Harnessing the power of Machine Learning for Automating the Repetitive Tasks
Research Paper | Journal Paper
Vol.06 , Issue.03 , pp.108-112, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.108112
Abstract
Why to do hard work? When smart work pays off! There are about 7.6 billion people in the world who do many tasks every day, in which most of the tasks are repetitive. Repetitive tasks can be assisted and done by employing machine learning. Data is generated from these repetitive tasks, and this voluminous data is managed by Big Data Analytics and it is analyzed by Machine Learning and provides smart solutions. First of all Machine Learning creates a study pattern based on our daily routines and this data will be at a level of complexity that human minds will fail to comprehend. Machine Learning will make it possible for automated system to outthink the human brain by integrating broad information sets and finding correlations. A large number of repetitive tasks that involve manual labor can be automated through Machine Learning. Advances in Machine learning signify a future when devices run on self-learning algorithms and operate independently. They may deduce their own conclusions within certain parameters and develop a context based behavior to interact with human more directly than before. This could mean automating tasks of professionals like doctors (analyzing reports), advocates (for analyzing vast number of judgments and concluding outcomes), etc., even for routine jobs Machine Learning could uncover new potentials and enable human to make the best of their talents. In this article we would focus on how to minimize the time and energy spent on the repetitive and tedious tasks by assigning them to smart assistants using Machine Learning.
Key-Words / Index Term
Smart work, Machine Learning, Automating, Smart assistants
References
[1] ABDULSALAM YASSINE, SHAILENDRA SINGH and ATIF ALAMRI, “Mining Human Activity Patterns From Smart Home Big Data for Health Care Applications”
[2] Taking the Human Out of the Loop: A Review of Bayesian Optimization The paper introduces the reader to Bayesian optimization, highlighting its methodical aspects and showcasing its applications. By Bobak Shahriari, Kevin Swersky, Ziyu Wang, Ryan P. Adams, and Nando de Freitas
[3] Decentralizing Privacy: Using Block chain to Protect Personal Data Guy Zyskind MIT Media Lab Cambridge, Massachusetts Email: guyz@mit.edu Oz Nathan Tel-Aviv University Tel-Aviv, Israel Email: oznathan@gmail.com Alex ’Sandy’ Pentland MIT Media Lab Cambridge, Massachusetts Email: pentland@mit.edu
[4]Analytics vidya ( website)
Available: https://www.analyticsvidhya.com/blog/2017/09/common-machine-learning-algorithms/
[5] Digital doughnut (website ) Available: https://www.digitaldoughnut.com/articles/2017/june/machine-learning-accelerates-transformation
[6] Matlab&Simulink (website)
Available:
https://www.mathworks.com/discovery/machine-learning.html
[7] kdnuggets (website)
Available:
https://www.kdnuggets.com/2016/08/10-algorithms-machine-learning-engineers.html
[8] dezyre (website)
Available:
https://www.dezyre.com/article/top-10-machine-learning-algorithms/202
Citation
G. Shobana, K. Pradeepa, D. Subashree , "Harnessing the power of Machine Learning for Automating the Repetitive Tasks", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.108-112, 2018.
Prediction of Social Media User’s Mood using Deep Learning
Research Paper | Journal Paper
Vol.06 , Issue.03 , pp.113-119, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.113119
Abstract
In recent times, there is a huge increase in the usage of social media to share one’s opinion, feelings and even daily activities. By predicting the mood of the users in social media, we can identify the users who discuss or express suicide-related information. Prediction of user’s mood based on the likes, shares and status posted by them on social media is a challenging task as the mood of users change frequently. In this paper, a scheme is proposed to predict the user’s mood based on the likes, shares and status posted in social media and identify the users in the state of depression. This scheme classifies the mood of user as happy, sad, neutral, angry etc. using deep learning. It presents news feeds to keep the depressed user happy and enthusiastic. When the user is in a prolonged state of depression, the alert system alerts the top five users in his/her friend list. This scheme predicts the mood of the users with accuracy around 87%. Further, time critical information is sent to some users who regularly share information such that it reaches all the users within a certain period of time.
Key-Words / Index Term
Mood Prediction, Social Media, Alert System, Time Critical Information, Depression, News Feed
References
[1] M. Roshanaei, R. Han, S. Mishra, “Features for mood prediction in social media”, In the proceedings of IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 1580-1581, 2015.
[2] A. Hepburn, “Facebook statistics, stats & facts for 2011”, Digital Buzz, Accessed 31 January 2018.
[3] D. Noyes, “The top 20 valuable Facebook statistics”, Zephoria, Florida, Accessed 10 February 2018.
