Fast Retrieval Of Unstructured Documents By Using Meta Data And Hierarchical Clustering
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 12
Abstract
Several annotation systems let only “un typed” keyword annotation. For illustration, a user may interpret a weather report using a tag. There are several application domains where users make and contribute to information, news blogs, scientific networks, social networking groups, or disaster management networks. Present information sharing tools ,like content management software e.g., Microsoft Share-Point, allow users to share documents and annotate (tag)them in an ad hoc way. Likewise, Google Base allows users to describe attributes for their objects or decide from pre defined templates. This annotation process can make easy following information discovery. In our situation the author produces a new document and uploads it to the ordnance. We put forward Collaborative Adaptive Data Sharing platform (CADS) which is an “annotateas-you create” communications that construct simplefield data annotation.
Authors and Affiliations
K. V. Rama Kumar, K. Eswar
A Mustang Security User Authentication Scheme Based On Graphical Password
In all computer security contexts, User authentication is an essential thing. The most popular and simple type of user authentication method is to use the alphanumeric passwords. The reasons behind why we are using a...
Design of Co-Processor for NIOS-II Processor Based Poly phase Image Scalar
In this paper, we present an hardware accelerating coprocessor for a Polyphase image scaler. First the image scaling algorithm will be ported onto the SOC having Altera NIOSII processor which will be a pure software...
An Efficient Searching and File Replication Consistency in Peer-to-Peer Networks
Unstructured Network with file sharing properties with peer-to-peer (P2P) is very popular in the market. Though it is so popular it produce flooding query messages and result a heavy network traffic and which may not...
E-Commerce through Smart Devices in Emerging India
Recent developments in the area of Mobile Technology and Information Technology have led to rehabilitated interest in Electronic Commerce in organizations and societies. Electronic Commerce is supporting of customers,...
Secure Data Aggregation In Wireless Networks
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a hig...