Information Virality Prediction using Emotion Quotient of Tweets
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.642-651, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.642651
Abstract
Happiness travels quickly in comparison to sadness or disgust, but proliferation of anger and fear surpasses them all. This defines the bottom-line of information virality on social media. Pertinent psychological studies convey that human emotions may be ‘activated’ or ‘deactivated’ to drive people to take action. Based on this, we propose the use of cognitive behavioural features to assess the virality of information in tweets by finding a dominant emotion of same type across tweets as an indicator of viral spread. Fluctuations in emotions convey uncertainty and may reduce the frequency and intensity of discussion of a trending topic. The proposed virality prediction framework detects the emotion quotient (EQ), a measure of emotional intensity associated with five emotions, namely, fear, disgust, sadness, anger, and happiness for the exposed information in tweets to predict its outburst, i.e., virality, pertaining to social and political issues. The hybrid (lexicon + supervised learning) approach using parts-of-speech (adjectives, adverbs, verbs, emoticons) is proffered to transform the tweet into an emotional vector representative of the sentimental value for a trending topic. This emotional quantifier is then used as an empirical evidence to determine the likelihood of information going viral based on the strength of emotion in tweets and its no. of re-tweets. Preliminary results clearly demonstrate the effectiveness of the approach which affirms information virality.
Key-Words / Index Term
Viral, Twitter, Emotion
References
[1]. Social Media Statistics: http://www.statista.com
[2]. Twitter: http://www.twitter.com
[3]. A. Kumar, T. M. Sebastian, “Sentiment Analysis on Twitter”, IJCSI International Journal of Computer Science, Issue 9, No. 3 pp. 372–378, 2012.
[4]. A. Kumar, P. Dogra, V. Dabas, “Emotion Analysis Of Twitter Using Opinion Mining”, In Contemporary Computing (IC3), 2015 Eighth International Conference on, pp. 285-290, IEEE, 2015.
[5]. C. Nanda, M. Dua, “A Survey on Sentiment Analysis”, International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.2, pp.67-70, 2017.
[6]. L.Weng, F. Menczer, Y. Ahn, “Virality Prediction and Community Structure in Social Networks”, Nature Scientific Report, Vol. 3, Article no.2522, 2013.
[7]. T.A. Hoang, E.P.Lim, P. Achananuparp, J. Jiang, F. Zhu, “On Modeling Virality of Twitter Content”, In International Conference on Asian Digital Libraries . Springer, Berlin, Heidelberg, pp. 212-221, 2011.
[8]. J. Berger, K. Milkman, “Social transmission, emotion, and the virality of online content” Wharton Research Paper, 2010
[9]. L.K. Hansen, A. Arvidsson, F.A. Nielsen, E. Colleoni, M. Etter, “Good friends, bad news — affect and virality in Twitter” In Future information technology Springer, Berlin, Heidelberg, pp. 34-43, 2011.
[10]. D. Derks, A. E. Bos, J. V. Grumbkow, “Emoticons and social interaction on the internet: the importance of social context” Computers in Human Behavior, Vol.23, No.1, pp.842–849, 2007.
[11]. WordNet, A Lexical Database for English: https://wordnet.princeton.edu/.
[12]. A. Kumar , A. Jaiswal, “Empirical Study of Twitter and Tumblr for Sentiment Analysis using Soft Computing Techniques”, In Proceedings of the World Congress on Engineering and Computer Science 2017, Vol. 1, pp. 1-5, 2017.
[13]. MPS. Bhatia, A. Kumar, “A Primer on the Web Information Retrieval Paradigm”, Journal of Theoretical and Applied Information Technology (JATIT), Vol. 4, No.7, pp. 657-662, 2008.
Citation
A. Kumar, S.R. Sangwan, "Information Virality Prediction using Emotion Quotient of Tweets," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.642-651, 2018.
A Survey on Interactive Clothing Based on IoT using QR code and Mobile Application
Survey Paper | Journal Paper
Vol.6 , Issue.6 , pp.652-654, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.652654
Abstract
The invention of Internet has made the day-to-day life easy and less complicated. The proposed system is called Interactive clothes that make use of QR code and IoT. A QR code is embedded within the clothes that consist of a unique Id. A mobile application is developed that scans the QR code present in the cloth and gets linked to a database stored in a cloud database. It provides a digital environment for both the manufacturers and the end users. From manufacturing perspective, the system has the ability to identify fake brands, keep track of the loyal customers, and minimize the resources waste and keeping track of the goods using a single relational database system. For end users, the benefits are huge. The mobile application(Personal Stylist) provides a simple user interface where users could get suggestions regarding their clothes with other outfits, dressing according to the season and deciding whether the color suits their skin tone or not.
Key-Words / Index Term
Cloud database, IoT, Mobile application, QRcode, Relational database system
References
[1] Xiao-song Hu, Li-ling Jiang , Rui Cheng , Tie-jun Wang , Qing Li, “A probabilistic clothes recommender based on cloth features”, School of Economic Information Engineering, Southwestern University of Finance and Economics, Chengdu 611130, China, August 2014.
[2] Poorva Parkhi, Snehal Thakur, Sonakshi Chauhan, “RFID based parking management system”, Department of Computer Engineering, Sinhgad Academy of Engineering, Pune, India, February 2014.
[3] Jia Ning Luo, Ming-Hour Yang , Ming Chein Yang, “An anonymous car rental system based on NFC”.
[4] Weibing Chen, Gaobo Yang, and Ganglin Zhang, “A Simple and Efficient Image Pre-processing for QR Decoder” Dept.of Electrics Communication Engineering, Changsha University, Changsha Hunan.
[5] Teuta Cata, Payal S. Patel and Toru Sakaguchi “QR Code: A New Opportunity for Effective Mobile Marketing” Northern Kentucky University, Highland Heights, KY 41099, USA.
[6] Lefayet, Sultan, Lipol “Quick Response in the Textile Industries” International Journal of Scientific and Research Publications, Volume 5.
[7] Deepthi, Pradyumna G.R “Comparison of MD5 and Blowfish Algorithm” NMAM Institute of Technology, Nitte, Udupi, Karnataka, India.
Citation
Prasad Mutkule, Malakappa Ankoshe, "A Survey on Interactive Clothing Based on IoT using QR code and Mobile Application," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.652-654, 2018.
Analyzing the usage of website evaluation methods – an actor based approach
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.655-669, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.655669
Abstract
In recent era, websites are the ultimate media for getting information, advertisement of organizations, shopping, entertainment, education, as well as social contacts. But a website must possess a high quality to provide success to organizers as well as to satisfy the users. The academicians proposed a lot of website evaluation models which has been designed by taking a variety of approaches and methods. To evaluate the website, one needs knowledge about the diversity in website evaluation approaches and methods to be followed. This paper highlights the ethics involved in the application of prominent website evaluation methods by conducting an in-depth study of reputed research papers from large databases such as IEEE, Springer, ACM and Taylor & Francis publications. Website methods have been classified on the basis of actors involved in the evaluation. Analysis of the usage of these methods in previous website evaluation studies has been accomplished which concludes that the majority of evaluation studies relied upon user based evaluation methods. It is recommended that there should be more orientation towards the automated evaluation methods as it is free from human biasing and can be exercised when the website just completed the design phase to predict the quality of the website. Due to summarization of major website evaluation methods, the paper has massive value for academicians as well as industry readership in the discipline of website evaluation.
Key-Words / Index Term
Website evaluation, Evaluation methods, Website quality, Website assessment
References
[1] H. Achour, N. Bensedrine, “An evaluation of internet banking and online brokerage in Tunisia”, In Proceedings of the 1st International Conference on E-Business and E-learning (EBEL), Amman, Jordan, pp. 147-158, 2005.
[2] A. P. Afonso, J. R. Lima, M. P. Cota, “A heuristic evaluation of usability of Web interfaces”, In Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, pp.1-6, IEEE, June 2006.
[3] J. Alhelalat, E. M. Ineson, T. Jung, K. Evans, “The Evaluation of Hotel Websites’ Quality, Usability and Benefits: Developing a Testing Model”, In Proceedings of Euro-CHRIE Conference, 2008.
[4] M. Alomari, P. Woods, K. Sandhu, “Predictors for e-government adoption in Jordan: Deployment of an empirical evaluation based on a citizen-centric approach”, Information Technology and People, Vol.25, Issue.2, pp.207-234, 2012.
[5] R. Ali, M. S. Beg, “An overview of Web search evaluation methods”, Computers & Electrical Engineering, Vol.37, Issue.66, pp.835-848, 2011.
[6] I. Alsmadi, A.T. Al-Taani, N.A. Zaid, “Web structural metrics evaluation”, In Developments in E-systems Engineering (DESE), pp.225-230, IEEE, September 2010.
