SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
International Journal of Engineering Science Invention
ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726
www.ijesi.org Volume 3 Issue 2ǁ February 2014 ǁ PP.35-37
www.ijesi.org 35 | Page
XAML Based Mechanism with Closed Dataset Robust System
Using HERM Algorithm
1
P.M.Balaganesh M.E., (P.HD) DEAN/cse, 2,
D.Radha M.Tech, AP/cse,
3
R.Sarojinidevi (ME)/cse
1, 2, 3,
Sembodai Rukmani Varatharajan Engineering College, Sembodai.
ABSTRACT: Robust system Hybrid extraction of robust model (HERM), a dynamic XAML based mechanism
for the adaptive management and reuse of e-learning resources in a distributed environment like the Web. This
proposed system argues that to achieve the on-demand semantic-based resource management for Web-based e-
learning, one should go beyond using domain ontology’s statically.
KEYWORDS: XAML, Dataset, Data Management, E-learning.
I. INTRODUCTION
In many application domains (e.g., medicine or biology), comprehensive schemas resulting from
collaborative initiatives are made available. This proposed system argues that to achieve the on-demand
semantic-based resource management for Web-based e-learning, one should go beyond using domain ontology’s
statically. So the propose XAML based matching process involves semantic mapping has done on both the open
dataset and closed dataset mechanism to integrate e-learning databases by using ontology semantics. It defines
context-specific portions from the whole ontology as optimized data and an XAML based resource reuse
approach by using an evolution algorithm. Such well established schemas are often associated with reliable data
that have been carefully collected, cleansed, and verified, thus providing reference ontology-based data
management systems (DMSs) in different application domains. A good practice is therefore to build on the
efforts made to design reference DMSs whenever we have to develop our own DMS with specific needs. Easily
that a robust module based DMS evolves safely both the schema and the data of the reference DMS. From a
module robust to consistency checking, for any data update in a corresponding module-based DMS, we show
how to query the reference DMS for checking whether the local update does not bring any inconsistency with
the data and the constraints of the reference DMS .From a module robust to query answering, for any query
asked to module-based DMS, It shows how to query the reference DMS for obtaining additional answers by also
exploiting the data stored in the reference DMS.
II. RELATED WORK
Conventional Data Management Strategies:
In conventional information management principles, the stored records are normally identified by sets
of key words or index terms, and requests for information are expressed by using Boole an combinations of
index terms. The retrieval strategy is normally based on an auxiliary inverted-term index that lists the
corresponding set of document references for each allowable index term. The Boolean retrieval system is
designed to retrieve all stored records exhibiting the precise combination of key words included in the query:
when two query terms are related by an and connective, both terms must be present in order to retrieve a
particular stored record; when an or connective is used, at least one of the query terms must be present to
retrieve a particular item.
Content-based Methods:
In content-based recommendation methods, the utility u(c, s) of item s for user c is estimated based on
the utilities u(c, si) assigned by user c to items si ∈S that are “similar” to item s. For example, in a movie
recommendation application, in order to recommend movies to user c, the content-based recommender system
tries to understand the commonalities among the movies user c has rated highly in the past (specific actors,
directors, genres, subject matter, etc.). Then, only the movies that have a high degree of similarity to whatever
user’s preferences are would get recommended.
XAML Based Mechanism With Closed Dataset…
www.ijesi.org 36 | Page
Limited content analysis:
Content-based techniques are limited by the features that are explicitly associated with the objects that
these systems recommend. Therefore, in order to have a sufficient set of features, the content must either be in a
form that can be parsed automatically by a computer (e.g., text), or the features should be assigned to items
manually. While information retrieval techniques work well in extracting features from text documents, some
other domains have an inherent problem with automatic feature extraction. For example, automatic feature
extraction methods are much harder to apply to the multimedia data, e.g., graphical images, audio and video
streams. Moreover, it is often not practical to assign attributes by hand due to limitations of resource Another
problem with limited content analysis is that, if two different items are represented by the same set of features,
they are indistinguishable.
Proposed design:
This proposed system Hybrid extraction of robust model (HERM) is very efficient and reuse of e-
