A Study on Cloud Computing in E-Governance
Survey Paper | Journal Paper
Vol.5 , Issue.12 , pp.254-258, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.254258
Abstract
A technique Cloud computing is for registering which is planned from the improvement of advances for parallel computing, cloud computing, and service-oriented architecture. What`s more, its point is to give correspondence and capacity assets in an ensured situation to convey the services as quick as could be allowed, which is given through Internet stage. The given Services in e-government are accessible through Internet, along these lines cloud computing can be utilized as a part of the usage of Egovernmence design and furnish better service with the most reduced cost utilizing its advantages. In this examination, the cloud computing in e-government has been clarified and it`s been endeavored to distinguish the difficulties and advantages of the cloud to show signs of improvement condition to actualize new innovation.
Key-Words / Index Term
Cloud computing, E-Government, Challenges, Benefits, Internet, parallel computing
References
[1]. A. tripathi, B. Parihar. (2011). “E-governance challenges and cloud benefit”. 2011 IEEE International Conference on Computer Science and Automation Engineering, 351-354.
[2]. Kuldeep Vats, Shravan Sharma, Amit Rathee. (2012). “A Review of Cloud Computing and E-Governance”. International Journal of Advanced Research in Computer Science and Software Engineering. 2 (2) Kuldeep Vats, Shravan Sharma, Amit Rathee. (2012). A Review of Cloud Computing and E-Governance. International Journal of Advanced Research in Computer Science and Software Engineering. 2 (2).
[3] Rajkumar Buyya, James Broberg, Andrzej M. Goscinski. (2011). “Cloud Computing: Principles and Paradigms”. Hoboken, New Jersey: John Wiley and Sons.v
[4]. Borko Furht, Armando Escalante. (2010). “Handbook of Cloud Computing”. New York: Springer.
[5]. Eric A. Marks, Bob Lozano.. (2010). “Executive`s Guide to Cloud Computing”. Hoboken, New Jersey: John Wiley and Sons, 40-102.
[6]. A. tripathi, B. Parihar. (2011). “E-governance challenges and cloud benefit”. VSRD International Journal of CS & IT. 1 (1), 29-35.
[7]. Mahafuz Aziz Aveek, Md. Sakibur Rahman. (2011). “Implementing EGovernance in Bangladesh Using Cloud Computing Technology”. BRAC University, Dhaka, Bangladesh.
[8]. Ishaq, Qusay and Rana, Muhammad Ehsan. (2011). “Towards Cloud-based e- Government Solutions for Developing Countries: Critical Success Factors and Expected Benefits”. University of Malaya, 4th international conference on Informatics and technology, Kuala Lumpur. 10 (11)
[9]. H. Takabi, J.B.D. Joshi, G.Ahn. (2010). “Security and Privacy Challenges in Cloud Computing Environments”. IEEE Security Privacy Magazine. 8 (3).
[10]. Toby Velte, Anthony Velte, Toby J. Velte, Robert C. Elsenpeter. (2010). “Cloud Computing: A Practical Approach”. New York: McGraw Hill Professional, 274.
[12]. K. Vats, S. Sharma and A. Rathee. (2012). “A review of cloud computing and e-governance”. International Journal of Advanced Research in Computer Science and Software Engineering. 2 (2).
Citation
Kondra Mounika, Anusha Taduri, Sridhar Manda, "A Study on Cloud Computing in E-Governance," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.254-258, 2017.
Games Transmogrified to Make Classroom Teaching More Effective
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.259-266, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.259266
Abstract
In this 21st century it is important to reinvent future of students by adopting unseasoned and interesting methods for classroom teaching. In this paper, games which everyone is familiar in day-to-day life are transmogrified and embedded into the classroom teaching to make the learning more ingrained and emphatic. To enhance classroom engagement it is very important to adopt classified teaching strategies which make the neoteric students to attend the classes without attendance compulsion. The games discussed in the paper are not subject or stream dependent, they can be easily modified and implemented with minor change to create a reasonable fun and learning environment. Games are competitive in nature which inbuilt the problem solving skills among the students through various stages of activities involved in game play. Implementation of games in education helps students to achieve planning, strategic thinking, communication skills, group decision making, negotiating skills and the most important gain in knowledge.
Key-Words / Index Term
Game based learning, Class room teaching, Effective learning, Teaching methodologies
References
[1] Paul Brna, Rose Luckin, “Interactive Learning Environments” Vol. 16, No. 3, 195–197, December 2008.
[2] Juho Hamari, Jonna Koivisto, Harri Sarra, “Does gamification work?-A Literature Review of empirical Studies on Gamification”,In the 47th Hawaii International Conference on System Science,2014.
[3] Dicheva D.,Dichev C.,Agre G.,&Angelova G, “Gamification in Education:A Systematic Mapping Study”18(3),75-88.
[4] N.Raj,R.Dubey, “Snakes and Stairs Game Design using Automata Theory”, Volume-5, Issue-5, 58-62, IJCSE 2017.
