba, Taha Jerbi and Valérie Burdin,Variational and Shape Prior -based Level Set Model for Image
Segmentation
[10] Luminita A. Vese & Tony F. Chan, A Multiphase Level Set Framework for Image Segmentation Using the Mumford and Shah Model,
International Journal of Computer Vision 50(3), 271–293, 2002© 2002 Kluwer Academic Publishers. Manufactured in the Netherlands
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Associate membership, P2P, Security, Sybil attack, SyMon.
[1] J. Douceur. The Sybil attack. In IPTPS, 2002.
[2] Jyothi B.S and Dharanipragada Janakira, SyMon: An approach to defense Sybil Attack in structured P2P network.
[3] T. S. E. Ng and H. Zhang. Predict the network distance of internet with coordinates-base method. IEEE, 2002.
[4] R. Bazzi and G. Konjevod. The establish of different id in overlay networks. ACM PODC, 2005.
[5] J. Newsome, E. Shi, D. Song, and A. Perrig. Sybil attack in sensor networks Analysis and defenses. ACM/IEEE IPSN, 2004.
[6] G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson. Sybil-resist DHT routing. The European Symposium Research,
2005.
[7] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Defense against Sybil attacks by using Sybil Guard based on social networks.
Technical Report IRP-TR-06-01, Intel Research Pittsburgh, June 2006.
[8] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Nearly optimal solution using Sybil limit based on social network. Technical
Report TRA2/08, SNU, School of Computing, Mar. 2008.
[9] W. J. Bolosky, J. R. Douceur, D. Ely, and M. Theimer. Feasibilities of server less distributed system on an existing set of desktop
PC. In ACM SIGMETRICS, 2000.
[10] A. Cheng and E. Friedman. Sybil proof reputation system. In ACMSIGCOMM seminar on Economics of P2P Networks, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An Enhanced Security Scheme for Wireless Sensor Network Using Mobile Sink Server |
Country | : | India |
Authors | : | Kanagavalli.N,M.E, Hema Rani.V |
: | 10.9790/0661-0868388 | |
Keywords: Distributed. Security, Wireless Sensor networks, AODV, Mobile Sink.
[1] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," The International Journal of
Computer and Telecommunications Networking Computer Networks, vol. 38, no. 4, pp. 393-422, March 2002.
[2] I. Chatzigiannakis, A. Kinalis, and S. Nikoletseas, "Sink mobility protocol for data collection in wireless sensor networks," Proc. of
the 4th ACM International Workshop on Mobility Management and Wireless Access (MOBIWAC'06), pp. 52-59, 2006.
[3] S. Basagni, A. Carosi, E. Melachrinoudis, C. Petrioli, and Z. M. Wang, "Protocols and model for sink mobility in wireless sensor
networks," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 10, no. 4, pp. 28-30, 2006..
[4] L. Cheng, Y. Chen, C. Chen, and J. Ma, "Query-based data collection in wireless sensor networks with mobile sinks," Proc. of the
2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, pp. 1157-
1162, 2009.
[5] B. Parno, A. Perrig, and V. D. Gligor, "Distributed detection of node replication attacks in sensor networks," Proc. of the 2005
IEEE Symposium on Security and Privacy (S&P'05), pp. 49–63, 2005.
[6] W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key pre-distribution scheme for wireless sensor networks," In ACM
CCS 2003, pages 42{51,Oct. 2003}.
[7] Yunxia Chen and Qing Zhao "On the Lifetime of Wireless Sensor Networks," IEEE communications letters, vol. 9, no. 11, pp. 976-
978, November 2005.
[8] Charles E. Perkins and Elizabeth M. Royer, "Ad-hoc On-Demand Distance Vector Routing," Proceeding of the 2nd IEEE
Workshop on Mobile Computing Systems and Applications (WMCSA'99), New Orleans, LA, USA, February 1999, pages 90-100.
[9] Murat Demirbas and Youngwhan song, "An RSSI-based Scheme for Sybil Attack Detectionin Wireless Sensor
Networks,"Proceeding of the 2006 International symposium on World of Wireless, Mobile and Multimedia Networks
(WOWMOM'06), pages 564- 570.