[4] P. Chiranjeevi, V. Gopalakrishnan, P. Moogi, “Neutral face classification using personalized appearance models for fast and robust emotion detection”, IEEE Transactions on Image Processing ,vol. 24, no. 9, pp.2701-2711, 2015.
[5] G. T. Giancristofaro, A. Panangadan, “Predicting Sentiment towards Transportation in Social Media using Visual and Textual Features”, In the proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems (ITSC), pp. 2113-2118, 2016.
[6] Md. Z. Uddin, W. Khaksar, J. Torresen, “Facial Expression Recognition Using Salient Features and Convolutional Neural Network”, IEEE Access, vol. 5, pp.26146-26161, 2017.
[7] M. Tasviri, S. A. H. Golpayegani, H. Ghavamipoor, “Presenting a Model Based on Social Network Analysis in Order to Offer a Diet to Users Proper to Their Mood”, In the proceedings of the 3th International Conference on Web Research (ICWR), pp. 133-139, 2017.
[8] A. Cernian, A. Olteanu, D. Carstoiu, C. Mares “Mood Detector – On Using Machine Learning to Identify moods and Emotions”, In the proceedings of the 21st International Conference on Control Systems and Computer Science, pp. 213-216, 2017.
[9] Z. Zhu, H. F. Satizabal, U. Blanke, A. Perez-Uribe, G.Troster “Naturalistic Recognition of Activities and Mood Using Wearable Electronics”, IEEE Transactions on Affective Computing, vol. 7, no.3, pp.272-285, 2016.
[10] S.Taylor, E.Nosakhare, A. Sano, R. Picard, “Personalized Multitask Learning for Predicting Tomorrow’s Mood, Stress, and Health”, IEEE Transactions on Affective Computing, vol. 14, no. 8, 2017.
[11] Y. Suhara, Y. Xu, A. Pentland, “Deepmood: Forecasting depressed mood based on self-reported histories via recurrent neural networks”, In the proceedings of the 26th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, pp. 715–724, 2017.
[12] A. Kaur, R. Malhotra, “Application of random forest in predicting fault-prone classes”, In the procedings of the IEEE International Conference on Advanced Computer Theory and Engineering, pp. 37-43, 2008.
[13] A. Gepp, K. Kumar, S. Bhattacharya, “Business failure prediction using decision trees”, Journal of forecasting, vol. 29, no. 6, pp. 536-555, 2010.
[14] K. Lee, D. Palsetia, R. Narayanan, M.M.A. Patwary, A. Agrawal, A. Choudhary, “Twitter trending topic classification”, In the proceedings of 11th IEEE International Conference on Data Mining Workshops (ICDMW), pp. 251-258, 2011.
[15] L.Breiman, “Bagging predictors”, Machine learning, vol.24, no.2, pp.123-140, 1996.
[16] R. Tarjan, “Depth-first search and linear graph algorithms”, SIAM journal on computing, vol. 1, no. 2, pp.146-160, 1972.
Citation
M.K.Sandhya, V.Soundarya, R.Swarnalakshmi, I.Swathi, "Prediction of Social Media User’s Mood using Deep Learning", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.113-119, 2018.
Computational Biology- Nano Programmed Carrier and Computed Aided Surgical for Cancer
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.120-122, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.120122
Abstract
The task of dealing with human body is one of the most complex one especially when it comes to curing someone suffering from heavy torment of malignant tumors. Cancer therapies are currently limited to surgery, radiation, and chemotherapy. All three methods risk damage to normal tissues or incomplete eradication of the cancer. Computational methods involves the development and application of data-analytical and theoretical methods, and computational techniques to the study of biological, and behavioral systems, and with Nanotechnology it offers the means to target chemotherapies directly and selectively to cancerous cells and neoplasms, guide in surgical resection of tumors, and enhance the therapeutic efficacy of radiation-based and other treatment modalities. All of this can add up to a decreased risk to the patient and an increased probability of survival. “Nano programmed carriers” or “NPC” carrying effective drugs are deployed in the blood stream. They are programmed to hit only the right spot through DNA computing which is interface to biochemical processes and are highly directional. On the other hand cancer abrupt can be predicted through Cancer computational biology. It aims to determine the future mutations in cancer through an algorithmic approach .It allows the gathering of data points using nano programmed robots and other sensing devices. This data is collected from DNA, RNA, and other biological structures. Areas of focus include determining the characteristics of tumors, analyzing molecules that are Involved in causing cancer, and understanding how the human genome relates to the causation of cancer
Key-Words / Index Term
nano programmed carriers, nanotechnology, programmed bio sensors, CAS, cancer computational biology
References
[1] R. Weissleder, M.C. Schwaiger, S.S. Gambhir, H. Hricak, “Imaging approaches to optimize molecular therapies”, Science Translational Medicine, Vol. 8, Issue. 355, pp. 355-371, 2016.
