This paper explains the concept of knowledge repositories and its uses in various applications, explores how to construct a strong knowledge repository, what are the various fields to be considered while constructing a knowledge repository and how these knowledge repositories influence knowledgeable action in knowledge management. This paper also discusses about knowledge mapping, constituents of knowledge mapping, different stages of mapping from the knowledge repository and the different types of mapping. Subsequently explored the factors that is to be considered while constructing the knowledge repository. A simple model is been for DSS using knowledge repository. Finally an area where knowledge mapping can be applied with knowledge repository.
{"title":"Application of Knowledge Repository and Mapping in Knowledge Management","authors":"Ms. K. L. Sumathy, Dr. M. Chidambaram","doi":"10.1109/WCCCT.2014.71","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.71","url":null,"abstract":"This paper explains the concept of knowledge repositories and its uses in various applications, explores how to construct a strong knowledge repository, what are the various fields to be considered while constructing a knowledge repository and how these knowledge repositories influence knowledgeable action in knowledge management. This paper also discusses about knowledge mapping, constituents of knowledge mapping, different stages of mapping from the knowledge repository and the different types of mapping. Subsequently explored the factors that is to be considered while constructing the knowledge repository. A simple model is been for DSS using knowledge repository. Finally an area where knowledge mapping can be applied with knowledge repository.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121191664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The main goal of this research is to develop English-Tamil machine translation system using rule-based approaches. For rule based approach, considering the structural difference between English and Tamil languages, syntax transfer based methodology is adopted for translation. This translation engine is a parser, which analyzes the source text, and the corresponding target structure is generated through the transfer lexicon. Morphological generator for Tamil is required to generate the proper Tamil sentence.
{"title":"Rule Based Machine Translation System from English to Tamil","authors":"M. Kasthuri, Britto Kumar","doi":"10.1109/WCCCT.2014.50","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.50","url":null,"abstract":"The main goal of this research is to develop English-Tamil machine translation system using rule-based approaches. For rule based approach, considering the structural difference between English and Tamil languages, syntax transfer based methodology is adopted for translation. This translation engine is a parser, which analyzes the source text, and the corresponding target structure is generated through the transfer lexicon. Morphological generator for Tamil is required to generate the proper Tamil sentence.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131622430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
An e-learning system is increasingly gaining popularity in the academic community because of several benefits of learning anywhere, anyplace and anytime. In the hands of well-trained educators, e-learning technologies can offer powerful new solutions for teaching and learning. The FLIP classroom is the latest learning model now slowly making inroads into the teaching and training in India. This paper describes a tutor (e-learning package) incorporates the idea of Flip model, which teaches about problem solving techniques in Mensuration - a branch of Mathematics. This tutor is aimed at helping the school students strengthen their understanding of the concepts covered in Mensuration. The design part of the tutor consists of: (i) Learning material (ii) Classification of problems (iii) Student module (iv) Teacher module and (v) Reports. The implemented software covers portions of grade 6 to 10 curriculum of Tamilnadu State Board Syllabus. The highlights of the tutor are: a) The teacher plays a major role in defining problems and solution steps. b) Word problems with multiple step solutions.
{"title":"Implementation of E-Learning Package for Mensuration-A Branch of Mathematics","authors":"S. Prabha, A. Shanavas","doi":"10.1109/WCCCT.2014.37","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.37","url":null,"abstract":"An e-learning system is increasingly gaining popularity in the academic community because of several benefits of learning anywhere, anyplace and anytime. In the hands of well-trained educators, e-learning technologies can offer powerful new solutions for teaching and learning. The FLIP classroom is the latest learning model now slowly making inroads into the teaching and training in India. This paper describes a tutor (e-learning package) incorporates the idea of Flip model, which teaches about problem solving techniques in Mensuration - a branch of Mathematics. This tutor is aimed at helping the school students strengthen their understanding of the concepts covered in Mensuration. The design part of the tutor consists of: (i) Learning material (ii) Classification of problems (iii) Student module (iv) Teacher module and (v) Reports. The implemented software covers portions of grade 6 to 10 curriculum of Tamilnadu State Board Syllabus. The highlights of the tutor are: a) The teacher plays a major role in defining problems and solution steps. b) Word problems with multiple step solutions.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126204422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Medical image processing plays an essential role in providing information in wide area for such advanced images. Magnetic resonance imaging (MRI) is an advanced medical imaging technique providing rich information about the human soft tissue anatomy. MRI of the brain is an invaluable tool to help physicians to diagnose and treat various brain diseases including stroke, cancer, and epilepsy. The specific information to evaluate the diseases. Histogram equalization is one of the important steps in image enhancement technique for MRI. There are several methods of image enhancement and each of them is needed for a different type of analysis. In this paper study and compare different Techniques like Global Histogram Equalization (GHE), Local histogram equalization (LHE), Brightness preserving Dynamic Histogram equalization (BPDHE) and Adaptive Histogram Equalization (AHE) using different objective quality measures for MRI brain image Enhancement.
