Vaishnav K;Swaminarayan P;Virparia P V
014489 Vaishnav K;Swaminarayan P;Virparia P V (Institute of Science and Technology for Advanced studies and Research, allabh Vidyanagar, Gujarat-388 120) : Comparative study of query retrieval methods in database management system and semantic web. Prajna 2009, 17(Dec), 125-31.
The main objective of the computer machine is to store the information in some structured format and to provide the right information to right person at right time. In history, several such systems were developed from flat files to DBMS to the latest framework such as Semantic Web, which is an evolving extension of the World Wide Web in which web content can be expressed not only in natural language, but also in a form that can be understood, interpreted and used by software agents, thus permitting them to find, share and integrate information more easily. This paper describes the query retrieval in database management system through SQL and query retrieval in Semantic Web through SPARQL. We have implemented an example sub schema in SQL server and Protege to provide the comparison between the wide spread SQL query language and a new semantic query language SPARQL.
Sajja P S;Dahiya V
014488 Sajja P S;Dahiya V (Camputar science Dep, Sardar patel Univ, Vallabh Vidyanagar, Gujarat-388 120) : Role of MTF in analysing the contrast and threshold performance of human visual system. Prajna 2009, 17(Dec), 117-21.
This research is focused on practical model of the contrast performance of the human visual system. The level of contrast required to achieve recognition of a given image or class of images projected onto the photon sensitive surface at a specific scale is discussed in this paper. The solution is derived from the signal to threshold condition for its mapping on the retina and from retina to brain. Different types of image exhibits different signals to the threshold requirement. The difference between them is small relative to the total instantaneous dynamic range of the visual system. The signal processing is also dependent on the Modulation Transfer Function (MTF) that impacts the threshold contrast performance of the Human Visual System (HVS). There are number of stages and pathways for processing an image by HVS, which are explored in this paper.
3 illus, 11 ref
Premalatha K;Natarajan A M
014487 Premalatha K;Natarajan A M (NO, Kongu Engineering College, Erode-638 052) : Procreant PSO for fastening the convergence to optimal solution in the application of document clustering. Curr Sci 2009, 96(1), 137-43.
This communication presents the Procreant PSO (particle swarm optimization) algorithm for document-clustering problems. This algorithm is a hybrid of PSO and genetic algorithm (GA), a population-based heuristic search technique, which can be used to solve combinatorial optimization problems, modelled on the concepts of cultural and social rules derived from the analysis of the swarm intelligence (PSO) and also based on crossover and evolution (GA). In standard PSO the non-oscillatory route can quickly cause a particle to stagnate and also, it may prematurely converge on suboptimal solutions that are not even guaranteed to local optimal solution. In this communication, a modification strategy is proposed for the PSO algorithm and applied to the document corpus. The strategy adds reproduction using crossover when stagnation in the movement of the particle is identified and carries out local search to improve the goodness-of-fit. Reproduction has the capability to achieve faster convergence and better solution. Experimental results are examined with document corpus. It demonstrates that the Procreant PSO algorithm statistically outperforms the Simple PSO and the traditional K-means algorithm.
7 illus, 16 ref
Patel C N;Deasi A
014486 Patel C N;Deasi A (Anand Institute of Information Science, Opp. Twon Hall Anand, Gujarat-388 120) : Skew detection and text line extraction for hand written gujarati text. Prajna 2009, 17(Dec), 99-103.
The area of Optical Character Recognition (OCR) has been addressed very well for many popular international languages like English, Chinese, Arabic, Japanese and some of the Indian languages like Oriya, Bengali, Tamil, Telugu etc. Gujarati language OCR has also been focused since last few years, but still there is a scope for developing new and innovative techniques. This paper describes two important and basic preprocessing tasks for OCR, the skew detection and text line extraction for handwritten Gujarati text. This paper also describes properties of Gujarati script, brief overview of the OCR process and problems related to Gujarati OCR. This paper describes various techniques of skew detection and correction. The results based on radon transform for skew detection and correction are discussed. Text line extraction is done using projection profile techniques. The radon transform based techniques are found quite satisfactory for detecting and correcting skew angle.
2 illus, 13 ref
Leducq D
014485 Leducq D (NO, Sciences and Technologies of Lille Univ, Laboratory "Territory City, Environment, Society "(EA 4019), AvP- Langevincite scientifique- 59655, France, Email: divya.leducq@gmail.com) : Strategic assets and weaknesses of a new infotech growth pole in India: Pune (Maharashtra). Trans Inst Indian Geogr 2008, 30(2), 125-36.
Central Government started to establish the scheme "Software Technology Park of India" in Pune to support the economic growth in the information technology sector. In due course, the private sector followed, building others IT parks: thus contributing to the rapid growth of the city. Indeed, these parks covered multi-spatial realities, ranging from a simple tower to a township. They played an important role in the economic development of Pune by promoting the growth of the IT cluster. Consequently, the importance of Pune in the regional and national scheme is rising. At the same time, this rapid growth involves problems, which, in the long term, can harm the dynamics of Pune. The actors public-private are required to set up palliative strategies, in order to preserve the potential of the economic growth of the city. This will be the sole answer in order to fructify the efforts made for almost two decodes.
4 illus, 19 ref
Kamani K C;Kathiriya D R
014484 Kamani K C;Kathiriya D R (Information Technology Center, Anand Agricultural Univ, Anand, Gujarat-388 001) : Cross layer mobility management in heterogeneous wireless seamless technology using IPv6. Prajna 2009, 17(Dec), 108-16.
The growing availability and ubiquity of different types of access networks is driving an evolution towards a "network of networks" consisting of heterogeneous but interconnected core and access network technologies that enable users to be always "best connected" anytime, anywhere, without much thought to the background technology used for maintaining and securing connectivity. However, before this vision is realized there are several technological barriers that must be overcome. It is widely anticipated that beyond 3G networks will be an IP-based integration of heterogeneous wireless access technologies. "Seamless Mobility" in such network is much more difficult to be achieved than in traditional wireless telecommunication networks because the B3G network environments are more complex, and various IP-based services presents various QoS requirements, and single handover strategy can not meet all the situations. An integrated mobility management solution is really needed instead of the one fold IP-layer solution such as Mobile IP. In fact, Mobile IP is a simple routing redirection mechanism and the handover performance of Mobile IP is very poor due to the inherent problems in IP such as no sensitivity on the requirements of QoS from application layer and the change of under layer service environments. This article tries to divide the task of "Seamless Mobility" into several subtasks including a well-defined mobility management framework, an IP-layer signaling protocol with good extensibility to support mobility, an set of typical IP-layer handover strategies, an adaptive Handover Control scheme and multi-mode support in Mobile Nodes. Obviously, Mobile IPv6 is perfect as IP-layer mobility protocol and all the handover strategies are designed based on Hierarchical Network-layer Mobility Management framework and implemented by extending of Mobile IPv6. The adaptive Handover Control scheme is proposed to improve IP-layer handover performance and optimize the utilization of multiple network resources based on accurate handover decision on target network, handover strategy and handover time according to cross-layer information. In addition, Mobile Nodes should be modified to support multiple available interfaces and the network-layer mobility management functions.