[2] Phillips E, Penate-Medina O, Zanzonico PB, Carvajal RD, Mohan P, Ye Y, Humm J, Gönen M, Kalaigian H, Schöder H, Strauss HW, Larson SM, Wiesner U, Bradbury MS, “Clinical translation of an ultrasmall inorganic optical-PET imaging nano particle probe”, Science Translational Medicine, Vol. 6, Issue. 260, pp. 260ra149, 2016.
[3] Haun JB, Castro CM, Wang R, Peterson VM, Marinelli BS, Lee H, Weissleder R. , “Micro-NMR for rapid molecular analysis of human tumor samples”, Science Translational Medicine, Vol. 3, Issue.71, pp.71ra16, 2011.
[4] Maeda H1, Nakamura H, Fang J, “The EPR effect for macromolecular drug delivery to solid tumors: Improvement of tumor uptake, lowering of systemic toxicity, and distinct tumor imaging in vivo”, Advanced Drug Delivery Reviews, Vol. 65, Issue. 1, pp. 71-79, 2013.
[5] Bertrand, N., Wu, J., Xu, X., Kamaly, N. & Farokhzad, O. C. "Cancer nanotechnology: the impact of passive and active targeting in the area of modern cancer biology" Advanced Drug Delivery Reviews, Vol.66, pp. 2–25, 2014.
[6] C He, X Duan, N Guo, C Chan, C Poon, RR Weichselbaum, W Lin, “Core-shell nano scale coordination polymers combine chemotherapy and photodynamic therapy to potentiate checkpoint blockade cancer immunotherapy
Citation
Smith S Trivedi, "Computational Biology- Nano Programmed Carrier and Computed Aided Surgical for Cancer", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.120-122, 2018.
A Survey on Sharing Data in Cloud
Survey Paper | Journal Paper
Vol.06 , Issue.03 , pp.123-126, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.123126
Abstract
Cloud is an online storage application mainly used to store documents, media and various files. However, due to large and easy access of cloud there arise various security issues such as data stealing and authentication issues when trying to share data on public platform. Fine-grained sharing of encrypted data is achieved through Attribute-based encryption. This is done with a methodology to provide data confidentiality and integrity using key generation, encryption and decryption. There are various techniques used to share data in cloud and each of these techniques employ different procedures or steps to achieve the end result. One among those techniques are public key encryption techniques which is a form of asymmetric key encryption where both public and private keys are used to keep the data or document secure. A security model is built through verifiable decryption algorithm. This is achieved by introducing a verification key from the output of the encryption algorithm. Finally, we present an approach to securely share data in an efficient manner through the ABE scheme.
Key-Words / Index Term
cloud computing, attribute-based encryption, Key Exchange, Data Sharing
References
[1] Yifeng Zheng, Xingliang Yuan, Xinyu Wang, Jinghua Jiang, Cong Wang, Xiaolin Gui, “Towards Encrypted Cloud Media Center with Secure Deduplication” IEEE Transactions on Multimedia, Vol.19, Issue.2, 2017.
[2] Nicolae Paladi, Christian Gehrmann, Antonis Michalas, “Providing User Security Guarantees in Public Infrastructure Clouds” IEEE Transactions on Cloud Computing, Vol.5, Issue.3, 2017.
[3] Jianghong Wei, Wenfen Liu, Xuexian Hu, “Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2015. doi: 10.1109/TCC.2016.2545668
[4] Mazhar Ali,Revathi Dhamotharan,Eraj Khan,Samee U.Khan,Athanasios V.Vasilakos,Keqin Li and Albert Y.Zomaya, “SeDaSC: secure data sharing in clouds” IEEE Systems Journal, Vol.11, Issue.2, 2017.
[5] Mazhar Ali,Saif U.R.Malik and Samee U.Khan, “DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party” IEEE Transactions on Cloud Computing Vol.5, Issue.4, 2017.
[6] Ruixuan Li; Chenglin Shen; Heng He; Zhiyong Xu; Cheng-Zhong Xu, “A Lightweight Secure Data Sharing Scheme For Mobile Cloud Computing” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2017. doi: 10.1109/TCC.2017.2649685
[7] Jian Shen , Tianqi Zhou, Xiaofeng Chen, Jin Li, and Willy Susilo, “Anonymous And Traceable Group Data Sharing In Cloud Computing” IEEE transactions on information forensics and security, Vol.13, Issue.4, 2018.
