Submit Search
Upload
Assess data reliability from a set of criteria using the theory of belief functions
•
1 like
•
144 views
IAEME Publication
Follow
Assess data reliability from a set of criteria using the theory of belief functions
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 11
Download now
Download to read offline
Recommended
An efficient feature selection algorithm for health care data analysis
An efficient feature selection algorithm for health care data analysis
journalBEEI
Propose a Enhanced Framework for Prediction of Heart Disease
Propose a Enhanced Framework for Prediction of Heart Disease
IJERA Editor
IRJET- Disease Prediction System
IRJET- Disease Prediction System
IRJET Journal
Research Method EMBA chapter 12
Research Method EMBA chapter 12
Mazhar Poohlah
ROLE OF CERTAINTY FACTOR IN GENERATING ROUGH-FUZZY RULE
ROLE OF CERTAINTY FACTOR IN GENERATING ROUGH-FUZZY RULE
IJCSEA Journal
DETERMINING BUSINESS INTELLIGENCE USAGE SUCCESS
DETERMINING BUSINESS INTELLIGENCE USAGE SUCCESS
ijcsit
IRJET- Review on Knowledge Discovery and Analysis in Healthcare using Dat...
IRJET- Review on Knowledge Discovery and Analysis in Healthcare using Dat...
IRJET Journal
IRJET-Survey on Data Mining Techniques for Disease Prediction
IRJET-Survey on Data Mining Techniques for Disease Prediction
IRJET Journal
Recommended
An efficient feature selection algorithm for health care data analysis
An efficient feature selection algorithm for health care data analysis
journalBEEI
Propose a Enhanced Framework for Prediction of Heart Disease
Propose a Enhanced Framework for Prediction of Heart Disease
IJERA Editor
IRJET- Disease Prediction System
IRJET- Disease Prediction System
IRJET Journal
Research Method EMBA chapter 12
Research Method EMBA chapter 12
Mazhar Poohlah
ROLE OF CERTAINTY FACTOR IN GENERATING ROUGH-FUZZY RULE
ROLE OF CERTAINTY FACTOR IN GENERATING ROUGH-FUZZY RULE
IJCSEA Journal
DETERMINING BUSINESS INTELLIGENCE USAGE SUCCESS
DETERMINING BUSINESS INTELLIGENCE USAGE SUCCESS
ijcsit
IRJET- Review on Knowledge Discovery and Analysis in Healthcare using Dat...
IRJET- Review on Knowledge Discovery and Analysis in Healthcare using Dat...
IRJET Journal
IRJET-Survey on Data Mining Techniques for Disease Prediction
IRJET-Survey on Data Mining Techniques for Disease Prediction
IRJET Journal
Classification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey Data
CSCJournals
Analysis on Data Mining Techniques for Heart Disease Dataset
Analysis on Data Mining Techniques for Heart Disease Dataset
IRJET Journal
IRJET- Medical Data Mining
IRJET- Medical Data Mining
IRJET Journal
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
IRJET Journal
Lime
Lime
Daniel LIAO
Dissertation
Dissertation
Mefratechnologies
Ez36937941
Ez36937941
IJERA Editor
Data analysis
Data analysis
HarisRiaz25
50120130406036
50120130406036
IAEME Publication
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
eSAT Journals
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET Journal
Smart Health Prediction Report
Smart Health Prediction Report
Arhind Gautam
[IJCT-V3I2P26] Authors: Sunny Sharma
[IJCT-V3I2P26] Authors: Sunny Sharma
IJET - International Journal of Engineering and Techniques
Introductionedited
Introductionedited
Mefratechnologies
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
Universitas Pembangunan Panca Budi
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
ijistjournal
Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...