{"title":"Histogram Equalization for Image Enhancement Using MRI Brain Images","authors":"N. Senthilkumaran, J. Thimmiaraja","doi":"10.1109/WCCCT.2014.45","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.45","url":null,"abstract":"Medical image processing plays an essential role in providing information in wide area for such advanced images. Magnetic resonance imaging (MRI) is an advanced medical imaging technique providing rich information about the human soft tissue anatomy. MRI of the brain is an invaluable tool to help physicians to diagnose and treat various brain diseases including stroke, cancer, and epilepsy. The specific information to evaluate the diseases. Histogram equalization is one of the important steps in image enhancement technique for MRI. There are several methods of image enhancement and each of them is needed for a different type of analysis. In this paper study and compare different Techniques like Global Histogram Equalization (GHE), Local histogram equalization (LHE), Brightness preserving Dynamic Histogram equalization (BPDHE) and Adaptive Histogram Equalization (AHE) using different objective quality measures for MRI brain image Enhancement.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130579320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new hybrid classification technique for recognizing printed digits. The feature extraction was performed using object region boundary analysis, Fourier Descriptors (FD) and Chain code based algorithm. A new curve tracing Chain code based algorithm (CTCC) was proposed to extract the curve features from the digit images. The recognition was performed using dynamic programming and multi-layer perceptron using back propagation algorithm (MLP-BP). Higher accuracy of 99% was obtained. The proposed methods were simple with higher recognition accuracy and lesser time complexity.
{"title":"Digit Recognition Using Hybrid Classifier","authors":"R. Radha, R. Aparna","doi":"10.1109/WCCCT.2014.18","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.18","url":null,"abstract":"This paper proposes a new hybrid classification technique for recognizing printed digits. The feature extraction was performed using object region boundary analysis, Fourier Descriptors (FD) and Chain code based algorithm. A new curve tracing Chain code based algorithm (CTCC) was proposed to extract the curve features from the digit images. The recognition was performed using dynamic programming and multi-layer perceptron using back propagation algorithm (MLP-BP). Higher accuracy of 99% was obtained. The proposed methods were simple with higher recognition accuracy and lesser time complexity.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126669047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Telesphor Lakra, A. Jordon, K. J. Priya, T. Rajaretnam
Intuitionistic fuzzy recognizers and intuitionistic fuzzy finite automata are discussed. The notions of intuitionistic fuzzy finite automata with unique transition on an input symbol is introduced. It is shown that for any intuitionistic fuzzy finite automaton (IFA) there exists an equivalent intuitionistic fuzzy finite automaton with unique membership transitions on an input symbol such that membership values for recognized strings are the same. The concepts are proved and illustrated with examples.
{"title":"Intuitionistic Fuzzy Finite Automata with Unique Membership Transitions","authors":"Telesphor Lakra, A. Jordon, K. J. Priya, T. Rajaretnam","doi":"10.1109/WCCCT.2014.54","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.54","url":null,"abstract":"Intuitionistic fuzzy recognizers and intuitionistic fuzzy finite automata are discussed. The notions of intuitionistic fuzzy finite automata with unique transition on an input symbol is introduced. It is shown that for any intuitionistic fuzzy finite automaton (IFA) there exists an equivalent intuitionistic fuzzy finite automaton with unique membership transitions on an input symbol such that membership values for recognized strings are the same. The concepts are proved and illustrated with examples.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Improved network access is the universal reason for moving towards wireless networks. Equipping the wireless devices with context-aware capability will increase the Quality of Service. Due to this openness in communication, growth in the number of users and geographic coverage, enforcing of access control policies to the context-aware enabled wireless networks doubles the hardness in maintaining the security. Hence, this paper compares some of the existing frameworks and proposes a new framework to enforce role based access control services to the context-aware enabled wireless networks with the help of Context graphs. This proposed framework having a security subsystem that can adapt itself based on the current conditions of the environment.