[8] Joseph K. Liu, Man Ho Au,Xinyi Huang, Rongxing Lu, and Jin Li, “Fine-Grained Two-Factor Access Control For Web-Based Cloud Computing Services” IEEE Transactions on Information Forensics and Security, Vol.11, Issue.3, 2016.
[9] Bernardo Ferreira, Joao Rodrigues, Joao Leitao, Henrique Domingos, “Practical Privacy-Preserving Content-Based Retrieval In Cloud Image Repositories” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2017. doi: 10.1109/TCC.2017.2669999
[10] Ghassan O. Karame, Claudio Soriente, Krzysztof Lichota, Srdjan Capkun, “Securing Cloud Data Under Key Exposure” IEEE Transactions on Cloud Computing, Vol.PP, Issue.99, 2017. doi: 10.1109/TCC.2017.2670559
[11] Sikhar Patranabis, Yash Shrivastava, Debdeep Mukhopadhyay, “Provably Secure Key-Aggregate Cryptosystems With Broadcast Aggregate Keys For Online Data Sharing On The Cloud”
IEEE Transactions on Computers, Vol.66, Issue.5, 2017.
[12] Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma, “Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption” IEEE Transactions On Information Forensics And Security, Vol.10, Issue.7, 2015.
Citation
S. Nivetha, R. Sowmya, B. Monica Jenefer, "A Survey on Sharing Data in Cloud", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.123-126, 2018.
State of the Art Technologies to Broadcast Epidemic Awareness using Web Crawling
Survey Paper | Journal Paper
Vol.06 , Issue.03 , pp.127-131, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.127131
Abstract
The main aim is to survey all the necessary papers that helps in building a system that spreads awareness among the people during an epidemic to reduce its severity by giving them general information regarding the epidemic diseases and predictions about its severity. There is no proper information among the public regarding the symptoms, precautions and treatment information of any epidemic disease during its spread which leads to unnecessary panic among the public. An android application specially tailored to provide prompt information to the public during the spread of an epidemic disease will be an efficient solution to diminish its spread. This application uses state of the art technology like firebase cloud messaging, firestore, python web scraper and parsehub to accomplish its goal. Thus, the proposed system has all the necessary features to create appropriate awareness among the public during the spread of any epidemic thereby reducing unwanted panic leading to reduction in the severity of the disease.
Key-Words / Index Term
E-health, firebase cloud messaging, firestore, web scraper, parsehub
References
[1] Christoforos, Hadjichrysanthou, Kieran, J.Sharkey, “Epidemic control analysis: Designing targeted intervention strategies against epidemics propagated on contact networks”, Journal of Theoretical Biology Volume 365, 21 January 2015
[2] Fabon Dzogang, Thomas Lansdall-Welfare, FindMyPast Newspaper Team, Nello Cristianini, “Discovering Periodic Patterns in Historical News”, PLOS ONE, Volume 11, id e0165736 (2016).
[3] Huijuan Wang, Chuyi Chen, Bo Qu1, Daqing Li and Shlomo Havlin, “Epidemic mitigation via awareness propagation in communication networks: the role of time scales”, l 2017 New Journal Physics.
[4] LixiaZuo and MaoxingLiu, "Effect of Awareness Programs on the Epidemic Outbreaks with Time Delay", in Abstract and Applied Analysis 2014
[5] Michael C. Smith, David A. Broniatowski, Michael J. Paul, Mark Dredze, "Towards Real-Time Measurement of Public Epidemic Awareness: Monitoring Influenza Awareness through Twitter",2015, Association for the Advancement of Artificial Intelligence
[6] MuhannadQuwaider, YaserJararweh, “Multi-tier cloud infrastructure support for reliable global health awareness system”, Simulation Modelling Practice and Theory,2016
[7] NehaSrivastava, Uma Shree, Nupa Ram Chauhan, Dinesh Kumar Tiwari, "Firebase Cloud Messaging (ANDROID)", International Journal of Innovative Research in Science, Engineering and Technology 2017
[8] Nicholas Thapen, DonalSimmie, Chris Hankin, Joseph Gillard, "DEFENDER: Detecting and Forecasting Epidemics Using Novel data-Analytics for Enhanced Response" Journal Plos one 2016
[9] Peninah M. Munyua, R. MbabuMurithi, Peter Ithondeka, Allen Hightower, Samuel M. Thumbi, Samuel A. Anyangu, JusperKiplimo, Bernard Bett, Anton Vrieling, Robert F. Breiman, M. KariukiNjenga, "Predictive Factors and Risk Mapping for Rift Valley Fever Epidemics in Kenya",,Journal Plos one 2016
[10] Sebastian Funk, ErezGilad, Chris Watkins and Vincent A. A. Jansen, "Spread of awareness and its impact on Epidemic Outbreaks", PNAS 2009 April, 106 (16) 6872-6877.
