A Critical Study on Semantic Web Systems and Semantic Web Services
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 6
Abstract
The World Wide Web is the greatest repository of information having a decentralized design in which web pages are hosted by numerous computers, where each document can point to other documents, either on the same or different computers. As a result, individuals all over the world are able to provide content on the Web, allowing the growth exponentially as more and more people learn how to use it. However, it is difficult for machines to process and integrate this information meaningfully, so to process a web page intelligently, a computer must understand the data, and it is possible in Semantic Web. Relational database (RDB) is normally used for traditional data processing, where as Extensible Markup Language documents (XML Documents) are widely useful for performing online conversation in B2B applications. In fact XML data formats may be treated as de facto standard of data representation and exchange format for massive amount of enterprise information over the web. Performance of the application depends on both type of the data structures used and the type of the information maintained in the structures. In this paper some semantic web concepts, different layers of Semantic web architecture, Web services and Semantic web services are presented.
Authors and Affiliations
B. Hemanth Kumar, Prof. M. Surendra Prasad Babu
Block cipher in NTRU
In every sector today, secure and efficient data transfer is essential. To guarantee the security, for the most part Public Key Cryptographic Systems (PKCS) is utilized. A RSA and NTRU framework by and large fits in w...
Secure Transmission and Minimizing Communication Over Head In Cooperative Group
A mobile ad-hoc network is a selfconfiguring infrastructure less network of mobile devices connected by wireless. Here the problem is efficiently and securely broadcasting to cooperative groups and trusted key generat...
In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...
Design Of Ring Topology Using Set Of Node
This is a simple and scalable novel network-onchip (NoC) based on the ring concept. The reported prototype design is generic with respect to the number of nodes and data channels. Topology efficiently exploits the ava...
Stategy And Necessity Trades For Smile Networks
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed user...