[7] M. Asmaran, “Quantitative and Qualitative Evaluation of Three Search Engines (Google, Yahoo, and Bing)”, American Scientific Research Journal for Engineering, Technology, and Sciences (ASRJETS), Vol.26, Issue.2, pp.97-106, 2012.
[8] B. Bakariya, G.S. Thakur, "Effectuation of Web Log Preprocessing and Page Access Frequency using Web Usage Mining", International Journal of Computer Sciences and Engineering, Vol.1, Issue.1, pp.1-5, 2013.
[9] S. Baloglu, Y.A. Pekcan, “The website design and Internet site marketing practices of upscale and luxury hotels in Turkey”, Tourism management, Vol.27, Issue.1, pp.171-176, 2006.
[10] S.J. Barnes, R.T. Vidgen, “An integrative approach to the assessment of e-commerce quality”, J. Electron. Commerce Res., Vol.3, Issue.3, pp.114-127, 2002.
[11] S.J. Barnes, R. Vidgen, “Interactive e-government: evaluating the web site of the UK Inland Revenue”, Journal of Electronic Commerce in Organizations (JECO), Vol.2, Issue.1, pp.42-63, 2004.
[12] S.J. Barnes, R. T. Vidgen, “Data triangulation and web quality metrics: A case study in e-government”, Information and Management, Vol.43, Issue.6, pp.767-777, 2006.
[13] U. Bastida, T.C. Huan, “Performance evaluation of tourism websites` information quality of four global destination brands: Beijing, Hong Kong, Shanghai, and Taipei”, Journal of Business Research, Vol.67, Issue.2, pp.167-170, 2014.
[14] H.H. Bauer, M. Hammerschmidt, T. Falk, “Measuring the quality of e-banking portals”, International journal of bank marketing, Vol.23, Issue.2, pp.153-175, 2005.
[15] U. Bauernfeind, N. Mitsche, “The application of the data envelopment analysis for tourism website evaluation”, Information Technology and Tourism, Vol.10, Issue.3, pp.245-257, 2008.
[16] F. Can, R. Nuray, A. B. Sevdik, “ Automatic performance evaluation of Web search engines”, Information processing & management, Vol.40, Issue.3, pp.495-514, 2004.
[17] S. Cebi, “Determining importance degrees of website design parameters based on interactions and types of websites”, Decision Support Systems, Vol.54, Issue.2, pp.1030-1043, 2013a.
[18] S. Cebi, “A quality evaluation model for the design quality of online shopping websites”, Electronic Commerce Research and Applications, Vol.12, Issue.2, pp.124-135, 2013b.
[19] S.C. Chiemeke, A.E. Evwiekpaefe, F.O. Chete, “The adoption of Internet banking in Nigeria: An empirical investigation”, Journal of Internet Banking and Commerce, Vol.11,Issue.3, pp.1-10, 2006.
[20] K.C. Chinthakayala, C. Zhao, J. Kong, “A comparative study of three social networking websites’, World Wide Web, Vol.17, Issue.6, pp.1233-1259, 2014.
[21] W.C. Chiou, C.C. Lin, C. Perng, “A strategic framework for website evaluation based on a review of the literature from 1995–2006”, Information and management, Vol.47, Issue.5, pp.282-290, 2010.
[22] W.C. Chiou, C.C. Lin, C. Perng, “A strategic website evaluation of online travel agencies”, Tourism Management, Vol.32, Issue.6, pp.1463-1473, 2011.
[23] W. Chmielarz, M. Zborowski, “Comparative Analysis of Electronic Banking Websites in Poland in 2014 and 2015”, In Information Technology for Management, pp.147-161, 2016, Springer International Publishing.
[24] S.C. Chu, Y. Kim, “Determinants of consumer engagement in electronic word-of-mouth (eWOM) in social networking sites”, International journal of Advertising, Vol.30, Issue.1, pp.47-75, 2011.
[25] W. Chung, J. Paynter, “An evaluation of Internet banking in New Zealand”, In System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on, pp. 2410-2419, IEEE, 2002, January.
[26] B. Clifton, “Advanced Web Metrics with Google Analytics”, Wiley Publishing, Inc, 2008.
[27] M.A. Corigliano, R. Baggio, “On the significance of tourism website evaluations”, Information and Communication Technologies in Tourism 2006, pp.320-331, 2006.
[28] F.S. Effendi, I. Alfina, “Quality evaluation of airline`s e-commerce website, a case study of AirAsia and Lion Air websites”, In Advanced Computer Science and Information Systems (ICACSIS), International Conference on 2014, pp.125-128, IEEE, Oct 18, 2014.
[29] N. Elkhani, S. Soltani, A. Bakri, “An Effective Model for Evaluating Website Quality Considering Customer Satisfaction and Loyalty: Evidence of Airline Websites”, IJCSI International Journal of Computer Science Issues, Vol.10, Issue.2, pp.109-117, 2013.
[30] A. Ellahi, R.H. Bokhari, “Key quality factors affecting users` perception of social networking websites”, Journal of Retailing and Consumer Services, Vol.20, Issue.1, pp.120-129, 2013.
[31] S. Goodwin, “Using screen capture software for website usability and redesign buy-in”, Library Hi Tech, Vol.23, Issue.4, 2005.
[32] I.J. Gabriel, “Usability metrics for measuring usability of business-to-consumer (b2c) e-commerce sites”, In Proceedings of the 6th Annual ISOnEworld Conference, Las Vegas, NV, pp.74.1-74.19, April 11-13, 2007.
[33] A. Garcia, C. Maciel, F. Pinto, “A quality inspection method to evaluate e-government sites”, Electronic government, pp.198-209, 2005.
[34] W. Gray, C. Salzman, “Damaged merchandise? a review of experiments that compare usability evaluation methods”, Human-Computer Interaction, Vol.13, pp.203-261, 1998.
[35] J.A. Greene, N.K. Choudhry, E. Kilabuk, W.H. Shrank, “Online social networking by patients with diabetes: a qualitative evaluation of communication with Facebook”, Journal of general internal medicine, Vol.26, Issue.3, pp 287-292, 2011.
[36] M. Grimsley, A. Meehan, “e-Government information systems: Evaluation-led design for public value and client trust”, European Journal of Information Systems, Vol.16, Issue.2, pp.134-148, 2007.
[37] S. Gullikson, R. Blades, M. Bragdon, “The impact of information architecture on academic web site usability”, The Electronic Library, Vol.17, Issue.5, pp.293-304, 1999.
[38] L. Hasan, E. Abuelrub, “Assessing the quality of web sites”, Applied Computing and Informatics, Vol.9, Issue.1, pp.11-29, 2011.
[39] A. Henriksson, Y. Yi, B. Frost, M. Middleton, “Evaluation instrument for e-government websites”, Electronic Government, Vol.4, Issue.2, pp.204-226, 2007.
[40] T. Hollingsed, D. Novick, “Usability inspection methods after 15 years of research and practice”, In SIGDOC `07: Proceedings of the 25th annual ACM international conference on design of communication, pp.249-255, New York, NY, USA, 2007.ACM.
[41] A. Holzinger, “Usability engineering methods for software developers”, Communications of the ACM, Vol.48, Issue.1, 2005.
[42] A. Howitt, S. Clement, S. de Lusignan, “An evaluation of general practice websites in the UK”, Family Practice, Vol.19, Issue 5, pp.547-556, 2002.
[43] Y.C. Hu, “ Fuzzy multiple-criteria decision making in the determination of critical criteria for assessing service quality of travel websites”, Expert Systems with Applications, Vol.36, Issue.3, pp.6439-6445, 2009.
[44] G.J. Huang, T.C. Huang, J.C. Tseng, “A group-decision approach for evaluating educational web sites”, Computers and Education, Vol.42, Issue.1, pp.65-86, 2004.
[45] C. Ip, R. Law, H.A. Lee, “A review of website evaluation studies in the tourism and hospitality fields from 1996 to 2009”, International Journal of Tourism Research, Vol.13, Issue.3, pp.234-265, 2011.
[46] H. Jati, D.D. Dominic, “Quality evaluation of e-government website using web diagnostic tools: Asian case”, In Information Management and Engineering, 2009. ICIME`09. International Conference on, pp.85-89, IEEE, April 2009.
[47] S. Joo, S. Lin, K. Lu, “A usability evaluation model for academic library websites: efficiency, effectiveness and learnability”, Journal of Library and Information studies, Vol.9, Issue.2, pp.11-26, 2011.
[48] A. Kaur, D. Dani, “The Web Navigability Structure of E-Banking in India”, International Journal of Information Technology and Computer Science (IJITCS), Vol.5, Issue.4, pp.29-37, 2013.