learning resources in a distributed environment like the Web for better result. This proposed system argues that
to achieve the on-demand semantic-based resource management for Web-based e-learning, one should go
beyond using domain ontology’s statically. The proposed approach for matching process in web cluster
databases from different database servers can be easily integrated and deliver highly dimensional e-learning
resource management and reuse is far from being mature. However, e-learning is also a widely open research
area, and there is still much room for improvement on the method.
Architecture diagram:
Manages Data centers
Fig.1 System Architecture of HERM
Fig.1.This architecture explains the context aware based evolution algorithm for dynamic e-learning
resource reuse in detail. This system is going to conduct a simulation experiment and evaluate the proposed
approach with a xaml e-learning scenario.
HERM Algorithm:
The extraction and matching process has been implemented step by step with initial requirements.
String [][] fillCLabMatrix (Tree of Nodes source, target);
String [][] cLabsMatrix;
String[] matchers;
int i,j;
Matchers=getMatchers ();
For each sourceAtomicConceptOfLabel in source
i=getACoLID(sourceAtomicConceptOfLabel);
for each targetAtomicConceptOfLabel in target
j= getACoLID(targetAtomicConceptOfLabel);
cLabsMatrix[i][j]=getRelation(matchers,
sourceAtomicConceptOfLabel,targetAtomicConceptOfLabel);
return cLabs Matrix
String get Relation(String[] matchers,
Atomic ConceptOfLabel source, target)
String matcher;
String relation Idk ;
int i=0;
XAML Based Mechanism With Closed Dataset…
www.ijesi.org 37 | Page
while ((i<sizeof(matchers))&&(relation==Idk))
matcher= matchers[i];
Relation=execute Matcher (matcher, source, target);
i++;
return relation;
The major work of this module is perform the data matching by getting the user query the data request
can be done in optimized fashion, that is, the data request can come from the data agent of any type of user
query. Data Agent can request for explicit request with a specific condition, where in this application, it is
modeled as patient information, here the agent can request for specific name. Agent can also request for sample
request, that is, they can request for specific number of clustering by sequence. These requests are raised by the
data agents during runtime and the open datasets are also allocated uniquely for each query during runtime. This
Dataset accompanied by necessary additions depending upon the requirement. Open data set used to read, write,
matching the data from more than one different database services. If your application requires working with
data, you can load the data into a dataset, which provides your application with a local in-memory cache of the
data to work. Information about loading data into a dataset.
III. CONCLUSION
The proposed technique HERM have given better results for solving the problem of safe
personalization of modules built from an existing reference DMS. This raises new issues to check easily that a
module-based DMS evolves independently but coherently the reference DMS from which it has been built. It
have introduced two notions of module robustness that make possible to build locally the relevant queries to ask
to the reference database in order to check global consistency (possibly upon each update), and to obtain global
answers for local queries.
IV. ACKNOWLEDGEMENT
I would like to thank Ms. D.Radha for give excellent insights and suggestions.
REFERENCES
[1] Modular Ontologies: Concepts, Theories and Techniques for Knowledge Modularization, H. Stuckenschmidt, C. Parent, S.
Spaccapietra, eds. Springer, 2009.
[2] R. Kontchakov, L. Pulina, U. Sattler, T. Schneider, P. Selmer, F. Wolter, and M. Zakharyaschev, Minimal Module Extraction from
DL-Lite Ontologies Using QBF Solvers,” Proc. 21st Int’l Joint Conf.
[3] Artificial Intelligence (IJCAI), 2009.
[4] B. Konev, D. Walther, and F. Wolter, “Forgetting and Uniform Interpolation in Extensions of the Description Logic EL,” Proc.
22nd Int’l Workshop Description Logics, 2009.
[5] B. Konev, D. Walther, and F. Wolter, “Forgetting and Uniform Interpolation in Large-Scale description Logic Terminologies,”
Proc. 21st Int’l Joint Conf. Artifical intelligence (IJCAI), 2009.
[6] K. Wang, Z. Wang, R.W. Topor, J.Z. Pan, and G. Antoniou, “Concept and Role Forgetting in ALC Ontologies,” Proc. Eighth Int’l
Semantic Web Conf. (ISWC), 2009.
[7] M.Y. Vardi, “The Complexity of Relational Query Languages,” Proc. 14th Ann. ACM Symp. Theory of Computing (STOC), 1982.
[8] A. Cali, G. Gottlob, and T. Lukasiewicz, “Datalog+-: A Unified Approach to Ontologies and Integrity Constraints,” Proc. Int’l
Conf. Database Theory (ICDT), 2009.
[9] R. Cattell, “Scalable Sql and Nosql Data Stores,” SIGMOD Record, vol. 39, no. 4, pp. 12-27, 2010.
[10] B. Cuenca Grau, I. Horrocks, Y. Kazakov, and U. Sattler, “Extracting Modules from Ontologies: A Logic-Based Approach,” Proc.
Third Int’l Workshop OWL Experiences and Directions (OWLED), 2007.

