Online video search or stream live on social media has become tremendous widespread and
speedy increased continuously in recent years. Most of the videos shared on social media are
aimed at the more number of views from audiences. What and how many videos the users
shared all around the world have created a great amount and varied videos and the other data
into Internet cloud’s database and even can be viewed as a kind of big data of digital contents.
This research is to present how to implement a social-driven tags computing (SDT) which can
be used to facilitate online video search on social media platforms
There are various online networking sites such as Facebook, twitter where students casually discuss their educational
experiences, their opinions, emotions, and concerns about the learning process. Information from such open environment can
give valuable knowledge for opinions, emotions and help the educational organizations to get insight into students’ educational
life. Analysing down such data, on the other hand, can be challenging therefore a qualitative research and significant data
mining process needs to be done. Sentiment classification can be done using NLP (Natural Language Processing). For a social
network that provides micro blogging services such as twitter, the incoming tweets can be classified into News, Opinions,
Events, Deals and private Messages based on authors information available in the tweets. This approach is similar to
Tweetstand, which classifies the tweets into news and non-news. Even for e-commerce applications virtual customer
environments can be created using social networking sites. Since the data is ever growing, using data mining techniques can get
difficult, hence we can use data analysis tools
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
IMPLEMENTATION OF FOLKSONOMY BASED TAG CLOUD MODEL FOR INFORMATION RETRIEVAL ...ijscai
In the magnitude of internet one need to devote extra time to investigate anticipated resource, especially
when one need to search information from documents. For the higher range internet there is serious need
to demand the essentiality to discover the reserved resources. One of the solutions for information retrieval
from document repository is to attach tags to documents. Numerous online social bookmarking services
permit users to attach tags with resources which are eventually meta-data, frequently stated as folksonomy.
In current paper, authors implemented this model for information retrieval by utilizing these tags, after
retrieving by using delicious API and synthesize tag cloud in an Indian University to search and retrieve
information from document repository.
Evaluation the Impact of Human Interaction/Debate on Online News to Improve U...IJERA Editor
The average of many people trust online comments for any news as much as personal recommendations [1], [2]. In this paper, we analyzed the impact of the online news’s comments to evaluating the threading models of electronic debates by using online surveys. In this paper, based on the results of our online survey of 500 participants, we evaluated whether forums with comments concerning online news are appropriate for the study of debates. In particular, we have to verify whether the nature of discussions around news is argumentative and whether the participating people expect to engage in multiple rounds of arguments. We presented DirectDemocracyP2P application as a user interface for decentralized debates. In this paper, we evaluated and analyzed the comments that were collected from online surveys to improve the DirectDemocracyP2P applications. Also we have to verify whether the actual comments commonly submitted around news do go beyond the simple advertisement of one own’s merchandise and attacks of competitors, into fair reviews of news features and quality.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
There are various online networking sites such as Facebook, twitter where students casually discuss their educational
experiences, their opinions, emotions, and concerns about the learning process. Information from such open environment can
give valuable knowledge for opinions, emotions and help the educational organizations to get insight into students’ educational
life. Analysing down such data, on the other hand, can be challenging therefore a qualitative research and significant data
mining process needs to be done. Sentiment classification can be done using NLP (Natural Language Processing). For a social
network that provides micro blogging services such as twitter, the incoming tweets can be classified into News, Opinions,
Events, Deals and private Messages based on authors information available in the tweets. This approach is similar to
Tweetstand, which classifies the tweets into news and non-news. Even for e-commerce applications virtual customer
environments can be created using social networking sites. Since the data is ever growing, using data mining techniques can get
difficult, hence we can use data analysis tools
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
IMPLEMENTATION OF FOLKSONOMY BASED TAG CLOUD MODEL FOR INFORMATION RETRIEVAL ...ijscai
In the magnitude of internet one need to devote extra time to investigate anticipated resource, especially
when one need to search information from documents. For the higher range internet there is serious need
to demand the essentiality to discover the reserved resources. One of the solutions for information retrieval
from document repository is to attach tags to documents. Numerous online social bookmarking services
permit users to attach tags with resources which are eventually meta-data, frequently stated as folksonomy.
In current paper, authors implemented this model for information retrieval by utilizing these tags, after
retrieving by using delicious API and synthesize tag cloud in an Indian University to search and retrieve
information from document repository.
