Text database cleaning by filling the Missing values using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 5
Abstract
Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by themselves and they react to the situation. Learning characteristics of an agent is done by verifying its previous experience from its knowledgebase. An agent concept is a complementary approach to the Object Oriented paradigm with respect to the design and implementation of the autonomous entities driven by beliefs, goals and plans. Text database cleaning process detects and cleans the wrong data or duplicates data or missing data by identifying the outliers. Cleaning of Text Databases focuses on incomplete data cleaning. Incomplete data cleaning is performed using the attribute missing rate. Agents incorporated in the architectural design of a Text database cleaning process combines both the features of Multi-Agent System (MAS) Framework and MAS with learning (MAS-L) Framework. MAS framework reduces the development time and the complexity of implementing the software agents. MAS-L framework incorporates the intelligence and learning properties of agents present in the system. MAS-L Framework makes use of the Decision Tree learning and an evaluation function to decide the next best decision that applies to the machine learning technique. This paper proposes the design for Multi-Agent based Data Cleaning Architecture that incorporates the structural design of agents into object model. The Design of an architectural model for Multi-Agent based Data Cleaning inherits the features of the Multi-Agent System (MAS) and uses the MAS-L framework to design the intelligence and learning characteristics.
Authors and Affiliations
Dr. G. Arumugam , T. Joshva Devadas
Towards Novel And Efficient Security Architecture For RoleBased Access Control In Grid Computing
Recently, there arose a necessity to distribute computing applications frequently across grids. Ever more these applications depend on services like data transfer or data portal services and submission of...
Writer Identification and Recognition Using Radial Basis Function
Handwriting has continued to persist as a means of communication and recording information in day-to-day life even with the introduction of new technologies. Given its ubiquity in human transactions, machine recognition...
Micro-Processor based Improved Ultrasonic Direction and Range Finder
This document gives formatting instructions for authors preparing papers for publication in the Proceedings of an IEEE conference. The authors must follow the instructions given in the document for t...
Detecting Malicious Node in MANET Using Trust Based Cross-Layer Security Protocol
In this paper, we develop a trust based security protocol based on a cross-layer approach which attains confidentiality and authentication of packets in both routing and link layers of MANETs. In the first phase of the p...
An approach of Requirements Tracing by using a multilevel Framework
This paper presents a multilevel framework for tracing the requirements. Before presenting the framework, a review in systematic fashion was conducted and based on the results of that we tried to find out the gaps betwee...