9 illus, 15 ref
James J
014483 James J (Economics Dep, Tilburg Univ, 2 Warandelaan, 5000 LE Tilberg, The Netherlands, Email: m.j.james@uvt.nl) : Measuring the global digital divide at the level of individuals. Curr Sci 2009, 96(2), 194-7.
According to the conventional measure, the digital divide assigns the same weight to each country regardless of its population size. In this note, by contrast, the divide is conceptualized at the level of individuals as the absolute number of internet users and mobile phone subscribers in developed as against developing countries. On this basis I find that the conventional gap in information technology (IT) use between these countries either shrinks dramatically or is actually reversed. The role of China in these new results is heavily emphasized. The goal of policy should be to provide access to the vast number of individuals who still have no access to IT, even when the digital divide is closed.
6 tables, 5 ref
Jajal B;Desai V
014482 Jajal B;Desai V (Ashok & Rita Patel Biotechnology Institute (ARIBAS), New Vallabh Vidyanagar, Gujarat-388 120) : Sensing image forgey using matlab. Prajna 2009, 17(Dec), 104-7.
Due to availability of immense number of image editing software, a layman can easily perform editing operations into j digital image. Among the major operations, Copy-paste of one image area into another is considered to be the common example of manipulating image. A digital image consists of storage representation of RGB (Red-Green-Blue) color format. Usually an image is assumed to be acquired in 24 bits Bitmap format. The procedure devised here senses the same regions within an image, assuming the test image to contain such forgery. The suggested procedure can be considered as a tool i image forensics. This paper discusses the procedure successfully implemented using Matlab.
6 illus,1 table, 9 ref
Vikram Singh;Nagpal S
024087 Vikram Singh;Nagpal S (Computer Science and Engineering Dep, Chaudhary Devi Lal Univ, Sirsa, Haryana, Email: Vikramsinghkuk@yahoo.com) : Classification of health care databases using interactive association rule mining : a case study of hepatitis dataset. Arya Bhatta J Math Inf 2010, 2(1), 29-34.
An interactive association rule method has been proposed to improve upon the quality of the data mining results in large medical datasets. Very often association rule mining yields numerous meaningless rules. Domain expert can often guide and restrict the search procedure to contain the number of useless rules. The association rule method proposed herein is "Apriori" based that takes a target attribute from a clinician to identify the class of patients in hepatitis database. The clinical data derived from the electronic healthcare records and biological information derived from data mining techniques could provide more imperative input to the decision making process. The aim of the experiments conducted as a part of the work reported herein is to mine useful knowledge hidden in the form of association rules that can help the clinicians to quickly make sense out of vast clinical datasets.
9 ref
Akosu N I;Jegede A J;Adegoke G K
024086 Akosu N I;Jegede A J;Adegoke G K (Computer Science Dep, Federal Polytechnic, Nasarawa, Nigeria, Email: bymjegede@yahoo.co.uk) : Useful benchmarks for evaluating the usability of online portals and processes. Indian J multidiscipl Res 2009, 5(3), 363-72.
This study examines relevant benchmarks for evaluating the usability of online portals and processes. Issues raised in this paper include user categories and characteristics; practice, standards and measures of evaluation; procedure for successful evaluation and usability testing using the THROWN model The study concludes by recommending sound planning as well as careful selection of evaluation paradigms techniques to ensure the success of any evaluation effort.
2 illus, 13 ref
Gupta A;Verma R;Singh K
023035 Gupta A;Verma R;Singh K (Computer Applications Dep, Apeejay Institute of Management, Rama Mandi-Hoshiarpur Road, Jalandhar-144 007, Email: guptashu1@rediffmail.com) : Smart sim selector: a software for simulation software selection. Int J appl Engng Res 2009, 4(6), 975-87.
In a period of continuous change in global business environment, organizations, large and small, are finding it increasingly difficult to deal with, and adjust to the demands for such change. Simulation is a powerful tool for allowing designers imagine new systems and enabling them to both quantify and observe behavior. Currently the market offers a variety of simulation software packages. Some are less expensive than others. Some are generic and can be used in a. wide variety of application areas while others are more specific. Some have powerful features for modeling while others provide only basic features. Modeling approaches and strategies are different for different packages. Companies are seeking advice about the desirable features of software for manufacturing simulation, depending on the purpose of its use. Because of this, the importance of an adequate approach to simulation software selection is apparent. Smart Sim Selector is a software developed for the purpose of providing support for users when selecting simulation software. Smart Sim Selector consists of a database which is linked to an interface developed using Visual Basic 6.0. The system queries a database and finds a simulation package suitable to the user, based on requirements which have been specified. This paper provides an insight into the development of Smart Sim Selector, in addition to the reasoning behind the system.
8 illus, 1 table, 13 ref
Chatterjee D K;Singh A K
023034 Chatterjee D K;Singh A K (NO, Projects & Development India Ltd, Sindri) : Process hazard review and risk assessment in process industry. Indian J Fertil 2009, 5(8), 55-8.
Accidents which occurred in the past are pointer to the importance and need for appropriate "Safety Management System". Accordingly, techniques for identifying hazard and evaluating their damage potential have been evolved and successfully used for taking proper measures during design and operation stage to help in reducing accidents. This article deals with both qualitative and quantitative process hazard analysis. The role of risk assessment in chemical industries has also been discussed.
Tayay D K;Jain A;Aggarwal N;Bhasin P
018826 Tayay D K;Jain A;Aggarwal N;Bhasin P (Computer Engineering Dep, GGSIP Univ, Delhi, Email: dev_tayal22001@yahoo.com) : Fuzzy analytical hierarchical process based career decision making. Icfai univ J Inf Technol 2009, 5(4), 36-51.
