Abstract: Recent era efforts have been taken in the field of social based Question and Answer (Q&A) which is used to search the answers for the non – factorial questions. But traditional search engines like Google, Bing is used to answer only for the factorial questions where we can get direct answer from the data base servers. The web search engine for the (Q&A) system does not dependent on the broadcasting methods and centralized server for identifying friends on the social network. The problem is recovered by using mobile Q&A system in that mobile nodes are help full for accessing internet because these techniques are used to generate low node overload, higher server bandwidth cost and highest cost of mobile internet access. Lately technical experts proposed a new method called Distributed Social – Based Mobile Q&A system (SOS) which makes very faster and quicker responses to the asker. SOS enables the mobile user’s to forward the question in the decentralized manner in order get effective, capable, and potential answers from the users. SOS is the light weighted knowledge engineering technique which is used find correct person who ready and willing to answer questions hence this type of search are used reduce searching time and computational cost of the mobile nodes. In this paper we proposed a new method called mobile Q&A system in the cloud based environment through which the data has been as been transmitted form cloud server to the centralized server at any time.
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
Peer-to-peer systems have recently a remarkable success in the social, academic, and commercial communities. A fundamental problem in Peer-to-Peer systems is how to efficiently locate appropriate peers to answer a specific query (Query Routing Problem). A lot of approaches have been carried out to enhance search result quality as well as to reduce network overhead. Recently, researches focus on methods based on query-oriented routing indices. These methods utilize the historical information of past queries and query hits to build a local knowledge base per peer, which represents the user's interests or profile. When a peer forwards a given query, it evaluates the query against its local knowledge base in order to select a set of relevant peers to whom the query will be routed. Usually, an insufficient number of relevant peers is selected from the current peer's local knowledge base thus a broadcast search is investigated which badly affects the approach efficiency. To tackle this problem, we introduce a novel method that clusters peers having similar interests. It exploits not only the current peer's knowledge base but also that of the others in
the cluster to extract relevant peers. We implemented the proposed approach, and tested (i) its retrieval effectiveness in terms of recall and precision, (ii) its search cost in terms of messages traffic and visited peers number. Experimental results show that our approach improves the recall and precision metrics while reducing dramatically messages traffic.
Least Cost Influence by Mapping Online Social Networks paperpublications3
Abstract: The online social network has become popular for sharing the information. Online social networks exhibit many platforms to create awareness of new products. In recent time Least cost Influence problem to find minimum number of seed user is most important topic in online social networks. The eventual target is to find the least advertising cost set of users which produce enormous influence. In existing many diffusion models are used. In this paper the stochastic threshold model is used to find the seed user in multiple online social networks to maximize the influence. This model decreases the processing time comparing to the other models.
Keywords: Stochastic threshold model, influence, diffusion, multiple networks, online social networks.
Title: Least Cost Influence by Mapping Online Social Networks
Author: Bessmitha S, Shajini N
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
Peer-to-peer systems have recently a remarkable success in the social, academic, and commercial communities. A fundamental problem in Peer-to-Peer systems is how to efficiently locate appropriate peers to answer a specific query (Query Routing Problem). A lot of approaches have been carried out to enhance search result quality as well as to reduce network overhead. Recently, researches focus on methods based on query-oriented routing indices. These methods utilize the historical information of past queries and query hits to build a local knowledge base per peer, which represents the user's interests or profile. When a peer forwards a given query, it evaluates the query against its local knowledge base in order to select a set of relevant peers to whom the query will be routed. Usually, an insufficient number of relevant peers is selected from the current peer's local knowledge base thus a broadcast search is investigated which badly affects the approach efficiency. To tackle this problem, we introduce a novel method that clusters peers having similar interests. It exploits not only the current peer's knowledge base but also that of the others in
the cluster to extract relevant peers. We implemented the proposed approach, and tested (i) its retrieval effectiveness in terms of recall and precision, (ii) its search cost in terms of messages traffic and visited peers number. Experimental results show that our approach improves the recall and precision metrics while reducing dramatically messages traffic.
Least Cost Influence by Mapping Online Social Networks paperpublications3
Abstract: The online social network has become popular for sharing the information. Online social networks exhibit many platforms to create awareness of new products. In recent time Least cost Influence problem to find minimum number of seed user is most important topic in online social networks. The eventual target is to find the least advertising cost set of users which produce enormous influence. In existing many diffusion models are used. In this paper the stochastic threshold model is used to find the seed user in multiple online social networks to maximize the influence. This model decreases the processing time comparing to the other models.
Keywords: Stochastic threshold model, influence, diffusion, multiple networks, online social networks.
Title: Least Cost Influence by Mapping Online Social Networks
Author: Bessmitha S, Shajini N
ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Paper Publications
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
Https://javacoffeeiq.com
Alex Pentland puts it in his productivity study, “fewer memos, more coffee breaks” increases productivity via socialisation and collaboration among staff members.
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Hybrid sentiment and network analysis of social opinion polarization icoictAndry Alamsyah
The rapid growth of social media and user generated contents (UGC) has provided a rich source of potentially relevant data. The problems arise on how to summarize those data to understand and transforming it into information. Twitter as one of the most popular social networking and micro-blogging service can be analyzed in terms of content produced with sentiment analysis. On the other hand, some types of networks can also be constructed to analyze the social network structure and network properties. This research intended to combine those content and structural approaches into hybrid approach for identifies social opinion polarization, this is in the form of conversation network. Sentiment analysis used to determine public sentiment, and social network analysis used to analyze the structure of the network, detecting communities and influential actors in the network. Using this hybrid approach, we have comprehensive understanding about social opinion polarization. As case study, we present real social opinion polarization about reclamation issue in Indonesia.
Big Data Analytics- USE CASES SOLVED USING NETWORK ANALYSIS TECHNIQUES IN GEPHIRuchika Sharma
This report is done as a part in completion of our Big Data Analysis Course at Jindal Global Business School.