[10] Kai Xing, Fang Liu, Xiuzhen Cheng, David H.C. Du, "Real-Time Detection of Clone Attacks in Wireless Sensor Networks," icdcs,
pp.3-10, 2008 The 28th International Conference on Distributed Computing Systems, 2008.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: 3D Visualization, Stereoscopy, Stereopairs
[1] IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.11, November 2009 234 Manuscript received
November 5, 2009 Manuscript revised November 20, 2009 Efficient 3D Object Visualization via 2D Images Kitara Kadhim Al-
Shayeh and† and Muzhir Shaban Al-Ani††, †Al-Zaytoonah University of Jordan, Department of MIS, Amman - Jordan
††Amman Arab University, Faculty of IT, Amman - Jordan - 11953
Development Of A Cost Effective 3d Window For Stereoscopic 3d Visualization Using Distorted
www.iosrjournals.org 91 | Page
[2] N. Sandyarani, Dr. V.Vaithyanathan "AN EXPERT SYSTEM FOR STEREOSCOPIC 3D VISUALISATION (WITHOUT THE
APPLICATION OF CONVENTIONAL ATTACHMENTS TO THE EYES) OF COMPUTER GENERATED STEREOPAIRS"
was accepted and published in the International Journal of Computer Science, Newyork, USA. ISSN 1549-3636, Journal of
Computer Science 5 (12): 1051-1057, 2009
[3] A. Bardera et al. "Image Segmentation Using Access Entropy", Journal Signal Processing Systems, vol.54, no.1-3, pp 205-214,
2009.
[4] Meisam Aliroteh and Tim McInerney, "SketchSurfaces: Sketch Line Initialized Deformable Surfaces for Efficient and Controllabl e
Interactive 3D Medical Image Segmentation", Third International Symposium on Visual Computing (ISVC07), LNCS 4841, Lack
Tahoe, Nevada/California, November 26-28, pp 542-553, 2007.
[5] Manuel Ferre et al., "3D Image Visualization and Its Performance in Teleoperation", HCI International Conference (HCII 2007),
Peking, China; 22.07.2007 - 27.07.2007; in: "Virtual Reality, Vol.14, LNCS 4563, R. Shumaker (Hrg.); Springer, Volume 14, LNCS
4563 (2007), pp 669-707, 2007.
[6] K. Krechetova et al., "3D Medical Image Visualization and Volume Estimation of Pathology Zones", NBC - 14th Nordic-Baltic
Conference on Biomedical Engineering and Medical Physics, Latvia (IFMBE Proceedings) Vol. 20, pp 532-535, 2008.
[7] N. Sandyarani, Dr. V. Vaithyanathan "DEPTH FIELD COMPUTATIONS USING NON -LINEAR PROJECTION METHODS" –
Paper published in the proceedings of the International Conference on Computing Communication and Networking (ICCCN –
2008), December 18 – 20, 2008, Chettinad College of Engineering & Technology, Karur, TamilNadu conducted by the IEEE
Madras Section & IEEE CS Madras Chapter. (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4787757) – IEEE Explore.
[8] N. Sandyarani, Dr. V. Vaithyanathan "DEPTH COMPUTATIONS USING DATA IN THE FORM OF INTENSITY OF PIXELS
FOR ENHANCED COMPUTER VISION" – Paper published in the proceedings of the International Conference on Computing
Communication and Networking (ICCCN – 2008), December 18 – 20, 2008, Chettinad College of Engineering & Technology,
Karur, TamilNadu conducted by the IEEE Madras Section & IEEE CS Madras Chapter.
(http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4787729) – IEEE Explore.
[9] N. Sandyarani, Dr. V. Vaithyanathan "Design and Development Of A High Quality Window For 3D Visualization " - paper
accepted for publication at the international conference on computational intelligence and multimedia applications- 2007 at Mepco
Sivskasi Engg college-India.
[10] Dr. M. Narayana Rao & V. Vaithyanathan "VISUAL COMPUTING OF PARAMETERS / ATTRIBUTES OF GEOMETRIC
SOLIDS USING COLOR GRADATION / QUEUING THEORY AND ITS APPLICATIONS IN ENGINEERING GRAPHICS" –
Paper published in the proceedings of the International Conference on Computing Communication and Networking (ICCCN –
2008), December 18 – 20, 2008, Chettinad College of Engineering & Technology, Karur, TamilNadu conducted by the IEEE
Madras Section & IEEE CS Madras Chapter. (http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=4787756) – IEEE Explore.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Structured Data Extraction from the Deep Web |
Country | : | India |
Authors | : | Vimala.S, Meenakshi.R |
: | 10.9790/0661-0869396 | |
Keywords: Data extraction, Deep web, Nested structure, Structured data.