Common problem for many students is the selection of college to be enrolled in for graduate studies for their prospective career. A student is uncertain about making this decision. As many factors are involved in choosing an appropriate college for graduation, college selection falls into the category of Multi-criteria Analysis (MA) problem. To solve such problems, the Analytical Hierarchical Process (AHP) (Saaty, 1980) is employed. Moreover, if an individual is supposed to take any decision, he specifies his preferences using linguistic variables instead of assigning any crisp score to the preference. These linguistic terms are nothing but imprecise and dubious values. To deal with such fuzziness, Buckley (1999), and Laarhoven and Pedrycz (1983) extended Saaty's AHP by incorporating fuzzy characteristics into it and developed a new process known as Fuzzy Analytical Hierarchical Process (FAHP). FAHP thus helps the decision makers to deal with imprecision and subjectiveness in pair-wise comparison process. By using FAHP, this paper will aid the school students in selecting the best college for pursuing B. Tech in the Delhi region.
4 illus, 11 tables, 22 ref
Singhal A;Srivastava N
018825 Singhal A;Srivastava N (Computer Science Dep, Banaras Hindu Univ, Varannasi, Uttar Pradesh, Email: achintya.singhal@gmil.com) : Knowledge based management systems for the fishery sector: an analysis. Icfai univ J Inf Technol 2009, 5(4), 75-84.
Growth of researches in the area of biological sciences over the past two decades has been dramatic. But, there has been a considerable low usage of IT in fishery sciences. Fishery sciences include not only facilitation of fishing but also incorporates heavy researches for their conservation, culture and drug research programs, etc. Today, one of the most developed and contributory works carried out is at ICLARM, Malaysia. They have got a very vast relational database on finfishes. This paper focuses the need and development of a Knowledge-Based System (KBS) for the fishery world. Knowledge-based methods offer the most flexible and expressive representation methods for the domain and for the type of applications that are required to be built. These systems have emerged as an important discipline which can further enhance the effectiveness and the productivity of the current system (Aakalu et al., 1991; and Shue and Lau, 1994). The paper concerns with the development of a knowledge-based management system capturing all the relevant data in its micro form and linking it using mathematical logics and relations. The following are the main goals: To allow knowledge researchers/scientists to update a knowledge base and have these updates persist on secondary storage; to allow multiple knowledge engineers to have shared access to knowledge base and modify the knowledge base concurrently; and to maintain consistency of the shared knowledge base as it evolves.
2 illus, 2 tables
Senthilkumar B
018824 Senthilkumar B (Bioinformatics Infrastructure Facility, Mizoram Univ, Aizawl-796 009) : Mizoram butterflies data storage retrieval using client-server technology. Icfai Univ J Comp Sci 2010, 4(1), 42-71.
Primary data are collected from the school of life sciences of Mizoram University. The present project deals with taxonomical data organization of Mizoram butterfly species. The project is developed based on client-server technology. Visual basic 2008 with NET Framework 3.5 is used as front-end (Client) and SQL server 2000 is used as back-end (server). This is the pioneer work on developing database for Mizoram butterflies. In this paper, addition and deletion of butterfly species' taxonomical data are accomplished. Uploading and downloading of butterfly images and search mechanisms according to butterfly family category are designed. Displaying of data is achieved through Data Grid View component. The Mizoram_butterfly database backup and restore mechanisms are implemented through VB.NET. Input data are validated before adding into the database. The whole package is setup and deployed using VB.NET in-built tool and distributed to the client terminals of Biotechnology and Zoology Department of Mizoram University.
53 illus, 9 ref
Nagalakshmi H S;Suhasini M
018823 Nagalakshmi H S;Suhasini M (Computer Science Dep, Government Women's College, Hunsur, Karnataka, Email: hsnss2003@yahoo.co.in) : Similarity measures for real world data mining. Icfai Univ J Comp Sci 2010, 4(1), 35-41.
In real world, data is described not in terms of crisp/singular numeric data but also in terms of multiple data wherein the data values of each entity are of varied sizes. For an effective data mining implementation, the databases which contain such multiple values of data have to be analyzed and aggregated to derive relevant meaningful data. This aspect of analyzing such data is one of the most important and fundamental basis of cluster analysis. The crux of cluster analysis lies in the design of similarity measures which aim at capturing the degree of similarities between the entities. In this paper, the authors present two such degrees of similarity measures for multiple valued data types and deal with the clustering of such multiple valued data considering real life examples. The dataset considered is of 50 individuals and their areas of study and the areas of expertise in relevance to their fields of study. The degree of similarity perceived between entities or between the data and the query, denotes the relevance/alikeness in the given data.
1 illus, 3 ref
Hariharan S
018822 Hariharan S (Information Technology Dep, School of Computer and Information Sciences, B S Abdur Rahman Univ, Vandalur, Chennai-48, Email: mailtos.harihariharan@gmail.com) : Detection of unsolicited e-mails and summarization by keyword extraction. Icfai Univ J Comp Sci 2010, 4(1), 7-15.
Electronic mail (E-mail) serves as a popular mode of communication in every day life. E-mail offers several advantages like speed of delivery, cheaper cost, acknowledgment report, transparent service and distributed environment. Managing these e-mails requires huge attention as spammers try to induce large amount of spam or unsolicited mails. This paper focuses on detecting these unwanted mails, called 'unsolicited mails', received by the user. The mail messages are parsed through a filter that would identify the spam immediately, thereby generating an alert. These mails are then clustered effectively. The results obtained were promising and provide a platform for further improvements to build a domain-independent personalizer system. Also, a detailed mechanism to summarize the mail contents is proposed.
2 illus, 4 tables, 15 ref
Chakraborty P;Saxena P C;Katti C P
018821 Chakraborty P;Saxena P C;Katti C P (School of Comuter and Systems Sciences, Jawaharlal Nehru Univ, New Delhi-110 067, Email: pinki chakraborty_163@yahoo.com) : Knight reach puzzle. Icfai Univ J Comp Sci 2010, 4(1), 72-6.
2 illus, 2 tables
Chakrabarty A;Purkayastha S
018820 Chakrabarty A;Purkayastha S (Computer Science Dep, Assam Univ, Silchar-788 011, Email: mcscalok@gmail.com) : Analysis of some prime generating sieves. Icfai Univ J Comp Sci 2010, 4(1), 16-26.