In this report, we have mainly focused on literature review of 10 use-cases in the visualization task. We have worked on use cases pertaining to varied use of social media site Twitter in the political, cultural and business context; use by drug marketers and musicians among others.
Big Data Analysis- Live DATA PRESENTATION- Bitcoin Alpha trust networkRuchika Sharma
This presentation was made as a part of our Big Data Analysis course to further analyse the of Gephi software in understanding live data and interpreting our findings by visualizing the data thereof. We have used the Bitcoin Alpha Trust network to carry out our analysis.
Survey on Performance of Hadoop Map reduce Optimization Methodspaperpublications3
Abstract: Hadoop is a open source software framework for storage and processing large scale of datasets on clusters of commodity hardware. Hadoop provides a reliable shared storage and analysis system, here storage provided by HDFS and analysis provided by MapReduce. MapReduce frameworks are foraying into the domain of high performance of computing with stringent non-functional requirements namely execution times and throughputs. MapReduce provides simple programming interfaces with two functions: map and reduce. The functions can be automatically executed in parallel on a cluster without requiring any intervention from the programmer. Moreover, MapReduce offers other benefits, including load balancing, high scalability, and fault tolerance. The challenge is that when we consider the data is dynamically and continuously produced, from different geographical locations. For dynamically generated data, an efficient algorithm is desired, for timely guiding the transfer of data into the cloud over time for geo-dispersed data sets, there is need to select the best data center to aggregate all data onto given that a MapReduce like framework is most efficient when data to be processed are all in one place, and not across data centers due to the enormous overhead of inter-data center data moving in the stage of shuffle and reduce. Recently, many researchers tend to implement and deploy data-intensive and/or computation-intensive algorithms on MapReduce parallel computing framework for high processing efficiency.
A Study on Cancer Perpetuation Using the Classification Algorithmspaperpublications3
Abstract: Analysis of cancer datasets is one of the important research in data mining techniques. In the present work, classification techniques such as CART, Random Forest, LMT, and Naive Bayesian are used. The result predicts that Random forest method using training dataset outperforms the remaining methods. The random forest method using training dataset have less value of absolute relative error. Relative absolute error of LMT is high for cancer survival dataset. Value of absolute relative error is greater than 50% for almost all the algorithms except for random forest method using training dataset.
Current trends of opinion mining and sentiment analysis in social networkseSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Hybrid sentiment and network analysis of social opinion polarization icoictAndry Alamsyah
The rapid growth of social media and user generated contents (UGC) has provided a rich source of potentially relevant data. The problems arise on how to summarize those data to understand and transforming it into information. Twitter as one of the most popular social networking and micro-blogging service can be analyzed in terms of content produced with sentiment analysis. On the other hand, some types of networks can also be constructed to analyze the social network structure and network properties. This research intended to combine those content and structural approaches into hybrid approach for identifies social opinion polarization, this is in the form of conversation network. Sentiment analysis used to determine public sentiment, and social network analysis used to analyze the structure of the network, detecting communities and influential actors in the network. Using this hybrid approach, we have comprehensive understanding about social opinion polarization. As case study, we present real social opinion polarization about reclamation issue in Indonesia.
Big Data Analytics- USE CASES SOLVED USING NETWORK ANALYSIS TECHNIQUES IN GEPHIRuchika Sharma
This report is done as a part in completion of our Big Data Analysis Course at Jindal Global Business School.
In this report, we have mainly focused on literature review of 10 use-cases in the visualization task. We have worked on use cases pertaining to varied use of social media site Twitter in the political, cultural and business context; use by drug marketers and musicians among others.
Big Data Analysis- Live DATA PRESENTATION- Bitcoin Alpha trust networkRuchika Sharma
This presentation was made as a part of our Big Data Analysis course to further analyse the of Gephi software in understanding live data and interpreting our findings by visualizing the data thereof. We have used the Bitcoin Alpha Trust network to carry out our analysis.
Survey on Performance of Hadoop Map reduce Optimization Methodspaperpublications3
Abstract: Hadoop is a open source software framework for storage and processing large scale of datasets on clusters of commodity hardware. Hadoop provides a reliable shared storage and analysis system, here storage provided by HDFS and analysis provided by MapReduce. MapReduce frameworks are foraying into the domain of high performance of computing with stringent non-functional requirements namely execution times and throughputs. MapReduce provides simple programming interfaces with two functions: map and reduce. The functions can be automatically executed in parallel on a cluster without requiring any intervention from the programmer. Moreover, MapReduce offers other benefits, including load balancing, high scalability, and fault tolerance. The challenge is that when we consider the data is dynamically and continuously produced, from different geographical locations. For dynamically generated data, an efficient algorithm is desired, for timely guiding the transfer of data into the cloud over time for geo-dispersed data sets, there is need to select the best data center to aggregate all data onto given that a MapReduce like framework is most efficient when data to be processed are all in one place, and not across data centers due to the enormous overhead of inter-data center data moving in the stage of shuffle and reduce. Recently, many researchers tend to implement and deploy data-intensive and/or computation-intensive algorithms on MapReduce parallel computing framework for high processing efficiency.
A Study on Cancer Perpetuation Using the Classification Algorithmspaperpublications3
Abstract: Analysis of cancer datasets is one of the important research in data mining techniques. In the present work, classification techniques such as CART, Random Forest, LMT, and Naive Bayesian are used. The result predicts that Random forest method using training dataset outperforms the remaining methods. The random forest method using training dataset have less value of absolute relative error. Relative absolute error of LMT is high for cancer survival dataset. Value of absolute relative error is greater than 50% for almost all the algorithms except for random forest method using training dataset.
Abstract: Tracking and detecting the crowd is the main problem in the current era hence we are making video scenes method .Detection of many individual objects has been improved over recent years. It has been challenging to detect and track the tasks due to occlusions and variation in people appearance. Facing these challenges, we suggest to leverage information on the global structure of the scenes and to resolve jointly. We explore the constraints of the crowd density and detection of optimization using joint energy function. We show how the optimization of such energy function improves to track and detect in floating crowds. We validate our approach on a challenging video dataset of crowded scenes. The addition of different features which is relevant to tracking peoples such as movement, size, height and the observation models in the particle filters and followed by a clustering methods. It minimizes the communication cost and Data Retrieval is easy.
