Sharon - agent based service middleware for e-governance: a systematic web examination based approach using Christina ontology
Over the past few years, semantic web service and multi agent approach has been used successfully in the development of E-Governance. Such a hybrid approach can be considered as an effective approach for the development of predictive modeling in complex e-governance systems. This paper descript a novel approach for the Advanced Semantic Web Service and Multi-Agent based middleware to solve the problems in like MIS Advanced Integrated system interoperability, Sharon advanced system operation research complex Integration, available resource sharing integration of heterogeneous data. This approach is useful for the construction of regional based E-government.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
To study the difference in academic achievement of higher secondary school students on the basis of emotional intelligence
Present study is an attempt to study the difference in academic achievement of higher secondary school students on the basis of Emotional Intelligence and its four components namely Interpersonal Skill, Intrapersonal Skill, Interpersonal Management, Intrapersonal Management. Study was conducted on one hundred sixty higher secondary school students, selected by adopting random sampling technique. Data was collected by using Mangal Emotional Intelligence Inventory constructed and standardized by Mangal and Mangal (1971). Statistical analysis was done by computing t-test, Findings indicates no significant difference in the academic achievement of higher secondary school students on the basis of Emotional Intelligence, intrapersonal skill, interpersonal management and intrapersonal management but significant difference exist in academic achievement on the basis of interpersonal skill which is found to be significant at 0.05 level of significance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Mobile agent based data retrieval from distributed database
This paper describes the process involved in data retrieval from heterogeneity distributed database environment which employ multiple agent system. When a user request in any environment the request is converted to a query using Natural language Processing and passed for search through specific domains which helps to reduce the computation time and further complexity. But the transfer of record to and fro between system and base station increases the network traffic, communication cost, and response time. In order to minimize the overall complexity mobile agents are used to fetch the data required from various domains. This will help to improve the performance by exploiting the sites in parallel process.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Punjabi Speech Recognition of Isolated words using compound EEMD & neural network
Automatic Speech recognition and conversion of speech to text is a work which has proved its importance for decades. A lot of work has already been done in this contrast. This paper focuses on the category of the emotion of Punjabi speech and the conversion of speech to text using advanced system voice recognition pattern. This paper also focuses on the optimization of the EEMD process by combining EEMD process with the Neural Network. Neural Network has been found to be friendly in the contrast of compounding different algorithms to it and it produces significant results. This paper also focuses on the future works to be considered in the same field.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Accident detection system: survey and analysis
Now-a-days, the vehicles are becoming more sophisticated with features like GPS navigation and airbags for safety. In spite of this the victims of the accidents which occur at remote locations do not get prompt medical service. There are several cases where the accident victims lose their lives due to lack of medical assistance. In such situations the advancements in technology does not seem to be useful. This paper specifies the system that would automatically detects an accident and notifies the nearest rescue service which will enable the accident victim to receive instant medical help and assistance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Concurrency control technique for enhancing RDBMS efficiency, performance and activity
The Efficiency, Performance and Activity of a RDBMS must be consistent. This consistency is achieved through Concurrency Control. Concurrency control deals with the issues involved with allowing multiple people simultaneous access to shared entities, be they objects, data records, or some other representation. The Concurrency Control mechanism ensures that the database maintains its consistency. Concurrency control of distributed transactions requires a distributed synchronization algorithm, which has to ensure that concurrent transactions are not only serializable at each site where they execute, but that they are also globally serializable. The advanced protocols put forward are focused on increasing the level of concurrency and simultaneously decreasing the rate of transaction restarts. Some protocols also compromise consistency in order to achieve concurrency. Several Concurrency Control algorithms have been suggested and implemented and used in a variety of real world applications. This article reveals the analysis of various Concurrency Control Techniques on the database systems and further discusses some of the Hybrid Techniques, which provide efficient Concurrency Control on database systems.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Data mining with artificial neural network in a scenerio of a bank
Companies have been collecting data for decades, building massive data warehouses in which to store it. Even though this data is available, very few companies have been able to realize the actual value stored in it. The question these companies are asking is how to extract this value. The answer is Data mining. Data mining, the extraction of hidden predictive information from large databases, is a powerful new technology with great potential to help companies focus on the most important information in their data warehouses. There are many technologies available to data mining practitioners, including Artificial Neural Networks, Regression, and Decision Trees. Many practitioners are wary of Neural Networks due to their black box nature, even though they have proven themselves in many situations. In our current research we are attempting to compare the aforementioned technologies and determine if Neural Networks outperform more traditional statistical techniques. This paper is an overview of neural networks and questions their position as a preferred tool by data mining practitioners.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure online password administration system using biometric authentication
There are numerous limitations with the existing traditional authentication methods used to protect private data such as PIN/password which is easy to duplicate and forgotten. This paper proposes a novel methodology to protect private information by means of secured password administration system using biometric authentication. The system architecture and main modules are presented.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Intelligent Query Manipulation and Retrieval in Temporal Database
More and more organizations each day are now storing achieves of data to help them make essential business resolutions. The Commercial Database Management Systems (DBMS) that are available in the I.T. market do not afford any considerable and practical methods of storing and manipulate such data. Time is ubiquitous in information systems. Almost every enterprise faces the trouble of its data becoming out of date. However, such data is frequently valuable, so it should be archived and some means of accessing it should be afforded. Also, some data may be naturally historical, e.g., medical, cadastral, or judicial records. Whilst there has been research into the subject of Temporal Databases, there is a lack of marketable tools. The Paper aims to design and develop a Temporal Database Management System (TDBMS) that provides means to manipulate temporal data. The TDBMS will provide a Temporal Relational Algebra (TRA) structured query language that is based on and is an extension to Relational Algebra (RA) for extracting data from the Temporal Database. The TRA is to contain most the common operators that are associated with RA such as Cartesian Product, Natural Join, Union and many more. The TRA will introduce new temporal operators, which are useful for querying Temporal Databases.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Optimization of MANET by Team Multicast Routing Protocol
Team multicast identifies clusters of nodes with same affinity as teams and manages the multicast membership information using the unit of team rather than dealing with individual node members. The source propagates a data packet to each subscribed team’s leader and each leader forwards the data to the entire team. But none of the existing work on team multicasting consider the QoS metrics of the team leader like power, bandwidth etc. In this paper, we propose a QoS-aware team multicast protocol for MANETs, which gives a better solution to the above said problems. In our proposed protocol, the team leaders are selected based on the QoS metrics like bandwidth, residual energy and stability. Thus, the problem of link breakage can be reduced proactively. In case of link breakage occurring at any place of the network, a new team leader is selected in reactive basis. This avoids the delay in route repair mechanism. By simulation results, we show that the proposed protocol achieves better packet delivery ratio with reduced delay and overhead.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]