Prime number generation is vital to prime factorization and primality testing, and is also used for generating random numbers. Prime number generation gives a better understanding of the fascinating nature of prime numbers which helps to generate large primes which are used in public key cryptosystems for e-security. Further, prime number generation involves heavy number crunching, thus it is also used as a benchmark for comparing the hardware performance and the capabilities of compilers. Prime number generation programs are among the choicest programs for demonstrating programming basics to beginners. The present paper thus discusses some commonly used techniques of generating prime numbers employing the sieve theory. It begins with the famous Sieve of Eratosthenes (SoE) and discusses some of its efficient extensions. The paper also provides an overview of the Pritchard's wheel sieve technique. Finally are provided a comparative complexity analysis of the SoE and its quoted extensions.
2 illus, 1 table, 17 ref
Banerjee S;Roy U;Begum S
018819 Banerjee S;Roy U;Begum S (Computer & System Science Dep, Siksha Bhavana, Visva Bharati Univ, Santiniketan-731 235) : Secured cluster based Routing protocol. Icfai univ J Inf Technol 2009, 5(4), 7-20.
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead, hosts rely on each other to keep the network connected. In the recent past, most of the ad hoc network routing protocols are cooperative in nature and rely on trust-your-neighbor relationship to route packets among participating nodes. This native trust may paralyze the network with an attack of minimum effort. The dynamics of the ad hoc routing protocols have been studied but security issues and concerns have not been paid much attention. This paper proposes a cluster-based routing protocol with the incorporation of some security in simple manner. Hereafter, the proposed protocol is referred to as Secured Cluster-Based Routing Protocol (SCBRP). This protocol can easily identify and prevent malicious attacks during transmission. With a suitable simulation setup, the protocol has been simulated with 150 nodes and the simulation results have been compared with other cluster-based routing protocols, such as PCBRP-opt and Blind Flooding (BF). The obtained results are in good agreement with those of others. It can be stated that the scheme is robust, secure and provides accurate routing information in a timely manner.
4 illus, 1 table, 9 ref
Balakrishnan M;Meena K
018818 Balakrishnan M;Meena K (NO, Bioinformatics Centre, Central Agricultural Research Institute, Port Blair-744 101, Email: mbkrishnan@hotmail.com) : Ann model for coconut yield prediction using optimal discriminant plane method at Bay Islands. Icfai Univ J Comp Sci 2010, 4(1), 26-34.
The main focus of this study is to investigate a distributed neural network used to forecast production in Andaman and Nicobar Islands using weather parameters. The data relating to coconut yield from Central Agricultural Research Institute (CARI) have been collected for the period 1980 to 2006. The data such as average yearly rainfall, average mean temperature, relative humidity, wind speed, evaporation and sunshine hours of relevant period (1980 to 2006) have also been obtained. A multilayer perceptron with backpropagation and optimal discriminant plane method algorithm has been used. The network is trained using 17 patterns each of nine inputs. In this study, to convert nine inputs into two inputs, the nine dimensional vectors are mapped into a two-dimensional space by using a transformation. The transformed two-dimensional vector does not represent any individual feature, instead, it is a combination of nine features with no dimensional quantity.
4 illus, 2 tables, 9 ref
Aarti Singh;Juneja D;Sharma A K
018817 Aarti Singh;Juneja D;Sharma A K (NO, M M Institute of Computer Technology & Business Management, M M Univ, Mullana, Email: singh2208@gmail.com) : Extensive analysis of implementation issues in semantic web. Icfai univ J Inf Technol 2009, 5(4), 67-74.
Semantic Web (SW) deals with transforming the information-oriented web into a knowledge-oriented web. SW makes product and service information more abundant and improves search mechanisms thus resulting in user satisfaction, but lack of standard ontologies and communication interface for a domain is creating a lot of hurdles in its implementation. Considerable research has been focused at overcoming these deficiencies through more efficient agent-oriented interactive algorithms and ontology-based system design. The main focus of this survey is targeted on the recent solutions available for overpowering the explored issues.
3 illus, 1 table, 19 ref
Siegmund N;Rosenmuller M;Moritz G;Saake G; Timmermann D
017808 Siegmund N;Rosenmuller M;Moritz G;Saake G; Timmermann D (Computer Science Dep, Institute of Technical and Business Information, Magdeburg Univ, niversitates Platz 2, 39106 Magdeburg, Email: nsiegmun@ovgu.de) : Towards robust data storage in wireless sensor networks. IETE Tech Rev 2009, 26(5), 335-41.
Wireless sensor networks are used for sensing data if wired communication is not suitable. Connection losses and depletion of nodes, however, result in reduced data availability of such networks. This is problematic in upcoming scenarios like health care or home automation where data availability is highly important. In this paper, we present an approach to provide robust data storage for wireless sensor networks. We achieve this goal by providing FAME-DBMS, a customizable database management system which can be tailored according to the varying requirements of a sensor network. FAME-DBMS provides reliable data storage using security and integrity features, transaction management and recovery and a customizable query engine. Since data reliability in wireless sensor networks also suffers from node failures, we propose a new S-RAID storage layer inspired from the RAID approach of server systems. This S-RAID is integrated in FAME-DBMS to store data redundantly and distributed in a wireless sensor network and thus provides access to data even when nodes fail.
2 illus, 1 table, 24 ref
Shah N;Tsai C F;Marinov M;Cooper J;Vitliemov P;Chao K M
017807 Shah N;Tsai C F;Marinov M;Cooper J;Vitliemov P;Chao K M (Computing and the Digital Environment Dep, Coventry Univ, UK, Email: nazaraf.shah@coventry.ac.uk) : Ontological on-line analytical processing for integrating energy sensor data. IETE Tech Rev 2009, 26(5), 375-87.
In this paper we propose an ontological OLAP (on-line analytical processing) framework to integrate distributed energy sensor data. The OLAP data cube in the framework annotated with semantics with other supporting mechanisms can deal with the issues of the schema inconsistency that may result from integration of heterogeneous data sources. The proposed approach provides a way of storing, reusing and composing OLAP cubes in order to increase system usability. A prototype of the proposed framework based on a number of existing tools such as protege, Jess, and Fuzzy J has been developed to demonstrate its feasibility.
6 illus, 59 ref
Pungial C;Fortis T F;Aritoni O
017806 Pungial C;Fortis T F;Aritoni O (NO, Research Institute e-Austria, Bvd.C.Coposu, 4, Room 045B, 300223, Timisoara, Romania, Email: cpungila@info.uvt.ro) : Benchmarking database systems for the requirements of sensor readings. IETE Tech Rev 2009, 26(5), 342-9.