Literature Survey on Buliding Confidential and Efficient Query Processing Usi...paperpublications3
Abstract: Hosting data query services with the deployed cloud computing infrastructure increase the scalability and high performance evaluations with low cost. However, some data owners might not be interested to the save their in the cloud environment because of data confidentiality and query processing privacy should be guaranteed by the cloud service providers. Secured Query should able to provide very high efficient of query processing and also should reduce in – house workload. In this paper we proposed RASP data perturbation techniques combines various objectives like random noise injection, dimensionality expansion, efficient encryption and random projection, henceforth RASP methodology are also used to preserves multidimensional ranges. KNN – R algorithm used to work with RASP range for processing KNN queries. The experimental result of our project carried out to define realistic security and threat model approaches for improved efficient and security.
Abstract: Here we define a new category which we call “the category of abelian groups over the category of rings” and we denote it by M. This category is the collection of modules over different rings. We have discussed some properties of this category in details. Some results of Ab (the category of abelian groups), Ring (the category of rings) have been proved and used in the proofs of the properties of M in this paper. Also we have defined another new category which we call “the category of semi abelian groups over the category of semi rings” and we have denoted it by M’. We discussed some properties of M’.
Abstract: Google employs algorithms in such a way that it holds the capability of sensing what one might want to see, out of the keyword that we have entered. In other words Google’s algorithms accept our query as input and produce results in the form of webpages that may count up to many thousands or even millions.
There are certain criteria upon which the algorithm filters our search results. The technical term used to represent such criteria is ‘clues’. These clues are unique signals that help in determining what really we are looking for. They include information like the terms and condition of a website, how recent has the content been modified, the region in which the user exists, how good the title of a pages looks and rank of the page.
Google’s developers focus on refining the quality of result produced by employing different ‘clues’, that also determine if a page or website stands at position 1 in search results.
While the overall preview of how the algorithm works has been specified, a Google algorithm is not as easy as it meets the eye. Google algorithms are complicated and increase in the level of complexity as the search for a user’s query gets refined from level to level.
It takes more than one video to build your brand and your community. You’ve got to integrate video with all kinds of other channels like content, social, search, email and offline in order to accomplish your goals and build your business.
Smart Home Management System Using Wireless Sensor Network (WSN)paperpublications3
Abstract: Nowadays, shortage of electricity is a very serious problem due to insufficient production. The wastage of electricity can be avoided by switching off the electrical appliances when not in use. This can be achieved by using Smart home system which automatically turns off loads when not in use, the system can save energy in homes and offices. The system will automatically switch off based on the presence of people at home. Another major issue is that there might be occurrence of theft when nobody is present at home. The theft can be avoided by using MEMS accelerometer which intimates the user through registered mobile number when there is an unexpected break of windows or door through the GSM modem. The system in addition also has a provision for the user to fix energy consumption reading and when the user consumption exceeds a fixed reading, a message would be sent to the users registered mobile number through the GSM modem. Applications for this system include workstations, open office cubicles, home offices, and home entertainment systems.
Foxwell GT80 PLUS Next Generation Diagnostic Platform Get Free Foxwell NT1001 TPMS Trigger Tool
http://www.buyobdtoolshop.com/wholesale/foxwell-gt80-plus-next-generation-diagnostic-platform-12510.html
Permen lhk no. 46 2016 ttg pemanfaatan jasa lingkungan panas bumi dan kawasan...Rizki Darmawan
Rincian peraturan menteri lingkungan hidup dan kehutanan dalam perizinan hingga untuk pemanfaatan geothermal/panas bumi di lokasi taman nasional, taman hutan raya , taman wisata alam.
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
Dr.G.Anandharaj1, Dr.P.Srimanchari2
1Associate Professor and Head, Department of Computer Science
Adhiparasakthi College of Arts and Science (Autonomous), Kalavai, Vellore (Dt) -632506
2 Assistant Professor and Head, Department of Computer Applications
Erode Arts and Science College (Autonomous), Erode (Dt) - 638001
ABSTRACT
In unpredictable increase in mobile apps, more and more threats migrate from outmoded PC client to mobile device. Compared
with traditional windows Intel alliance in PC, Android alliance dominates in Mobile Internet, the apps replace the PC client
software as the foremost target of hateful usage. In this paper, to improve the confidence status of recent mobile apps, we
propose a methodology to estimate mobile apps based on cloud computing platform and data mining. Compared with
traditional method, such as permission pattern based method, combines the dynamic and static analysis methods to
comprehensively evaluate an Android applications The Internet of Things (IoT) indicates a worldwide network of
interconnected items uniquely addressable, via standard communication protocols. Accordingly, preparing us for the
forthcoming invasion of things, a tool called data fusion can be used to manipulate and manage such data in order to improve
progression efficiency and provide advanced intelligence. In this paper, we propose an efficient multidimensional fusion
algorithm for IoT data based on partitioning. Finally, the attribute reduction and rule extraction methods are used to obtain the
synthesis results. By means of proving a few theorems and simulation, the correctness and effectiveness of this algorithm is
illustrated. This paper introduces and investigates large iterative multitier ensemble (LIME) classifiers specifically tailored for
big data. These classifiers are very hefty, but are quite easy to generate and use. They can be so large that it makes sense to use
them only for big data. Our experiments compare LIME classifiers with various vile classifiers and standard ordinary ensemble
Meta classifiers. The results obtained demonstrate that LIME classifiers can significantly increase the accuracy of
classifications. LIME classifiers made better than the base classifiers and standard ensemble Meta classifiers.