Evaluation the Impact of Human Interaction/Debate on Online News to Improve U...IJERA Editor
The average of many people trust online comments for any news as much as personal recommendations [1], [2]. In this paper, we analyzed the impact of the online news’s comments to evaluating the threading models of electronic debates by using online surveys. In this paper, based on the results of our online survey of 500 participants, we evaluated whether forums with comments concerning online news are appropriate for the study of debates. In particular, we have to verify whether the nature of discussions around news is argumentative and whether the participating people expect to engage in multiple rounds of arguments. We presented DirectDemocracyP2P application as a user interface for decentralized debates. In this paper, we evaluated and analyzed the comments that were collected from online surveys to improve the DirectDemocracyP2P applications. Also we have to verify whether the actual comments commonly submitted around news do go beyond the simple advertisement of one own’s merchandise and attacks of competitors, into fair reviews of news features and quality.
Graphs have become the dominant life-form of many tasks as they advance a
structure to represent many tasks and the corresponding relations. A powerful
role of networks/graphs is to bridge local feats that exist in vertices as they
blossom into patterns that help explain how nodal relations and their edges
impacts a complex effect that ripple via a graph. User cluster are formed as a
result of interactions between entities. Many users can hardly categorize their
contact into groups today such as “family”, “friends”, “colleagues” etc. Thus,
the need to analyze such user social graph via implicit clusters, enables the
dynamism in contact management. Study seeks to implement this dynamism
via a comparative study of deep neural network and friend suggest algorithm.
We analyze a user’s implicit social graph and seek to automatically create
custom contact groups using metrics that classify such contacts based on a
user’s affinity to contacts. Experimental results demonstrate the importance
of both the implicit group relationships and the interaction-based affinity in
suggesting friends.
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
Social groups in the form of different discussion forums are proliferating rapidly. Most of these
forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore,
recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members’ needs and favorites. It is noteworthy that not only the users’
comments and posts can have valuable information, but also there are some other valuable
information which can be obtained from social data; moreover, it could be extracted from
relations and interactions among users. Hence, association rules mining techniques are one of
the techniques which can be applied in order to extract more implicit data as input to the
recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have
defined new hybrid rules by considering both users and posts’ content data. Each of the defined
rules has been examined on an asynchronous discussion group in this study. In addition, the
impact of the defined rules on the precision and recall values of the recommender system has
been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and
usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising.
Tag based image retrieval (tbir) using automatic image annotationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALcscpconf
Artificial Intelligence techniques have been instrumental in helping users to handle the large amount of information on the Internet. The idea of recommendation systems, custom search engines, and intelligent software has been widely accepted among users who seek assistance insearching, sorting, classifying, filtering and sharing this vast quantity of information. In thispaper, we present a contextual model of recommendation engine which keeping in mind the context and activities of a user, recommends resources in an academic networking portal. Theproposed method uses the implicit method of feedback and the concepts relationship hierarchy to determine the similarity between a user and the resources in the portal. The proposed algorithm has been tested on an academic networking portal and the results are convincing
Contextual model of recommending resources on an academic networking portalcsandit
Artificial Intelligence techniques have been instrumental in helping users to handle the large
amount of information on the Internet. The idea of recommendation systems, custom search
engines, and intelligent software has been widely accepted among users who seek assistance in
searching, sorting, classifying, filtering and sharing this vast quantity of information. In this
paper, we present a contextual model of recommendation engine which keeping in mind the
context and activities of a user, recommends resources in an academic networking portal. The
proposed method uses the implicit method of feedback and the concepts relationship hierarchy
to determine the similarity between a user and the resources in the portal. The proposed
algorithm has been tested on an academic networking portal and the results are convincing.
Recommender systems have grown to be a critical research subject after the emergence of the first paper on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems, has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation and classification of that research. Because of this, we reviewed articles on recommender structures, and then classified those based on sentiment analysis. The articles are categorized into three techniques of recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to find out the research papers related to sentimental analysis based recommender system. To classify research done by authors in this field, we have shown different approaches of recommender system based on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in recommender structures research, and gives practitioners and researchers with perception and destiny route on the recommender system using sentimental analysis. We hope that this paper enables all and sundry who is interested in recommender systems research with insight for destiny.