Mais conteúdo relacionado

Mais procurados

INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGdannyijwest
 
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...dannyijwest
 
View the Microsoft Word document.doc
View the Microsoft Word document.docView the Microsoft Word document.doc
View the Microsoft Word document.docbutest
 
Performance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information RetrievalPerformance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information Retrievalidescitation
 
IRJET - BOT Virtual Guide
IRJET -  	  BOT Virtual GuideIRJET -  	  BOT Virtual Guide
IRJET - BOT Virtual GuideIRJET Journal
 
USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...
USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...
USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...IJDKP
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...IJSRD
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Enhancing the labelling technique of
Enhancing the labelling technique ofEnhancing the labelling technique of
Enhancing the labelling technique ofIJDKP
 
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
 
Indexing based Genetic Programming Approach to Record Deduplication
Indexing based Genetic Programming Approach to Record DeduplicationIndexing based Genetic Programming Approach to Record Deduplication
Indexing based Genetic Programming Approach to Record Deduplicationidescitation
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...Enhmandah Hemeelee
 

Mais procurados (17)

Ijetcas14 368
Ijetcas14 368Ijetcas14 368
Ijetcas14 368
 
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKINGINTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
INTELLIGENT SOCIAL NETWORKS MODEL BASED ON SEMANTIC TAG RANKING
 
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...
Semantic Annotation Framework For Intelligent Information Retrieval Using KIM...
 
View the Microsoft Word document.doc
View the Microsoft Word document.docView the Microsoft Word document.doc
View the Microsoft Word document.doc
 
Bi4101343346
Bi4101343346Bi4101343346
Bi4101343346
 
Performance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information RetrievalPerformance Evaluation of Query Processing Techniques in Information Retrieval
Performance Evaluation of Query Processing Techniques in Information Retrieval
 
IRJET - BOT Virtual Guide
IRJET -  	  BOT Virtual GuideIRJET -  	  BOT Virtual Guide
IRJET - BOT Virtual Guide
 
USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...
USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...
USING ONTOLOGIES TO IMPROVE DOCUMENT CLASSIFICATION WITH TRANSDUCTIVE SUPPORT...
 
Ax34298305
Ax34298305Ax34298305
Ax34298305
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
 
Text Classification in the Field of Search Engines
Text Classification in the Field of Search EnginesText Classification in the Field of Search Engines
Text Classification in the Field of Search Engines
 
International Journal of Computational Engineering Research(IJCER)
 International Journal of Computational Engineering Research(IJCER)  International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Enhancing the labelling technique of
Enhancing the labelling technique ofEnhancing the labelling technique of
Enhancing the labelling technique of
 
K04302082087
K04302082087K04302082087
K04302082087
 
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...
 