IJAAS Team
ICBAI Presentation (2)
ICBAI Presentation (2)
Pradeepta Mishra
CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING SILHOUETTE SCORE VALUE
CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING SILHOUETTE SCORE VALUE
ijcsit
MULTI MODEL DATA MINING APPROACH FOR HEART FAILURE PREDICTION
MULTI MODEL DATA MINING APPROACH FOR HEART FAILURE PREDICTION
IJDKP
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
ijcsit
Big Data and Cloud Readiness
Big Data and Cloud Readiness
AIRCC Publishing Corporation
More Related Content
What's hot
Classification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey Data
CSCJournals
Analysis on Data Mining Techniques for Heart Disease Dataset
Analysis on Data Mining Techniques for Heart Disease Dataset
IRJET Journal
IRJET- Medical Data Mining
IRJET- Medical Data Mining
IRJET Journal
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
IRJET Journal
Lime
Lime
Daniel LIAO
Dissertation
Dissertation
Mefratechnologies
Ez36937941
Ez36937941
IJERA Editor
Data analysis
Data analysis
HarisRiaz25
50120130406036
50120130406036
IAEME Publication
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
eSAT Journals
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET Journal
Smart Health Prediction Report
Smart Health Prediction Report
Arhind Gautam
[IJCT-V3I2P26] Authors: Sunny Sharma
[IJCT-V3I2P26] Authors: Sunny Sharma
IJET - International Journal of Engineering and Techniques
Introductionedited
Introductionedited
Mefratechnologies
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
Universitas Pembangunan Panca Budi
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
ijistjournal
Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...
IJAAS Team
ICBAI Presentation (2)
ICBAI Presentation (2)
Pradeepta Mishra
CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING SILHOUETTE SCORE VALUE
CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING SILHOUETTE SCORE VALUE
ijcsit
What's hot
(19)
Classification Scoring for Cleaning Inconsistent Survey Data
Classification Scoring for Cleaning Inconsistent Survey Data
Analysis on Data Mining Techniques for Heart Disease Dataset
Analysis on Data Mining Techniques for Heart Disease Dataset
IRJET- Medical Data Mining
IRJET- Medical Data Mining
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Early Identification of Diseases Based on Responsible Attribute using Data Mi...
Lime
Lime
Dissertation
Dissertation
Ez36937941
Ez36937941
Data analysis
Data analysis
50120130406036
50120130406036
Correlation of artificial neural network classification and nfrs attribute fi...
Correlation of artificial neural network classification and nfrs attribute fi...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
IRJET- Machine Learning Classification Algorithms for Predictive Analysis in ...
Smart Health Prediction Report
Smart Health Prediction Report
[IJCT-V3I2P26] Authors: Sunny Sharma
[IJCT-V3I2P26] Authors: Sunny Sharma
Introductionedited
Introductionedited
Quality Assurance in Knowledge Data Warehouse
Quality Assurance in Knowledge Data Warehouse
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
CLUSTERING DICHOTOMOUS DATA FOR HEALTH CARE
Disease prediction in big data healthcare using extended convolutional neural...
Disease prediction in big data healthcare using extended convolutional neural...
ICBAI Presentation (2)
ICBAI Presentation (2)
CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING SILHOUETTE SCORE VALUE
CLUSTERING ALGORITHM FOR A HEALTHCARE DATASET USING SILHOUETTE SCORE VALUE
Similar to Assess data reliability from a set of criteria using the theory of belief functions
MULTI MODEL DATA MINING APPROACH FOR HEART FAILURE PREDICTION
MULTI MODEL DATA MINING APPROACH FOR HEART FAILURE PREDICTION
IJDKP
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
ijcsit
Big Data and Cloud Readiness
Big Data and Cloud Readiness
AIRCC Publishing Corporation
Determining Business Intelligence Usage Success
Determining Business Intelligence Usage Success
AIRCC Publishing Corporation
Determining Business Intelligence Usage Success
Determining Business Intelligence Usage Success
AIRCC Publishing Corporation
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
14894
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
IRJET Journal
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptx
Arti Parab Academics
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
ijistjournal
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
IRJET Journal
prediction using data mining.pdf
prediction using data mining.pdf
NavAhmed3
Running Head Data Mining in The Cloud .docx
Running Head Data Mining in The Cloud .docx
healdkathaleen
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
IOSR Journals
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
ssuser793b4e
The High Quality Data Gathering System Essay
The High Quality Data Gathering System Essay
Divya Watson
Data mining and data warehousing
Data mining and data warehousing
JuliaWilson68
A Systems Approach To Qualitative Data Management And Analysis
A Systems Approach To Qualitative Data Management And Analysis
Michele Thomas
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
IJET - International Journal of Engineering and Techniques
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
IJCSES Journal
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
ijdpsjournal
Similar to Assess data reliability from a set of criteria using the theory of belief functions
(20)
MULTI MODEL DATA MINING APPROACH FOR HEART FAILURE PREDICTION
MULTI MODEL DATA MINING APPROACH FOR HEART FAILURE PREDICTION
BIG DATA AND CLOUD READINESS
BIG DATA AND CLOUD READINESS
Big Data and Cloud Readiness
Big Data and Cloud Readiness
Determining Business Intelligence Usage Success
Determining Business Intelligence Usage Success
Determining Business Intelligence Usage Success
Determining Business Intelligence Usage Success
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Using Randomized Response Techniques for Privacy-Preserving Data Mining
Survey on Medical Data Sharing Systems with NTRU