Keywords: LIME classifiers, ensemble Meta classifiers, Internet of Things, Big data
Knowledge graph-based method for solutions detection and evaluation in an on...IJECEIAES
Online communities are a real medium for human experiences sharing. They contain rich knowledge of lived situations and experiences that can be used to support decision-making process and problem-solving. This work presents an approach for extracting, representing, and evaluating components of problem-solving knowledge shared in online communities. Few studies have tackled the issue of knowledge extraction and its usefulness evaluation in online communities. In this study, we propose a new approach to detect and evaluate best solutions to problems discussed by members of online communities. Our approach is based on knowledge graph technology and graphs theory enabling the representation of knowledge shared by the community and facilitating its reuse. Our process of problem-solving knowledge extraction in online communities (PSKEOC) consists of three phases: problems and solutions detection and classification, knowledge graph constitution and finally best solutions evaluation. The experimental results are compared to the World Health Organization (WHO) model chapter about Infant and young child feeding and show that our approach succeed to extract and reveal important problem-solving knowledge contained in online community’s conversations. Our proposed approach leads to the construction of an experiential knowledge graph as a representation of the constructed knowledge base in the community studied in this paper.
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...inventionjournals
The problem of web search time complexity and accuracy has been visited in many research papers, and the authors discussed many approaches to improve the search performance. Still the approaches does not produce any noticeable improvement and struggles with more time complexity as well. To overcome the issues identified, an efficient multi mode conceptual clustering algorithm has been discussed in this paper, which identifies the similar interested user groups by clustering their search context according to different conceptual queries. Identified user groups are shared with the related conceptual queries and their results to reduce the time complexity. The multi mode conceptual clustering, performs grouping of search queries and users according to number of users and their search pattern. The concept of search is identified by using Natural language processing methods and the web logs produced by the default web search engines. The author designed a dedicated web interface to collect the web log about the user search and the same data has been used to cluster the social groups according to number of conceptual queries. The search results has been shared between the users of identified social groups which reduces the search time complexity and improves the efficiency of web search in better manner
Designing a Survey Study to Measure the Diversity of Digital Learners IJITE
This article describes the design of a quantitative study that aims to gather empirical data on the different
types of digital learners in a student population, inclusive of the elusive digital natives who purportedly
exist in settings laden with digital technology. The design of this study revolves on the impetus in mapping
the diversity of digital learners, followed by elucidations on the research design and methods that are to be
employed, its accompanying data analysis, ethical considerations and an elaboration of the measures that
are taken in ensuring validity and reliability.
Designing a Survey Study to Measure the Diversity of Digital LearnersIJITE
This article describes the design of a quantitative study that aims to gather empirical data on the different
types of digital learners in a student population, inclusive of the elusive digital natives who purportedly
exist in settings laden with digital technology. The design of this study revolves on the impetus in mapping
the diversity of digital learners, followed by elucidations on the research design and methods that are to be
employed, its accompanying data analysis, ethical considerations and an elaboration of the measures that
are taken in ensuring validity and reliability.
Framework for opinion as a service on review data of customer using semantics...IJECEIAES
At opinion mining plays a significant role in representing the original and unbiased perception of the products/services. However, there are various challenges associated with performing an effective opinion mining in the present era of distributed computing system with dynamic behaviour of users. Existing approaches is more laborious towards extracting knowledge from the reviews of user which is further subjected to various rounds of operation with complex procedures. The proposed system addresses the problem by introducing a novel framework called as opinion-as-a-service which is meant for direct utilization of the extracted knowledge in most user friendly manner. The proposed system introduces a set of three sequential algorithm that performs aggregated of incoming stream of opinion data, performing indexing, followed by applying semantics for extracting knowledge. The study outcome shows that proposed system is better than existing system in mining performance.
Integrated expert recommendation model for online communitiesst02IJwest
Online communities have become vital places for Web 2.0 users to share knowledg
e and experiences.
Recently, finding expertise user in community has become an important research issue. This paper
proposes a novel cascaded model for expert recommendation using aggregated knowledge extracted from
enormous contents and social network fe
atures. Vector space model is used to compute the relevance of
published content with respect
to a specific query while PageRank
algorithm is applied to rank candidate
experts. The experimental results sho
w that the proposed model is
an effective recommen
dation which can
guarantee that the most candidate experts are both highly relevant to the specific queries and highly
influential in corresponding areas
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
Abstract: The main aim of this project is secure the user login and data sharing among the social networks like Gmail, Facebook and also find anonymous user using this networks. If the original user not available in the networks, but their friends or anonymous user knows their login details means possible to misuse their chats. In this project we have to overcome the anonymous user using the network without original user knowledge. Unauthorized user using the login to chat, share images or videos etc This is the problem to be overcome in this project .That means user first register their details with one secured question and answer. Because the anonymous user can delete their chat or data In this by using the secured questions we have to recover the unauthorized user chat history or sharing details with their IP address or MAC address. So in this project they have found out a way to prevent the anonymous users misuse the original user login details.
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
Abstract: In many fields, such as industry, commerce, government, and education, knowledge discovery and data
mining can be immensely valuable to the subject of Artificial Intelligence. Because of the recent increase in
demand for KDD techniques, such as those used in machine learning, databases, statistics, knowledge acquisition,
data visualisation, and high performance computing, knowledge discovery and data mining have grown in
importance. By employing standard formulas for computational correlations, we hope to create an integrated
technique that can be used to filter web world social information and find parallels between similar tastes of
diverse user information in a variety of settings
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
Web is a rich domain of data and knowledge, which is spread over the world in unstructured manner. The
number of users is continuously access the information over the internet. Web mining is an application of data
mining where web related data is extracted and manipulated for extracting knowledge. The data mining is used
in the domain of web information mining is refers as web mining, that is further divided into three major
domains web uses mining, web content mining and web structure mining. The proposed work is intended to
work with web uses mining. The concept of web mining is to improve the user feedbacks and user navigation
pattern discovery for a CRM system. Finally a new algorithm HMM is used for finding the pattern in data,
which method promises to provide much accurate recommendation.