Indexing based Genetic Programming Approach to Record Deduplication
Indexing based Genetic Programming Approach to Record DeduplicationIndexing based Genetic Programming Approach to Record Deduplication
Indexing based Genetic Programming Approach to Record Deduplication
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
 

Semelhante a E0322035037

2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )SBGC
 
JS_proposal.doc
JS_proposal.docJS_proposal.doc
JS_proposal.docbutest
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Semantic web personalization
Semantic web personalizationSemantic web personalization
Semantic web personalizationAlexander Decker
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...acijjournal
 
A novel method for generating an elearning ontology
A novel method for generating an elearning ontologyA novel method for generating an elearning ontology
A novel method for generating an elearning ontologyIJDKP
 
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGYINTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGYcscpconf
 
Paper id 25201463
Paper id 25201463Paper id 25201463
Paper id 25201463IJRAT
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...Enhmandah Hemeelee
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
Database Management system
Database Management systemDatabase Management system
Database Management systemVijay Thorat
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...sunda2011
 
View the Microsoft Word document.doc
View the Microsoft Word document.docView the Microsoft Word document.doc
View the Microsoft Word document.docbutest
 

Semelhante a E0322035037 (20)

2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
2017 IEEE Projects 2017 For Cse ( Trichy, Chennai )
 
B131626
B131626B131626
B131626
 
JS_proposal.doc
JS_proposal.docJS_proposal.doc
JS_proposal.doc
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Semantic web personalization
Semantic web personalizationSemantic web personalization
Semantic web personalization
 
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
MAP/REDUCE DESIGN AND IMPLEMENTATION OF APRIORIALGORITHM FOR HANDLING VOLUMIN...
 
F046063538
F046063538F046063538
F046063538
 
A novel method for generating an elearning ontology
A novel method for generating an elearning ontologyA novel method for generating an elearning ontology
A novel method for generating an elearning ontology
 
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGYINTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
INTELLIGENT INFORMATION RETRIEVAL WITHIN DIGITAL LIBRARY USING DOMAIN ONTOLOGY
 
T0 numtq0n tk=
T0 numtq0n tk=T0 numtq0n tk=
T0 numtq0n tk=
 
Paper id 25201463
Paper id 25201463Paper id 25201463
Paper id 25201463
 
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...In tech application-of_data_mining_technology_on_e_learning_material_recommen...
In tech application-of_data_mining_technology_on_e_learning_material_recommen...
 
G1803054653
G1803054653G1803054653
G1803054653
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
Database Management system
Database Management systemDatabase Management system
Database Management system
 
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
IEEE Final Year Projects 2011-2012 :: Elysium Technologies Pvt Ltd::Knowledge...
 
Sub1583
Sub1583Sub1583
Sub1583
 
Final proj 2 (1)
Final proj 2 (1)Final proj 2 (1)
Final proj 2 (1)
 
View the Microsoft Word document.doc
View the Microsoft Word document.docView the Microsoft Word document.doc
View the Microsoft Word document.doc
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