[11] Simon Dellicour, Rebecca Rose and Oliver G. Pybus, "Explaining the geographic spread of emerging epidemics: a framework for comparing viral phylogenies and environmental landscape data”, BMC Bioinformatics, 2016
Citation
R. Dhanalakshmi, Suprajah S, Swetha S, Vaishnavi Kanna S, "State of the Art Technologies to Broadcast Epidemic Awareness using Web Crawling", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.127-131, 2018.
Can a computer simulation determine what happens at super luminal speeds?
Research Paper | Journal Paper
Vol.06 , Issue.03 , pp.132-134, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.132134
Abstract
Special Relativity prohibits masses from moving faster than the speed of light. Einstein makes a plausibility argument for this, illustrating that time would appear to go backward at super luminal velocities. However, this argument includes nothing from special relativity, and only contains the assumption that light travels at a finite speed. Thus, we may use the Galilean transformation along with this assumption so as to avoid the imaginary time problem at super luminal speeds. In this document we run a computer simulation of the observation of a clock from two distinct inertial frames. We run a relativistic simulation as well as a non-relativistic simulation. We compare the two and observe a clue to time dilation inherent in non-relativistic mechanics. Besides this, some interesting qualitative observations are made. Finally, for super luminal velocities, we use only the Galilean transform, and make observations, keeping in mind Einstein’s argument.
Key-Words / Index Term
Relativity, Einstein, Galileo, simulation, time travel, special relativity
References
[1]. REFERENCES
[2]. The Scientists: An Epic of Discovery, Edited by Andrew Robinson
[3]. Relativity: The Special and General Theory, Albert Einstein
[4]. Philosophae Naturalis Principia Mathematica, Sir Isaac Newton
[5]. The Classical Theory of Fields, L. Landau and E. Lifshitz
[6]. The Feynman Lectures on Physics, R.P. Feynman
Citation
Pitambar Sai Goyal, "Can a computer simulation determine what happens at super luminal speeds?", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.132-134, 2018.
Enhancement of Software and Data Portability by Normalizing Variations in Hardware
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.135-140, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.135140
Abstract
This paper explores the concept of software and user data portability by tackling device driver issues caused due to diversity in computer hardware. The objective of this paper is to implement a universal interface between the hardware and the software intended to minimize time and manpower. Drivers are required for software-hardware integration and different hardware manufactured by OEMs require device drivers designed specifically for the hardware component. Development of a new platform requires the software manufacturer to target a variety of hardware. Upgrading existing software requires the device drivers to be checked if they are compatible with the newer version of the software. Device drivers have to be written for each software platform separately. This results in a lot of time being consumed which directly affects the consumer such as delayed software and firmware updates, security patches, bug fixes etc. This interface addresses the driver development issues by providing a standard hardware platform for which the software can be developed.
Key-Words / Index Term
software, hardware, portability, platform, interface, drivers, compatibility
References
[1] Anon., “ARM Cortex-A Series Programmers’s Guide”, Literature number ARM DEN0013D, pp.10-3, 2014.
[2] J.F. & Ross, K.W., “Computer Networking: A Top-Down Approach”. New York: Addison-Wesley. p. 36, 2010.
[3] Nirav Trivedi, Himanshu Patel, Dharmendra Chauhan, “Fundamental structure of Linux kernel based device driver and implementation on Linux host machine”, International Journal of applied Information Systems (IJAIS), Vol.10, Issue.4, pp.2249-0868, 2016.
[4] Scott Mueller, “Upgrading and Repairing PCs, Eleventh Edition”, Que, 2999, ISBN 0-7897-1903-7.
[5] Pete Bennett, EE Times. "The why, where and what of low-power SoC design." December 2, 2004. Retrieved July 28, 2015.
[6] Hendric, William (2015). "A Complete overview of Trusted Certificates - CABForum". Retrieved February 26, 2015.
[7] StatCounter, “Desktop macOS Version Market Share Worldwide Jan 2017 - Jan 2018” January, 2018.
[8] Steven M. Hancock (November 22, 2002). “Tru64 UNIX troubleshooting: diagnosing and correcting system problems”, HP Technologies Series, IT Pro collection. Digital Press. pp.119–126. ISBN 978-1-55558-274-6. Retrieved May 3, 2011.
Citation
Pon Rahul M, Rishi Shree S, "Enhancement of Software and Data Portability by Normalizing Variations in Hardware", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.135-140, 2018.