[49] S. Kaur, S.K. Gupta, “A Systematic Review of Realistic Methods and Approaches for Evaluation of Website”, International Journal of Computer Sciences and Engineering, Vol.6, Issue.2, 2018.
[50] A. Kaushik, “Web analytics, an hour a day”, Wiley Publishing, Inc, 2007.
[51] A. Keenan, A. Shiri, “Sociability and social interaction on social networking websites”, Library Review, Vol.58, Issue.6, pp.438-450, 2009.
[52] T. Kincl, P. Štrach, “Measuring website quality: asymmetric effect of user satisfaction”, Behaviour and Information Technology, Vol.31, Issue.7, pp.647-657, 2012.
[53] H. Korda, Z. Itani, “Harnessing social media for health promotion and behavior change”, Health promotion practice, Vol.14, Issue.1, pp.15-23, 2013.
[54] L. Kumar, N. Kumar, “SEO technique for a website and its effectiveness in context of Google search engine”, International Journal of Computer Sciences and Engineering, Vol. 2, Issue.6, pp.113-118, 2014.
[55] R. Law, S. Qi, D. Buhalis, “Progress in tourism management: A review of website evaluation in tourism research”, Tourism management, Vol.31, Issue.3, pp.297-313, 2010.
[56] J. Lazar, “Web usability: a user-centered design approach”, Pearson/Addison-Wesley, 2006.
[57] B. Lilburne, D. Prajwol, K.M. Khan, M. Khosrowpour, “Measuring quality metrics for web applications”, In Proceedings of the 15th Information Resources Management Association International Conference, held in New Orleans, USA, 23-26 May, 2004.
[58] K.Y. Lin, H.P. Lu, “Why people use social networking sites: An empirical study integrating network externalities and motivation theory”, Computers in human behavior, Vol.27, Issue.3, pp.1152-1161, 2011.
[59] P. Lorca, J. de Andrés, A.B. Martínez, “Does Web accessibility differ among banks?”, World Wide Web, Vol.19, Issue.3, pp.351, 2016.
[60] J. Lu, Z. Lu, “Development, distribution and evaluation of online tourism services in China”, Electronic Commerce Research, Vol.4, Issue.3, pp.221-239, 2004.
[61] Y. Lu, Z. Deng, B. Wang, “Analysis and evaluation of tourism e-commerce websites in China”, International Journal of Services, Economics and Management, Vol.1, Issue.1, pp.6-23, 2007.
[62] R. Malhotra, A. Sharma, “A neuro-fuzzy classifier for website quality prediction”, In Advances in Computing, Communications and Informatics (ICACCI), 2013 International Conference on, pp.1274-1279, IEEE, August 2013.
[63] E.N. Martins, L.S. Morse, “Evaluation of internet websites about retinopathy of prematurity patient education”, British journal of ophthalmology, Vol.89, Issue.5, pp.565-568, 2005.
[64] S. Mavromoustakos, A.S. Andreou, “WAQE: a web application quality evaluation model”, International Journal of web engineering and technology, Vol.3, Issue.1, pp.96-120, 2006.
[65] L. Mich, “Evaluating website quality by addressing quality gaps: a modular process”, In Software Science, Technology and Engineering (SWSTE), 2014 IEEE International Conference on, pp.42-49, IEEE, June 2014.
[66] L. Mich, M. Franch, G. Cilione, “The 2QCV3Q Quality Model for the Analysiy of Web site Requirements”, J. Web Eng., Vol.2, Issue.1-2, pp.115-127, 2003a.
[67] L. Mich, M. Franch, L. Gaio, “Evaluating and designing web site quality”, IEEE MultiMedia, Vol.10, Issue.1, pp.34-43, 2003b.
[68] L. Mich, M. Franch, “Un approccio multi-step per la valutazione dell’usabilità del sito web di una destinazione turistica”, Atti di: SIMKTG Il marketing dei talenti: Marketing e Tecnologia, pp.24-25, 2007.
[69] F. J. Miranda, R. Cortés, C. Barriuso, “Quantitative evaluation of e-banking web sites: An empirical study of Spanish banks”, Electronic Journal of Information Systems Evaluation, Vol.9, Issue.2, 2006.
[70] B. Mobasher, R. Cooley, R., J. Srivastava, “Automatic personalization based on web usage mining”, Communications of the ACM, Vol.43, Issue.8, pp.142-151, 2000.
[71] J.M. Moreno, J.M., Del Castillo, C. Porcel, E. Herrera-Viedma, “A quality evaluation methodology for health-related websites based on a 2-tuple fuzzy linguistic approach”, Soft Computing, Vol.14, Issue.8, pp.887-897, 2010.
[72] A.M. Morrison, J.S. Taylor, A. Douglas, “Website evaluation in tourism and hospitality: the art is not yet stated”, Journal of Travel and Tourism Marketing, Vol.17, Issue.2-3, pp.233-251, 2005.
[73] B.L. Neiger, R. Thackeray, S.A. Van Wagenen, C.L. Hanson, J.H. West, M.D. Barnes, M.C. Fagen, “Use of social media in health promotion: purposes, key performance indicators, and evaluation metrics”, Health promotion practice, Vol.13, Issue.2, pp.159-164, 2012.
[74] J. Nielsen, “Usability engineering”, London: Academic Press, 1993.
[75] J. Nielsen, R.L. Mack, “Usability Inspection Methods”, John Wiley & Sons. New York, 1994.
[76] J. Nielsen, R. Molich, “Heuristic evaluation of user interfaces”, Telemedicine journal and ehealth the official journal of the American Telemedicine Association, Vol.17, pp.249–256, 1990.
[77] L. Olsina, G. Rossi, “A quantitative method for quality evaluation of web sites and applications”, IEEE multimedia, Vol.9, Issue.4, pp.20-29, 2002.
[78] T. Orehovački, A. Granić, D. Kermek, “Evaluating the perceived and estimated quality in use of Web 2.0 applications”, Journal of Systems and Software, Vol.86, Issue.12, pp.3039-3059, 2013.
[79] X. Papadomichelaki, G. Mentzas, “A multiple-item scale for assessing e-government service quality”, In International Conference on Electronic Government, pp.163-175, Springer, Berlin, Heidelberg, August 2009.
[80] A. Parasuraman, V.A. Zeithaml, A. Malhotra, “ES-QUAL: A multiple-item scale for assessing electronic service quality”, Journal of service research, Vol.7, Issue.3, pp.213-233, 2005.
[81] E. Peterson, “Web analytics demystified”, Celilo Group Media and CafePress, 2004.
[82] F.R. Pérez-López, “An evaluation of the contents and quality of menopause information on the World Wide Web”, Maturitas, Vol.49, Issue.4, pp.276-282, 2004.
[83] V. Petricek, T. Escher, I.J. Cox, H. Margetts, “The web structure of e-government-developing a methodology for quantitative evaluation”, In Proceedings of the 15th international conference on World Wide Web, pp.669-678, ACM, May 2006.
[84] P.G. Polson, C. Lewis, J. Rieman, C. Wharton, “Cognitive walkthroughs: a method for theory-based evaluation of user interfaces”, International Journal of man-machine studies, Vol.36, Issue.5, pp.741-773, 1992.
[85] L. Pranić, D. Garbin Praničević, J. Arnerić, “Hotel website performance: evidence from a transition country”, Tourism and hospitality management, Vol.20, Issue.1, pp.45-60, 2014.
[86] S. Qi, C. Ip, R. Leung, R. Law, “A new framework on website evaluation”, In E-Business and E-Government (ICEE), 2010 International Conference on, pp.78-81. IEEE. 2010, May.
[87] A. Rocha, “Framework for a global quality evaluation of a website”, Online Information Review, Vol.36, Issue.3, pp.374-382, 2012.
[88] A.M. Santos, “Theoretical-Methodological proposal to evaluate the quality of educational websites to support education”, In Proceedings of the 3rd International Conference on Technological Ecosystems for Enhancing Multiculturality, pp.397-401. ACM, October 2015.
[89] H. Sadeghi, “Automatic performance evaluation of web search engines using judgments of metasearch engines”, Online Information Review, Vol.35, Issue.6, pp.957-971, 2011.
[90] A. Sen, P.A. Dacin, C. Pattichis, “Current trends in web data analysis”, Communications of the ACM, Vol.49, Issue.11, 2006.
[91] H. Sharp, Y. Rogers, J. Preece, “Interaction Design: Beyond Human-Computer Interaction”, Wiley, Second Edition, 2007.
[92] K. Schäfer, T.F. Kummer, “Determining the performance of website-based relationship marketing”, Expert Systems with Applications, Vol.40, Issue.18, pp.7571-7578, 2013.