Improving energy efficiency in order to reduce CO2 emissions is a permanent challenge in the European space. Smart metering could help for improving energy efficiency by offering information about the way in which the energy is used. Smart metering will be based on large volumes of sensor data, since energy monitoring will bring together sensor data from various critical areas. The main purpose of this paper was to present the selection mechanism for a scalable storage solution, based on the requirements of the DEHEMS (Digital Environment Home Energy Management System) project. With regular sensor readings coming at every 6 seconds, there is an impressive amount of data collected even for the minimal target of about 250 households, 10 sensors per user. With these huge data streams that are non-stationary time-series data, collected at discrete intervals, the DEHEMS project has to offer a solution for storing and retrieving sensor data in a responsive way. We have tested both collection speed and aggregation speed for reasonable data streams of sensor data. The tests were performed on various database models, with their associated representations, including relational databases, key-value stores, column stores, self-tuning databases, as well as time-series enabled database systems. These experiments confirmed that column stores and key-value stores perform better than relational databases, while time-series databases outperform all the others.
4 illus, 3 tables, 13 ref
Marmelo R;Bizarro P;Marques P
017805 Marmelo R;Bizarro P;Marques P (Informatics Engineering Dep, Coimbra Univ, Portugal, Email: rjmm@dei.uc.pt) : 9ticks - he web as a stream. IETE Tech Rev 2009, 26(5), 369-74.
Internet contains thousands of Frequently Updated, Time-stamped, Structured (FUTS) data sources. This type of information represents a different class of information that is not properly handled by existing data management systems such as databases, data warehouses, search engines, pub-sub, event processing or information retrieval systems. In this position paper, we describe 9ticks, a system we are designing to collect, parse, store, query and disseminate PUTS information. Sticks is helping us understand that all those steps raise new challenges but also bring new opportunities. In this paper, we summarize the challenges identified and present our vision of an end-to-end PUTS management system.
6 illus, 19 ref
MacKinnon L;Bacon L
017804 MacKinnon L;Bacon L (School of Computing and Creative Technologies, Abertay Dundee Univ, Kydd Building, Dundee DD1 1HG, Email: l.mackinnon@abertay.ac.uk) : 'Re-using an existing wheel' developing data architecture for cooperating autonomous and semi-autonomous, agent-based web services. IETE Tech Rev 2009, 26(5), 330-4.
This short position paper considers issues in developing Data Architecture for the Internet of Things (loT) through the medium of an exemplar project, Domain Expertise Capture in Authoring and Development Environments (DECADE). A brief discussion sets the background for loT, and the development of the distinction between things and computers. The paper makes a strong argument to avoid reinvention of the wheel, and to reuse approaches to distributed heterogeneous data architectures and the lessons learned from that work, and apply them to this situation. DECADE requires an autonomous recording system, local data storage, semi-autonomous verification model, sign-off mechanism, qualitative and quantitative analysis carried out when and where required through web-service architecture, based on ontology and analytic agents, with a self-maintaining ontology model. To develop this, we describe a web-service architecture, combining a distributed data warehouse, web services for analysis agents, ontology agents and a verification engine, with a centrally verified outcome database maintained by certifying body for qualification/professional status.
1 illus, 15 ref
Lansdale T;Bloodsworth P;Anjum A;Habib Y; Mehmood T;McClatchey R
017803 Lansdale T;Bloodsworth P;Anjum A;Habib Y; Mehmood T;McClatchey R (Centre for Complex Co-operative Systems, BIT, UWE Bristol, UK, Email: Thomas.Hector.Lansdale@cern.ch) : Rule-based querying of distributed, heterogeneous data. IETE Tech Rev 2009, 26(5), 363-8.
When searching for data, users tend to think in terms of the information they need to retrieve and not where and how it is stored. This is especially true in the highly complex domain of neurological research. The generic medical querying service described herein, aims to close the gap between users and data resources that are intricate, distributed and heterogeneous in nature. A theme that is common to both this domain and the emerging Internet of things is that users often need to query more than a single resource. This has come about with the large-scale fragmentation and distribution of data. Our work thus far has produced a prototype architecture for the querying of heterogeneous distributed data in the medical domain. A flexible querying mechanism that has the potential to support agent-based personalization has been developed to provide users with accurate and relevant results and some initial results are presented.
2 illus, 15 ref
Koppen V;Siegmund N;Soffner M;Saake G
017802 Koppen V;Siegmund N;Soffner M;Saake G (Institute for Business and Technical Systems, Computer Science Dep, Magdeburg Univ, Germany, Email: vkoeppen@ovgu.de) : Architecture for interoperability of embedded systems and virtual reality. IETE Tech Rev 2009, 26(5), 350-6.
Virtual Reality enhances the development process of complex and inter-operating products due to bringing existing systems together with virtual prototypes. The modeling of existing products within the virtual reality environment and furthermore the properties of products and product combination are important factors for success in a product life cycle. A reduction of effort for modeling of existing products and simulation of properties can be achieved, when systems and their properties are transported to the virtual reality environment. In this paper, we present a service-oriented architecture for embedded systems and virtual reality. The multiplicity of interfaces, protocols, and hardware and software aspects requires an architecture that overcomes the related difficulties to increase efficiency. Service-oriented architectures make different scenarios in the product life cycle possible, whereas the implementation effort for embedded systems is reduced due to software reuse.
6 illus, 15 ref
Kang J;Jeon J;Lee Y;Jeong T T
017801 Kang J;Jeon J;Lee Y;Jeong T T (School of Electrical & Computer Eng., Chungbuk National Univ, Korea, Email: jskang01@chungbuk.ac.kr) : Vision-based computing approach and modeling for wireless network. IETE Tech Rev 2009, 26(6), 394-401.
Presents a new approach to wireless network from vision based computing methods and modeling. In contrast to traditional laser/photo-diode based transceivers, ourmethod relies on a standard charge-coupled device camera to segment bit patterns through optical image processing techniques. This paper, network packets are 'transmitted' via screen updates to an LCD display. In the preliminary experiments, a maximum continuous throughput of 52.0 kbps was demonstrated using a standard NTSC camera. Transmissions over a distance of 30 ft (approximately 9m) were also achieved by employing an 18 x optical zoom lens assembly. We prove that this approach provides not only a redundant, secure means for wireless communication, but also a medium for enabling networking through non-traditional devices, e.g., television monitors, widely available.