Similar to A Novel Frame Work System Used In Mobile with Cloud Based Environment (20)
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
A Novel Frame Work System Used In Mobile with Cloud Based Environment
1. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 72
Paper Publications
A Novel Frame Work System Used In Mobile
with Cloud Based Environment
1
D. Aravind Gosh, 2
Dr.C.Nalini
1,2
Dept. of CSE, Bharath University
Abstract: Recent era efforts have been taken in the field of social based Question and Answer (Q&A) which is used
to search the answers for the non – factorial questions. But traditional search engines like Google, Bing is used to
answer only for the factorial questions where we can get direct answer from the data base servers. The web search
engine for the (Q&A) system does not dependent on the broadcasting methods and centralized server for
identifying friends on the social network. The problem is recovered by using mobile Q&A system in that mobile
nodes are help full for accessing internet because these techniques are used to generate low node overload, higher
server bandwidth cost and highest cost of mobile internet access. Lately technical experts proposed a new method
called Distributed Social – Based Mobile Q&A system (SOS) which makes very faster and quicker responses to the
asker. SOS enables the mobile user’s to forward the question in the decentralized manner in order get effective,
capable, and potential answers from the users. SOS is the light weighted knowledge engineering technique which is
used find correct person who ready and willing to answer questions hence this type of search are used reduce
searching time and computational cost of the mobile nodes. In this paper we proposed a new method called mobile
Q&A system in the cloud based environment through which the data has been as been transmitted form cloud
server to the centralized server at any time.
Keywords: Question and answer system, On-line social network, Non-Factual questions, Peer to Peer system,
clustering technique, cloud computing terminology, and Virtual Local Area Networks (VLANs).
I. INTRODUCTION
In earlier traditional search engines like Bing and Google which is used to retrieve answers for the factorial or factual
questions through Internet [1]. In order for getting improves the quality, performance and efficiency of the search engines
we proposed new method in the search by using keywords of questions itself. Similar interested people may be any
particular field can be grouped or clustered in order to refer the historical results. Even though the factual questions can be
answered in the form of centralized stored server but this technique is not suitable for non – factual queries answering
which is more over subjective (for example, can anyone recommend me a Doctorate professor for doing project in the
data mining issues…?) If the required and valid information’s is not available in the data base server means the question is
forwarded to the human begins which are the most “Intelligent Machine in the universe” [4].
The social search based question & answer system can be categorized in to two types: Centralized server based and Broad
casting based. In Centralized server we used to constructs maintains the record of the each social user and user’s friends, it
also searches required answers from the friends and friends of friends so on. In Broad casting method each question has
been broad casted to every single user in the community. Because of rapidly increasing in the development of the smart
phone can make use of effective internet access very fast and secured way hence this makes Q&A system more promising
and compatible applications [6]. However, the previous centralized and broadcasting techniques are not use full for the
mobile supporting (smart phones) because mobile nodes access the nodes with the limited resources and higher bandwidth
cost. Later group of technical researchers have proposed SOS method (Distributed Social – based mobile Q&A system)
which is used to search the answer based on the friends who are capable and the question ID with social ID are framed
2. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 73
Paper Publications
along with the queries [7]. In this paper we proposed new method called mobile Q&A system in the cloud based
environment which serves as a mobile cloud computing based on the cloud computing concepts. Cloud computing are
used to meet the requirements like adaptability, scalability, availability, and self awareness [8].
The remainder of the paper is organized as follows. In section 2 we presented related works and section 3 discuss about
the design of SOS system. Section 4 explains in detail about Architecture Diagram. Section 5 and 6 gives out detail study
about Algorithm and Performance Evaluation. We conclude this paper with screenshot and remarks on future work in
Section 7 & Section 8 and Section 9 produces References papers.
II. RELATED WORKS
The first and for most part to design SOS (Distributed Q&A mobile system) is completely and totally based on social
networking side which can be extended the lower end mobile system which can tackle correct answer identification. SOS
is used find the accurate answer for the identification and quality answer is responsible for the willingness of user to
answer another user’s question. They proposed similar interest and quality answer based on the previous experience and
also based on forward question method. In this paper we proposed new method called mobile Q&A system in the cloud
based environment in which server serves as a mobile cloud computing. Cloud computing are used to meet the
requirements like availability, scalability, adaptability, availability, and self-awareness.
In this paper [1] focus in on specific classification of social search because searchers asks the quires to the group of the
people and individually whom they know personally and friendly in the social based networking message updating. When
social experiences can also able to do a web search with the help of social information. In fact search engines are used to
match of pre – search to post – search questionnaires.
In this paper [2] they identified the gratification and dimension of users and user’s friends networking sites as a result
three kinds of dimensions can be resulted according to connection dimension, friendship dimension and information
dimensions. This paper helps to understand friends networking sites which are mediated for the social networking
communities that make people with the similar interest to interact. Hence the main purpose of this paper to understand
uses and gratification in order to obtain information from the networking sites.
In this paper [3] social searching is totally focus on the creations and deletion of links between individuals, friends, group
members and associated links between parents and children (parents became collaborator). Hence parents and children
can be link to guardian collaborator to his or her child.
In this paper [4] the phenomenon used to search social network status message in order to questions. Survey of this paper
conveys about asking and answering queries via status – message updates via social networking. This paper gives us clear
understanding about informational needs by using general tools like social search tool and crawler tool and online tool
which makes status messages to ask questions rather than giving detail descriptions about their current status.
In this paper [5] Peer to peer networking architecture makes a way to store and share resources based on the decentralized
manner by using IP (Internet Protocol) multicasting method data have been encrypted and then transmitted to known user
for the authorize information. This paper gives brief knowledge about the P2P which has no server to control and transfer
data to another system, so the peer should wait until they get data from root node which is developed by the binary tree.
Peer to Peer communication is more secured because it performs the operation in the centralized manner. Increase in
efficiency and minimizing of the bandwidth consumption is the main disadvantage in the P2P network. Senders and
receivers have the secret key word which is acquired by the Encryption and Decryption.
In [6] authors have proposed about the usage of multimedia content in the Peer to Peer architecture. The basic design in
order to support P2P multimedia sharing forums based on Multimedia board (M - Board). Multimedia content are widely
used because of increasing of bandwidth and storage of resource as well as multimedia materials as high pictures
resolutions for the third party services providers like you tube etc. Hence it is most and more beneficial for developing
multimedia content in an easy manner, low cost and efficient manner.