[5] GeroLuckemeyer, “Virtual Blended Learning Enriched by Gamification and Social Aspects in Programming Education”,In 10th International Conference on Computer Science & Education (ICCSE 2015) July 22-24. Fitzwilliam College, Cambridge University, UK, pp. 438-444, IEEE 2015
[6] Shannon Magnacca, “Game-Based Learning in the Social Studies Classroom”, Digital Commons@Georgia Southern 2013
[7] C. Rebetez , M. Bétrancourt, “Video game research in cognitive and education sciences”, Volume XI, No. 1 (March), 131-142.
Citation
Kavisha Duggal, Lovi Raj Gupta, G Kavya Sri, "Games Transmogrified to Make Classroom Teaching More Effective," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.259-266, 2017.
An Approach Towards Designing Relational Database With Transaction Operations
Research Paper | Journal Paper
Vol.5 , Issue.12 , pp.267-272, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.267272
Abstract
A transaction processing on relational database perform as single logical unit of work, which either executed completely or not at all on database system. A transaction processing on database perform mainly two basic operations read and write operation on the database system. Read operations fetch the content of the database using some standard SQL query and retrieve the data from database to the local logical buffer in main memory. In other hand, write operations, update of the local logical buffer and send back the data from the local main memory to database system for permanent storage. In this paper, we are going to know various applications of transactions schedules and how to resolve the various issues that implicitly generated during the transaction schedule generation. Every transaction has many operations on it; all these operations may or may not be of same duration.
Key-Words / Index Term
Serial Schedule, Relational Database, Normalization, Shared Lock, Exclusive Lock
References
[1]. A.Waqas, A.W. Mahessar, N. Mahmood, Z. Bhatti, M..Karbasi, A. Shah, February 2015 , “Transaction management techniques and practices in current cloud computing environments: a survey”, IJDMS ) Vol.7, No.1,
[2]. Deng, Yuetang Frankl, Phyllis Chays, David, “Testing database transaction consistency”, Technical Report TRC-IS-2003, Page No .184-195, 2003
[3] Elmasri, R. and Navathe, S.B.2007: Fundamentals of Database Systems, 5th Ed., Addison Wesley.
[4] R. G. Tiwari, S. B. Navathe, and G. J. Kulkarni, September 2010. “Towards Transactional Data Management over the Cloud,” 2010 Second Int. Symp. Data, Privacy, E-Commerce, pp. 100–106
[5] S. Das and A. El Abbadi, 2010 “G-Store: A Scalable Data Store for Transactional Multi key Access in the Cloud,” in SoCC’, Indianapolis, Indiana, USA, , pp. 163–174.
[6] Codd E. F., 1970, “A relational model of data for large shared data banks”, Communications of the ACM. vol. 13, No.6, pp. 377–387.
[7] Ravula, R ,2014-2015 "Database : Transactions and concurrency control", online Lecture series , E- Classes by R Ravula. ravindrababuravula.com
[8] Connolly, Thomas, Carolyn Begg, 2005, : Database Systems. A Practical Approach to Design, Implementation, and Management, Pearson Education, 3rd edition.
[9] R. Kaula, and J. Chin, April 1993 “A database approach towards flexiblemanufacturing: A conceptual framework, “ in Computers and Industrial Engieering, Vol 24, No 2, pp. 131-141,1993
[10] Elmagarmid, Ahmed K, “Database Transaction Modelsfor Advanced Applications”, Database, 611, 1992
[11] Gray, Jim Lamport, Leslie, “Consensus on transaction commit”, ACM Transactions on Database Systems, 133-160, Vol – 31, Issue -1 , 2006
Citation
Kunal Kumar, Sachindra Kumar Azad, "An Approach Towards Designing Relational Database With Transaction Operations," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.267-272, 2017.
Indirect Assessment of Outcomes in Education: A-Review
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.273-278, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.273278
Abstract
Outcome Based Education (OBE) is the focal point of teaching and learning methodology. To achieve OBE many components are essential like Programme Educational Objectives (PEOs), Exit Outcomes (EOs), Programme Outcomes (POs), Course Outcomes (COs), Graduate Attributes, Lesson Outcomes, Unit Outcomes, Vision and Mission. Attainment of any of these components lead to the achievement of OBE and validate the teaching- learning process. Modes of Outcome Based Assessment can be direct (tests, assignments, projects, end examinations, formatives) as well as indirect (feedback, discussion forums, blogs). Much work has been done to check the attainment of outcomes and achievement of OBE using the direct assessment tools. This study focuses on the development of a systematic approach to check the achievement of OBE using automated indirect assessment tool. Traditional way of assessing the attainment of outcomes is not optimal. As to manually calculate the attainment from the huge datasets requires much effort. Hence, automated process of indirect assessment of outcomes has become the necessity in today’s era.
Key-Words / Index Term
outcome based assessment, programme outcomes; course outcomes; outcome based education; survey tool, indirect assessment
References
[1] Lakshmi H.N, G. Bhagya Sri, Yashasree. J, S. Bhargav, B. Satheesh Kumar, K. Anusha, "Assessment method for Course Outcome attainment: A case study in engineering education", International Journal of Computer Sciences and Engineering, Vol.5, Issue.8, pp.94-100, 2017.
