SlideShare a Scribd company logo
Robust Module-based Data Management
ABSTRACT
The current trend for building an ontology-based data management system (DMS) is to
capitalize on efforts made to design a preexisting well-established DMS (a reference system).
The method amounts to extracting from the reference DMS a piece of schema relevant to the
new application needs – a module –, possibly personalizing it with extra-constraints w.r.t. the
application under construction, and then managing a dataset using the resulting schema. In this
project, we extend the existing definitions of modules and we introduce novel properties of
robustness that provide means for checking easily that a robust module-based DMS evolves
safely w.r.t. both the schema and the data of the reference DMS. We carry out our
investigations in the setting of description logics which underlie modern ontology languages,
like RDFS, OWL, and OWL2 from W3C. Notably, we focus on the DL-liteA dialect of the DL-
lite family, which encompasses the foundations of the QL profile of OWL2 (i.e., DL-liteR): the
W3C recommendation for efficiently managing large datasets.
Existing System
The current trend for building an ontology-based data management system (DMS) is to
capitalize on efforts made to design a preexisting well-established DMS (a reference system).
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
The method amounts to extracting from the reference DMS a piece of schema relevant to the
new application needs – a module –, possibly personalizing it with extra-constraints w.r.t. the
application under
construction, and then managing a dataset using the resulting schema..
Problems on existing system:
1.This is Method Not Maintain Easy.
Proposed System
Here, we extend the existing definitions of modules and we introduce novel properties of
robustness that provide means for checking easily that a robust module-based DMS evolves
safely w.r.t. both the schema and the data of the reference DMS. We carry out our
investigations in the setting of description logics which underlie modern ontology languages,
like RDFS, OWL, and OWL2 from
W3C. Notably, we focus on the DL-liteA dialect of the DL-lite family, which encompasses the
foundations of the QL profile of OWL2 (i.e., DL-liteR): the W3C recommendation for efficiently
managing large datasets.
Advantages:
1. This is very useful to maintain Data.
2. Search and retrieve the data is very Easy.
Implementation
Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus it can be considered to be the most critical stage in achieving a
successful new system and in giving the user, confidence that the new system will work and
be effective.
The implementation stage involves careful planning, investigation of the existing
system and it’s constraints on implementation, designing of methods to achieve changeover
and evaluation of changeover methods.
Main Modules:-
Main Modules:-
1. User Module:
In this module, Users are having authentication and security to access the detail
which is presented in the ontology system. Before accessing or searching the details user
should have the account in that otherwise they should register first.
.
2. Global Answer Illustration:
Suppose now that our DMS can answer conjunctive queries (a.k.a. select-project-join
queries), e.g., Q(x):- JournPaper(x) ^ hasAuthor(x; "AH") asking for the journal papers written
by Alon Y. Halevy. In some situation, it is interesting to provide answers from our DMS
together with the reference one, called global answers, typically when our own DMS provides
no or too few answers. To do so, we extend the notion of module to robustness to query
answering, so that global query answering can be performed on demand. We ensure that the
module captures the knowledge in the reference schema that is required to answer any query
built upon the relations of interest. Then, at global query answering time, this knowledge is used
to identify the relevant data for a given query within the distributed dataset consisting of the
dataset of the module-based DMS plus that of the reference DMS.
3. Reducing Data Storage Illustration:
Computing edit distance exactly is a costly operation. Sev- eral techniques have been
proposed for identifying candidate strings within a small edit distance from a query string fast.
All of them are based on q-grams and a q-gram
counting argument. For a string s, its q-grams are produced by sliding a window
of length q over the characters of s. To deal with the special case at the beginning and the end of
s, that have fewer than q characters, one may introduce special characters, such as “#” and “$”,
which are not in S. This helps conceptually extend
s by prefixing it with q - 1 occurrences of “#” and suffixing it with q - 1 occurrences of “$”.
Hence, each q-gram for the string s has exactly q characters.
4. Module-Based Data Management:
The main idea underlying the notion of module of a Tbox is to capture some
constraints of the Tbox, including all the (implied) constraints built upon a given signature,
denoted the signature of interest. Our definition of module extends and encompasses the
existing definitions. In contrast with we do not impose modules of a Tbox to be subsets of it.
For a module to capture some constraints of the Tbox, it is indeed sufficient to impose that it is
logically entailed by the Tbox. In contrast with , we do not impose the signature of modules to
be restricted to the signature of interest. In fact, as we have shown through the illustrative
example, the robustness properties may enforce the signature of modules to contain additional
relations that are not relations of interest but that are logically related to them.
.
.
Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql 5.0
 Database Connectivity : JDBC.