[93] C. Shchiglik, S.J. Barnes, “Evaluating website quality in the airline industry”, Journal of Computer Information Systems, Vol.44, Issue.3, pp.17-25, 2014.
[94] K. Silius, M. Kailanto, A.M. Tervakari, “Evaluating the quality of social media in an educational context”, In Global Engineering Education Conference (EDUCON) 2011 IEEE, pp.505-510, IEEE, April 2011.
[95] A. Sivaji, A. Abdullah, A.G. Downe, “Usability testing methodology: Effectiveness of heuristic evaluation in E-government website development”, In Modelling Symposium (AMS), 2011 Fifth Asia, pp.68-72, IEEE, May 2011.
[96] R. Spencer, “The streamlined cognitive walkthrough method, working around social constraints encountered in a software development company”, CHI 2000 Proceedings, Vol.2, Issue.1, pp.353–359, 2000.
[97] M. Spiliopoulou, “Web usage mining for web site evaluation”, Communications of the ACM, Vol.43, Issue.8, pp.127–134, 2000.
[98] J. Srivastava, R. Cooley, M. Deshpande, P.N. Tan, “Web usage mining: Discovery and applications of usage patterns from web data”, Acm Sigkdd Explorations Newsletter, Vol.1, Issue.2, pp.12-23, 2000.
[99] R. Shrivastva, S. Mewad, P. Sharma, “An Approach to Give First Rank for Website and Webpage Through SEO”, International Journal of Computer Sciences and Engineering, Vol. 2, Issue.4, pp.13-17, 2014.
[100] A. Stefani, M. Xenos, “E-commerce system quality assessment using a model based on ISO 9126 and Belief Networks”, Software Quality Journal, Vol.16, Issue.1, pp.107-129, 2008.
[101] C.C. Sun, G.T. Lin, “Using fuzzy TOPSIS method for evaluating the competitive advantages of shopping websites”, Expert Systems with Applications, Vol.36, Issue.9, pp.11764-11771, 2009.
[102] D.D.J. Suwawi, E. Darwiyanto, M. Rochmani, “Evaluation of academic website using ISO/IEC 9126”, In Information and Communication Technology (ICoICT), 2015 3rd International Conference on, pp.222-227, IEEE, May 2015.
[103] M. Tate, J. Evermann, B. Hope, S. Barnes, “Perceived service quality in a university web portal: revising the e-qual instrument”, In System Sciences, 2007. HICSS 2007. 40th Annual Hawaii International Conference on, pp.147b-156b, IEEE, January 2007.
[104] M.C.S. Torrente, A.B.M. Prieto, D.A. GutiéRrez, M.E.A. De Sagastegui, “Sirius: A heuristic-based framework for measuring web usability adapted to the type of website”, Journal of Systems and Software, Vol.86, Issue.3, pp.649-663, 2013.
[105] W.H. Tsai, W.C. Chou, J.D. Leu, “An effectiveness evaluation model for the web-based marketing of the airline industry”, Expert Systems with Applications, Vol.38, Issue.12, pp.15499-15516, 2011.
[106] L. Vaughan, “New measurements for search engine evaluation proposed and tested”, Information Processing and Management, Vol.40,Issue.4, pp.677-691, 2004.
[107] L. Vaughan, M. Thelwall, “Search engine coverage bias: evidence and possible causes”, Information processing & management, Vol.40, Issue.4, pp.693-707, 2004.
[108] P. Verdegem, G. Verleye, “User-centered E-Government in practice:: A comprehensive model for measuring user satisfaction”, Government information quarterly, Vol.26, Issue.3, pp 487-497, 2009.
[109] C.S. Weir, “Investigating the relationship between usability, preferences and usage intentions when banking online”, A thesis submitted for the Degree of Doctor of Philosophy, The University of Edinburgh, 2008.
[110] D. Wenham, P. Zaphiris, “User interface evaluation methods for internet banking web sites: a review, evaluation and case study”, Human-computer interaction, theory and practice, pp.721-725, 2003.
[111] C. Wharton, J. Rieman, C. Lewis, P. Polson, “The cognitive walkthrough method: a practitioner`s guide”, In Nielsen, J., and Mack, R. L. (Eds.), Usability inspection methods, pp.105-140, New York, NY: John Wiley & Sons, 1994.
[112] B. Yen, P.J.H. Hu, M. Wang, “Toward an analytical approach for effective Web site design: A framework for modeling, evaluation and enhancement”, Electronic Commerce Research and Applications, Vol.6, Issue.2, pp.159-170, 2007.
[113] B. Yoo, N. Donthu, “Developing a scale to measure the perceived quality of an Internet shopping site (SITEQUAL)”, Quarterly journal of electronic commerce, Vol.2, Issue.1, pp.31-45, 2001.
[114] C. Zafiropoulos, V. Vrana, “A framework for the evaluation of hotel websites: The case of Greece”, Information Technology and Tourism, Vol.8, Issue.3-1, pp.239-254, 2006.
[115] Q. Zhang, R.S. Segall, “Web mining: a survey of current research, techniques, and software”, International Journal of Information Technology & Decision Making, Vol.7, Issue.4, pp.683-720, 2008.
[116] B. Zhao, Y. Cheng, “Research on B2C e-commerce website service quality evaluation based on analytic hierarchy process”, In Information Science and Technology (ICIST), 4th IEEE International Conference on 2014, pp.364-367, IEEE, Apr 26 2014.
[117] Y. Zhu, “Integrating external data from web sources into a data warehouse for OLAP and decision making”, Shaker Verlag, 2004.
[118] E. Mendes, N. Mosley, (Eds.). Web engineering. Springer Science & Business Media, 2006.
[119] S.H. Kan, Metrics and Models in Software Quality Engineering, Second ed.: Addison Wesley, 2003.
[120] G. Büyüközkan, D. Ruan, O. Feyzioğlu, “Evaluating e‐learning web site quality in a fuzzy environment”, International Journal of Intelligent Systems, Vol.22, Issue 5, pp.567-586, 2007.
Citation
S. Kaur, S.K. Gupta, "Analyzing the usage of website evaluation methods – an actor based approach," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.655-669, 2018.
A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.670-681, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.670681
Abstract
Cloud is the Internet based computing that provides resources on-demand. This has become an attractive solution to data owners as the can outsource data and computing. There is potential risk in terms of security and privacy of the outsourced data as the cloud servers are treated untrusted. In this context, there are two security mechanisms that are widely used. They are known as cryptography and steganography. The cryptography converts data into some format that cannot be comprehended by humans while the steganography hides the presence of a message (may be encrypted one) in an image or any digital media. If both are used independently they have their own limitations. When both are combined, it forms a realizable mechanism with both security and secrecy. Thus, the Crypto-steganography is the approach that overcomes the limitations of individual mechanisms as it proves to be difficult to adversaries to launch attacks. In this paper an LSB substitution method and quadruple efficient image encryption method are used to secure sensitive messages when they are outsourced to public cloud. We built a prototype application to show the utility of the proposed hybrid method. The results revealed that the proposed is capable of increasing security to the data outsourced to public cloud.
Key-Words / Index Term
Cloud computing, cryptography, steganography, crypto-steganography
References
[1] M.Y. Wu, M.C. Yu, J.S. Leu, and S.K. Chen, "Improving security and privacy of images on cloud storage by histogram shifting and secret sharing," Proceedings of the 83th IEEE Vehicular Technology Conference, Nanjing China, pp. 1-5, May 2016.
[2] H. Reza, and M. Sonawane, "Enhancing mobile cloud computing security using steganography," Journal of Information Security, Vol. 7, No. 4, pp. 245-259, July 2016.
[3] J. Stone, "Reddit Fappening ban triggers outraged response from nude photo distributor," International Business Times, September 2014. (http://www.ibtimes.com/reddit-fappening-ban-triggers-outragedresponse-nude-photo-distributor-1681708)
[4] T. Gopalakrishnan, and S. Ramakrishnan, "Image encryption in blockwise with multiple chaotic maps for permutation and diffusion," ICTAT Journal on Image and Video Processing, Vol. 6, No. 3, pp. 1220-1227, February 2016.
[5] S.S. Dharwadkar, and R.M. Jogdand, "A user identity management protocol using efficient dynamic credentials," International Journal of Scientific Engineering and Research, Vol. 2, pp. 42-47, June 2014.
[6] M.G. Charate, and S.R. Bhosale, "Cloud computing security using Shamir’s secret sharing algorithm from single cloud to multi cloud," International Journal of Advanced Technology in Engineering and Science, Vol. 3, pp. 349-357, April 2015.