Survey on Medical Data Sharing Systems with NTRU
Health Informatics- Module 3-Chapter 3.pptx
Health Informatics- Module 3-Chapter 3.pptx
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
A STUDY OF TRADITIONAL DATA ANALYSIS AND SENSOR DATA ANALYTICS
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
THE CRYPTO CLUSTERING FOR ENHANCEMENT OF DATA PRIVACY
prediction using data mining.pdf
prediction using data mining.pdf
Running Head Data Mining in The Cloud .docx
Running Head Data Mining in The Cloud .docx
Achieving Privacy in Publishing Search logs
Achieving Privacy in Publishing Search logs
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
Review of the Implications of Uploading Unverified Dataset in A Data Banking ...
The High Quality Data Gathering System Essay
The High Quality Data Gathering System Essay
Data mining and data warehousing
Data mining and data warehousing
A Systems Approach To Qualitative Data Management And Analysis
A Systems Approach To Qualitative Data Management And Analysis
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
[IJET-V1I3P10] Authors : Kalaignanam.K, Aishwarya.M, Vasantharaj.K, Kumaresan...
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
A SURVEY ON DATA MINING IN STEEL INDUSTRIES
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
CLOUD-BASED DEVELOPMENT OF SMART AND CONNECTED DATA IN HEALTHCARE APPLICATION
More from IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
More from IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Recently uploaded
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Tsuyoshi Horigome
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
upamatechverse
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
DeelipZope
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
KurinjimalarL3
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
slot gacor bisa pakai pulsa
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
SIVASHANKAR N
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
ranjana rawat
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
ranjana rawat
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
rakeshbaidya232001
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Asutosh Ranjan
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
RajaP95
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
SIVASHANKAR N
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls in Nagpur High Profile
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Recently uploaded
(20)
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Assess data reliability from a set of criteria using the theory of belief functions
1.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 13 ASSESS DATA RELIABILITY FROM A SET OF CRITERIA USING THE THEORY OF BELIEF FUNCTIONS Saloni Niranjan Shah Department of Computer Engineering, RMD Sinhgad School of Engineering, Savitribai Phule Pune University, Warje, Pune-58, India Prof. Vina M. Lomte Assistant Professor, Department of Computer Engineering, RMD Sinhgad School of Engineering, Savitribai Phule Pune University, Warje, Pune-58, India ABSTRACT To combine information source reliability in an uncertainty representation there are many available methods, but there are very small work focusing on the problem of evaluating the reliability. However, in data warehousing system data reliability and confidence are very necessary components as they are very effective for retrieval and analysis of data. Customizable criteria and very useful down to earth decisions are provided. Even if the method is very general, it provides more specifically interest in scientific experimental data. The method diagnosis and measure the data reliability from a set of general criteria. It believes on the use of basic probabilistic assignments and of evoked belief functions, since they offer a good settlement between flexibility and computational tractability. The goal of the work is to propose a partly automatic decision-support system to help in data reliability. Keywords: Belief Functions, Evidence, Maximal Coherent Subsets, Trust, Data Quality, Ontology 1. INTRODUCTION Data Reliability means that data are fairly complete and accurate to meet the intended purposes. Data reliabilitymeans that exists when data is sufficiently complete and error free to be crediblefor its purpose and context. Data reliability is the accuracy and completeness of computer- processed data, given the uses they are intended for. INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) ISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online) Volume 6, Issue 5, May (2015), pp. 13-23 © IAEME: www.iaeme.com/IJCET.asp Journal Impact Factor (2015): 8.9958 (Calculated by GISI) www.jifactor.com IJCET © I A E M E
2.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 14 Measuring data reliability can be leaded reviewing existing information about the data, executing tests on the data, considering advanced electronic analysis; marking to and from source documents; and reviewing selected system controls. To calculate data reliability is major issues for many scientists, as these data are used in further inferences. During collection, data reliability is mostly ensured by measurement device calibration, by adapted experimental design and by statistical repetition.This estimation is especially important in areas where data are scarce and difficult to obtain (e.g., for economical or technical reasons), as it is the case, for example, in Life Sciences. The reliability of these data depends on many different aspects and Meta information: data source, experimental protocol. Developing generic tools to evaluate this reliability represents a true challenge for the proper use of distributed data. In classical statistical procedures, a pre-processing step is generally done to remove outliers.In procedures using web facilities and data warehouses, this step is often omitted, implicit or simplistic. There are very small works present that propose a solution to evaluate data reliability. This paper proposes a method to assess data reliability from Meta information. Lots of