[2] B.R. Patel, "Comparative analysis of classification algorithm in EDM for improving student performance", International Journal of Computer Sciences and Engineering, Vol.5, Issue.10, pp.171-175, 2017
[3] M. Kasunic, Designing an Effective Survey. Pittsburgh, Carnegie Mellon Software Engineering Institute, September 2005.
[4] A. Naz and M. Casto, “Bring best of two worlds in a software engineering class, student outcomes of Accreditation Board of Engineering and Technology (ABET) and information literacy standards of Association of College & Research Libraries (ACRL),” in Proceedings of Frontiers in Education Conference FIE, 2013, pp. 80–86.
[5] C. S. Unigraz and C. Steiner, “D8.1b Version: 2.5 Refinement and Improvement of Evaluation Framework,” vol. 1, no. 49, 2010.
[6] K. Y. Tshai et al., “Outcome-based education - The assessment of programme educational objectives for an engineering undergraduate degree”, Engineering Education, vol. 9, pp. 74–85, July 2003.
[7] J. Burkey and W. L. Kuechler, “Web-based surveys for corporate information gathering: A bias-reducing design framework,” IEEE Trans. Prof. Commun., vol. 46, no. 2, pp. 81–93, 2003.
[8] D.Sindhuja and V.Geetha , "Modified and Adaptive E-learning", International Journal of Computer Sciences and Engineering, Vol.3, Issue.5, pp.55-61, 2015.
[9] P. F. Mead and M. M. Bennett, “Practical Framework for Bloom’s Based Teaching and Assessment of Engineering Outcomes,” in Proceedings of Educ. Train. Optical Photonics, 2009, pp. 3-12.
[10] R. M. Crespo et al., “Aligning assessment with learning outcomes in outcome-based education,” in IEEE Education Engineering Conference, pp. 1239–1246, 2010.
[11] Z.T. Deng, R. Rojas-oviedo, and X. Qian, “Evaluation of Assessment Tools for Outcome Based Engineering Courses,” in Proceedings of the American Society for Engineering Education Annual Conference & Exposition, pp. 1-8, 2003.
[12] L. J. Shuman, M. Besterfield-Sacre, H. Wolfe, C. J. Atman, J. McGourty, R. L. Miller, B. M. Olds, and G. M. Rogers, “Defining the outcomes: A framework for EC-2000,” IEEE Transactions on Education, vol. 43, no. 2, pp. 100–110, May 2000.
[13] M. Khalifa and R. Lam, “Web-based learning: effects on learning process and outcome,” IEEE Trans. Educ., vol. 45, no. 4, pp. 350–356, Nov. 2002.
[14] W. Mansor, H. Hashim, S. A. C. Abdullah, M. U. Kamaluddin, M. F. A. Latip, A. I. M. Yassin, T. K. A. Rahman, Z. Zakaria, and M. M. Kamal, “Preliminary results on the implementation of Outcome-Based Education on the non-examinable computer engineering modules,” in Proceedings - Frontiers in Education Conference, FIE, 2008, p. S4B–20.
[15] J. Turns, C. J. Atman, and R. Adams, “Concept maps for engineering education: A cognitively motivated tool supporting varied assessment functions,” IEEE Transactions on Education, vol. 43, no. 2, pp. 164–173, May 2000
[16] M. S. O. Masni-Azian, A., Rahimah, A.H, “Towards OBE : A Case Study of Course Outcome ( CO ) and Programme Outcome ( PO ) Attainment for Product Design and Development Course,” IOSR J. Res. Method Educ., vol. 4, no. 2, pp. 55–61, 2014.
[17] G. MacKerron, “Implementation, implementation, implementation: Old and new options for putting surveys and experiments online”, Journal of Choice Modelling, vol. 4, pp. 20–48, 2011.
[18] G. K. Chung, T. C. Harmon, and E. L. Baker, “The impact of a simulation-based learning design project on student learning,” IEEE Transactions on Education, vol. 44, no. 4, pp. 390–398, 2001
Citation
J. Bhatia, H. Singh, "Indirect Assessment of Outcomes in Education: A-Review," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.273-278, 2017.
Future Opportunities and Challenges in Sentiment Analysis: An Overview
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.279-286, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.279286
Abstract
Today the evolution of technology and fair access to the internet in countries such as India, public opinions over social media, expression of sentiment on products and services are fast and furious in present days. These opinions have value for companies to materialize profits and understand the market for their future strategic decisions. Present technology adoption energized by the healthy growth in big data framework, caused applications based on Sentiment Analysis (SA) in big data to become common for businesses. But there is wide gap and scope for SA application in big data. This paper discusses various Sentiment analysis approaches and algorithms, including sentiment polarity detection, SA features (explicit and implicit), sentiment classification techniques, applications of SA. Future opportunities and challenges of sentiment analysis is explored. Scalable, automated, accurate, sophisticated sentiment analysis is a much sought-after technology that almost no one has truly nailed yet.