A Review on Mining Large Unstructured Datasets to Find Top-K Competitors
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.141-143, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.141143
Abstract
Now-a-days in any business field we are hearing about the word ‘competition’. So, by competitive analysis we can analyze the competitors and can assess the strengths and weakness of a competitor. Competition is necessary in marketing to know which companies are primary competitors and also know which company is competing with itself. So by this we make our products, services and marketing stands out well in business. Competitiveness between two items can be defined based on market segments that they can both cover. Competitiveness is evaluated in large review datasets and address the problem of finding top-k competitors. For evaluating of competitiveness, it utilizes customer reviews which are abundantly available in wide range of domains. There are so many efficient methods for addressing the problem of finding top-k competitors in terms of scalability, accuracy.
Key-Words / Index Term
Data Mining, Competitor Mining, Competitors, Information search and retrieval
References
[1] Valkanas, George, Theodoros Lappas, and Dimitrios Gunopulos."Mining Competitors from Large Unstructured Datasets." IEEE Transactions on Knowledge and Data Engineering vol.29,Issue 9,pp 1971-1984, 2017.
[2] M. Bergen and M. A. Peteraf, “Competitor identification and competitor analysis: a broad-based managerial approach,” Managerial and Decision Economics, 2002
[3] D. Zelenko and O. Semin, “Automatic competitor identification from public information sources,” International Journal of ComputationalIntelligence and Applications, 2002.
[4] R. Li, S. Bao, J. Wang, Y. Yu, and Y. Cao, “Cominer: An effective algorithm for mining competitors from the web,” in ICDM, pp. 948–952 2006.
[5] R. Li, S. Bao, J. Wang, Y. Liu, and Y. Yu, “Web scale competitor discovery using mutual information,” in ADMA, pp. 798–808 2006.
[6] T. Lappas, G. Valkanas, and D. Gunopulos, “Efficient and domain invariant competitor mining,” in SIGKDD, pp. 408–416, 2012,
[7] Q. Wan, R. C.-W. Wong, and Y. Peng, “Finding top-k profitable products,” in ICDE, vol.24,Issue 10,pp 1774-1788 2011.
[8] X. Ding, B. Liu, and P. S. Yu, “A holistic lexicon-based approach to opinion mining,” ser. WSDM ’08.
[9] E. Marrese-Taylor, J. D. Velasquez, F. Bravo-Marquez, and Y. Matsuo, “Identifying customer preferences about tourism products using an aspect-based opinion mining approach,” Procedia Computer Science, vol. 22, pp. 182–191, 2013.
[10] K. Xu, S. S. Liao, J. Li, and Y. Song.Mining comparative opinions from customer reviews for competitive intelligence.Decis. Support Syst., 2011.
[11] G. Pant, and O. R. L. Sheng. Mining competitor relationships from online news: A network-based approach. Electronic Commerce Research and Applications vol.10,Issue.4, pp 418-427 2011.
[12] S. Borzs ̈ onyi, D. Kossmann, and K. Stocker, “The skyline operator,” ̈in ICDE, 2001.
[13] Kumar, B. Senthil, and Nisha Joseph. "A Review on Competitor Mining and Unstructured Dataset Handling Techniques." Journal of Network Communications and Emerging Technologies (JNCET) vol.7, no. 9,pp22-26 2017.
Citation
B.Lasya Reddy, Shaik Salam, "A Review on Mining Large Unstructured Datasets to Find Top-K Competitors", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.141-143, 2018.
A Review On High Utility Itemset Mining
Review Paper | Journal Paper
Vol.06 , Issue.03 , pp.144-147, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.144147
Abstract
Sequential pattern mining is the imperative data mining problem with expansive application from text analysis to market basket analysis. It is the way towards extricating certain sequential patterns whose support surpasses a predefined limit which is defined by the user according to their interest. With frequent pattern mining, pattern is viewed as fascinating if its event surpasses users determined limit. Notwithstanding, users interest may identify with numerous components that are not really communicated as far as the event recurrence. Since the quantity of sequences can be huge, and users have distinct interest and prerequisites, to get the most fascinating sequential pattern, generally a minimum base support is predefined by clients. Utility mining is a new advancement of data mining innovation. It developed as of late to address the confinement of frequent pattern mining by thinking about the client`s desire or objective and in addition the crude information. An efficient algorithm is to be developed for extracting high utility sequential patterns.
Key-Words / Index Term
Data mining, Frequent Pattern Mining, High Utility Itemset mining, sequential pattern mining
References
[1] R. Agarwal, C. Aggarwal, and V. Prasad, “Depth first generation of long patterns,” in SIGKDD, 2000, pp. 108–118.