[1] BrightPlanet.com. The deep web: Surfacing hidden value. Accessible at http://brightplanet.com, July 2000.
[2] I. Muslea, S. Minton, and C. Knoblock, "Hierarchical Wrapper Induction for Semistructured Information Sources", Autonomous
Agents and Multi-Agent Systems, vol. 4, nos. ½, pp. 93-114, 2001.
[3] W. Cohen and L. Jensen, "A Structured Wrapper Induction System for Extracting Information from Semi-Structured Documents",
Proc. IJCAI Workshop Adaptive Text Extraction and Mining, 2001.
[4] V. Crescenzi, G. Mecca, and P. Merialdo, "Roadrunner: Towards Automatic Data Extraction from Large Web Sites", Proc. 27th Int'l
Conf. Very Large Data Bases, pp. 109-118, 2001.
[5] C.H. Chang and S.C. Lui, "IEPAD: Information Extraction Based on Pattern Discovery", Proc. 10th World Wide Web Conf., pp. 681-
688, 2001.
[6] K. Simon and G. Lausen, "ViPER: Augmenting Automatic Information Extraction with Visual Perceptions", Proc. 14th ACM Int'l
Conf. Information and Knowledge Management, pp. 381-388, 2005.
[7] H. Zhao, W. Meng, Z. Wu, V. Raghavan and C. Yu, " Fully Automatic Wrapper Generation for Search Engines", Proc. 14th World
Wide Web Conf., pp. 66-75, 2005.
[8] B. Liu and Y. Zhai, "NET – A System for Extracting Web Data from Flat and Nested Data Records",. Proc. 6th Int'l Conf., Web
Information Systems Engg, pp. 487-495, 2005.
[9] Y. Zhai and B. Liu, "Structured Data Extraction from the Web Based on Partial Tree Alignment", IEEE Trans., Knowledge and Data
Engg., vol. 18, no. 12, pp. 1614-1628, Dec. 2006.
[10] Weifeng Su, Jiying Wang, Frederick H. Lochovsky and Yi Liu, "Combining Tag and Value Similarity for Da ta Extraction and
Alignment", IEEE Trans., Knowledge and Data Engg., vol. 24, no. 7, pp. 1186-1200, Jul. 2012.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Optimization of Multiple SPARQL Queries |
Country | : | India |
Authors | : | R.Gomathi, C.Sathya |
: | 10.9790/0661-08697101 | |
Keywords: RDF, Multiple SPARQL, Common substructures
[1] P. Roy, S. Seshadri, S. Sudarshan, and S. Bhobe. Efficient and extensible algorithms for multi query optimization. In SIGMOD, 2000.
[2] M. Stocker, A. Seaborne, and A. Bernstein. SPARQL basic graph pattern optimization using selectivity estimation. In WWW, 2008.
[3] D. J. Abadi, A. Marcus, S. R. Madden, and K. Hollenbach. Scalable semantic web data management using vertical partitioning. In
VLDB, 2007.
[4] T. Neumann and G. Weikum. RDF-3X: a RISC-style engine for RDF. In PVLDB, 2008.
[5] M. Atre, V. Chaoji, M. J. Zaki, and J. A. Hendler. Matrix "bit" loaded: A scalable lightweight join query processor for RDF data. In
WWW,2010.
[6] A. Kementsietsidis, F. Neven, D. V. de Craen, and S. Vansummeren. Scalable multi-query optimization for exploratory queries over
federated scientific databases. PVLDB, 2008.
[7] M. Hong, A. J. Demers, J. Gehrke, C. Koch, M. Riedewald, and W. M. White. Massively multi-query join processing in
publish/subscribe systems. In SIGMOD, 2007.
[8] K. O'Gorman, D. Agrawal, and A. E. Abbadi. Multiple query Optimization by cache-aware middleware using query teamwork. In
ICDE, 2002.
[9] A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: a review.ACM Comput. Surv., 1999.
[10] M. Schmidt, M. Meier, and G. Lausen. Foundations of SPARQL query optimization. In ICDT, 2010.