9 illus, 3 tables, 16 ref
Jeffery K G
017800 Jeffery K G (Director IT & International Strategy, Science and Technology Facilities Council, Rutherford Appleton Lab, Harwell Science and nnovation Campus, Chilton, Didcot, Oxfordshire OX11 0QX, UK, Email: keith.jeffery@stfc.ac.uk) : Internet of things: the death of a traditional database. IETE Tech Rev 2009, 26(5), 313-9.
Traditional database research has developed technology to ensure that the database -- even when distributed - represents the world of interest with integrity and a consistent state. Important concepts have been developed and proven. However, the internet of things challenges all this. Very large numbers of nodes handle volumes that are vast, the speed is fast and the data/information space is global - indeed with space data - universal. This poses challenges. What does the concept of a state mean when the information map of the real world of interest is represented across millions of nodes, many of which are updating in real-time? What does a transaction look like when the data being updated is spread across hundreds or thousands of nodes with differing update policies? Worse, how does one roll back or compensate a transaction? We have already seen database research applied to semi-structured data, to streamed data, and real-time applications. Is it possible for these techniques to be applied to the internet of things? The internet of things opens up more opportunities for security compromises. How do we develop trust band security techniques across multiple policies? How do we prevent the unauthorized use of private information yet permit authorized use? We need dynamic trust, security, and privacy management. Do we need a new theoretical framework?
1 illus, 7 ref
Hamad F;Samlov L;James A
017799 Hamad F;Samlov L;James A (Computing and Digital Environment Dep, Distributed Systems and Modelling Applied Research Group, Faculty of E, Priory Street, Cv1 5FB, Coventry, UK, Email: f.hamad@coventry.ac.uk) : Energy-aware security in M-commerce and the internet of things. IETE Tech Rev 2009, 26(5), 357-62.
Data privacy and security is a major concern for M-commerce and the Internet of Things. Security measures such as encryption may be implemented to protect confidentiality, integrity and availability. Limitations in processing power, battery life, communication bandwidth and memory constrain the applicability of existing cryptography standards for mobile devices. This paper describes an experiment to investigate the computational requirements for some of the most popular cryptographic algorithms with reference to power and resources consumption. Given reliable information on battery consumption, users can make informed decisions on which security schemes to use.
10 illus, 16 ref
Copper J;James A
017798 Copper J;James A (NO, , Hildebrand, London, UK, Email: jcopper@hildebrand.co.uk) : Challenges for database management in the internet of things. IETE Tech Rev 2009, 26(5), 320-9.
This article discusses the challenges for Database Management in the Internet of Things. We provide scenarios to illustrate the new world that will be produced by the Internet of Things, where physical objects are fully integrated into the information highway. We discuss the different types of data that will be part of the Internet of Things. These include identification, positional, environmental, historical, and descriptive data. We consider the challenges brought by the need to manage vast quantities of data across heterogeneous systems. In particular, we consider the areas of querying, indexing, process modeling, transaction handling, and integration of heterogeneous systems. We refer to the earlier work that might provide solutions for these challenges. Finally we discuss a road map for the Internet of Things and respective technical priorities.
80 ref
Alshamari M;Mayhew P
017797 Alshamari M;Mayhew P (School of Computing Sciences, East Anglia Univ, Norwich, UK, Email: m.alshamari1@uea.ac.uk) : Technical review: current issues of usability testing. IETE Tech Rev 2009, 26(6), 402-6.
System usability can be measured through various methods. One of the more important and widely employed techniques is 'usability testing', where asks, number of users, evaluators, and other factors are the main elements. This paper reviews usability testing together with current issues that can influence usability testing results, both negatively and positively. It also reviews web usability testing. In addition, in this paper, usability testing in the future is considered in order that improvements may be made.
2 illus, 2 tables, 32 ref
Mittal P K;Ansari S R;Chandna R
016795 Mittal P K;Ansari S R;Chandna R (Mathematics and R&D Dep, Graphic Era Univ, Dehraun, Uttarakhand) : Neural networks and fuzzy systems: fuzzy neural networks. Acta Cienc Indica-Math 2009, 35(2), 437-43.
It has increasingly been recognized that the areas of fuzzy systems and neural networks are strongly interconnected. For example, neural networks have already been proven very useful in numerous applications of fuzzy set theory for constructing membership functions of relevant fuzzy sets and other context-dependent entities from sample data. They also show great promise as an efficient tool for solving fuzzy relation equations, which play a fundamental role in dealing with many practical problems involving fuzzy systems. In this paper, possibility of approximating a given system by an appropriate neural network. The motivation for approximating fuzzy systems by neural networks is based upon the inherent capability of neural networks to perform massive parallel processing of information. This is important in those fuzzy controllers and, more generally, fuzzy expert systems, that are required to process large numbers of fuzzy interference rules in real time. When the neural network representing a given fuzzy expert system is implemented in hardware, all relevant fuzzy inference rules are processed in parallel. This results in high computational efficiency, which is crucial in many applications. Furthermore, the neural network representation is eminently fitted for introducing suitable adaptive capabilities into the system.
2 illus, 20 ref
Dwivedi K K;Atal M R;Shrivastava R
016794 Dwivedi K K;Atal M R;Shrivastava R (Computer Application Dep, Govt. G.G.P.G. College, Bhopal, Email: kaushal_neelaj_2005@yahoo.co.in) : Challenges of intrusion detection compression technology. J Envir Res Dev 2009, 4(2), 572-81.
Database Management System (DBMS) controls and manages data to eliminate data redundancy and to ensure integrity, consistency and availability of the data, among other features. Even though DBMS vendors continue to offer greater automation and simplicity in managing databases, the need for specialized intrusion detection database compression technology has not yet been addressed. Our research focuses on developing such technology. The focus is not only on compression but also on database management through planning and best practice adoption to improve operational efficiency, and provide lower costs, privacy and security. The focus in this summary is on the compression part of the DMBS system for intrusion detection. Presents a methodology employing grammar-based and large alphabet compression techniques which involves the generation of multiple dictionaries for compressing clustered subfiles of a very large data file. One of the dictionaries is a common dictionary which models features common to the subfiles. In addition, non-common features of each subfile are modeled via an auxiliary dictionary. Each clustered subfile is compressed using the augmented dictionary consisting of the common dictionary together with the auxiliary dictionary for that subfile.
^iia4 illus, 8 ref
Angadi U B;Anandan S;Ramachandra K S
016793 Angadi U B;Anandan S;Ramachandra K S (NO, National Institute of Animal Nutrition and Physiology, Adugodi, Bangalore, Karnataka-560 030, Email: koodliramu@yahoo.co.in) : Visual data mining tool and database for assessing district-wise animal and feed resources in India. Indian J Anim Sci 2009, 79(1), 89-92.