Key-Words / Index Term
Sentiment Analysis Approaches, tools, techniques, machine Learning, opportunities, and challenges, supervised learning and unsupervised learning
References
[1]. Harnani Mat Zin and Samaneh Nadali, Nurfadhlina Mohd Sharef. “Overview and Future Opportunities of Sentiment Analysis Approaches for Big Data.” thescipub.com. http://thescipub.com/PDF/jcssp.2016.153.168.pdf
[2]. .Agnihotri, R., R. Dingus, M.Y. Hu and M.T. Krush, 2015. Social media: Influencing customer satisfaction in B2B sales. Industrial Market. Manage. DOI: 10.1016/j.indmarman.2015.09.003
[3]. Asur, S. and B.A. Huberman, 2010. Predicting the future with social media. Proceedings of the International Conference on Web Intelligence and Intelligent Agent Technology, Aug. 31 2010-Sept. 3, IEEE Xplore Press, Toronto, ON, pp: 492-499. DOI: 10.1109/WI-IAT.2010.63
[4]. Bagheri, A., M. Saraee and F. de Jong, 2013. Care more about customers: Unsupervised domain independent aspect detection for sentiment analysis of customer reviews. Knowledge-Based Syst., 52: 201-213. DOI: 10.1016/j.knosys.2013.08.011
[5]. Balahur, A., J.M. Hermida and A. Montoya, 2012. Detecting implicit expressions of emotion in a text: A comparative analysis. Decision Support Syst., 53: 742-753. DOI: 10.1016/j.dss.2012.05.024
[6]. Balahur, A., R. Mihalcea and A. Montoya, 2014. Computational approaches to subjectivity and sentiment analysis: Present and envisaged methods and applications. Comput. Speech Lang., 28: 1-6. DOI: 10.1016/j.csl.2013.09.003
[7]. Banea, C., R. Mihalcea and J. Wiebe, 2014. Sense-level subjectivity in a multilingual setting. Comput. Speech Lang., 28: 7-19. DOI: 10.1016/j.csl.2013.03.002
[8]. Batrinca, B. and P.C. Treleaven, 2014. Social media analytics: A survey of techniques, tools and platforms. Ai Society, 30: 89-116. DOI: 10.1007/s00146-014-0549-4
[9]. Bernabé-Moreno, J., A. Tejeda-Lorente, C. Porcel, H. Fujita and E. Herrera-Viedma, 2015. CARESOME: A system to enrich marketing customers acquisition and retention campaigns using social media information. Knowledge-Based Syst., 80: 163-179. DOI: 10.1016/j.knosys.2014.12.033
[10]. Bing, L.I. and K.C.C. Chan, 2014. A fuzzy logic approach for opinion mining on large-scale twitter data. Proceedings of the ACM 7th International Conference on Utility and Cloud Computing, 0Dec. 8-11, IEEE Xplore Press, London, pp: 652-657. DOI: 10.1109/UCC.2014.105
[11]. Bravo-Marquez, F., M. Mendoza and B. Poblete, 2014. Meta-level sentiment models for big social data analysis. Knowledge-Based Syst., 69: 86-99. DOI: 10.1016/j.knosys.2014.05.016
[12]. Cambria, E., M. Grassi, A. Hussain and C. Havasi, 2011. Sentic Computing for social media marketing. Multimedia Tools Applic., 59: 557-577. DOI: 10.1007/s11042-011-0815-0
[13]. Chaumartin, F., L. Talana and U. Paris, 2007. UPAR7: A knowledge-based system for headline sentiment tagging. Proceedings of the 4th International Workshop on Semantic Evaluations, (WSE’ 07), Stroudsburg, PA, USA, pp: 422-425. DOI: 10.3115/1621474.1621568
[14]. Cheong, M. and V.C.S. Lee, 2010. A microblogging based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Inform. Syst. Frontiers, 13: 45-59. DOI: 10.1007/s10796-010-9273-x
[15]. Conejero, J., P. Burnap, O. Rana and J. Morgan, 2013. Scaling archived social media data analysis using a Hadoop cloud. Proceedings of the IEEE 6th International Conference on Cloud Computing, Jun. 28 Jul. 3, IEEE Xplore Press, Santa Clara, CA, pp: 685-692. DOI: 10.1109/CLOUD.2013.120
[16]. Da Silva, N.F.F., E.R. Hruschka and E.R. Hruschka, 2014. Tweet sentiment analysis with classifier ensembles. Decision Support Syst., 66: 170-179. DOI: 10.1016/j.dss.2014.07.003 De Vel, O., A. Anderson, M. Corney and G. Mohay, 2001. Mining e-mail content for author identification forensics. ACM SIGMOD Record, 30: 55-64. DOI: 10.1145/604264.604272
[17]. Denecke, K., 2008. Using SentiWordNet for multilingual sentiment analysis. Proceedings of the 24th International Conference on Data Engineering Workshop, Apr. 7-12, IEEE Xplore Press, Cancun, pp: 507-512. DOI: 10.1109/ICDEW.2008.4498370
[18]. Derczynski, L. and K. Bontcheva, 2014a. PHEME: Veracity in digital social networks. Proceedings of the Workshop on UMAP Projects Synergy, (UPS’ 14), pp: 1-4.