In this paper [7] authors have proposed a new technique called SOS (Social based Mobile Q&A system) with low cost and
node so that very quick response to the quires. When the asker indentified potential answers by means of previous answer
3. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 74
Paper Publications
quality from friends or friends of friends. Tools like Natural Language Processing (NPL), First Order Logic representation
(FOL) and Registration Server.
In this paper [8] we have learnt about the detail how the networking server scan and search nearby user who can really
give out potential answer based on the similar interest description and hence makes requests based on the mobile
resources sharing. Mobile clouds are capable of extracting to translate them into the English language.
III. SOS (SOCIAL BASED MOBILE Q&A SYSTEM)
SOS (Social based Mobile Q&A system) in a distributed way with low over node and lower system cost, which can make
quick responses to the queries. SOS techniques enables the mobile users in order to forward the questions to the potential
users who can answer the question from the friend list, the resulting operation can be done through decentralized manner
before resorting to the server. High performance of SOS and Q&A services result can be obtained in the real time
application with the help of analytical result. The queries can be forwarded along with the online social networking tool
with number of hops then to sever. The heart of the distributed Social based Mobile Q&A system is that it can makes
issues usually with the persons closely related with the his / her social life along with the simple interest. Mobile cloud
nodes are basically based under the cloud computing concepts which used to access the Centralized database server with
the help of cloud based server at any time anywhere. Hence the mobile cloud computing meets the requirements of
availability, scalability, and adaptability.
IV. ARCHITECTURE DIGRAM
A. Registration Server:
Registration Server technique refers to the continues and compulsory recording of the information together with the
certain type of descriptive or identifying character formats with certain concerns between them, as provided by the laws
and regulation of each country specification. SOS incorporates on the online social networking sites, where social links
are connected by the interconnecting nodes. User Registration work as been carried out in the Registration Server hence
user is represented with the Similar Interest ID, So that user can share his/her common interest with their friends and
friends of friends.
B. First–Order Logic Representation:
FOL is a very powerful technique for to describe objects and their relationship hence it serves as base to the inference
technique. First Order Predicate (FOP) calculus is used to build analyses of different type of architectures. FOP method is
very declarative and descriptive representation of driving information and knowledge from the database. Flexibility as
more limitation when more than module added to the common database unfortunately hence it maintains monotonic for
consistency learning process. FOP logic uses different kinds of statements for composing atomic symbols in order to
4. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 75
Paper Publications
predicate function with multiple arguments. This type of representation are used to allow little amount of flexible
knowledge but sensitivity and efficiency makes way for weakness in the large knowledge database.
C. First – Order Logic Inference:
Inference is a method which is used to attack user’s sensitive data from the complete database. Inference is a data mining
techniques which is used to find hidden information from the user perspective. Verification of data mining together with
various level of security attack is concluded for protections of the hidden levels are used in Inference technique. Gaining
knowledge illegitimately from the database for analysis purpose is performed in the inference attack hence it builds
inference structure and inference goal for connecting FOL symbols with respective goals. Each and every node in the
lattice inference structure represents connective between syntax symbols of the social information and fuzzy database.
D. Natural Language Processing:
Natural Language Processing (NPL) is a technique which is used to translate human languages into Computer
understandable language. It is a method for a computer to understand a text without any sort of calculations and clues
henceforth this technique automates selection answer process by forwarding the question from one mobile node to another
in the SOS system. In order to parse the question, the mobile node used to first process the queries or question in the
Natural Language Processing (NLP) and then initiate the question to the FOL format then follows inference technique in
order to infer user question to the similar interest people. Finally, the question has been changed into numerical string
formats.
E. Question Interested Id:
Question Interested ID is introduced in order to generate question ID and interest ID in the numerical string format. Hence
the top of the line list contains all user interest ID categories in the database server. The different types of interest are
categorized in alphabetic order in the category’s column and each category represent by its entry index. While generating
the numerical string format each and every category checked and tabled therefore if a user ask a question with a similar
interest category people then the entry index of similar interest people in his/her profile is identified using digits in the
numerical string of the corresponding position.
F. Best Answer Module:
Social networking sites which are used to directly indicate the willingness and similar interest people in order to answer or
forward the question to the user’s friends and friends of friends recently works of social networking has studied about the
effectively calculation of the social closeness and similar interest between different user’s. However this technique is
wholly based on the network topology where energy is consumed. But social online networking changes very often
therefore network topology calculation is not mostly suitable for the mobile device for SOS techniques. In order to reduce
the over load on the mobile node each user in the SOS (Social based Mobile Q&A system) manages to find information of
the quality answer based on his/her interest of their friends. As the performance of the SOS depends on knowledge based
on user I, hence User I considers as the number answer received from the User J and also quality answer of User J was
calculated hence we call it has feedback mechanism calculation. SOS initially makes the users to indicate the answer
quality and value of a newly added friend for each received answers therefore an asker can rate the quality of the answer
based on the FOL format. By considering high dimensionality of online social networking sites user can answer to the
question and rate the quality answer from the another user reviews. In this way a mobile node can able to quickly note the
active answers which are passive before and we can able to identify them as the potential answer to the question.
G. Cloud Computing:
Cloud Computing is a recently emerging technical computing terminology which is based on the consumption and utility
of computer resources. Cloud computing are mostly involved in deploying of the Remote Servers and Software Networks
which makes centralized data storage and online access of resources or computer services.
a. Characteristics Of Cloud Computing:
AGILITY: Agility is used to improve user’s ability to re-establish or re-provision infrastructure resources of the mobile
computing.
5. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 76
Paper Publications
APPLICATION PROGRAMMING INTERFACE (API): Application Programming Interface used to access software
which enables computers and mobile devices to interact with the cloud software. Cloud computing used to represent
Representational State Transfer (REST).
