Volume-8 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
Keywords: 3D animations, interactivity, Simulated Learning, Virtual Environment,VRML
[1]. VRML Applications in Construction: Internet based Emerging Construction Technologies http://rebar.ecn.purdue.edu/ect/links/technologies/internet/vrml.aspx
[2]. Burdea, G. and Coiffet, P., Virtual Reality Technology (2nd ed. Wiley Interscience, 2003).
[3]. Vince, J. Virtual Reality Systems (Addison-Wesley, 1995).
[4]. Arts and Humanities Data Service (2002). Creating and using virtual reality: A guide for the arts and humanities. Retrieved February 21, 2004, from http://vads.ahds.ac.uk/guides/vr_guide
[5]. Beier, K. P. (2004). Virtual reality: A short introduction. Retrieved February 20, 2004, from http://www-vrl.umich.edu/intro/index.html
[6]. Schofield, D. 1995. Virtual Reality Technology and its Application.
[7]. Ames A., Nadeau D., Moreland J., VRML 2.0 Sourcebook (2nd edition, John Wiley & Sons, Inc., 1997).
[8]. Web 3D Repository, http://www.web3d.org/vrml/vrml.htm
[9]. Cosmo Player, http://www.ca.com/cosmo/
[10]. Cortona, http://www.parallelgraphics.com/products/cortona/
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Mining the Text Documents Using Phrase Based Tokenizer Approach |
| Country | : | India |
| Authors | : | Dr.Mrs.D.shanthi, V.Umadevi |
| : | 10.9790/0661-0860614 ![]() |
|
Keywords: Text mining, text classification, pattern mining, pattern evolving, information filtering.
[1] Y.Li, C. Zhang, and J.R. Swan, "An Information Filtering Modelon the Web and Its Application in Jobagent," Knowledge-Based
Systems, vol. 13, no. 5, pp. 285-296, 2000.
[2] Y. Li and N. Zhong, "Interpretations of Association Rules by Granular Computing," Proc. IEEE Third Int'l Conf. Data
Mining(ICDM '03), pp. 593-596, 2003.
[3] X. Li and B. Liu, "Learning to Classify Texts Using Positive and Unlabeled Data," Proc. Int'l Joint Conf. Artificial Intelligence
(IJCAI'03), pp. 587-594, 2003.
[4] Y. Li, W. Yang, and Y. Xu, "Multi-Tier Granule Mining for Representations of Multidimensional Association Rules," Proc. IEEE
Sixth Int'l Conf. Data Mining (ICDM '06), pp. 953-958, 2006.
[5] Y. Li and N. Zhong, "Mining Ontology for AutomaticallyAcquiring Web User Information Needs," IEEE Trans. Knowledge and
Data Eng., vol. 18, no. 4, pp. 554-568, Apr. 2006.
[6] Y. Li, X. Zhou, P. Bruza, Y. Xu, and R.Y. Lau, "A Two-Stage Text Mining Model for Information Filtering," Proc. ACM 17th
Conf. Information and Knowledge Management (CIKM '08), pp. 1023-1032,2008.
[7] H. Lodhi, C. Saunders, J. Shawe-Taylor, N. Cristianini, and C.Watkins, "Text Classification Using String Kernels," J. Machine
Learning Research, vol. 2, pp. 419-444, 2002.
[8] A. Maedche, Ontology Learning for the Semantic Web. Kluwer Academic, 2003.
[9] C. Manning and H. Schu¨ tze, Foundations of Statistical Natural Language Processing. MIT Press, 1999.
[10] I. Moulinier, G. Raskinis, and J. Ganascia, "Text Categorization: A Symbolic Approach," Proc. Fifth Ann. Symp. Document
Analysis and Information Retrieval (SDAIR), pp. 87-99, 1996.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Steganography, security, information hiding cryptography, wavelet transform.
[1] "A Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm" World of Computer Science and Information
Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 1, No. 6, 239-246, 2011
[2] Image encryption and decryption using blowfish algorithm World Journal of Science and Technology 2012, 2(3):151-156 ISSN:
2231 – 2587
[3] A DWT Based Approach for Image Steganography International Journal of Applied Science and Engineering 2006. 4, 3:275-290
[4] Applied Mathematical Sciences, Vol. 6, 2012, no. 79, 3907 - 3915A "New Method in image Steganography with Improved Image
Quality".
[5] World Applied Sciences Journal 13 (3): 507-516, 2011 ISSN 1818-4952 " Improvement of Embedding Capacity and Quality of
DWT-Based Audio Steganography Systems"