[2] R. Agrawal and R. Srikant. “Fast algorithms for mining association rules,” in Proc. of the 20th VLDB Conf., pp.487-499, 1994.
[3] Y. Liu, W. Liao and A. Choudhary, “A fast high utility itemsets mining algorithm,” in Proc. of the Utility-Based Data Mining Workshop, 2005
[4] W. Wang, J. Yang and P. Yu, “Efficient mining of weighted association rules (WAR),” in Proc. of the ACMSIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2000), pp. 270-274, 2000.
[5] S.Meenakshi, P.Sharmila, “A review of high utility patterns,” Computer and Communication Engineering, vol. 5, Issue 8, August 2017
[6] Junqiang Liu, Ke Wang, and Benjamin C.M. Fung “Mining High Utility Patterns in One Phase without Generating Candidates” IEEE Transactions on knowledge and data engineering, vol. 28, no. 5, May 2016.
[7] Mengchi Liu, Junfeng Qu, “Mining High Utility Itemsets without Candidate Generation”, CIKM‟12, October 29–November 2, 2012, Maui, HI, USA. Copyright 2012 ACM 978-1-503.
[8] Philippe Fournier-Viger, Cheng-Wei Wu, Souleymane Zida, Vincent S., “FHM: Faster High-Utility Itemset Mining using Estimated Utility Co-occurrence Pruning”, 21st International Symposium on Methodologies for Intelligent Systems (ISMIS 2014), Springer, LNAI, pp. 83-92
[9] F. Bonchi, F. Giannotti, A. Mazzanti, and D. Pedreschi, “Exante: A preprocessing method for frequent-pattern mining,” IEEE Intelligent Systems, vol. 20, no. 3, pp. 25–31, 2005.
[10] R. Bayardo and R. Agrawal, “Mining the most interesting rules,” in SIGKDD. ACM, 1999, pp. 145–154.
[11] S. Morishita and J. Sese, “Traversing itemset lattice with statistical metric pruning,” in PODS. ACM, 2000, pp. 226–236.
[12] Han J., Pei J., Yin Y., Mao R., “Mining frequent patterns without candidate generation: a frequent-pattern tree approach,” Data Mining Knowledge Discovery in Data. Vol. 8, No. 1, pp. 53-87, 2004.
[13] Liu J., Pan Y., Wang K., and Han J., “Mining frequent item sets by opportunistic projection,” In Special Interest Group on Knowledge Discovery and Data Mining. Association for Computing Machinery, pp.229–238, 2002.
[14] Fournier-Viger P., Wu C.-W., Zida S., and Tseng V.S., “Fhm: Faster high-utility itemset mining using estimated utility Cooccurrence pruning,” In Proceedings of the 21th International Symposium on Methodologies for Intelligent Systems. Springer, pp.83-92, 2014.
[15] Li Y.-C., Yeh J.-S., and Chang C.-C., “Isolated items discarding Strategy for discovering high utility itemsets,” Data &Knowledge Engineering, Vol. 64, No. 1, pp. 198–217, 2008.
[16] Ahmed C. F., Tanbeer S. K., Jeong B.-S., and Lee Y. -K., “Efficient tree structures for high utility pattern mining in incremental databases,” IEEE Transactions on Knowledge and Data Engineering, Vol. 21, No. 12, pp. 1708– 1721, 2009.
[17] Tseng V. S., Shie B.-E., Wu C.-W., and Yu P. S., “Efficient algorithms for mining high utility itemsets from transactional databases,” IEEE Transactions onData Engineering, Vol. 25, No. 8, pp. 1772–1, 86, 2013.
Citation
D. Divyashree, G. Sunitha, "A Review On High Utility Itemset Mining", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.144-147, 2018.
A Survey on Text Pre-processing Techniques and Tools
Survey Paper | Journal Paper
Vol.06 , Issue.03 , pp.148-157, Apr-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6si3.148157
Abstract
We live in an era of digital data explosion over Internet. Data warehouses deal with numerical databases than textual sources. Nearly eighty percent of digital data is either in semi or un-structured textual form. Several knowledge mining techniques developed over the past decade and those that are being developed now continue to draw attention to transform such textual data into desirable information and useful knowledge. This knowledge and information is used to benefit many fields of applications such as: social network, business management, customer care management system, market analysis, search engines, fraud detection, just to name a few. Text Mining (TM) is what is needed if desired information is to be obtained from such voluminous data. TM is multi-disciplinary in nature. Several TM techniques are deployed in the process of extracting knowledge from textual sources. Input text for such techniques needs to be pre-processed and cleaned. This survey briefly presents pre-processing tools for TM in general and Natural Language Processing (NLP) in particular. Also presents the broad categories of TM techniques used. The focus of this paper is to explore and analyze several features of text preprocessing techniques and tools that would interest researchers in the area of TM.