COST: Cloud computing makes a way from capital expenditure to operational expenditure. Device and Location
Independence: Enables to access system by using web browser regardless of devices and locations (eg personal
computer, mobile phones). If the infrastructure is off-site (typically accessed by third party) via internet hence user can
connect from anywhere.
MAINTENANCE: Installation is very much easier than any other device because there is no need to install on each
user’s computers.
MULTIENANCY: Enables different kinds of sharing devices and manages lower cost across a large number of pools of
user’s.
PERFORMANCE: Performance is monitored in a very consistent manner hence architecture as been loosely coupled
and constructed using web service as the system interface.
PRODUCTIVITY: Productivity is increased whenever multiple user access on the same data simultaneously rather than
waiting for a data to be saved and emailed. Information need not to be re-entered when the data is not irrelevant to the
given topic neither user doesn’t need install software application in order to upgrade version.
RELIABILITY: Reliability increases when multiple users uses redundant sites which makes well defined and designed
cloud computing suitable for the business community.
SECURITY: Centralization of data can be improved due to secured resource factors but due to loss of control over the
sensitive data can make lack security for the kernels stored in the database.
b. Service Models Of Cloud Computing:
INFRSTRUCTURE as a SEVICE (IaaS): In order to deploy Virtual Local Area Networks (VLANs) and Software on
the cloud infrastructure applications cloud users install operating system images and virtual machines (oracle, VMware,
servers, storage, load balancers and network).
PLATFORM as a SERVICE (PaaS): Cloud providers a delivers web server, database, programming language execution
environment and operating system. Cloud application developers used to run software application on low cost. Cloud
environment can manage hardware/software layers and complexity issues.
SOFTWARE as a SERVICE (SaaS): Cloud providers are used to install and operate software applications in the cloud
environment where users access the software from the software clients. Cloud users need not to manage infrastructure and
platform where the application runs hence we can eliminate installing of cloud software from users own computer which
used to simplifies support and maintenance. Cloud application is very different from another application therefore
scalability is achieved by using cloning task with multiple virtual machines during run time. Load balancers are used to
distribute the working task over to different set of virtual machine at different place this process is very much transparent
to the cloud server which access single point. In order to accommodate a very huge amount of cloud users multitenant
technique, that is any machine servers can able to access more than one cloud user organization at a time.
V. ALGORITHM 1
Pseudo code of the best answer identification executed by node i:
1: Input: IDi, IDj , Q(i,j) (j ∈ Fi)
2: Output: top-K best answerers
3: //Periodically update Q(i,j) (j ∈ Fi)
4: for each time identifying new friend (friend j) initiated with friend list Fi do
5: Equation (2) has been updated based on Q(i,j) Question (user (i), user friend (j))
6. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 77
Paper Publications
6: end for
7: if the question cannot be answered by the Q(i) then
8: if TTL>0 then
9: for each friend j in friend list Fi do
10: Using IDqi and IDj Similarity has been calculated S(qi,j) based on
Equation (1)
11: Calculate Best Answer (BA(i,j)) using Q(i,j) and Similarity (S(qi,j)) based on
Equation (3)
12: Add Best Answer BA(i,j) to a list List do
13: end for
14: QuickSort partition around the Kth largest element in List
15: Then tofind the top-K friends who are having the highest BA(i,j)
16: TTL-=1
17: Send the Question to the identified K friends
18: end if
19: end if
20: if the user does not received answers from its created Question
21: Forward Question to the centralized server for the answer from node j
22: end if
23: Then after receiving the correct answer from node j
24: By Default extracted answer is saved in the cloud server which is the accessed by centralized server when ever and
where ever
25: end if
Algorithm 1 shows the pseudo code process for selecting the best answer from the node j. If the node i could not able to
identify the correct answer to the created question during the time corresponding to TTL, it waits for the centralized server
for resorting the correct answer. Lines 4 – 6 are used eventually update the answer quality of each user’s friends. Line 8 –
13 calculates the every single friend’s best answer and used to generate metric values for the further classifications. Line
14 – 17 manages to identify the top K – friends who have the highest best answer metric value. Lines 24 – 26 are used to
save correct answer in the cloud server which is then accessed by the centralized server.
VI. PERFORMANCE EVALUATION
SOS system has been evaluated using crawled questions from Yahoo! Answers. Since Yahoo! Answer does not have any
type of information about user profile, hence we crawled four different types of user’s in the decentralized way. We then
used one user as the seed and used as first breadth search in order to crawl another user’s profile. Users are clustered using
social clustering methodology. User’s profiles contain information about user’s education, hobbies and interests and their
First Order Logical (FOL) representation and then finally encoded as a numerical strings. In this experiment we have
focused on the question evaluating into three related fields computer science, history, and world geography and Indian
polity.
Since the facebook dataset is not relevant to the Yahoo! Answer dataset, we cannot able to correctly and directly identify
which is capable of answering the questions. Therefore in order to make the experiments very operable we manually
created 100 questions with the keywords which can be mapped to a facebook user’s profile interest. For each of 100
questions we randomly assigned 70 questions for the computer science and each 10 questions to history, world geography
and Indian polity. We have used answer quality indication by the Yahoo! Answer methodology in our experiments hence
the best answer has five rating, the spam answer has one rating and all other type as three ratings. The 100 questions have
been replicated by 10 times randomly. We set β to 0:5 to balance interest similarity and answer quality α to 0.3 by default
impact factor. In order to make the correlation between the user, we imported educational database, Thus by mandatory
when a question is asked by user A, the inference engine can automatically searches the correct answer. As a result,
Inference engine with SOS collaboration can handle the matching answerers without an inference engine.
7. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 78
Paper Publications
By default, we have chosen four users to select for forwarding the question. We are using RLA in order to denote the
number of Relevant Answer for the questions and RTA is used to determine ReTrieved Answers in the SOS system. In
the following experiments we have deployed four different types of matrices.
EXTRACT RATE: A measurements in order to Extract Returned Rate results which is represented by |RTA| / (|RLA Ω
RLA|).