[7] K.S. Seethalakshmi, Usha. B, Sangeetha. K. N, “Security Enhancement in Image Steganography Using Neural Networks and Visual Cryptography”, IEEE Int. Conf.Computation System and Information Technology for Sustainable Solutions (CSITSS), 2016.
[8] SadafBukhari, Muhammad ShoaibArif, M.R. Anjum, and SamiaDilbar, “Enhancing security of images by Steganography and Cryptography techniques”, IEEE Int. Conf. Innovative Computing Technology (INTECH), 2016.
[9] Ria Das, Indrajit Das, “Secure Data Transfer in IoT environment: adopting both Cryptography and Steganography techniques”, IEEE Int. Conf. on Research in Computational Intelligence and Communication Networks (ICRCICN), 2016.
[10] AnkitGambhir and SibaramKhara, “Integrating RSA Cryptography & Audio Steganography”, IEEE ICCCA, 2016.
[11] Kamaldeep Joshi, RajkumarYadav, “A New LSB-S Image Steganography Method Blend with Cryptography for Secret Communication”, IEEE ICIIP, 2015.
[12] Vipul Shanna and Madhusudan “Two New Approaches for Image Steganography Using Cryptography” IEEE Int. Conf. Image Information Processing, 2015.
[13] MoreshMukhedkar, PrajktaPowar and Peter Gaikwad, “Secure non real time image encryption algorithm development using cryptography & Steganography”, IEEE INDICON, 2015.
[14] RiniIndrayani, HanungAdiNugroho, RisanuriHidayat, IrfanPratama, “Increasing the Security of MP3 Steganography Using AES Encryption and MD5 Hash Function”, International Conference on Science and Technology-Computer (ICST), IEEE, 2016.
[15] Nikhil Patel, ShwetaMeena, “LSB Based Image Steganography Using Dynamic Key Cryptography”, International Conference on Emerging Trends in Communication Technologies (ETCT), 2016.
[16] Dan Gonzales, Jeremy M. Kaplan, Evan Saltzman, Zev Winkelman, And Dulani Woods, “Triple Security Of File System For Cloud Computing,” Ieee Transactions On Cloud Computing. 5 (3), P1-14, 2017.
[17] Mark Stieninger, Dietmar Nedbal, Werner Wetzlinger, Gerold Wagner And Michael A. Erskine, “Factors Influencing The Organizational Adoption Of Cloud Computing: A Survey Among Cloud Workers,” International Journal Of Information Systems And Project Management. 6 (1), P1-19, 2018.
[18] G. Preethi And N.P.Gopalan, “Data Embedding Into Image Encryption Using The Symmetric Key For Rdh In Cloud Storage,” International Journal Of Applied Engineering Research. 13, P3861-3866, 2018.
[19] C. Kaleeswari, P. Maheswari, Dr. K. Kuppusamy, Dr. Mahalakshmi Jeyabalu, “A Brief Review On Cloud Security Scenarios,” Ijsrst. 4 (5), P1-6, 2018.
[20] Zheng Yan,Robert H. Deng And Vijay Varadharajan, “Cryptography And Data Security In Cloud Computing,” Ieee, P1-5, 2017.
[21]Swapnil Rajesh Telrandhe And Deepak Kapgate, “Authentication Model On Cloud Computing,” International Journal Of Computer Sciences And Engineering. 2 (10), P1-5, 2014.
[22] Richa Arya, “Triple Security Of File System For Cloud Computing,” International Journal Of Computer Science And Engineering. 2 (3), P1-7, 2014.
Citation
Konakanti. Bhargavi, Thota. Bhaskara Reddy, "A Hybrid Multi-Stage Methodology for Secure Outsourcing of Confidential Data to Public Cloud," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.670-681, 2018.
Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.682-687, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.682687
Abstract
Cross layer based approaches has given new dimensions to MANET (Mobile Adhoc Network) by releasing fixed layer boundary constraints. These new paradigm makes it possible to limit the issues such as low battery, limited bandwidth, link breakage of MANET. Still cross layer based designs are trying to remove such barriers and trying to make Manet more scalable. Though cross layer based designs are flexible but securing the network from malicious attack is definitely challenging task. This paper is an attempt to discuss about technique to optimize the performance of secure cross layer routing protocol. We have designed SCLPC (Secure cross layer based Power control) protocol. But when security is imposed using AASR (Authenticated and anonymous secure routing), the network metrics as end to end delay and routing overhead is disturbed. To optimize the network performance here we proposed OSCLPC (Optimized secure cross layer based power control protocol). The proposed OSCLPC has been evaluated using SHORT (Self healing and optimizing route technique). We also examined the OSCLPC with malicious code. The OSCLPC and M-OSCLPC (malicious OSCLPC) is simulated in ns2 and we also compared it with reactive routing protocol AODV.
Key-Words / Index Term
Cross layer designs, CLPC, AODV
References
[1] Vineet Srivastava, MehulMotani “Cross-layer design: A survey and the road ahead” communication Magazine, IEEE, Vol:43, Issue:12, IssueDate:Dec, 2005.
[2] Amit A. Bhusari,Dr. P.M Jawandhiya “Review and classification of Cross layer Routing protocol for Manet” IEEE sponsored 3rd ICECS 2016,Coimbatore,pp 600-607
[3] A. Sarfaraz Ahmed, T. Senthil Kumaran, S. Syed Abdul Syed, S. Subburam “Cross layer Design Approach for Power control in Mobile Adhoc Networks” Egyptian Informatics Jouran 2015.
[4] Wei liu and Ming Yu “Authenticated Anonymous secure routing for Manets in adversarial environments ” IEEE transactions on vehicular network, March 2014
[5] Chao Gui and Prasant Mohapatra “ A self healing and optimizing routing technique for adhoc networks”, Dept of Computer science, Davis, CA 95616.
[6] Gaurav Bhatia and Vivek Kumar“ Adapting MAC 802.11 for performance optimization of MANET using cross layer interaction” International Journal of Wireless & Mobile Networks (IJWMN) Vol.2, No.4, November 2010
[7] Muhammed Asif Khan, Sahibzadaa Zakiuddin, Jalal Ahmad “ Cross layer optimization of Dynamic source routing protocol using IEEE 802.11e based medium awareness” 978-1-4673-5885-9/13 IEEE 2013.
[8] Zouhair El-Bazzal, Khaldoun El-Ahmadieh, Zaher Merhi, Michel Nahas and Amin Haj-Ali “ A Cross layered protocol for Ad hoc networks” 2012 international conference on Information technology and e-services 978-1-4673-1166-3/12
[9] Sreedhar C, Dr. S. Madhusudana Verma, Dr. N. Kasiviswanatha “Cross layer based secure routing in Manet” International Journal of Engineering Research and Applications, ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.725-731
[10] Y.-C. Hu and D. B. Johnson, ”Caching Strategies in On- Demand Routing Protocols for Wireless Ad Hoc Networks”, Proc. ACM International Conference on Mobile Computing and Network (MOBICOM), 2000
[11] S Bose and A.Kannan “Detecting Denial of Service Attacks using Cross Layer based Intrusion Detection System in Wireless Ad Hoc Networks” IEEE-International Conference on Signal processing, Communications and Networking Madras Institute of Technology, Anna University Chennai India, Jan 4-6, 2008. Pp ]82-188
[12] Pradip M. Jawandhiya, Mangesh m.ghonge, DR. M.S Aliand Prof.J.S Deshpande “A Survey of Mobile adhoc
network attacks” IJEST,Vol.2, No.9, Sep 2010
[13] C. Perkins, E. Belding-Royer, S. Das, et al., “RFC 3561 - Ad hoc OnDemand Distance Vector (AODV) Routing,” Internet RFCs, 2003.
[14] D. Kelly, R. Raines, R. Baldwin, B. Mullins, and M. Grimaila,“Towardsa taxonomy of wired and wireless anonymous Networks,”in Proc.IEEE WCNC’09, Apr. 2009.
[15] J. Kong, X. Hong, and M. Gerla, “ANODR: An identity-free and ondemand routing scheme against anonymity threats in mobile adhoc networks,” IEEE Trans. on Mobile Computing, vol. 6, no. 8, pp.888–902, Aug. 2007.
[16] Ju-Lan Hsu and Izhak Rubin, “Cross Layer On-Demand Routing Algorithms For Multi-Hop Wireless Csma/Ca
Networks,” 978-1-4244-2677-5/08 IEEE 2008.
[17]NS2NetworkSimulator.http://www.isi.edu/nsnam/ns/
Citation
Amit A. Bhusari,P.M. Jawandhiya, V.M.Thakare, "Performance Analysis of an Optimized and Secure Routing Protocol with impact of malicious behavior utilizing Cross Layer Design for Mobile Adhoc Networks," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.682-687, 2018.