[19]. Ding, X., B. Liu and S.M. Street, 2007. The utility of linguistic rules in opinion mining. Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Jul. 23-27, Amsterdam, pp: 811-812. DOI: 10.1145/1277741.1277921
[20]. Efron, M., M. Gary and Z. Julinang, 2004. Cultural orientation: Classifying subjective documents by Cociation analysis. Proceedings of the AAAI Fall Symposium Series on Style and Meaning in Language, Art, Music and Design, (AMD’ 04), pp: 41-48.
[21]. Eirinaki, M., S. Pisal and J. Singh, 2012. Feature-based opinion mining and ranking. J. Comput. Syst. Sci., 78: 1175-1184. DOI: 10.1016/j.jcss.2011.10.007
[22]. Fei, X., H. Wang and J. Zhu, 2010. Sentiment word identification using the maximum entropy model. Proceedings of the 6th International Conference on Natural Language Processing and Knowledge Engineering, Aug. 21-23, IEEE Xplore Press, Beijing, pp: 1-4. DOI: 10.1109/NLPKE.2010.5587811
[23]. Fei, Z., J. Liu and G. Wu, 2004. Sentiment classification using phrase patterns. Proceedings of the 4th IEEE International Conference on Computer Information Technology, Sept. 14-16, IEEE Xplore Press, pp: 1147-1152. DOI: 10.1109/CIT.2004.1357349
[24]. Fulse, S., R. Sugandhi and A. Mahajan, 2014. A survey on multimodal sentiment analysis. Int. J. Eng. Res. Technol., 3: 1233-1238. Gamon, M., 2004.
[25]. Sentiment classification on customer feedback data: Noisy data, large feature vectors and the role of linguistic analysis. Proceedings of the 20th International Conference on Computational Linguistics, (CCL’ 04), Stroudsburg, PA, USA, pp: 1-7. DOI: 10.3115/1220355.1220476
[26]. Ghazi, D., D. Inkpen and S. Szpakowicz, 2014. The prior and contextual emotion of words in sentential context. Comput. Speech Lang., 28: 76-92. DOI: 10.1016/j.csl.2013.04.009
[27]. Go, A., R. Bhayani and L. Huang, 2009. Twitter sentiment classification using distant supervision. Grefenstette, G., Y. Qu, J. Shanahan and D. Evans, 2004.
[28]. Guo, Y., Z. Shao and N. Hua, 2010. Automatic text categorization based on content analysis of cognitive situation models. Inform. Sci., 180: 613-630. DOI: 10.1016/j.ins.2009.11.012
[29]. Habernal, I., T. Ptáček and J. Steinberger, 2014. Supervised sentiment analysis in Czech social media. Inform. Process. Manage., 50: 693-707. DOI: 10.1016/j.ipm.2014.05.001
[30]. Hai, Z., K. Chang and J. Kim, 2011. Implicit feature identification via co-occurrence association rule mining. Proceedings of the 12th International Conference on Computational Linguistics and Intelligent Text Processing, Feb. 20-26, Springer Berlin Heidelberg, pp: 393-404. DOI: 10.1007/978-3-642-19400-9_31
[31]. Harrigan, P., G. Soutar, M.M. Choudhury and M. Lowe, 2014. Modelling CRM in a social media age. Aus. Market. J., 23: 27-37. DOI: 10.1016/j.ausmj.2014.11.001
[32]. Hatzivassiloglou, V. and K.R. McKeown, 1997. Predicting the semantic orientation of adjectives. Proceedings of the 8th Conference on European chapter of the Association for Computational Linguistics, (ACL’ 97), Stroudsburg, PA, USA, pp: 174-181. DOI: 10.3115/976909.979640
[33]. He, W., H. Wu, G. Yan, V. Akula and J. Shen, 2015. A novel social media competitive analytics framework with sentiment benchmarks. Inform. Manage., 52: 801-812. DOI: 10.1016/j.im.2015.04.006
Citation
Pranay Kumar B.V, M. Sadanandam, "Future Opportunities and Challenges in Sentiment Analysis: An Overview," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.279-286, 2017.
Role of Natural Language Processing in Social Media
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.287-289, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.287289
Abstract
This paper highlight role of Natural Language Processing in social media sources like twitter, Facebook, LinkedIn etc. As now a day’s social media playing the vital role in terms of current trends social issues awareness etc. The major area where social media analysis requires is business analytics. As every business need the customer reviews and preferences for their business growth. This paper explains the major steps involved in social media mining.
Key-Words / Index Term
Natural Language Processing, Social media,text summarization, sentiment analysis, Named Entity Recognition, Part-Of-Speech,Tagging.
References
[1] https://www.tutorialspoint.com/artificial_intelligence/artificial_intelligence_natural_language_processing.htm
[2] Saranyamol C S, Sindhu L, “A Survey on Automatic Text Summarization”, International Journal of Computer Science and Information Technologies, 2014,Vol. 5 Issue 6.
[3] Rafael Ferreira et al.“Assessing Sentence Scoring Techniques for Extractive Text Summarization”, Elsevier Ltd., Expert Systems with Applications 40 (2013)5755-5764
[4] H. P. Luhn, "The automatic creation of literature abstracts”, IBM Journal of Research and Development, vol. 2, pp. 159-165, 1958.