COMPLETE RATE: A measurements is obtained in order to know completeness of the returned results which is
represented by |RLA| / (|RTA Ω RTA|).
OVER REVIEW: Technique used to extract number of messages being transmitted in the system during overall
simulation process.
In our evaluation part, the users are used to answer the question in the different approaches but the correct and relevant
answer to the question has been traced out from Q&A educational database. We have classified the answerers in the trace
out data formats hence we have two different approaches for denoting FOL inference engines.
1. SOS – W/ - Infer (SOS with Inference)
2. SOS – W/O – Infer (SOS without Inference)
We had compared the routing performance of SOS with two different techniques Flooding and Random walk. Flooding
method represent broadcasting techniques which is used to forward question to the entire user friend’s. In Random
method node forwards the question to the users when it gets the correct Answer.
Fig.2 QUERY PRECISION RATE VERSUS K
The number of selected friends K for each node as been increased in the each step we have seen SOS as the highest query
precision rate because SOS used to identify social relationship. In the Flooding type node used to forward the question to
all the user’s friends therefore the precision will become low. In the Random Walk, a question being sent randomly to the
user’s henceforth low precision rate has been generated. Precision rate decrease in both SOS – W/- Infer (SOS With
Inference) and SOS – W/O – Infer (SOS With Inference) when K value is increased.
0
1
2
3
4
5
6
7
5 10 15 20
PrecisionRate
Number of Selected Neighbors (K)
SOS - W/- Inference
SOS - W/O - Inference
Flooding
Random Walk
8. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 79
Paper Publications
Fig.3 QUERY RECALL RATE VERSUS K
The resulted value of recall rate has been compared in the four system formation. Flooding approaches used to forwards
the question to the user’s friends and friends hence it provides highest Query Recall Rate, therefore recall rate of Random
Walk also increased this because many user’s friends receives questions.
Fig.4 COMMUNICATION DELAY
Communication overhead has been measured by using number of queries with different types of network services or size.
N size has been crawled using with different users and network with same topology. In, Flooding terminology queries or
question forwarded to all the neighbors of users, hence it leads to the high overhead and recall rate has been improved.
Random Walk has a low overhead when compared to the flooding. But SOS remains constant with overhead, Potential
answer can be efficiently and effectively located therefore network size does not need to increase the number of
forwarding question hops.
0
10
20
30
40
50
60
70
80
90
100
5 10 15 20
RecallRate
Number of Selected Neighbors (K)
Random Walk
Flooding
SOS - W/O - Inference
SOS - W/- Inference
0
20
40
60
80
100
120
140
160
100 200 300 400
Delay(Min)
Network Service
Random Walk
Flooding
SOS -W/O- Inference
SOS -W/- Inference
9. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 80
Paper Publications
Fig. 5 QUERY PRECISION WITH NUMBER OF SOCIAL HOPS
Fig (5) Precision rate has been calculated with different social hops. We have seen that 80 percent of the answers are
retrieved from direct friends, this happens because social network used to cluster friends with common Interest ID. SOS –
W/- Infer (SOS with Inference) has the high recall and precision rate hence SOS – W/O – Infer (SOS with Inference)
identify the potential answer with information inferred from user’s and question.
VII. HOME PAGE
This figure represents our project home page were we are creating initial network for our project. We are made fakebook
for the Bharath University so that top professional to the student can register their personal information along with their
interest. Any student can post their question and get answer regarding subject knowledge. The best answer is given by the
rating based. Finally we are connecting relevant application with the cloud environment.
0
10
20
30
40
50
60
70
5 10 15 20
Delay(Min)
Network Service
SOS - W/O - Inference
SOS - W/- Inference
10. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 81
Paper Publications
A. Registration Page:
In the Registration Page we are making user ID and login information for the initial stage of creating database. After
login page identification we are making Sign up page and getting information about the user. Once user registered their
details they can login any time anywhere.
B. Cloud Service Provider:
This screen a shot describes about cloud service provides detailed information. After the data has been entered in
database, the following database server is connected to cloud service provider.
11. ISSN 2350-1022
International Journal of Recent Research in Mathematics Computer Science and Information Technology
Vol. 2, Issue 1, pp: (72-83), Month: April 2015 – September 2015, Available at: www.paperpublications.org
Page | 82
Paper Publications
C. Cloud Service:
Finally the distributed database server has been connected to the Cloud Server for the real time application protocol.
VIII. CONCLUSION
SOS system used to enable nodes to find the friends who can accurately answer the question. FOL representation and
inference engine are used to find capability and willingness person who is ready to give the correct answer for the
question. We compared four different types of metrics like extract rate, complete rate, over reviewed, and delay
in time for getting the correct answer. Therefore by understanding the following concept we proposed new
method called “Mobile Q&A System in the Cloud based Environment. Cloud server acts as bridge for
connecting centralized server without a disturbance at any cost and time. The future enhancement of this project
can be done in Cloud security environment because there is lot security threat for the cloud server by hackers.
REFERENCES
[1] The Anatomy of a large scale social search engine. (Damon Horovrity, Sepandar D.Kamvar). ACM 978 – 1 – 60558
– 799 – 8/10/2014.
[2] A Comparison of Information Seeking Using Search Engines and Social Networks. (Meredith Ringel Morris, Jaime
Teevan Katrina Panovich) Copyright 2010 Association for the Advancement of Artificial Intelligence.
[3] MySpace and Face book : Identifying Dimension of used and Gratification for Friend Networking Sites. (Jennifer
Bonds, John Raacke) Individual Difference Research 2010 vol:8 No:1 PP 27-33.
[4] Opportunities for remote collaboration in a social web search model that integrates parents and children. (Sandra
Regina Rocha Silva, Geraldo Bonorino Xexeo, Moacir Florentio Da Silva jr) On-Line Publication Feb2014.
[5] What do People Ask Their social networks and why? A Survey Study of Status Messages Q&A behavior. (Meredith
Ringel Morris, Jaime Teevan Katrina Panovich) (IW3C2) 2010 ACM 978-1-60558-929-9/10/04