criteria are used, each one giving a piece of information about data reliability. These pieces are then combined into a global assessment that is sent back, after proper ordering, to the end user. Such method should handle with conflicting information, as different criteria may give conflicting information about the reliability. It is important to be able to detect conflict and to obtain insights about its origins, or in the absence of such conflicts, to know why such data have been declared poorly (or highly) reliable. The method which are presenting here answers these needs, by addressing two issues: first it provide a general approach to calculate or evaluate global reliability from a set of criteria, second it analyze the problem of ordering the reliability assessments so that the data are allocated in a useful manner to the end users. The goal of the work is to propose a partly automatic decision-support system to help in a data selection process for data reliability. As evaluating data reliability is subject to some uncertainties, we propose to model information by the means of evidence theory, for its capacity to model uncertainty and for its richness in fusion operators. Each criterion value is affiliated to a reliability assessment by the means of fuzzy sets later transformed in basic belief assignments, for the use of fuzzy sets facilitates expert removal. This paper is organized as: Section 2 deals with an overview of the related research regarding the data reliability methods. Section 3 is about proposed system. Section 4 describes the features of the system. And, Section 5 describes the conclusion. 2. RELATED WORK In earlier days, data reliability is mostly dependent on measurement device calibration, on adapted experimental design and on statistical repetition. In existing systems most popular system to assess data reliability is Multi Agent System. The approach is similar to the comparison of source assessments with reference values which are calculatedby experts in probabilistic or possibilistic methods. It needs the definition of an objective error function and a fair amount of data with a known reference value. This is barely applicable in our case, as data are distributed and can be collected and stored for later use, i.e., not having anyparticular purpose during collection of data [10]. Other approaches believe on the analysis of conflict between source information, assuming that a source is more reliable when it presents an appropriate data. This shows that to make the assumption that the majority opinion is more reliable. If one accepts this assumption, then the results
3.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 15 of such methods could possibly complement our approach. This assumes is not working in real life examples as the data is dynamic [9]. In open and dynamic multi agent systems, agents often need to believe on resources or services provided by other agents to effectuatetheir goals. During this process, agents are disclosed to the risk of being misused by others [8]. In evidence theory, methods to calculate reliability correspondin choosing reliability scores that minimize an error function [5]. Another paper proposes a multifaceted approach to trust models in internet environments. The authors point out the great number of terms and twistmeanings of trust. And also point out the difficulty to capture the wide range of subjective views of trust in single-faceted approaches. They invoke an OWL-based ontology of trust related concepts, such as credibility, reliability, honesty, competency or reputation, as well as a Meta model of relationships between concepts. Through domain specific models of trust, they can invoke personalized models suited to different needs. The idea is to provide internal trust management systems, i.e., the trust diagnosis being made inside the system, while using the annotation power of a user community to collect trust data [4]. The methods which are presented in this paper for commendation systems is close to our proposal, but uses possibility theory as a basis for calculation or evaluations rather than belief functions. Another difference between this access and ours is that global information is not acquired by a fusion of multiple uncertainty models, but by the propagation of uncertain criteria through an aggregation function [3]. In existing system, evidence theory is used for reasoning with uncertainty, with unequivocal connections to other frameworks such as probability, possibility and imprecise probability theories. To deal with the conflicting information Maximal coherent subset detection algorithm is used [1]. From all above related work we can conclude that there is no security used for data collection as well as data reliability or for documents. In our proposed system we will be included a security for data which will be displayed to user when he will fired a query. 3. PROPOSED SYSTEM The goal of the work is to propose a partly automatic decision-support system to help in a data selection process for data reliability. 3.1. Design 3.1.1.Data Container A data container is a subject-oriented, integrated, time-variant and non-volatile collection of data in support of management's decision making process. A data container can be used to analyze a particular subject area. For example, "sales" can be a particular subject.A data container integrates data from multiple data sources. For ex- ample, source A and source B may have different ways of identifying a product, but in a data container, there will be only a single way of identifying a product. Historical data is kept in a data container. For example, one can retrieve data from 3 months, 6 months, 12 months, or even older data from a data container. This contrasts with a transactions system, where often only the most recent data is kept. For example, a transaction system may hold the most recent address of a customer, where a data container can hold all addresses associated with a customer. A data container is a copy of transaction data specifically structured for query and analysis.