{"title":"SECCON: A Framework for Applying Access Control Policies in Context-Aware Wireless Networks","authors":"D. Amalarethinam, V. Nirmal","doi":"10.1109/WCCCT.2014.27","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.27","url":null,"abstract":"Improved network access is the universal reason for moving towards wireless networks. Equipping the wireless devices with context-aware capability will increase the Quality of Service. Due to this openness in communication, growth in the number of users and geographic coverage, enforcing of access control policies to the context-aware enabled wireless networks doubles the hardness in maintaining the security. Hence, this paper compares some of the existing frameworks and proposes a new framework to enforce role based access control services to the context-aware enabled wireless networks with the help of Context graphs. This proposed framework having a security subsystem that can adapt itself based on the current conditions of the environment.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129541417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multicast routing is more effective than unicast routing as it transmits a single copy of message to all its group members within single transmission. Multicast routing protocols require the individual nodes to maintain the state information, as they typically rely on the creation of multicast tree or mesh. Maintaining this state information creates a large amount of communication, processing, memory overhead and complexity in finding the geographic location of the neighbor nodes. Since every node in manet has to perform the function of the router, some nodes may die early due to the lack of energy leading to the disconnection of the network. Thus we have developed a Qualified Stateless Multicast Routing Protocol (QSMRP) that simply uses the addresses of the multicast group members stored in the packet header that enable the receivers to select the best path for packet transmission and also enhances the lifetime of the network by finding the routing solutions that minimizes the energy of the nodes in the network.
{"title":"Qualified Stateless Multicast Routing Protocol for Enhancing the Network Lifetime in MANET","authors":"S. Pavithra, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.24","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.24","url":null,"abstract":"Multicast routing is more effective than unicast routing as it transmits a single copy of message to all its group members within single transmission. Multicast routing protocols require the individual nodes to maintain the state information, as they typically rely on the creation of multicast tree or mesh. Maintaining this state information creates a large amount of communication, processing, memory overhead and complexity in finding the geographic location of the neighbor nodes. Since every node in manet has to perform the function of the router, some nodes may die early due to the lack of energy leading to the disconnection of the network. Thus we have developed a Qualified Stateless Multicast Routing Protocol (QSMRP) that simply uses the addresses of the multicast group members stored in the packet header that enable the receivers to select the best path for packet transmission and also enhances the lifetime of the network by finding the routing solutions that minimizes the energy of the nodes in the network.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114234545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Jency Priya, A. Jeny Jordon, Telesphor Lakra, T. Rajaretnam
An intuitionistic fuzzy finite state automaton assigns a membership and nonmembership values in which there is a unique membership transition on an input symbol (IFA-UM) is considered. It is proved that the fuzzy behaviors of IFA-UM is closed under union, product, intersection and reversal.
{"title":"Closure Properties of Intuitionistic Fuzzy Finite Automata with Unique Membership Transitions on an Input Symbol","authors":"K. Jency Priya, A. Jeny Jordon, Telesphor Lakra, T. Rajaretnam","doi":"10.1109/WCCCT.2014.87","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.87","url":null,"abstract":"An intuitionistic fuzzy finite state automaton assigns a membership and nonmembership values in which there is a unique membership transition on an input symbol (IFA-UM) is considered. It is proved that the fuzzy behaviors of IFA-UM is closed under union, product, intersection and reversal.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"433 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115601533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Location Based Services has been widely used to guide the user with real time information. The efficient query processing and preserving the privacy of the user is a key challenge in these applications. There have been many researches for anonymity in the spatial network by generating cloaking region in the Road networks and a K-NN algorithm is used for processing query in this region. If the same query is issued frequently and processing these queries continuously is an issue. In this paper, a novel Frequent Query Retrieval Table (FQRT) is proposed to increase the efficiency of query processing in the K-NN algorithm. FQRT maintains the results of the frequently occurring queries and can be retrieved when the same query is issued in the cloaking region. The proposed FQRT algorithm reduces the query processing time and the network expansion cost.
{"title":"Optimization of K-NN Query Processing in Road Networks Using Frequent Query Retrieval Table","authors":"S. Sangeetha, S. Dhanabal, V. K. Kaliappan","doi":"10.1109/WCCCT.2014.22","DOIUrl":"https://doi.org/10.1109/WCCCT.2014.22","url":null,"abstract":"Location Based Services has been widely used to guide the user with real time information. The efficient query processing and preserving the privacy of the user is a key challenge in these applications. There have been many researches for anonymity in the spatial network by generating cloaking region in the Road networks and a K-NN algorithm is used for processing query in this region. If the same query is issued frequently and processing these queries continuously is an issue. In this paper, a novel Frequent Query Retrieval Table (FQRT) is proposed to increase the efficiency of query processing in the K-NN algorithm. FQRT maintains the results of the frequently occurring queries and can be retrieved when the same query is issued in the cloaking region. The proposed FQRT algorithm reduces the query processing time and the network expansion cost.","PeriodicalId":421793,"journal":{"name":"2014 World Congress on Computing and Communication Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130948772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}