[5] John Selvadurai “A Natural Language Processing based Web Mining System for Social Media Analysis”, International Journal of Scientific and Research Publications, Volume 3, Issue 1, January 2013 ISSN 2250-3153.
[6] The Stanford Natural Language Processing Group. (2012, Nov 15). Stanford Named Entity recognizer (NER) [Online].
[7] P. Radha and R.Divya,” Extracting Information from Social Network using NLP”, International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 4 (2017), pp. 621-630
[8] Surabhi Thorat,” Opinion Mining and Sentiment analysis- Its Tools and Challenges”, International Journal of IT, engineering and Applied Sciences Research (IJIEASR) ISSN: 2319-4413 Volume 3, No. 11, November 2014, pp. 12-15
Citation
Aditya Andhare, Surabhi Thorat and Vikrant Shaga, "Role of Natural Language Processing in Social Media," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.287-289, 2017.
A Petri-Net Based Representation of Automated Railway Signalling System with Collision Avoidance
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.290-295, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.290295
Abstract
In today’s fast going life railway plays a major role as a public transport in different countries. And it’s a very difficult job to control the railway traffic signal manually considering all kinds of situation and also it is very difficult to find out whether any deadlock situation has occurred or not. This work is emphasized on use of Petri nets in modeling railway network as well as railway signalling system and designing appropriate control logic for it to avoid collision. Here, the whole railway network is presented as a combination of the elementary models – tracks, stations and points (switch) within the station including sensors and semaphores. We use generalized mutual exclusion constraints and constraints containing the firing vector to ensure safeness of the railway network. In this research work, we have actually introduced constraints at the points within the station. These constraints ensure that when a track is occupied, we control the switch so that another train will not enter into the same track and thus avoid collision.
Key-Words / Index Term
Petri nets, safeness constraints, firing vectors, asynchronous systems
References
[1] International Workshop Petri Nets and Performance Models, Madison, 1987. IEEE Computer Society Press No. 796.
[2] T. Agerwala. Putting Petri nets to work. IEEE Computer, pages 85–94, December 1979.
[3] M. Ajmone Marsan, G. Balbo, A. Bobbio, G. Chiola, G. Conte, and A. Cumani. On Petri nets with stochastic timing. In Proceedings International Workshop on Timed Petri Nets, pages 80–87, Torino (Italy), 1985. IEEE Computer Society Press no. 674.
[4] M. Ajmone Marsan, G. Balbo, A. Bobbio, G. Chiola, G. Conte, and A. Cumani. The effect of execution policies on the semantics and analysis of stochastic Petri nets. IEEE Transactions on Software Engineering, SE-15:832–846, 1989.
[5] M. Ajmone Marsan, G. Balbo, and G. Conte. A class of generalized stochastic Petri nets for the performance evaluation of multiprocessor systems. ACM Transactions on Computer Systems, 2:93–122, 1984.
[6] M. Ajmone Marsan, A. Bobbio, G. Conte, and A. Cumani. Performance analysis of degradable multiprocessor systems using generalized stochastic Petri nets. IEEE Computer Society Newsletters, 6, SI-1:47–54, 1984.
[7] R.E. Barlow and F. Proschan. Statistical Theory of Reliability and Life Testing. Holt, Rinehart and Winston, New York, 1975.
[8] M.D. Beaudry. Performance-related reliability measures for computing systems. IEEE Transactions on Computers, C-27:540–547, 1978.
[9] A. Bobbio. Petri nets generating Markov reward models for performance/reliability analysis of degradable systems. In R. Puigjaner and D. Poitier, editors, Modeling Techniques and Tools for Computer Performance Evaluation, pages 353–365. Plenum Press, 1989.
[10] T. Saha, K. Das, ‘Integration and Interrelation of Big data With Cloud Computing: A Review’, International
Journal of Computer Sciences and Engineering, Volume 5, Issue: 11, pp. 181-185, November, 2017.
Citation
R. Barik, K. Santara, R. Ghosh, P. Sarkar, "A Petri-Net Based Representation of Automated Railway Signalling System with Collision Avoidance," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.290-295, 2017.
The Complexity of Verification and Validation Testing in Component Based Software Engineering
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.296-300, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.296300
Abstract
There is a huge need of software professional to develop the better quality systems in rapid time to satisfy the customer needs. The component based technologies fulfil the achievement to make this possible. The modern systems have practically too complex behaviour. The complex systems developed with reusable components has many features such as lower costs and shortened development lifecycles. The component software development places the significant challenges like system integration and testing to build the software products. The verification and validation techniques are essential to ensure the software quality for component based producers. Accomplishing these techniques in the reusable component building is not a simple task. This paper focuses the various difficulties of these testing in various stages of component based software engineering.
Key-Words / Index Term
Requirement, Design, Construction, Deployment, Software Quality, Verification, Validation
References
[1] L.Pavlova, “Testability of Component Based and Service Oriented Systems”, Proceedings of 12 International Conference Automatics and Informatics, 2008.