4.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 16 3.1.2.Web Server A web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The term can refer either to the entire system, or specifically to the software that accepts and supervises the HTTP requests. 3.1.2.1.Tomcat7: Apache Tomcat (or simply Tomcat, formerly also Jakarta Tomcat) is an open source web serverand servlet container developed by the Apache Software Foundation (ASF). Tomcat implements several Java EE specifications including Java Servlet, JavaServer Pages (JSP), Java EL, andWeb-Socket, and provides a "pure Java" HTTP web server environment for Java code to run in. 3.1.3. User User access the web browser after Login into the system. He can through a query and visualize the documents or result. Fig.1. System Architecture 3.2. Flow Diagram This presents the proposed system flow. As shown in the Figure 2, the flow defines the different steps to perform data reliability.
5.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 17 Fig.2. Flow Diagram Frist, user has to log in into the system for fetching the query. Then in next step user is issuing the queries into the system foe finding appropriate data. Data will be search from the present documents. After searching data, that data or document will be grouped based on the criteria present in our paper. Once the groups are created, apply the Maximal Coherent Subsets Detection algorithm for removing the conflict data or document. Maximal Coherent Subsets (MCS) algorithm is a merging strategy to deal with the problem of conflict information. When a conflicting information entering, the MCS perform conjunctive operator on maximal subset of information, and then uses disjunctive operation between the partial results.
6.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 18 After removing the conflicting information, Belief Function is used to assess reliable data or document. After using the Belief Function, the will be ordered in the decreasing order to show user most reliable data or document. The data will be shown in the form of table where first shows the most reliable data to the list reliable data or document. As in existing system there was not used any kind of security for the data or document. Here we provide a security for the data and or document by applying various security algorithms. 3.3. Algorithm Algorithm 1 Proposed Algorithm Require: Data sets Input: User Query 1. Enter login details 2. If(Login_validate) 3. { 4. Go to 2; //enter login details again 5. }else{ 6. Check Authorization 7. Fire query 8. Create grouping of data //on the base of criteria & required query 9. Apply reliability function 10. Calculate reliability of data // base on query 11. Find Maximal Coherent Subset 12. Order data base of reliability 13. Get data //final most reliable data for query 14. } Output: Provide Reliable Documents According to Query, Ordering by Documents reliability 3.4. Mathematical Model of a System Let S be defined as, S = ∑(Θ, A, L, E, I, P) Θ: Main set of Finite ordered space. Θ = {θ1, . . . ,θN} A: Main set of Criteria. A = {A1, . . . ,AS} L: Set of linguistic terms representing the state of data reliability. L = {very unreliable, slightly unreliable, neutral, slightly reliable, and very reliable} E: Set of focal elements. E = {e1, e2, e3,.......................} I: Set of intervals. I = {i1, i2, i3,..................} P: Set of processes that perform the system process. P = {P1, P2, P3, P4}
7.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 19 Step1: P1: Set of processes for preparation of data reliability. P1 = {a1, a2, a3, a4} Where, {a1=i|i is to generate the network} {a2=j|j is to create and load the user interaction} {a3=k|k is to create and fire query to data} Step 2: P2: Set of ordered space. P2 = {ᴓ1, ᴓ2, ᴓ3, . . . . . . .,ᴓN} Where, N is any odd number З ᴓi<ᴓj i< j ᴓ1 corresponds to total unreliability ᴓN corresponds to total reliability Step 3: P3: set of criteria. P3 = {A1, A2, A3, . . . . . . . . . . ,AS} Where, Ai is a finite space, representing individual criteria. We are providing the criteria group having a set of criteria and each element of Set A is treated as individual criteria. Step 4: P4: set of linguistic terms and fuzzy set P4 = {very unreliable, slightly unreliable, neutral, slightly reliable, and very reliable} 3.5. Feasibility Study This paper is comes under NP hard because detecting maximal coherent subsets has a NP- hard complexity. A lot of times you can solve a problem by reducing it to a different problem. I can reduce Problem B to Problem A if, given a solution to Problem A, I can easily construct a solution to Problem B. In this case, easily means in polynomial time. Those problems x such that there exists an NP- complete problem y where y Turing reduces to x. Here the problem is algorithm defined is NP hard as we cannot predict the exact time required for each user to get authenticated. Also how many events will occur is also hard to predict thus the problem can be solved either by heuristics or linear programming. 3.5.1.Functional Dependencies User is using Web Application to give their query string to obtain reliable document from data. Input : {User Query} Output : Provide Reliable Documents According to Query, Ordering by Documents reliability} Success : {Monitor reliable documents correctly according to criteria} Failure : {Unable to find any reliable documents}
