{"title":"Ontology construction for explicit description of domain knowledge","authors":"R. Mervin, S. Murugesh, A. Jaya","doi":"10.1109/ICIICT.2015.7396079","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396079","url":null,"abstract":"In the modern era numerous information are available in the World Wide Web which makes it difficult to get the semantic information. Ontologies plays vital role after the evolution of the Semantic Web. Ontologies are used in various domains. Ontology is used to refine the search with semantics and give the best result to the user. This paper portrays the construction of two different domain ontologies i.e. Knowledge Based Question Answering System (KBQA) and software requirements elicitation from unstructured text.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114424725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Dependency Structure Matrix (DSM) for e-books using ontology based text mining","authors":"K. Nanthini, R. Ramya","doi":"10.1109/ICIICT.2015.7396097","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396097","url":null,"abstract":"Dependency Structure Matrix (DSM) is a square matrix, used to map the dependencies between each entity/element. Such dependencies are examined to make out impacts. In general, college libraries maintain e-books for various departments, as students, research scholars in these days have started to refer e-books in most of the times. Since we don't have hard copies for some of the books, we go for searching e-books. This paper primarily focuses on finding related/linked/correlated/interrelated e-books that for a targeted e-book based on table of contents of each book. Related books will hold desired content that we require. Extract content page to ascertain the classes of e-books, ontology that provides inferences, regarding them. Subsequently, uses this ontology to discover the dependencies between each book and construct DSM which is used to represent related books as a result of comparing table of contents of each book. Subsequent to construction of DSM, it is converted into graph structure along with dependency level for easy analysis and find out. During arrival of fresh e-book to library, DSM is automatically updated by mining PDF and the graph is also updated along with their dependency level.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Catching target mobile node using time-of-arrival measurement in Wireless Sensor Networks","authors":"J. Premalatha, P. Vijayakumari","doi":"10.1109/ICIICT.2015.7396105","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396105","url":null,"abstract":"Target localization and mobile node tracking problems in WSNs have been receiving considerable concentration recently, because of the requirements to achieve high localization accuracy, with the output of minimum cost. The drawback involved is the crisis of target tracking in Wireless Sensor Networks. Localization primarily refers to revealing of the spatial coordinates of a node. Target tracking deals with spatial coordinates discovery and movement tracking of a moving object. The mobile node location algorithms like weighted tracking methods and Arrival Time (AT) are insufficient for finding the location of the mobile device. The location estimation and weighted tracking method are mainly based on mobile target signal's Arrival Time (AT) measurement model. In this paper work, location tracking process can be achieved into two ways. At first part we find the location of the mobile node along with the extended weighted tracking method. This can be used to track the mobile device and to estimate the weight for the particular mobile node. Secondly, the concentration is towards the AT measurement model for measuring the signal arrival time. Finally, the proposed algorithm finds the location of the mobile device and improves the performance of the AT measurement model in different places.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128465386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extraction of features for sentiment analysis using heterogenic domain","authors":"P. Ajitha, D. V. Reddy","doi":"10.1109/ICIICT.2015.7396093","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396093","url":null,"abstract":"The overwhelming majority of existing approaches to opinion feature extraction accept mining patterns solely from one review language sets, identifying the different disparities in word spacing characteristics of opinion options across totally different language. In this work we have to consume the different opinion that is identifying through the sentiments, it is an important role in normal life-style. Users can express their thought, when user can sold or buy the commodities or products through the online are some different ways, then user can express their view through rating format. We have a tendency to capture this inequality via a live step known as domain relevancy (DR) that characterizes the relevancy of a term to a text assortment. We have a tendency to first extract an inventory of candidate opinion options from the domain review languages by shaping a collection of syntactic independent rules. User can express their views through three different ways that is \"A+\" means positive, \"A-\" means negative and \"A\" means neutral i.e., half chances, by finding this rating we are using User-Related Filtering (URF) Algorithm. For every extracted candidate feature, we have a tendency to estimate its user internal-domain relevance (UIDR)data and user external-domain relevance(UEDR) data scores on the domain-dependent and domain-independent review technique, severally. Candidate options that are minimum generic (UEDR score but a threshold) and additional domain-specific (UIDR score maximum than another threshold) are then confirmed as opinion options. Experimental results on real-world review domains show the planned UIEDR data approach to outmatch many alternative well-established ways to identifying opinion options.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123861372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High energy time domain temperature sensor for on chip thermal management","authors":"A. Elamaran, K. Amudha","doi":"10.1109/ICIICT.2015.7396075","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396075","url":null,"abstract":"The calibrated heat sensor is used for on chip heat sensing. We suggest an all digital on chip time based heat sensor for system on a chip (SoC) heat management. For on-chip purpose, the proposed temperature sensor achieves area-efficient and fast thermal monitoring by adopting a Digital Controlled Oscillator. The future heat sensor extinguishes the want for double position measurement compare to earlier heat sensors. The future sensor uses suggestion clock to execute auto measurement, also the operation delay is able to discard. Temperature measurement results are provided with a time based code generated by a simple counter. Afterwards, the exactness of the proposed temperature sensor is able to enhance by little area also small power utilization. This future heat sensor is able to simply measurement by a suggestion pulse.