Animal and feed resource management planning must address economic and social sustainability. Integrated database with spatial interactions of animal and feed resources in the country is a key planning process. The impacts of a management plan on animal and feed resources are often hard to anticipate. Combining database management system tool with recent visualization techniques would be workable option. This paper presents a visualization tool to produce dynamic simulation of district-wise animal and feed resources availability and requirement in the country over a period of 20 years (1985 to 2005). It describes over all architecture of database as well as connection to GIS (Spatial decision support system). Database has been developed to store and maintain of feed and animal resource data. Programs were developed for database management, analysis and to convert animal and feed resources data to spatial and graphical form. The visualization tool provides effective information to assess animal and feed resources and impact on livestock at district level.
5 illus, 5 ref
Srikanth V;Ramesh Babu I
015585 Srikanth V;Ramesh Babu I (Information Science and Technology (IST) Dep, K L College of Engineering, Vaddesewaram, , Email: srikanth_ist@klce.ac.in) : Cluster head selection for wireless sensor networks. Icfai Univ J Inf Technol 2009, 5(1), 44-53.
Wireless Sensor Networks (WSN) have become one of the most interesting networking technologies since they can be deployed without the need of a communication infrastructure. Several applications, such as wild life sensing, surveillance and monitoring, have been developed using the strengths of WSN. The main concern of this technology is to increase network lifetime. One of the key factors for achieving the extended network lifetime is the selection of Cluster Head (CH). In this paper, first an outline of clustering is given and then several CH selection methods proposed for WSN are described, emphasizing their strengths and weaknesses.
2 illus, 10 ref
Singh Y;Bhatia P K;Kaur A;Sangwan O
015584 Singh Y;Bhatia P K;Kaur A;Sangwan O (NO, University School of Information Technology, GGS Indraprastha Universi, Delhi, Email: vs66@rediffmail.com) : Neural networks in software development process. Icfai Univ J Inf Technol 2009, 5(1), 54-62.
Software engineering is a knowledge-intensive activity requiring extensive knowledge of the application domain and of the target software itself. To meet this challenge, the relevant softwares are automated to a large extent and human intervention minimized to an optimum level. To achieve this goal, researchers have explored the potential of Artificial Neural Networks (ANN) as they are adaptable, have learning capabilities and are non-parametric. This paper looks at how Neural Network (NN) can be used to build tools for effort estimation, testing, metrics and maintenance tasks.
1 illus, 54 ref
Siddiqui J;Rahman Z;Zafar A;Talib F
015583 Siddiqui J;Rahman Z;Zafar A;Talib F (Computer Science Dep, Aligarh Muslim University, Aligarh-202 002, Email: jamshed_faiza@rediffmail.com) : Information technology and organizational associates: a synergy for agility. Icfai Univ J Inf Technol 2009, 5(1), 68-81.
Agility is an essential component for providing a competitive advantage in the fast changing business environment of the 21st century, where high-tech telecommunication network can playa vital role, if coupled with the existing human contributions. The paper gives insights for maintaining a balance between the two constituents of the company so that one is not promoted at the cost of the other. Our premise is the synergy model, built upon Socio-Technical Systems (STS) illuminating aspects of agility, when Information Technology (IT) and the organizational associates are made to augment the benefits accrued by each other. Contribution of IT to business agility, the role of networking in implementing agile processes and its prospects, and the possible synergies between IT and the human resources of a firm are examined.
1 illus, 24 ref
Meena K;Durairaj M;Subramanian K R
015582 Meena K;Durairaj M;Subramanian K R (NO, Shrimati Indra Gandhi College, Trichy, Email: drk.meena@gmail.com) : Machine learning techniques to predict fertility rate of sperm from the outcome of IVF functional tests. Icfai Univ J Inf Technol 2009, 5(1), 18-32.
Aim of this study are to predict the fertilization potential of animal sperm from the outcome of In Vitro sperm Function (IVF) tests using a machine learning technique of Artificial Neural Network (ANN), combined with the backpropagation algorithm; and (ii) to compare the predictive accuracy of the resulting model with that of a statistical Multi- Linear Regression (MLR) model. Artificial Insemination (AI) is one of the most successful reproductive technologies developed to improve the reproductive efficiency of farm animals and dairy cattle. The percentage of pre-freeze motility and the assays of sperm functions such as acrosome reaction, zona binding ability, in vitro fertilization, and in vitro embryo production are used to predict fertility in the field. ANN offers a novel approach to pattern recognition and can be more effective than traditional statistical techniques for identity associations, due, in part, to their ability to recognize highly non-linear associations (Durairaj and Meena, 2008). The work was carried out by using the MATLAB and Nuero Solutions software. The fertility rate of sperm was predicted using the feedforward multilayer perceptron ANN. Backpropagation algorithm was used for training the ANN in MATLAB. The results show that the predictive accuracy of the devised ANN (r = 0.995) is higher than that of the traditional Non-Linear Regression (NLR) (r = 0.903) model.
6 illus, 4 tables, 14 ref
Kolhe P R;Kolhe P P;Tharkar M H
015581 Kolhe P R;Kolhe P P;Tharkar M H (Computer Science Dep, College of Agricultural Engineering and Technology, Dapoli, Ratanagiri, Maharashtra) : Open source software in agricultural education. Asian Sci 2009, 4(1-2), 97-99.
Use of Information Technology (IT) in education has become a predominant topic for discussion in the recent years. While teacher education curricula have been up-dated to include computers in education, educational institutions have adopted the new information technology for teaching-learning and administration. With the emergence of Internet and its World Wide Web (WWW), the trend towards use of information technology in education has been tremendous growth. The reducing cost of computer hardware also has paved the way for integration of computer in educational institutions. However, because of the heavy dependence on proprietary/commercially available high cost software and their licensing, many educational institutions are not in a position to harness the potentials of information technology. Discusses the alternative to high price software for educational, research and extension purposes and makes a ease for using open source software in education.
1 table, 3 ref
Kolhe P R;Kolhe P P;Tharkar M H
015580 Kolhe P R;Kolhe P P;Tharkar M H (Computer Science Dep, College of Agricultural Engineering and Technology, Dapoli, Ratanagiri, Maharashtra) : Information and communication technology emerging tool for agricultural extension. Asian Sci 2009, 4(1-2), 85-90.