8.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 3.6. Feature 1) Gives and reliable data to the user 2) And provide security for data 4. RESULTS 4.1. Input Dataset For input dataset, we take travel agencies data in which and User Feedback are included. In this we provide detail information of travel agencies and we are calculating total positive and negative reviews. 4.2. Outcomes Following figures are showing results for practical work done. registration page is shown. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 20 Gives and reliable data to the user And provide security for data For input dataset, we take travel agencies data in which Travel Agency are included. In this we provide detail information of travel agencies and we are calculating total positive and negative reviews. Following figures are showing results for practical work done. In Fig.3 and Fig.4 Login and Fig.3: Log in and Registration Fig.4: Survey Expert Login International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), © IAEME Travel Agency Profile, Tour Package are included. In this we provide detail information of travel agencies and we are In Fig.3 and Fig.4 Login and
9.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. Fig Following fig.6 shows that when and login is done by expert or user one token will be sent to her/his email id or mobile number and that token will be verified before he/she brows the next page. Following Fig. shows that when a user select continent The data is transferring from ontology server to the main application browser. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 21 Fig.5: Registration of survey expert Following fig.6 shows that when and login is done by expert or user one token will be sent to her/his email id or mobile number and that token will be verified before he/she brows the next page. Fig.6: Token Verification Fig.7: Browse Tour Packages Following Fig. shows that when a user select continent, countries will be appeared under it. The data is transferring from ontology server to the main application browser. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), © IAEME Following fig.6 shows that when and login is done by expert or user one token will be sent to her/his email id or mobile number and that token will be verified before he/she brows the next page. countries will be appeared under it.
10.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. After selection of country tour packages will be displayed and will be transferred from ontology server to application browser. Fig. 9: After that, user can select package and make a payment to the agency. And expert can write their review and logout from the browser 5. CONCLUSION AND FUTURE In Data reliability the system which is used for finding very reliable data is playing a vital role. Existing system or methods which are used for data collection and data reliability is mostly assure by measurement device calibration, by adapted experimen repetition. For data collection and data reliability, we are going to use belief function and removing conflicting information Maximal coherent subset algorith provided in existing system here we provide the security for data sets and or documents. Future work includes combination of current approach with other sources of information to characterize experimental data. International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 22 Fig.8: selection of countries After selection of country tour packages will be displayed and will be transferred from o application browser. Fig. 9: Tour packages for specified country After that, user can select package and make a payment to the agency. And expert can write and logout from the browser. FUTURE WORK In Data reliability the system which is used for finding very reliable data is playing a vital role. Existing system or methods which are used for data collection and data reliability is mostly assure by measurement device calibration, by adapted experimental design and by statistical For data collection and data reliability, we are going to use belief function and removing conflicting information Maximal coherent subset algorithm is used. As studied, system here we provide the security for data sets and or documents. Future work includes combination of current approach with other sources of information to International Journal of Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), © IAEME After selection of country tour packages will be displayed and will be transferred from After that, user can select package and make a payment to the agency. And expert can write In Data reliability the system which is used for finding very reliable data is playing a vital role. Existing system or methods which are used for data collection and data reliability is mostly tal design and by statistical For data collection and data reliability, we are going to use belief function and removing m is used. As studied, no security will be system here we provide the security for data sets and or documents. Future work includes combination of current approach with other sources of information to
11.