Prediction Analysis Technique based on Clustering and Classification
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.688-692, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.688692
Abstract
The data mining is the technique to analyze the complex data. The prediction analysis is the technique which is applied to predict the data according to the input dataset. In the recent times, various techniques have been applied for the prediction analysis. In this paper, k-mean and SVM classifier based prediction analysis technique is improved to increase accuracy and execution time. In the prediction analysis based technique, k-mean clustering algorithm is used to categorize the data and SVM classifier is applied to classify the data. The back propagation algorithm has been applied with the k-mean clustering algorithm to increase accuracy of prediction analysis. The proposed algorithm is implemented in MATLAB and it is been tested that accuracy of clustering is increased, execution times is reduced for prediction analysis .
Key-Words / Index Term
K-mean, SVM, Prediction, categorization, Classification
References
[1] Rupali, R.Patil, "Heart disease prediction system using Naive Bayes and Jelinek-mercer smothing," 2014, International Journal of Advanced Research in Computer and Communication Engineering, vol. 3, no. 5
[2] Shamsher Bahadur Patel, Pramod Kumar Yadav and Dr. D. P. Shukla, "Predict the diagnosis of heart disease patients using classification mining Techniques," 2013, IOSR Journal of Agriculture and Veterinary Science (IOSR-JAVS), vol. 4, no. 2, pp. 61-64
[3] Jyoti Soni, Ujma Ansari and Dipesh Sharma, "Prediction data mining for medical diagnosis: An overview of heart disease prediction," 2011, International Journal of Computer Applications (0975-8887), vol. 17
[4] John G. Cleary and Leonard E. Trigg,” K: An Instance-based learner using an entropic distance measure," 1995, Proc. 12th International Conference on Machine Learning, pp. 108-114
[5] S. Vijayarani and M. Muthulkshmi, "Comparative analysis of Bayes and Lazy classification algorithms," 2013, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, no. 8
[6] R. Vijaya Kumar Reddy, K. Prudvi Raju, M. Jogendra Kumar, CH. Sujatha, P. Ravi Prakash, "Prediction ofheart disease using decision tree approach," 2016, International Journal of Advanced Research in Computer Science and Engineering, vol. 6, no. 3
[7] Promad Kumar Yadav, K. L. Jaiswal, Shamsher Bahadur Patel, D. P. Shukla, "Intelligent heart disease prediction model using classification algorithms," 2013, UCSMC, vol. 3, no. 08, pp. 102-107
[8] Gaurav Taneja and Ashwini Sethi, "Comparison of classifiers in data mining," 2014, International Journal of Computer Science and Mobile Computing, vol. 3, pp. 102-115
[9] Sheweta Kharya, "Using data mining techniques for diagnosis of cancer disease," 2012, UCSEIT, vol. 2, no. 2
[10] Doreswamy, Umme Salma M,” BAT-ELM: A Bio Inspired Model for Prediction of Breast Cancer Data”, 2015, IEEE
[11] R. Karakis, M. Tez, Y. Kilic, Y. Kuru, and I. Guler,“ A genetic algorithm model based on artificial neural network for prediction of the axillary lymph node status in breast cancer,” 2013, Engineering Applications of Artificial Intelligence, vol. 26, no. 3, pp. 945–950
[12] Marjia Sultana, Afrin Haider and Mohammad Shorif Uddin,” Analysis of Data Mining Techniques for Heart Disease Prediction”, 2016, IEEE
[13] Kamaljit Kaur and Kuljit Kaur,” Analyzing the Effect of Difficulty Level of a Course on Students Performance Prediction using Data Mining”, 2015 1st International Conference on Next Generation Computing Technologies (NGCT)
Citation
Bhupendra Kumar Jain, Manish Tiwari, "Prediction Analysis Technique based on Clustering and Classification," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.688-692, 2018.
Cramming Identification through Spatiotemporal Data
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.693-701, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.693701
Abstract
Indian roads carry almost 90 per cent of the country’s passenger traffic and around 65 per cent of its freight. In India sales of automobiles and movement of freight by roads is growing at a rapid rate along with the increasing rate of traffic. Geo-spatial temporal data with geographical information explodes as the development of GPS-devices using mobiles. To dig out the video patterns behind the video data efficiently in huge spatial temporal data, using an OPTICS algorithm on gpsdata from the traffic video footage introduced. Through above cluster types provides number of cluster groups with identifying the video information from the existing archives video footages. This work deals with the clustering of the video data from the large geospatial temporal traffic videos using TRAFFICOPTICS algorithm organizing archives through information. In-order to identify the vehicles from the video footages in large traffic network that to identify the congestion through the spatiotemporal data mining method.
Key-Words / Index Term
GPS, GEO, OPTICS, SPATIAL, GEO-SPATIAL, spatiotemporal, clustering
References
[1]. K.P. Agrawal, Sanjay Garg, Shashikant Sharma, and Pinkal Patel, “Development and validation of OPTICS based spatio-temporal clustering technique”, Inf. Sci. 369, C (November 2016), pp.388-401, 2016.
[2]. Mihael Ankerst, Markus M. Breunig, Hans-Peter Kriegel, Jörg Sander , OPTICS: Ordering Points To Identify the Clustering Proc. ACM SIGMOD’99 Int. Conf. on Management of Data, Philadelphia PA, pp.1-12, 1999.
[3]. Derya Birant, Alp Kut, “ST-DBSCAN: An algorithm for clustering spatial–temporal data”, Data & Knowledge Engineering 60, pp. 208–221, 2007.
[4]. Latika Sharma, Nitu Mehta,” Data Mining Techniques: A Tool For Knowledge Management System In Agriculture”, International Journal of Scientific & Technology Research, VOLUME 1, ISSUE 5, JUNE 2012.
[5]. Manjula Aakunuri, Dr.G.Narasimha, Sudhakar Katherapaka,”Spatial Data Mining: A Recent Survey and New Discussions”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (4), 1501-1504, ISSN: 0975-9646, 2011.
[6]. Shashi Shekhar, Zhe Jiang, Reem Y. Ali, Emre Eftelioglu, Xun Tang, Venkata M. V. Gunturi and Xun Zhou , “Spatiotemporal Data Mining: A Computational Perspective”, ISPRS International Journal of Geo-Information 2015, 4, 2306-2338, 2015.
[7]. Tanvi Jindal, Prasanna Giridhar, Lu-An Tang, Jun Li, Jiawei Han, “Spatiotemporal Periodical Pattern Mining in Traffic Data”, UrbComp’13, Chicago, Illinois, USA, August 11–14, 2013.
[8]. Khamphao Sisaat, Hiroshi Ishii, Masato Terada, Chaxiong Yukonhiatou, Hiroaki Kikuchi, Surin Kittitornkun , “A Spatio-Temporal malware and country clustering algorithm: 2012 IIJ MITF case study”, International Journal of Information Security, Volume 16 Issue 5, Pages 459-473, October 2017.
[9]. Liu, C., Gong, Y., Laflamme, S., Phares, B., & Sarkar, S., “Bridge damage detection using spatiotemporal patterns extracted from dense sensor network”, Measurement Science and Technology, 28(1), 014011, 2017.
[10]. Wu, L., Liu, C., Huang, T., Sharma, A., & Sarkar, S., “Traffic sensor health monitoring using spatiotemporal graphical modelling” Proceedings of the 2nd ACM SIGKDD Workshop on Machine Learning for
Prognostics and Health Management, August 13-17, Halifax, Nova Scotia, Canada, 2017.
[11]. Jiang, Z., Liu, C., Akintayo, A., Henze, G., & Sarkar, S.,” Energy prediction using spatiotemporal pattern networks” Applied Energy, 206, 1022-1039, 2017.
[12]. Xiaojing Wu, Raul Zurita-Millab, Menno-Jan Kraakb, Emma Izquierdo-Verdiguier, “CLUSTERING-BASED APPROACHES TO THE EXPLORATION OF SPATIO-TEMPORAL DATA”, The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences, Volume XLII-2/W7, 2017
ISPRS Geospatial Week 2017, 18–22 September 2017, Wuhan, China, 1387-1391.
[13]. D.Gokula priya, Dr.C.Saravanabhavan, K.Suvitha "Detecting Congestion Patterns in Spatio Temporal Traffic Data using Frequent Pattern Mining", SSRG International Journal of Computer Science and Engineering (SSRG - IJCSE), V4 (10), ISSN: 2348 – 8387, 11-14 October 2017.
[14]. Nada Lavra, Domen Jesenovec, Nejc Trdin, and Neža Mramor Kosta,“Mining Spatio-temporal Data of TrafficAccidents and Spatial Pattern Visualization “, Metodološki zvezki, Vol. 5, No. 1, pp. 45-63, 2008.