Juneja D;Iyengar S S;Phoha V V
015579 Juneja D;Iyengar S S;Phoha V V (NO, M M Institute of Computer Technology & Business Management, M M Univer, Mullana, Ambala 136119, Email: dimplejunejagupta@gmail.com) : Optimal and adaptive late call forwarding mechanism. Icfai Univ J Inf Technol 2009, 5(1), 7-17.
International roamers pay high charges for calls made or received. Moreover, many mobile networks provide the facility of Late Call Forwarding (LCF). As a result these calls terminate on the voice mail system in the home network of the callee. It results in a minimum of two legs of international call charges. One more may be incurred while retrieving the message. Also, the identities of the caller and the callee are sometimes lost from the call setup messages leading to unsatisfied customers. Hence, an optimal LCF mechanism that is adaptable to the demands of users and is also useful for roamers who typically lose the voicemail deposit capability is desired. This paper proposes an intelligent single operator and possibly optimal solution that overcomes annoyance of international outbound roamers by providing an optimal 1 routing of LCF.
5 illus, 11 ref
Indira Koneru
015578 Indira Koneru (NO, ICFAI University, 23 Nagarjuna Hills, Hyderabad-500 082, Email: indk68@hotmail.com) : ADDIE: Designing web-enabled information literacy instructional modules. DESIDOC J Libr Inf Technol 2010, 30(3), 23-34.
Proliferation of information in varying forms, formats, and amounts mystify users evaluating the quality and authenticity before consuming information. Unless the users are information literate, they will be deficient in the requisite skills to access and retrieve information, organise and evaluate critically the retrieved information and use it effectively for personal as well as professional accomplishments. Information literacy (IL) empowers one with the required knowledge about information, its nature and available formats, skills to fetch the relevant information by sifting the irrelevant information, and attitude for consuming and sharing information by ethical means and practices. Focuses on how to impart IL instructions using the potential technologies. Among all the available options for imparting IL instructions, Web is preferred owing to its flexible nature to reach out to the target groups wherever they are and whenever they want to access the IL modules. A diligent effort is made to integrate ADDIE, the widely-used instructional design model for designing and developing IL modules. INFOSEEK, the five-faceted model presented under Design Phase provides a content framework for developing IL instructional programmes.
2 illus, 22 ref
Guruprasad R;Behera B K
015577 Guruprasad R;Behera B K (Textile Technology Dep, Indian Institute of Technology Delhi, New Delhi-110 016, Email: behera@textile.iitd.ernet.in) : Soft computing in textiles. Indian J Fibre Text Res 2010, 35(1), 75-84.
Reviews the application of principal soft computing techniques for the study of textile processes and products. Soft computing suggests a new computing methodology that is both flexible and easy. Three major branches of soft computing, namely fuzzy logic, neural networks, and genetic algorithms, are discussed in detail with respect to their applications in solving variety of textile problems ranging from fibre classification, color grading, yarn and fabric property prediction, to the optimization of products and processes and even to search for a pleasing garment design. These tools of soft computing are complementary rather than competitive. Number of prediction models of `hybrid type' are being developed combining the merits of each of these techniques. These hybrid models will help in establishing a prediction system that is more intelligent and effective in problem solving.
^iia2 illus, 65 ref
Cheng H S;Sing L C
015576 Cheng H S;Sing L C (Faculty of Information Technology, Multimedia University, Cyberjaya, Malaysia) : Node labeling schemes in XML query optimization. IETE Tech Rev 2009, 26(2), 88-100.
With the rapid emergence of XML as a data exchange and data transfer medium over the Web, querying XML data has become a major concern. Labeling schemes have been developed to optimize query retrieval, since they provide a quick way to determine the type of relationships that are present among the nodes. Analyzes how each approach works, as well as its advantages and disadvantages. In addition, discusses some of the current trends in labeling methods, which indicate a clear shift towards hybrid approaches. Hybrid systems open the possibility of balancing one technology's weakness with another technology's strengths.
13 illus, 2 tables, 23 ref
Cha B;Ko F I S
015575 Cha B;Ko F I S (Information and Communication Engineering Dep, Chosun University, S. Korea) : Novel OTP system design using homomorphic graph of fingerprints. IETE Tech Rev 2009, 26(4), 268-79.
Security of internet is becoming one of the latest important concerns along with extensive application of the Internet. OTP is the first security medium for strengthening the stability of electronic financial transactions. Proposes the method of one-time password key generation of OTP using changed location and angle of fingerprint features and new OTP system. Fingerprint is one of the powerful personal authentication factors, and it can create variable password key for one-time use of information of fingerprint features. And authors performed a simulation for proposed random password key generation method and efficiency analysis.
2 illus, 3 tables, 19 ref
Al anni M K;Sundarajan V
015574 Al anni M K;Sundarajan V (Computer Science Dep, Pune University, Pune, Maharashtra) : Detecting a denial of service using artificial intelligent tools, genetic algorithm. Indian J Sci Technol 2009, 2(2), 16-21.
Describes novel work in using Genetic Algorithm for detecting misuse of programs. A brief overview of Intrusion Detection System, genetic algorithm and related detection techniques is presented. Developing rules manually through incorporation of attack signatures results is meaningful but weak as it is difficult to define thresholds. The proposition of learning the Intrusion Detection, rules based on genetic algorithms is presented. The experimental results are demonstrated on the KDD cup 99 and UoP intrusion detection data set (in the DARPA evaluations) in the experiments the characters of an attack such as Smurf and Apache2 (Denial of Service Attacks) are summarized through the KDD 99 data set and the effectiveness and robustness of the approach are discussed.
6 illus, 20 ref
Winiwarter W
013474 Winiwarter W (Scientific Computing Dep, Vienna Univ, Universitatsstrabe 5, A-1010 Vienna, Austria, Email: werner.winiwarter@univie.ac.at) : Learning transfer rules for machine translation from parallel corpora. J Digital Inf Mgmt 2008, 6(4), 285-93.
Main research contribution is that the transfer rules are not handcrafted but are learnt automatically from a parallel corpus. The system has been implemented in Amzil Prolog, which offers scalability for large rule bases, full Unicode support for Japanese characters, and several APIs for the seamless integration of the translation functionality into common office environments. As a first user interface we have developed a translation environment under Microsoft Word. The dynamic nature of our system allows for an easy customization of the rule base according to the user's personal preferences by simply post-editing the translation results, which leads to an automatic update. The user interface for Microsoft Word also provides the possibility for the user to display token lists, parse trees, and transfer rules, which makes JETCAT also a very useful tool for language students.
9 illus, 30 ref