International Journal of
Computer Engineering and Technology (IJCET), ISSN 0976-6367(Print), ISSN 0976 - 6375(Online), Volume 6, Issue 5, May (2015), pp. 13-23© IAEME 23 6. ACKNOWLEDGMENT The authors would like to express heartfelt gratitude towards the people whose help was very useful to complete this dissertation work on the topic of “Data Reliability: Evaluate from the Theory of Belief Functions”. It is great privilege to express sincerest regards to P.G. Guide Prof. Vina M. Lomte as well as H.O.D., Prof. D. N. Rewadkar, for there valuable inputs, able guidance, encouragement, whole- hearted cooperation and constructive criticism throughout the duration of this work. The Dissertation is based on research work in “Evaluating Data Reliability: An Evidential with Application to Web-Enabled Data Warehouse” by SebastienDestercke were with University Paul Sabatier, Toulouse, France, in 2008. And Patrice Buche received the PhD degree in computer science from the University ofRennes, France, in 1990. He has been a research engineer with INRA, Agricultural Research Institute since 2002 and an assistant professor with AgroParisTech, Paris, since 1992. Author is very much thankful to them for such a precious work. REFERENCES 1. SebastienDestercke, Patrice Buche and Brigitte Charnomordic, “Evaluating Data Reliability: An Evidential with Application to Web-Enabled Data Warehouse”, IEEE transactions on knowledge and data engineering, vol. 25, no. 1, January 2013. 2. F. Pichon, D. Dubois, and T. Denoeux, “Relevance and Truthfulness in Information Correction and Fusion,” Int’l J. Approximate Reasoning, vol. 53, pp. 159-175, 2011. 3. Denguir-Rekik, J. Montmain, and G. Mauris, “A Possibilistic- Valued Multi- Criteria Decision-Making Support for Marketing Activities in E-Commerce: Feedback Based Diagnosis System”, European J. Operational Research, vol. 195, no. 3, pp. 876-888, 2009. 4. K. Quinn, D. Lewis, D. OSullivan, and V. Wade, “An Analysis of Accuracy Experiments Carried Out over a Multi-Faceted Model of Trust”, Intl J. Information Security, vol. 8, pp. 103- 119, 2009. 5. D. Mercier, B. Quost, and T. Denoeux, “Refined Modeling of Sensor Reliability in the Belief Function Framework Using Contextual Discounting”, Information Fusion, vol. 9, pp. 246-258, 2008. 6. Y. Gil and D. Artz, “Towards Content Trust of Web Resources, Proc. 15th Int’l Conf. World Wide Web (WWW ’06), pp. 565-574, 2006. 7. S. Ramchurn, D. Huynh, and N. Jennings, “Trust in Multi-Agent Systems,” The Knowledge Eng. Rev., vol. 19, pp. 1-25, 2004. 8. F. Delmotte and P. Borne, “Modeling of Reliability with Possibility Theory”, IEEE Trans. Systems, Man, and Cybernetics A, vol. 28, no. 1, pp. 78-88, 1998. 9. R. Cooke, Experts in Uncertainty. Oxford Univ. Press, 1991. and S. Sandri, D. Dubois, and H. Kalfsbeek, “Elicitation, Assessment and Pooling of Expert Judgments Using Possibility Theory”, IEEE Trans. Fuzzy Systems, vol. 3, no. 3, pp. 313-335, Aug. 1995. 10. R. Cooke, Experts in Uncertainty. Oxford Univ. Press, 1991. 11. L. Zadeh, “The Concept of a Linguistic Variable and Its Application to Approximate Reasoning-i,” Information Sciences, vol. 8, pp. 199-249, 1975. 12. Ms. Jyoti Pruthi, Dr. Ela Kumar, “Data Set Selection In Anti-Spamming Algorithm - Large or Small” International journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 206 - 212, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
Download now