More Related Content

What's hot (16)

PDF
P2P Cache Resolution System for MANET
IJCSIS Research Publications
 
PDF
Traffic Classification using a Statistical Approach
Denis Zuev
 
DOCX
Advance Operating Systems
Raghu nath
 
PDF
A request skew aware heterogeneous distributed
João Gabriel Lima
 
PDF
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
 
DOCX
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
PDF
A New Architecture for Group Replication in Data Grid
Editor IJCATR
 
DOCX
Deep semantic understanding
sidra ali
 
PDF
Survey real time databases
Manuel Santos
 
PDF
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
ijwmn
 
PPTX
handle data with DHT and load balnce over P2P network
Hema Priya
 
PPT
Real Time Java DDS
kerush
 
PPTX
Data Replication In Cloud Computing
Rahul Garg
 
PDF
Hiding message from hacker using novel network techniques
PriyangaRajaram
 
PDF
RFNM-Aranda-Final.PDF
Thomas Aranda
 
PDF
A quality of service management in distributed feedback control scheduling ar...
csandit
 
P2P Cache Resolution System for MANET
IJCSIS Research Publications
 
Traffic Classification using a Statistical Approach
Denis Zuev
 
Advance Operating Systems
Raghu nath
 
A request skew aware heterogeneous distributed
João Gabriel Lima
 
Provable Multicopy Dynamic Data Possession in Cloud Computing Systems
1crore projects
 
PROVABLE MULTICOPY DYNAMIC DATA POSSESSION IN CLOUD COMPUTING SYSTEMS
Nexgen Technology
 
A New Architecture for Group Replication in Data Grid
Editor IJCATR
 
Deep semantic understanding
sidra ali
 
Survey real time databases
Manuel Santos
 
Virtual Backbone Based Content Routing in Wireless Ad-Hoc Network
ijwmn
 
handle data with DHT and load balnce over P2P network
Hema Priya
 
Real Time Java DDS
kerush
 
Data Replication In Cloud Computing
Rahul Garg
 
Hiding message from hacker using novel network techniques
PriyangaRajaram
 
RFNM-Aranda-Final.PDF
Thomas Aranda
 
A quality of service management in distributed feedback control scheduling ar...
csandit
 

Viewers also liked (10)

DOCX
Abstrac de la soya bioquimica chico
Francisco Sierra
 
DOCX
Treatment sheet (for all those sleeping)
Podge0123
 
PPTX
Taylor swift
jesschilvers
 
PPS
El hombre del caf
Reflexiones PowerPoint
 
PDF
Steve Shon, NHS Lothian, Design Policy in Practice, a client perspective
Architects for Health
 
DOCX
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
K tdien tu c 5
Trần Nhật Tân
 
PPT
How Education in Pakistan can be improved?
Mohammad Salman
 
PPTX
Presentacio
ggj88
 
PPTX
Vedenie účtovníctva Bratislava
spracovanieuctovnictva
 
Abstrac de la soya bioquimica chico
Francisco Sierra
 
Treatment sheet (for all those sleeping)
Podge0123
 
Taylor swift
jesschilvers
 
El hombre del caf
Reflexiones PowerPoint
 
Steve Shon, NHS Lothian, Design Policy in Practice, a client perspective
Architects for Health
 
JAVA 2013 IEEE DATAMINING PROJECT Secure mining of association rules in horiz...
IEEEGLOBALSOFTTECHNOLOGIES
 
K tdien tu c 5
Trần Nhật Tân
 
How Education in Pakistan can be improved?
Mohammad Salman
 
Presentacio
ggj88
 
Vedenie účtovníctva Bratislava
spracovanieuctovnictva
 
Ad

Similar to JAVA 2013 IEEE DATAMINING PROJECT Robust module based data management (20)

