This paper discusses on a novel method for semantic searching and retrieval of information about learning materials. A novel metametadata taxonomy has been developed which provides the basis for a semantic search engi...
详细信息
ISBN:
(纸本)9781424449125
This paper discusses on a novel method for semantic searching and retrieval of information about learning materials. A novel metametadata taxonomy has been developed which provides the basis for a semantic search engine to extract, match and map queries to retrieve relevant results. Metametadata encapsulate metadata instances by using the properties and attributes provided by ontologies rather than describing learning objects. The use of ontological views assists the pedagogical content of metadata extracted from learning objects by using the control vocabularies as identified from the metametadata taxonomy. The use of ontological approach and metametadata (based on the metametadata taxonomy) have contributed towards a novel semantic searching mechanism. These three strands - the taxonomy, the ontological views, and the search algorithm - are integrated into an architecture (OMESCOD) to support the semantic search within the metadata repository.
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfil...
详细信息
Presently, mobile handheld device has successfully replaced traditional telephone to become the most popular wireless communication tools. Mobile Short Message Service (SMS) and Multimedia Message Service (MMS) fulfill almost all the user requirements as an effective communication and information delivering service. Since SMS/MMS become so popular on daily communication, there is a demand to communicate or exchange confidential information in a secure environment. Public Key Infrastructure (PKI) is a proven solution, which using pairing of key, for secure communication encryption. In this paper, m-PKI is introduced to provide PKI encryption to the mobile SMS and MMS. This new approach allows the end-user to send private and classified message via SMS. The key pair generation and distribution are performed by the Certificate Authority (CA). The size of the key pair are studied and decided by the tradeoff between performance and security.
作者:
Kumar Sinha, DeepakShreenidhi, H.S.
Faculty of Engineering and Technology Department of Computer Science and Engineering Bangalore India
Disease is a significant contributor to both suicides and or the biggest cause ill long - term disability. Vernacular usage is significantly impacted by sorrow. In this research, we use a number of classifiers that ar...
详细信息
In this paper, we consider sorting problem with n elements distributed over a number of processing entities in a distributed system. We have derived an alternative, efficient algorithm with the worst case lower bound ...
详细信息
ISBN:
(纸本)9788988678206
In this paper, we consider sorting problem with n elements distributed over a number of processing entities in a distributed system. We have derived an alternative, efficient algorithm with the worst case lower bound of (n - 1) rounds for distributed sorting on a line network, where n is the number of processors. The proposed distributed sorting algorithm improves the performance of each processor without creating copies of (n - 2) elements at intermediate processors and reduces the execution time of Sasaki's time-optimal algorithm [A. Sasaki, A time-optimal distributed sorting algorithm on a line network, Inform. Process. Lett., 83 (2002) pp. 21-26]. Also all processors do not necessarily perform the disjoint comparison-exchange operations and simulation results show that the proposed algorithm results in better execution time with the identity of processors. This algorithm could also be extended for sorting the distributed elements on the linear embedding obtained from a general network.
The amount of time spent in requesting and waiting for the meal in Martabak Air Mancur restaurant may permanently multiply the number of customers in the line waiting especially during peak hours and on weekend. It wi...
详细信息
In this effort, by consuming the k-symbol calculus, we generalize the Hdid-Luchko function (the Mittag-Leffler function of several variables). Some inequalities are established containing the normalized type of this f...
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and ...
详细信息
Security threats to smart and autonomous vehicles cause potential consequences such as traffic accidents,economically damaging traffic jams,hijacking,motivating to wrong routes,and financial losses for businesses and *** and autonomous vehicles are connected wirelessly,which are more attracted for attackers due to the open nature of wireless *** of the problems is the rogue attack,in which the attacker pretends to be a legitimate user or access point by utilizing fake *** figure out the problem of a rogue attack,we propose a reinforcement learning algorithm to identify rogue nodes by exploiting the channel state information of the communication *** consider the communication link between vehicle-to-vehicle,and *** evaluate the performance of our proposed technique by measuring the rogue attack probability,false alarm rate(FAR),mis-detection rate(MDR),and utility function of a receiver based on the test threshold values of reinforcement learning *** results show that the FAR and MDR are decreased significantly by selecting an appropriate threshold value in order to improve the receiver’s utility.
This paper is concerned with the hopf bifurcation control of L system. Firstly, the stability of the equilibriums of the system is studied, and the critical value of the system parameter at which hopf bifurcation occu...
详细信息
Agriculture planning is playing an important role as the economic growth is very high day by day in our daily life. There is lot of research study going on as there are few important issues like soil nutrients, crop p...
详细信息
暂无评论