Key-Words / Index Term
Text Mining, Pre-processing techniques, Pre-processing Tools, Natural Language Processing
References
[1] Feldman Ronen & Dagan Ido, “Knowledge Discovery in Textual Databases”, KDD, Vol. 95. pp. 112–117, 1995.
[2] Saira, Gillani Andleeb, “From text mining to knowledge mining: An integrated framework of concept extraction and categorization for domain ontology”, PhD Dissertation, Budapesti Corvinus Egyetem, 2015.
[3] J. I. Toledo-Alvarado et al., “Automatic Building of an Ontology from a Corpus of Text Documents Using Data Mining Tools”, 2012
[4] Joe Tekli, “An overview on XML Semantic Disambiguation from Unstructured”, Member, IEEE, 2016.
[5] Harris, Z., ‘The structure of science information’, J Biomed. Inform., Vol. 35(4), pp. 215–221, 2002.
[6] Alexander Gelbukh, ”Special issue: Natural Language Processing and its Applications”, Institut Politécnico Nacional Centro de Investigaciónen Computación México, Mexico, 2010.
[7] Sibarani E. M., Nadial M., Panggabean E., & Meryana S., "A Study of parsing process on natural language processing in Bahasa Indonesia", International Conference on Computational Science and Engineering, pp. 309-316 2013.
[8] Andreas Hotho, Andreas Nürnberger, and Gerhard Paaß, “A Brief Survey of Text Mining. In Ldv Forum”, Vol. 20.19–62. 2005.
[9] Dragomir R Radev, Eduard Hovy, and Kathleen McKeown, “Introduction to the special issue on summarization”, Computational linguistics 28, 4, pp. 399–408, 2002.
[10] M. Allahyari, S. Pouriyeh, M. Assefi, S. Safaei, E. D. Trippe, J. B. Gutierrez, and K. Kochut., Text Summarization Techniques: A Brief Survey. ArXiv e-prints, 2017, arXiv:1707.02268
[11] Dipanjan Das and André FT Martins, “A survey on automatic text summarization”, Literature Survey for the Language and Statistics II course at CMU 4, pp. 192–195, 2007.
[12] Pritam C Gaigole, L. H. Patil, & P. M. Chaudhari, “Preprocessing Techniques in Text categorization”, National Conference on Innovative Paradigms in Engineering & Technology (NVIPET-2013), Proceedings published by International Journal of Computer Applications (IJCA), 2013.
[13] Katariya Nikita, & Chaudhari M. S., “Text Preprocessing For Text Mining Using Side Information”, International Journal of Computer Science and Mobile Applications, vol.3 Issue. 1, pp. 01-05, 2015.
[14] Ramasubramanian C., & Ramya R., “Effective Pre-Processing Activities in Text Mining using Improved Porter’s Stemming Algorithm”, International Journal of Advanced Research in Computer and Communication Engineering, vol. 2, Issue 12, pp. 4536-4538, 2013.
[15] Vijayarani S, Ilamathi J, & Nithya, International Journal of Computer Science & Communication Networks, Vol 5(1), pp. 7-16, 2015.
[16] Vijayarani S, & Janani R, "Text mining: open source tokenization tools–an analysis", Advanced Computational Intelligence 3.1: pp. 37-47, 2016.
[17] Vaidya, Swapnil, & Jayshree Aher, "Natural Language Processing Preprocessing Techniques", International Journal of Computer Engineering and Applications, Volume XI, Special Issue, 2017, www.ijcea.com ISSN 2321-3469
[18] Katariya Nikita, & Chaudhari M. S., “Text Preprocessing For Text Mining Using Side Information”, International Journal of Computer Science and Mobile Applications, vol.3 Issue. 1, pp. 01-05, 2015.
[19] Nayak Arjun Srinivas, Kanive Ananthu, Chandavekar Naveen, & Balasubramani R, “Survey on Pre-Processing Techniques for Text Mining”, International Journal Of Engineering And Computer Science, Volume 5 Issues 6 2016.
[20] Nazri Mohd Zakree Ahmad, Siti Mariyam Shamsudin, &Azuraliza Abu Bakar. "An exploratory study of the Malay text processing tools in ontology learning.", Research project, Ministry of Higher Learning – Malesia, 2008.
Citation
Ravi Lourdusamy, Stanislaus Abraham, "A Survey on Text Pre-processing Techniques and Tools", International Journal of Computer Sciences and Engineering, Vol.06, Issue.03, pp.148-157, 2018.