[15]. Pawan S. Wasnik, S.D.Khamitkar, Parag Bhalchandra, S. N. Lokhande, Ajit S. Adte, “An Observation of Different Algorithmic Technique of Association Rule and Clustering”, International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.28-30, 2018.
[16]. S. Kshirsagar, M. Jadhav, C. Bhagwat, “Real Time Road Inspection System with Distance Intimation Technique”, International Journal of Scientific Research in Network Security and Communication, Vol.5, Issue.1, pp.16-19, 2017.
Citation
Srikanth Lakumarapu, Rashmi Agarwal, "Cramming Identification through Spatiotemporal Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.693-701, 2018.
Predicting and Visualizing the Heart Diseases by Machine Learning Algorithms with Big Data
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.702-706, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.702706
Abstract
Nowadays, most of the researchers are focusing and inspiring the healthcare and medical industries. Because, globally humans are affected by various diseases. Especially, the heart diseases are major defect for humans, which is unpredictable and it may happen any moment in the human life. The Machine Learning (ML) algorithms and Big Data technologies are providing the complete and effective solutions for the healthcare and medical industries to predict and diagnosis the various diseases. Moreover, it helps to protect the human life by the accurate prediction results in real-time. Purpose of this paper, to predict the heart diseases automatically by segmenting and classifying the patient`s heart data in real-time with the help of machine learning algorithms, big data, wireless heart monitor and smart phones. Finally, this research helps to predict, visualize and monitor the patient`s data in remotely and alerting to the heart specialists and health care professionals to save the patient`s life.
Key-Words / Index Term
machine learning, big data, predicting heart diseases, visualizing heart diseases
References
[1] Pedro Domingos, “The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World,” .
[2] Ian H. Witten, Eibe Frank , Mark A. Hall, Data Mining Practical Machine Learning Tools and Techniques third Edition, Morgan Kaufmann Publishers is an imprint of Elsevier, pp 978-0-12-374856-0
[3] Machine Learning for Dummies - John Paul Mueller, Luca Massaron - May 2016
[4] Machine Learning Using R - A Comprehensive Guide to Machine Learning - Karthik Ramasubramanian Abhishek Singh - 2017
[5] Understanding Machine Learning: From Theory to Algorithms by Shai Shalev-Shwartz and Shai Ben-David- Published 2014 by Cambridge University Press.
[6] coursera.org, ` Machine Learning`, 2017. [Online]. Available: https://www.coursera.org/learn/machine-learning.
[7] Roberto Battiti Mauro Brunato “The LION Way Machine Learning Plus Intelligent Optimization” – 2014.
[8] Brendan Phibbs MD, The Human Heart: A Basic Guide to Heart Disease, Second Edition, University of Arizona College of Medicine, Tucson, Arizona, pp 978-0781767774.
[9] Introduction to the ROC (Receiver Operating Characteristics) plot, 2018, [Online]. Available: https://classeval.wordpress.com/introduction/introduction-to-the-roc-receiver-operating-characteristics-plot.
[10] Jason W. Osborne, Best Practices in Logistic Regression 1st Edition, University of Louisville, USA, pp 978-1452244792, 2015.
[11] Y. Lakshmi Prasad, Big Data Analytics Made Easy, pp 978-1-946390-71-4, 2015.
[12] Nick Pentreath, Machine Learning with Spark, pp 978-1-76326-651-9, 2015.
[13] American Heart Association, [Online]. Available: https://professional.heart.org/professional/ResearchPrograms/UCM_461443_AHA-Approved-Data-Repositories.jsp.
[14] Wahoo X Heart Rate Monitoring System (HRMS), [Online]. Available: URL: https://www.wahoofitness.com/devices/heart-rate-monitors.
Citation
R. Kannan, V. Vasanthi, "Predicting and Visualizing the Heart Diseases by Machine Learning Algorithms with Big Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.702-706, 2018.
Differential Privacy Based Solution for Protecting Privacy of Big Data
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.707-713, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.707713
Abstract
With the emergence of distributed programming frameworks like Hadoop and cloud computing technology, big data and its analytics became a reality. As big data needs huge amount of storage and computing resources, cloud has given solution to the needs of big data. However, it is important to protect big data from privacy attacks. Disclosure of identity of an entity or organization or a person in the big data is an example for loss of privacy. In other words, non-disclosure of privacy of certain sensitive attributes is nothing but preserving privacy of big data. As traditional computing is replaced by Internet based computing, it became essential to deal with privacy of big data. Many techniques came into existence to protect big data. In this paper, we considered a specific case where an adversary launches attack to know the presence or absence of an entity in the big data. We proposed an algorithm based on differential privacy to withstand the aforementioned privacy attack on big data workload in MapReduce programming paradigm. We built a prototype application and deployed it in Elastic MapReduce (EMR) of Amazon Elastic Compute Cloud (EC2). The experimental results revealed the utility of the proposed algorithm and showed proof of the concept.
Key-Words / Index Term
Big data, big data privacy, differential privacy, Elastic MapReduce (EMR)
References
[1] Imran Ghani, Naghmeh Niknejad, Seung Ryul Jeong, “Energy Saving In Green Cloud Computing Data Centers: A Review”, Journal Of Theoretical And Applied Information Technology. 74 (1), P1-16, 2015.
[2] Danny Manongga, Wiranto Herry Utomo, Hendry, “E-Learning Development As Public Infrastructure Of Cloud Computing”, Journal Of Theoretical And Applied Information Technology. 62 (1), P1-6, 2014.
[3] V.Suresh Kumar, Dr. Aramudhan, “Hybrid Optimized List Scheduling And Trust Based Resource Selection In Cloud Computing”, Journal Of Theoretical And Applied Information Technology. 69 (3), P1-9, 2014.
[4] Bachtiar H. Simamora, M.Sc., Ph.D., Julirzal Sarmedy, S.Kom, “Improving Services Through Adoption Of Cloud Computing At Pt Xyz In Indonesia”, Journal Of Theoretical And Applied Information Technology. 73 (3), P1-10, 2015.
[5] P. Kumar And Sheila Anand, “An Approach To Optimize Workflow Scheduling For Cloud Computing Environment”, Journal Of Theoretical And Applied Information Technology. 57 (3), P1-7, 2013.
[6] Ayman G. Fayoumi, “Performance Evaluation Of A Cloud Based Load Balancer Severing Pareto Traffic”, Journal Of Theoretical And Applied Information Technology. 32 (1), P1-7, 2011.
[7] Ratna Sari, Yohannes Kurniawan, “Cloud Computing Technology Infrastructure To Support The Knowledge Management Process (A Case Study Approach)”, Journal Of Theoretical And Applied Information Technology. 73 (3), P1-6, 2015.
[8] S.Sudha, V.Madhu Viswanatham, “Addressing Security And Privacy Issues In Cloud Computing”, Journal Of Theoretical And Applied Information Technology. 48 (2), P1-13,2013.
[9] M. Lemoudden, N. Ben Bouazza, B. El Ouahidi, D. Bourget, “A Survey Of Cloud Computing Security Overview Of Attack Vectors And Defense Mechanisms”, Journal Of Theoretical And Applied Information Technology. 54 (2), P1-6, 2013.
[10] Abdellah Idrissi And Manar Abourezq, “Skyline In Cloud Computing”, Journal Of Theoretical And Applied Information Technology. 60 (3), P1-12, 2015.
[11] Marcos D. Assuncaoa, Rodrigo N. Calheirosb, Silvia Bianchic, Marco A. S. Nettoc And Rajkumar Buyyab, “Big Data Computing And Clouds: Trends And Future Directions”, Acm. P1-44, 2014.
[12] Arpit Gupta,Rajiv Pandey, And Komal Verma, “Analysing Distributed Big Data Through Hadoop Map Reduce”, Ieee. 129, P1-7, 2015.
[13] Kamran Siddique, Zahid Akhtar, Edward J. Yoon, Young-Sik Jeong, I, Dipankar Dasgupta, And Yangwoo Kim, “Apache Hama: An Emerging Bulk Synchronous Parallel Computing Framework For Big Data Applications”, Ieee. 4 ,P1-9, 2016.
[14] Pedro Roger Magalhaes Vasconcelos And Gisele Azevedo De Araujo Freitas, “Performance Analysis Of Hadoop Mapreduce On An Opennebula Cloud With Kvm And Openvz Virtualizations”, Icitst. P1-7, 2014.
[15] Priya P. Sharma And Chandrakant P. Navdeti, “Securing Big Data Hadoop: A Review Of Security Issues, Threats And Solution”, Ijcsit. 5, P1-6, 2014.