PPTX
Robust Module based data management system
Rahul Roi
 
DOCX
1 Anatomy of a Database System Joseph M. Hellerstein and
VannaJoy20
 
PDF
Data and Computation Interoperability in Internet Services
Sergey Boldyrev
 
PDF
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Ericsson
 
PDF
access.2021.3077680.pdf
neju3
 
PDF
Rise of NewSQL
Sushant Choudhary
 
PDF
Reference - Benjamin Hindman (Mesos Research Paper)
Puneet soni
 
PDF
Apache Mesos
benevolent001
 
PPTX
Nosql databases
ateeq ateeq
 
PDF
Distributed Algorithms with DDS
Angelo Corsaro
 
DOCX
Database
sahil shinwari
 
PPTX
NOSQL
akbarashaikh
 
PDF
Bhagaban Mallik
Raajdhani Engineering College
 
PPTX
Big Data Analytics Module-3 as per vtu syllabus.pptx
shilpabl1803
 
PPTX
Softwae and database in data communication network
AyoubSohiabMohammad
 
PDF
Document Based Data Modeling Technique
Carmen Sanborn
 
PDF
Challenges Management and Opportunities of Cloud DBA
inventy
 
DOCX
Bt0066 dbms
smumbahelp
 
PDF
Reactive Stream Processing for Data-centric Publish/Subscribe
Sumant Tambe
 
PPTX
Introduction to NoSQL
balwinders
 
Robust Module based data management system
Rahul Roi
 
1 Anatomy of a Database System Joseph M. Hellerstein and
VannaJoy20
 
Data and Computation Interoperability in Internet Services
Sergey Boldyrev
 
Conference Paper: Multistage OCDO: Scalable Security Provisioning Optimizatio...
Ericsson
 
access.2021.3077680.pdf
neju3
 
Rise of NewSQL
Sushant Choudhary
 
Reference - Benjamin Hindman (Mesos Research Paper)
Puneet soni
 
Apache Mesos
benevolent001
 
Nosql databases
ateeq ateeq
 
Distributed Algorithms with DDS
Angelo Corsaro
 
Database
sahil shinwari
 
Big Data Analytics Module-3 as per vtu syllabus.pptx
shilpabl1803
 
Softwae and database in data communication network
AyoubSohiabMohammad
 
Document Based Data Modeling Technique
Carmen Sanborn
 
Challenges Management and Opportunities of Cloud DBA
inventy
 
Bt0066 dbms
smumbahelp
 
Reactive Stream Processing for Data-centric Publish/Subscribe
Sumant Tambe
 
Introduction to NoSQL
balwinders
 
Ad

More from IEEEGLOBALSOFTTECHNOLOGIES (20)

DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOCX
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
IEEEGLOBALSOFTTECHNOLOGIES
 

Recently uploaded (20)

PPTX
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
PDF
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
PDF
UiPath Agentic AI ile Akıllı Otomasyonun Yeni Çağı
UiPathCommunity
 
PDF
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
PPSX
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
PPTX
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
PDF
Database Benchmarking for Performance Masterclass: Session 1 - Benchmarking F...
ScyllaDB
 
PPTX
𝙳𝚘𝚠𝚗𝚕𝚘𝚊𝚍—Wondershare Filmora Crack 14.0.7 + Key Download 2025
sebastian aliya
 
PDF
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
PDF
Why aren't you using FME Flow's CPU Time?
Safe Software
 
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
PPTX
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
PDF
Kubernetes - Architecture & Components.pdf
geethak285
 
PDF
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
PDF
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
PDF
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
PDF
Open Source Milvus Vector Database v 2.6
Zilliz
 
PDF
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
Paycifi - Programmable Trust_Breakfast_PPTXT
FinTech Belgium
 
How to Visualize the ​Spatio-Temporal Data Using CesiumJS​
SANGHEE SHIN
 
UiPath Agentic AI ile Akıllı Otomasyonun Yeni Çağı
UiPathCommunity
 
“Scaling i.MX Applications Processors’ Native Edge AI with Discrete AI Accele...
Edge AI and Vision Alliance
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Enabling the Digital Artisan – keynote at ICOCI 2025
Alan Dix
 
Usergroup - OutSystems Architecture.ppsx
Kurt Vandevelde
 
CapCut Pro Crack For PC Latest Version {Fully Unlocked} 2025
pcprocore
 
Database Benchmarking for Performance Masterclass: Session 1 - Benchmarking F...
ScyllaDB
 
𝙳𝚘𝚠𝚗𝚕𝚘𝚊𝚍—Wondershare Filmora Crack 14.0.7 + Key Download 2025
sebastian aliya
 
Enhancing Environmental Monitoring with Real-Time Data Integration: Leveragin...
Safe Software
 
Why aren't you using FME Flow's CPU Time?
Safe Software
 
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Priyanka Aash
 
Curietech AI in action - Accelerate MuleSoft development
shyamraj55
 
Kubernetes - Architecture & Components.pdf
geethak285
 
LLM Search Readiness Audit - Dentsu x SEO Square - June 2025.pdf
Nick Samuel
 
Darley - FIRST Copenhagen Lightning Talk (2025-06-26) Epochalypse 2038 - Time...
treyka
 