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128860148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KBRS — Keyword based recommendation system in social networks","authors":"Sandra Elizabeth Salim, R. Jebakumar","doi":"10.1109/ICIICT.2015.7396081","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396081","url":null,"abstract":"Social networks form an important platform for information sharing and interaction among users. The content from social networks can be used to generate recommendations for users in order to help them to choose what they desire. There exist a lot of recommendation methods currently. In this paper, we propose a keyword based recommendation system (KBRS), where the user's preferences are indicated by keywords. Here, we use a user based collaborative filtering (UCF) algorithm to provide recommendations. In order to support a more efficient and scalable execution, KBRS is implemented in Hadoop, using Map Reduce paradigm.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126407584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HS-TBAC a highly secured token based access control for outsourced data in cloud","authors":"S. Senthilkumar, Madhu Viswanatham, M. Vinothini","doi":"10.1109/ICIICT.2015.7396082","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396082","url":null,"abstract":"Cloud computing is recently developed internet based computing paradigm where ranges of services such as data storage, applications deployment, servers, etc. are delivered over the internet. On the basis of response, cloud allocates the services through internet. The important feature of quality of service in cloud computing is secured way of protecting information over internet. The cloud service provider (CSP) should afford security for the data stored and applications developed over the cloud in terms of Privacy and Access Control. In this paper, we offer an enhanced framework with the advent of Token Generation (TG), Mutual Authentication and Cryptography. We include a secured authentication mechanism among consumer and Registration Authority (RA) in our scheme. Secondly a Token Generator (TG) is utilized for issuing tokens to the consumer for accessing their resources from the cloud depends upon their access privileges.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115732600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Pritha, N. Velmurugan, S. Winster, A. Vijayaraj
{"title":"Deduplication based storage and retrieval of data from cloud environment","authors":"N. Pritha, N. Velmurugan, S. Winster, A. Vijayaraj","doi":"10.1109/ICIICT.2015.7396092","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396092","url":null,"abstract":"Cloud computing is based on the concept of Internet which enables centralized data storage. Cloud computing poses great possibilities and challenges. Among all the challenges data security the very important issue to be addressed. This paper proposes a novel system for the secure access and storage of the data based on data deduplication and Ramp Secure Secret key (RSS key). The data deduplication saves storage space by eliminating the redundant data and RSS key could enhance data security. This proposed system is better than the current cloud security systems as it addresses and satisfies the key disadvantages of the existing systems.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115814487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A phoneme based model for english to malayalam transliteration","authors":"C. Sunitha, A. Jaya","doi":"10.1109/ICIICT.2015.7396078","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396078","url":null,"abstract":"Transliteration plays an important role nowadays because it can be used for many applications such as text to speech conversion, Dubbing etc. The main purpose of Transliteration is to convert words from one language to another language such that their pronunciation will be same, but the meaning may be different. Transliteration is mainly classified into 4 models such as Phoneme based Transliteration Model, Correspondence based Transliteration Model, Grapheme based Transliteration Model, and Hybrid based Transliteration Model. Phoneme based transliteration takes the advantage of pronunciation and is better to implement when compared to other models. Research works are taking place in this field especially with Korean, Arabic, Chinese & Indian Languages. Very little work is being carried out with English to Malayalam Transliteration. At present Grapheme based transliteration is available for English - Malayalam transliteration. But there is a problem of pronunciation. This paper presents a Phoneme based transliteration model for English - Malayalam conversion which is based on pronunciation and works better than the Grapheme based model for the same. This model uses a pronunciation dictionary.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116073439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A model for settting location privacy scheme in MANET","authors":"S. Raj, R. Srikkanthan, A. S. Kumar","doi":"10.1109/ICIICT.2015.7396060","DOIUrl":"https://doi.org/10.1109/ICIICT.2015.7396060","url":null,"abstract":"In antagonistic environments, the challenger knows how to begin traffic analysis beside cut-off able routing in sequence rooted in routing messages and data packets. The challenger on assume the mobility pattern of nodes and sketch set of link routes during the routing of packets may pose a severe hazard to secret operations. Unidentified direction-finding protocols used by Mobile Ad-Hoc Networks (MANETs) that put out of sight node uniqueness. Routing as of observers from outside in arrange to afford secrecy protection. The undetermined direction-finding protocols can be applied with distinctive network models in dissimilar mobility patterns. By means of route secrecy, challenger cannot sketch a flow of packet is back to its sender or target, either on path or out of the path and there is no node has in sequence regarding the suitable identity and the location of transitional nodes in direction. The different Unidentified networking protocols are review and presentation of such protocols can be balanced and estimated using ns2 simulations of a distinguished routing protocol to attain improved route secrecy.","PeriodicalId":135283,"journal":{"name":"International Confernce on Innovation Information in Computing Technologies","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380754","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}