[2] Ishita Verma, “Study of Component Based Software Engineering”, International Journal of Computer Science & Communication Volume V(3).2008.
[3] Ivica Crnkovic, et al, “ Component based development process and Component Life Cycles”, Journal of Computing and Information Technology, pp. 321-327, 2006.
[4]Henderson,P and Walters, “ Component-based Systems as an aid to Design Validation”, 14th IEEE International Conference on Automated Software Engineeiring , pp. 303-306, Oct, 1999.
[5] Abhikriti Narwal, “Empirical Evaluation or Metrics for Component based Software Systems”, International Journal of Latest Research in Science and Technology, Vol. 1, Issue. 4, pp. 373-378, Nov, 2012.
[6] Devis, G, “Strategies for Information Requirements Determination”, IBM system Journal, Vol. 21, No. 1, 1982.
[7] M. Barjktarovie, “Formal specification and Verification of Communication Protocols Using Automated Tools “, 1st IEEE International Conference on Engineering of Complex Systems, 1995.
[8] K. Sulllivan and J.C. Knight, “Experience Assessing an Architectural Approach to Large Scale Reuse”, 18th International Conference on Software Engineering, 1996.
[9] Vitharana, P, “Risks and Challenges of Component-Based Software Development”, Communication of the ACM, Vol. 46, Issue 8, pp. 67-72, 2003.
[10]. Christina Wallin, “Verification and Validation of Software Components and Component Based Software Systems”, Extended Report of Building Reliable Component-Based Systems, July 2012.
Citation
Jogannagari Malla Reddy, Kothuri Parashu Ramulu, "The Complexity of Verification and Validation Testing in Component Based Software Engineering," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.296-300, 2017.
A Comparative Study of Black Box Testing and White Box Testing
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.301-304, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.301304
Abstract
The most important and time consuming part of software development life cycle is Software testing. Its main purpose is to detect software faults and failures so that defects can be recovered and corrected in early phases of testing. Software Testing is a process of confirming that the product software that has been manufactured by programmers is a good quality product and also to assure that the product is working according to the specification that has been intended so that customer satisfaction can also be possible. In this paper, we have described and compared the two most important and commonly used software testing techniques for detecting errors, which are: Black Box Testing and White Box Testing.
Key-Words / Index Term
Software Testing, Black Box Testing, White Box Testing, Software Development Life Cycle (SDLC).
References
[1]. Mohd. Ehmer Khan, “Different Forms of Software Testing Techniques for Finding Errors,” IJCSI, Vol. 7, Issue 3, No 1, pp 11-16, May2010
[2]. Mohd. Ehmer Khan, “Different Approaches to Black Box Testing Technique for Finding Errors,” IJSEA, Vol. 2, No. 4, pp 31-40, October 2011
[3]. Shivkumar Hasmukhrai Trivedi, “Software Testing Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 10, October 2012, ISSN: 2277 128X
[4]. Anitha.A, “A Brief Overview of Software Testing Techniques and Metrics”, International Journal of Advanced Research in Computer and Communication Engineering,Vol. 2, Issue 12, December 2013, ISSN (Online) : 2278-102
[5]. Vineta Arnicane,” Complexity of Equivalence Class and Boundary Value Testing Methods”, Scientific Papers, University of Latvia, 2009. Vol. 751 Computer Science and Information Technologies 80–101
[6]. Ayman Madi, O. K. Z. a. S. K., 2013. “On the Improvement of Cyclomatic Complexity Metric.” International Journal of Software Engineering and Its Applications, 7(2).
[7]. Harsh Bhasin, E. K., 2014.” Black Box Testing based on Requirement Analysis and Design Specifications.” International Journal of Computer Applications, 87(18), pp. 0975-8887.
[8]. Khan, M. E., 2011. “Different Approaches to White Box Testing Technique for Finding Errors”. International Journal of Software Engineering and Its Applications, 5(3), p. 14.
[9]. Mohd. Ehmer Khan, F. K., 2012. “A Comparative Study of White Box, Black Box and Grey Box Testing Techniques”. International Journal of Advanced Computer Science and Applications, 3(6).
[10]. Trivedi, S. H., 2012. “Software Testing Techniques”. International Journal of Advanced Research in Computer Science and applications.
[11]. Ayman Madi, O. K. Z. a. S. K., 2013. “On the Improvement of Cyclomatic Complexity Metric”. International Journal of Software Engineering and Its Applications, 7(2).
[12]. Dondeti, S. N. a. J., 2012.” Black box and white box testing. International Journal of Embedded Systems and Applications”, 2(2).
[13]. Harsh Bhasin, E. K., 2014. “Black Box Testing based on Requirement Analysis and Design Specifications”. International Journal of Computer Applications, 87(18), pp. 0975-8887.
[14]. Khan, M. E., 2011. “Different Approaches to White Box Testing Technique for Finding Errors”. International Journal of Software Engineering and Its Applications, 5(3), p. 14.
[15]. Mohd. Ehmer Khan, F. K., 2012. “A Comparative Study of White Box, Black Box and Grey Box Testing Techniques”. International Journal of Advanced Computer Science and Applications, 3(6).