Hello I'm "AI" Your New _________________
Dr. Tathagat Varma
 
Open Source Milvus Vector Database v 2.6
Zilliz
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 

JAVA 2013 IEEE DATAMINING PROJECT Robust module based data management

  • 1. Robust Module-based Data Management ABSTRACT The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system). The method amounts to extracting from the reference DMS a piece of schema relevant to the new application needs – a module –, possibly personalizing it with extra-constraints w.r.t. the application under construction, and then managing a dataset using the resulting schema. In this project, we extend the existing definitions of modules and we introduce novel properties of robustness that provide means for checking easily that a robust module-based DMS evolves safely w.r.t. both the schema and the data of the reference DMS. We carry out our investigations in the setting of description logics which underlie modern ontology languages, like RDFS, OWL, and OWL2 from W3C. Notably, we focus on the DL-liteA dialect of the DL- lite family, which encompasses the foundations of the QL profile of OWL2 (i.e., DL-liteR): the W3C recommendation for efficiently managing large datasets. Existing System The current trend for building an ontology-based data management system (DMS) is to capitalize on efforts made to design a preexisting well-established DMS (a reference system). GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:[email protected]
  • 2. The method amounts to extracting from the reference DMS a piece of schema relevant to the new application needs – a module –, possibly personalizing it with extra-constraints w.r.t. the application under construction, and then managing a dataset using the resulting schema.. Problems on existing system: 1.This is Method Not Maintain Easy. Proposed System Here, we extend the existing definitions of modules and we introduce novel properties of robustness that provide means for checking easily that a robust module-based DMS evolves safely w.r.t. both the schema and the data of the reference DMS. We carry out our investigations in the setting of description logics which underlie modern ontology languages, like RDFS, OWL, and OWL2 from W3C. Notably, we focus on the DL-liteA dialect of the DL-lite family, which encompasses the foundations of the QL profile of OWL2 (i.e., DL-liteR): the W3C recommendation for efficiently managing large datasets. Advantages: 1. This is very useful to maintain Data. 2. Search and retrieve the data is very Easy.
  • 3. Implementation Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective. The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Main Modules:- Main Modules:- 1. User Module: In this module, Users are having authentication and security to access the detail which is presented in the ontology system. Before accessing or searching the details user should have the account in that otherwise they should register first. . 2. Global Answer Illustration: Suppose now that our DMS can answer conjunctive queries (a.k.a. select-project-join queries), e.g., Q(x):- JournPaper(x) ^ hasAuthor(x; "AH") asking for the journal papers written by Alon Y. Halevy. In some situation, it is interesting to provide answers from our DMS
  • 4. together with the reference one, called global answers, typically when our own DMS provides no or too few answers. To do so, we extend the notion of module to robustness to query answering, so that global query answering can be performed on demand. We ensure that the module captures the knowledge in the reference schema that is required to answer any query built upon the relations of interest. Then, at global query answering time, this knowledge is used to identify the relevant data for a given query within the distributed dataset consisting of the dataset of the module-based DMS plus that of the reference DMS. 3. Reducing Data Storage Illustration: Computing edit distance exactly is a costly operation. Sev- eral techniques have been proposed for identifying candidate strings within a small edit distance from a query string fast. All of them are based on q-grams and a q-gram counting argument. For a string s, its q-grams are produced by sliding a window of length q over the characters of s. To deal with the special case at the beginning and the end of s, that have fewer than q characters, one may introduce special characters, such as “#” and “$”, which are not in S. This helps conceptually extend s by prefixing it with q - 1 occurrences of “#” and suffixing it with q - 1 occurrences of “$”. Hence, each q-gram for the string s has exactly q characters. 4. Module-Based Data Management: The main idea underlying the notion of module of a Tbox is to capture some constraints of the Tbox, including all the (implied) constraints built upon a given signature, denoted the signature of interest. Our definition of module extends and encompasses the existing definitions. In contrast with we do not impose modules of a Tbox to be subsets of it. For a module to capture some constraints of the Tbox, it is indeed sufficient to impose that it is logically entailed by the Tbox. In contrast with , we do not impose the signature of modules to be restricted to the signature of interest. In fact, as we have shown through the illustrative
  • 5. example, the robustness properties may enforce the signature of modules to contain additional relations that are not relations of interest but that are logically related to them. . . Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB(min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.
  • 6.  Database : Mysql 5.0  Database Connectivity : JDBC.