Approximating Source Accuracy Using Dublicate Records in Data Integration
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 3
Abstract
Currently, there are two main basic strategies to resolve conflicts in data integration: Instance-based strategy and metadata-based strategy. However, the two strategies have their limitations and their problems. In a metadata-basedstrategy, the data integration administrator uses some features of source to determine how they may participate to provide a single consistent result for any conflicted object.
Authors and Affiliations
Ali Al-Qadri,
A Content-Based Image Retrieval Semantic Modelfor Shaped and Unshaped Objects
Abstract: This paper presents an efficient content based image retrieval scheme for both the shaped and unshaped objects. The local regions of an unshaped image have been classified with respect to the frequency ofoccurr...
Data Classification Algorithm Using k-Nearest Neighbour Method Applied to ECG Data
In medical science, the importance of the Electrocardiography is remarkable since heart diseases constitute one of the major causes of mortality in the world. Electrocardiogram (ECG) is the only way for doctors...
Data Analytics on Application Logs for Managing API-related Dependencies
Abstract: There are innumerable APIs (Application Programming Interface) that are being created every single day as they serve as a rudimentary tool in developing software applications in today’s technology-driven indust...
Client Based Cache Consistency Scheme in Wireless Mobile Networks
Abstract: This paper proposes a client based cache consistency scheme for maintaining cache consistency in wireless mobile networks using a distributed cache invalidation method. This is implemented on top of a pre...
Built-In Self-Repair Techniques of Embedded Memories with BIST for Improving Reliability
Error correction code (ECC) and built-in selfrepair(BISR) techniques by using redundancies have beenwidely used for improving the yield and reliability of embeddedmemories. The target faults of these two schemes are soft...