[16] Lizhe Wanga, Jie Taoc, Rajiv Ranjan D, Holger Martenc, Achim Streit C, Jingying Chene And Dan Chena, “G-Hadoop: Mapreduce Across Distributed Data Centres For Data-Intensive Computing”, Ieee, P1-14, 2013.
[17] Yanish Pradhananga,Shridevi Karande And Chandraprakash Karande, “High Performance Analytics Of Bigdata With Dynamic And Optimized Hadoop Cluster”, Isbn, P1-7, 2016.
[18] Avita Katal, Mohammad Wazid And R H Goudar, “Big Data: Issues, Challenges, Tools And Good Practice”, Ieee, P1-6, 2104.
[19] Miguel G. Xavier, Marcelo V. Neves And Cesar A. F. De Rose, “A Performance Comparison Of Container-Based Virtualization Systems For Mapreduce Clusters”, Acm, P1-9, 2014.
[20] Alberto Fernandez, Sara Del Rio, Victoria Lopez, Abdullah Bawakid, Maria J. Del Jesus, Jose M. Benítez And Francisco Herrera, “Big Data With Cloud Computing: An Insight On The Computing Environment, Mapreduce, And Programming Frameworks”, Acm, P1-31,2014.
[21] Vinod Kumar Vavilapallih, Arun C Murthyh, Chris Douglasm, Sharad Agarwali ,Mahadev Konarh, Robert Evansy, Thomas Gravesy, Jason Lowey, Hitesh Shahh, Siddharth Sethh ,Bikas Sahah, Carlo Curinom And Owen O’malleyh San, “Apache Hadoop Yarn: Yet Another Resource Negotiator”, Acm, P1-P16, 2013.
[22] Ngu Wah Win And Thandar Thein, “An Efficient Big Data Analytics Platform For Mobile Devices”, Ijcsis. P1-5, 2015.
[23] Jiaqi Zhaoa, Lizhe Wangb, Jie Taoc, Jinjun Chend, Weiye Sunc, Rajiv Ranjane, Joanna Kołodziejf, Achim Streitc And Dimitrios Georgakopoulose, “A Security Framework In G-Hadoop For Big Data Computing Across Distributed Cloud Data Centres” Journal Of Computer And System Sciences, P1-14, 2014.
[24] Amresh Kumar,Kiran M.,Saikat Mukherjee And Ravi Prakash G, “Verification And Validation Of Mapreduce Program Model For Parallel K-Means Algorithm On Hadoop Cluster”, International Journal Of Computer Applications. 72, P1-P8, 2013.
[25] Mythreyee S,Poornima Purohit And Apoorva D.R, “A Study On Use Of Big Data In Cloud Computing Environment”, Ijariit. P1-7, 2017.
[26] Katarina Grolinger, Michael Hayes, Wilson A. Higashino, Alexandra L`heureux, David S. Allison And Miriam A.M. Capretz, “Challenges For Mapreduce In Big Data”, IEEE, P1-P10, 2014.
[27] Karthik Kambatlaa, Giorgos Kollias B, Vipin Kumarc And Ananth Gramaa, “Trends In Big Data Analytics”, IEEE, P1-13, 2014.
[28] Erkang Chenga, Liya Maa, Adam Blaissea, Erik Blaschb, Carolyn Sheaffb, Genshe Chenc, Jie Wua And Haibin Linga, “Efficient Feature Extraction Fromwide Area Motion Imagery By Mapreduce In Hadoop”, Acm. P1-9, 2015.
[29] John A. Miller, Casey Bowman, Vishnu Gowda Harish And Shannon Quinn, “Open Source Big Data Analytics Frameworks Written In Scala”, IEEE. 1-5, 2016.
[30] Harshawardhan S. Bhosale, Prof. Devendra And P. Gadekar, “A Review Paper On Big Data And Hadoop”, Ijsrp, P1-7, 2014.
[31] Yaxiong Zhao, Jie Wu, And Cong Liu, “Dache: A Data Aware Caching For Big-Data Applications Using The Mapreduce Framework”, Tsinghua Science And Technology. P1-12, 2014.
[32] Seyed Reza Pakize, “A Comprehensive View Of Hadoop Mapreduce Scheduling Algorithms” Ijcncs. P1-10, 2014.
[33] Matei Zaharia, Reynold S. Xin, Patrick Wendell, Tathagata Das, Michael Armbrust, Ankur Dave, Xiangrui Meng, Josh Rosen, Shivaram Venkataraman, Michael J. Franklin, Ali Ghodsi, Joseph Gonzalez And Scot, “Apache Spark: A Unified Engine For Big Data Processing”, Acm. 59, P1-10, 2016.
[34] Yeonhee Lee And Youngseok Lee, “Toward Scalable Internet Traffic Measurement And Analysis With Hadoop”, Acm. P1-8, 2013.
[35] Jingwei Huang, David M. Nicol, And Roy H. Campbell, “Denial-Of-Service Threat To Hadoop/Yarn Clusters With Multi-Tenancy”, Ieee. P1-8, 2014.
[36] Xindong Wu,Xingquan Zhu,Gong-Qing Wu, “Data Mining With Big Data”, Ieee. 26 (1), P.97-107, 2014).
[37] C.L. Philip Chen , Chun-Yang Zhang, “Data-Intensive Applications, Challenges, Techniques And Technologies: A Survey On Big Data”, Elsevier. P.32-44, 2014.
[38] R. Agrawal And R. Srikant , “Privacy-Preserving Data Mining”, In Proceedings Of The Acm Sigmod Conference On Management Of Data. Dallas, Pp.439-450. 2000.
[39] Securities And Exchange Commission, Edgar Log File Data Set. Available: Https://Www.Sec.Gov/Data/Edgar-Log-File-Data-Set. Last Accessed 10 November 2016.
[40] H. Kousar and B.R.P. Babu, “Efficient Map/Reduce secure data using Multiagent System,” International Journal of Computer Sciences and Engineering. 6 (5), p1-5, 2018.
[41] M. Murugesan and A. Kalaiyarasi, “An Efficient Deduplication Mechanism for Big Data Analysis in Cloud Environments,” International Journal of Computer Sciences and Engineering. 6 (4), p1-7,2018.
Citation
Y. Sowmya, M. NagaRatna, C. Shoba Bindhu, "Differential Privacy Based Solution for Protecting Privacy of Big Data," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.707-713, 2018.
Application of Fixed-Point Algorithm in Parallel Systems
Research Paper | Journal Paper
Vol.6 , Issue.6 , pp.714-719, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.714719
Abstract
Fixed point algorithm is a powerful method to determine more accurate solutions to dynamical systems and widely used in analysis, algebra, geometry, and logic which is available all over the world anywhere and anytime. Convergence of fixed point iteration plays vital role in the solution of problems. This paper introduces about fixed point algorithm and fixed point iteration with it applications. We studied some fixed point iteration methods which can be used in parallel systems. We assumed that each problem of parallel systems can be expressed or solved using the fixed point algorithm. For generating the parallel grid of processor four iterative algorithms or methods can be used.
Key-Words / Index Term
Fixed-Point, Fixed-Point Algorithm, Fixed-Point Iteration, Chain Point, Attractive Fixed-point.
References
[1] Esik. Z., (1980), “Identities in iterative algebraic theories Computational Linguistics and Computer Languages”, 14:183–207.
[2] Esik Zoltan. (2009),”Fixed Point theory” Springer-Verlag Berlin, chapter 2, Page 29-65.
[3] Asati Alok, Singh Amardeep and Parihar C.L. (2013), “127 Years of Fixed point theory-A Brief Survey of development of fixed point theory” Vol 04.
[4] Fiacco A.V., (1974), “Convergence properties of local solutions of sequences of mathematical programming problems in general spaces”, Journal of Optimization Theory and Applications Vol 13, 1–12.
[5] Kok-Keong Tan & Hong-Kun Xu, (1993), “Approximating fixed point of nonexpansive Mappings”, by the Ishikawa iteration process, journal of Mathematical analysis and applications 178, 301-308.
[6] Burden R L & Faires J D, (2011), “Numerical Analysis” Dublin City University.
[7] Coxeter, H. S. M. (1942), “Non-Euclidean Geometry” University of Toronto Press. p. 36.
[8] Weisstein, Eric W. "Dottie Number", Wolfram MathWorld, Wolfram Research, Inc. Retrieved 23 July 2016.
[9] https://mat.iitm.ac.in/home/sryedida/public_html/caimna/transcendental/iteration%20methods/fixed-point/iteration.html.
[10] Ortega, J.M., and R.G. Voigt. 1985, “Solution of partial differential equations on vector and parallel computers”, SiAM Rev.27:149-240.
Citation
Surya Prakash Pandey, Rakesh Kumar Katare, "Application of Fixed-Point Algorithm in Parallel Systems," International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.714-719, 2018.