E0322035037

  • 1. International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 3 Issue 2ǁ February 2014 ǁ PP.35-37 www.ijesi.org 35 | Page XAML Based Mechanism with Closed Dataset Robust System Using HERM Algorithm 1 P.M.Balaganesh M.E., (P.HD) DEAN/cse, 2, D.Radha M.Tech, AP/cse, 3 R.Sarojinidevi (ME)/cse 1, 2, 3, Sembodai Rukmani Varatharajan Engineering College, Sembodai. ABSTRACT: Robust system Hybrid extraction of robust model (HERM), a dynamic XAML based mechanism for the adaptive management and reuse of e-learning resources in a distributed environment like the Web. This proposed system argues that to achieve the on-demand semantic-based resource management for Web-based e- learning, one should go beyond using domain ontology’s statically. KEYWORDS: XAML, Dataset, Data Management, E-learning. I. INTRODUCTION In many application domains (e.g., medicine or biology), comprehensive schemas resulting from collaborative initiatives are made available. This proposed system argues that to achieve the on-demand semantic-based resource management for Web-based e-learning, one should go beyond using domain ontology’s statically. So the propose XAML based matching process involves semantic mapping has done on both the open dataset and closed dataset mechanism to integrate e-learning databases by using ontology semantics. It defines context-specific portions from the whole ontology as optimized data and an XAML based resource reuse approach by using an evolution algorithm. Such well established schemas are often associated with reliable data that have been carefully collected, cleansed, and verified, thus providing reference ontology-based data management systems (DMSs) in different application domains. A good practice is therefore to build on the efforts made to design reference DMSs whenever we have to develop our own DMS with specific needs. Easily that a robust module based DMS evolves safely both the schema and the data of the reference DMS. From a module robust to consistency checking, for any data update in a corresponding module-based DMS, we show how to query the reference DMS for checking whether the local update does not bring any inconsistency with the data and the constraints of the reference DMS .From a module robust to query answering, for any query asked to module-based DMS, It shows how to query the reference DMS for obtaining additional answers by also exploiting the data stored in the reference DMS. II. RELATED WORK Conventional Data Management Strategies: In conventional information management principles, the stored records are normally identified by sets of key words or index terms, and requests for information are expressed by using Boole an combinations of index terms. The retrieval strategy is normally based on an auxiliary inverted-term index that lists the corresponding set of document references for each allowable index term. The Boolean retrieval system is designed to retrieve all stored records exhibiting the precise combination of key words included in the query: when two query terms are related by an and connective, both terms must be present in order to retrieve a particular stored record; when an or connective is used, at least one of the query terms must be present to retrieve a particular item. Content-based Methods: In content-based recommendation methods, the utility u(c, s) of item s for user c is estimated based on the utilities u(c, si) assigned by user c to items si ∈S that are “similar” to item s. For example, in a movie recommendation application, in order to recommend movies to user c, the content-based recommender system tries to understand the commonalities among the movies user c has rated highly in the past (specific actors, directors, genres, subject matter, etc.). Then, only the movies that have a high degree of similarity to whatever user’s preferences are would get recommended.
  • 2. XAML Based Mechanism With Closed Dataset… www.ijesi.org 36 | Page Limited content analysis: Content-based techniques are limited by the features that are explicitly associated with the objects that these systems recommend. Therefore, in order to have a sufficient set of features, the content must either be in a form that can be parsed automatically by a computer (e.g., text), or the features should be assigned to items manually. While information retrieval techniques work well in extracting features from text documents, some other domains have an inherent problem with automatic feature extraction. For example, automatic feature extraction methods are much harder to apply to the multimedia data, e.g., graphical images, audio and video streams. Moreover, it is often not practical to assign attributes by hand due to limitations of resource Another problem with limited content analysis is that, if two different items are represented by the same set of features, they are indistinguishable. Proposed design: This proposed system Hybrid extraction of robust model (HERM) is very efficient and reuse of e- learning resources