[16]. Trivedi, S. H., 2012. “Software Testing Techniques. International Journal of Advanced Research in Computer” Science and Software Engineering, 2(10).
[17]. Yeresime Suresh, S. K. R., 2013. “A Genetic Algorithm based Approach for Test Data Generationin Basis Path Testing.” The International Journal of Soft Computing and Software Engineering, 3(3).
[18]. Abhijit A. Sawant, P. H. B. a. P. M. C., 2012. “Software Testing Techniques and Strategies”. International Journal of Engineering Research and Applications, 2(3), pp. 980-986.
[19]. S.Maheswari, Dr.K.Chitra “Classification Of Software Testing And Their Techniques” International Conference on Current Research in Engineering Science and Technology(ICCREST- 2016) E-ISSN :2348 – 8387
Citation
Akanksha Verma, Amita Khatana, Sarika Chaudhary, "A Comparative Study of Black Box Testing and White Box Testing," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.301-304, 2017.
The Real Time Big Data Processing Framework: Advantages and Limitations
Review Paper | Journal Paper
Vol.5 , Issue.12 , pp.305-312, Dec-2017
CrossRef-DOI: https://doi.org/10.26438/ijcse/v5i12.305312
Abstract
Big data is a blanket term for the non-traditional strategies and technologies needed to gather, organize, process, and gather insights from large datasets. While the problem of working with data that exceeds the computing power or storage of a single computer is not new, the pervasiveness, scale, and value of this type of computing have greatly expanded in recent years. In this paper, we will take a look at one of the essential components of a big data system: processing frameworks. Processing frameworks compute over the data in the system, either by reading from non-volatile storage or as it is ingested into the system. Computing over data is the process of extracting information and insight from large quantities of individual data points.
Key-Words / Index Term
Big Data, Hadoop, HDFS, Spark, Storm, Flink, Samza
References
[1] A. Alexandrov, R. Bergmann, S. Ewen, J.-C. Freytag, F. Hueske, A. Heise, O. Kao, M. Leich, U. Leser, V. Markl, F. Naumann, M. Peters, A. Rheinlander, M. J. Sax, S. Schelter, M. Hoger, K. Tzoumas, and D. Warneke. The stratosphere platform for big data analytics. The VLDB Journal, 23(6):939-964, 2014.
[2] K. Shvachko, H. Kuang, S. Radia, and R. Chansler. The Hadoop Distributed File System. In IEEE MSST, 2010.
[3] S. Aridhi and E. M. Nguifo. Big graph mining: Frameworks and techniques. Big Data Research, 6:1-10, 2016.
[4] Y. Bu, B. Howe, M. Balazinska, and M. D. Ernst. The hadoop approach to large-scale iterative data analysis. The VLDB Journal, 21(2):169-190, Apr. 2012.
[5] P. Carbone, A. Katsifodimos, S. Ewen, V. Markl, S. Haridi, and K. Tzoumas. Apache inkTM: Stream and batch processing in a single engine. IEEE Data Eng. Bull., 38(4):28-38, 2015.
[6] J. Dean and S. Ghemawat. MapReduce: simpli_ed data processing on large clusters. Commun. ACM, 51(1):107-113, 2008.
[7] D. Eadline. Hadoop 2 Quick-Start Guide: Learn the Essentials of Big Data Computing in the Apache Hadoop 2 Ecosystem. Addison-Wesley Professional, 1st edition, 2015.
[8] B. Elser and A. Montresor. An evaluation study of bigdata frameworks for graph processing. In IEEE International Conference on Big Data, pages 60-67, 2013.
[9] A. Gandomi and M. Haider. Beyond the hype: Big data concepts, methods, and analytics. International Journal of Information Management, 35(2):137-144, 2015.
[10] R. Li, H. Hu, H. Li, Y. Wu, and J. Yang. Mapreduce parallel programming model: A state-of-the-art survey. International Journal of Parallel Programming, pages 1-35, 2015.
[11] X. Liu, N. Iftikhar, and X. Xie. Survey of real-time processing systems for big data. In Proceedings of the 18th International Database Engineering & Applications Symposium, pages 356-361. ACM, 2014.
[12] D. Singh and C. K. Reddy. A survey on platforms for big data analytics. Journal of Big Data, 2(1):8, 2014.
[13] M. Tatineni, X. Lu, D. Choi, A. Majumdar, and D. K. D. Panda. Experiences and bene_ts of running rdma hadoop and spark on sdsc comet. In Proceedings of the XSEDE16 Conference on Diversity, Big Data, and Science at Scale, XSEDE16, pages 23:1-23:5, New York, NY, USA, 2016. ACM.
[14] R. S. Xin, J. E. Gonzalez, M. J. Franklin, and I. Stoica. Graphx: A resilient distributed graph system on spark. In First International Workshop on Graph Data Management Experiences and Systems, GRADES `13, pages 2:1-2:6, New York, NY, USA, 2013. ACM.
Citation
Vairaprakash Gurusamy, S. Kannan, K. Nandhini, "The Real Time Big Data Processing Framework: Advantages and Limitations," International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.305-312, 2017.