in a distributed environment like the Web for better result. This proposed system argues that to achieve the on-demand semantic-based resource management for Web-based e-learning, one should go beyond using domain ontology’s statically. The proposed approach for matching process in web cluster databases from different database servers can be easily integrated and deliver highly dimensional e-learning resource management and reuse is far from being mature. However, e-learning is also a widely open research area, and there is still much room for improvement on the method. Architecture diagram: Manages Data centers Fig.1 System Architecture of HERM Fig.1.This architecture explains the context aware based evolution algorithm for dynamic e-learning resource reuse in detail. This system is going to conduct a simulation experiment and evaluate the proposed approach with a xaml e-learning scenario. HERM Algorithm: The extraction and matching process has been implemented step by step with initial requirements. String [][] fillCLabMatrix (Tree of Nodes source, target); String [][] cLabsMatrix; String[] matchers; int i,j; Matchers=getMatchers (); For each sourceAtomicConceptOfLabel in source i=getACoLID(sourceAtomicConceptOfLabel); for each targetAtomicConceptOfLabel in target j= getACoLID(targetAtomicConceptOfLabel); cLabsMatrix[i][j]=getRelation(matchers, sourceAtomicConceptOfLabel,targetAtomicConceptOfLabel); return cLabs Matrix String get Relation(String[] matchers, Atomic ConceptOfLabel source, target) String matcher; String relation Idk ; int i=0;
  • 3. XAML Based Mechanism With Closed Dataset… www.ijesi.org 37 | Page while ((i<sizeof(matchers))&&(relation==Idk)) matcher= matchers[i]; Relation=execute Matcher (matcher, source, target); i++; return relation; The major work of this module is perform the data matching by getting the user query the data request can be done in optimized fashion, that is, the data request can come from the data agent of any type of user query. Data Agent can request for explicit request with a specific condition, where in this application, it is modeled as patient information, here the agent can request for specific name. Agent can also request for sample request, that is, they can request for specific number of clustering by sequence. These requests are raised by the data agents during runtime and the open datasets are also allocated uniquely for each query during runtime. This Dataset accompanied by necessary additions depending upon the requirement. Open data set used to read, write, matching the data from more than one different database services. If your application requires working with data, you can load the data into a dataset, which provides your application with a local in-memory cache of the data to work. Information about loading data into a dataset. III. CONCLUSION The proposed technique HERM have given better results for solving the problem of safe personalization of modules built from an existing reference DMS. This raises new issues to check easily that a module-based DMS evolves independently but coherently the reference DMS from which it has been built. It have introduced two notions of module robustness that make possible to build locally the relevant queries to ask to the reference database in order to check global consistency (possibly upon each update), and to obtain global answers for local queries. IV. ACKNOWLEDGEMENT I would like to thank Ms. D.Radha for give excellent insights and suggestions. REFERENCES [1] Modular Ontologies: Concepts, Theories and Techniques for Knowledge Modularization, H. Stuckenschmidt, C. Parent, S. Spaccapietra, eds. Springer, 2009. [2] R. Kontchakov, L. Pulina, U. Sattler, T. Schneider, P. Selmer, F. Wolter, and M. Zakharyaschev, Minimal Module Extraction from DL-Lite Ontologies Using QBF Solvers,” Proc. 21st Int’l Joint Conf. [3] Artificial Intelligence (IJCAI), 2009. [4] B. Konev, D. Walther, and F. Wolter, “Forgetting and Uniform Interpolation in Extensions of the Description Logic EL,” Proc. 22nd Int’l Workshop Description Logics, 2009. [5] B. Konev, D. Walther, and F. Wolter, “Forgetting and Uniform Interpolation in Large-Scale description Logic Terminologies,” Proc. 21st Int’l Joint Conf. Artifical intelligence (IJCAI), 2009. [6] K. Wang, Z. Wang, R.W. Topor, J.Z. Pan, and G. Antoniou, “Concept and Role Forgetting in ALC Ontologies,” Proc. Eighth Int’l Semantic Web Conf. (ISWC), 2009. [7] M.Y. Vardi, “The Complexity of Relational Query Languages,” Proc. 14th Ann. ACM Symp. Theory of Computing (STOC), 1982. [8] A. Cali, G. Gottlob, and T. Lukasiewicz, “Datalog+-: A Unified Approach to Ontologies and Integrity Constraints,” Proc. Int’l Conf. Database Theory (ICDT), 2009. [9] R. Cattell, “Scalable Sql and Nosql Data Stores,” SIGMOD Record, vol. 39, no. 4, pp. 12-27, 2010. [10] B. Cuenca Grau, I. Horrocks, Y. Kazakov, and U. Sattler, “Extracting Modules from Ontologies: A Logic-Based Approach,” Proc. Third Int’l Workshop OWL Experiences and Directions (OWLED), 2007.