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...IIIT Hyderabad
Online Social Networks (OSNs) are popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected with their friends. Consequently, linking user identities across OSN platforms, referred to as user identity linkage (UIL) becomes a critical problem. Solving this problem enables us to build a more comprehensive view of user’s activities across OSNs, which is highly beneficial for targeted advertisements, recommendations, and many more applications. In the thesis, we propose approaches for analyzing data collection methods, investigating biases in identity linkage datasets, linkage of user identities across social networks, control-ability of user identity linkage, and application of user identity linkage solutions to solve related problems.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...IJCSEA Journal
Viterbi Algorithm Decoder Enhanced with Non-transmittable Codewords is one of the best decoding
algorithm which effectively improves forward error correction performance. HoweverViterbi decoder
enhanced with NTCs is not yet designed to work in storage media devices. Currently Reed Solomon (RS)
Algorithm is almost the dominant algorithm used in correcting error in storage media. Conversely, recent
studies show that there still exist low reliability of data in storage media while the demand for storage
media increases drastically. This study proposes a design of the Soft Viterbi Algorithm decoder enhanced
with Non-transmittable Codewords (SVAD-NTCs) to be used in storage media for error correction. Matlab
simulation was used in this design in order to investigate behavior and effectiveness of SVAD-NTCs in
correcting errors in data retrieving from storage media.Sample data of one million bits are randomly
generated, Additive White Gaussian Noise (AWGN) was used as data distortion model and Binary Phase-
Shift Keying (BPSK) was applied for simulation modulation. Results show that,behaviors of SVAD-NTC
performance increase as you increase the NTCs, but beyond 6NTCs there is no significant change and
SVAD-NTCs design drastically reduce the total residual error from 216,878 of Reed Solomon to 23,900.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
““USATESTDOWN” A PROPOSAL OF A USABILITY TESTING GUIDE FOR MOBILE APPLICATION...csandit
The usability testing of mobile applications involving persons with Down syndrome is an issue
that has not be comprehensively investigated and there is no single proposal that takes on board
all the issues that could be taken into account[1]. This study aims to propose a practical guide
¨USATESTDOWN¨ to measure and evaluate the usability of mobile applications focusing on
Down syndrome users and their primary limitations. The study starts with an analysis of
existing methodologies and tools to evaluate usability and integrates concepts related to
inspection and inquiry methods into a proposal. The proposal includes the opinions of experts
and representative users; their limitations, the applicability during the development process and
the accessibility. This guide is based on the literature review and the author
A WIND POWER PREDICTION METHOD BASED ON BAYESIAN FUSIONcsandit
Wind power prediction (WPP) is of great importance to the safety of the power grid and the
effectiveness of power generations dispatching. However, the accuracy of WPP obtained by
single numerical weather prediction (NWP) is difficult to satisfy the demands of the power
system. In this research, we proposed a WPP method based on Bayesian fusion and multisource
NWPs. First, the statistic characteristics of the forecasted wind speed of each-source
NWP was analysed, pre-processed and transformed. Then, a fusion method based on Bayesian
method was designed to forecast the wind speed by using the multi-source NWPs, which is more
accurate than any original forecasted wind speed of each-source NWP. Finally, the neural
network method was employed to predict the wind power with the wind speed forecasted by
Bayesian method. The experimental results demonstrate that the accuracy of the forecasted
wind speed and wind power prediction is improved significantly.
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultancsandit
The National Institute of Standards and Technology (NIST) has issued a framework to provide
guidance for organizations within critical infrastructure sectors to reduce the risk associated
with cyber security. The framework is called NIST Cyber Security Framework for Critical
Infrastructure (CSF). Many organizations are currently implementing or aligned to different
information security frameworks. The implementation of NIST CSF needs to be aligned with and
complement the existing frameworks. NIST states that the NIST CSF is not a maturity
framework. Therefore, there is a need to adopt an existing maturity model or create one to have
a common way to measure the CSF implementation progress. This paper explores the
applicability of number of maturity models to be used as a measure to the security poster of
organizations implementing the NIST CSF. This paper reviews the NIST CSF and compares it to
other information security related frameworks such as COBIT, ISO/IEC 27001 and the ISF
Standard of Good Practice (SoGP) for Information Security. We propose a new information
security maturity model (ISMM) that fills the gap in the NIST CSF.
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
Social groups in the form of different discussion forums are proliferating rapidly. Most of these
forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore,
recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members’ needs and favorites. It is noteworthy that not only the users’
comments and posts can have valuable information, but also there are some other valuable
information which can be obtained from social data; moreover, it could be extracted from
relations and interactions among users. Hence, association rules mining techniques are one of
the techniques which can be applied in order to extract more implicit data as input to the
recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have
defined new hybrid rules by considering both users and posts’ content data. Each of the defined
rules has been examined on an asynchronous discussion group in this study. In addition, the
impact of the defined rules on the precision and recall values of the recommender system has
been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and
usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising.
Tag based image retrieval (tbir) using automatic image annotationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALcscpconf
Artificial Intelligence techniques have been instrumental in helping users to handle the large amount of information on the Internet. The idea of recommendation systems, custom search engines, and intelligent software has been widely accepted among users who seek assistance insearching, sorting, classifying, filtering and sharing this vast quantity of information. In thispaper, we present a contextual model of recommendation engine which keeping in mind the context and activities of a user, recommends resources in an academic networking portal. Theproposed method uses the implicit method of feedback and the concepts relationship hierarchy to determine the similarity between a user and the resources in the portal. The proposed algorithm has been tested on an academic networking portal and the results are convincing
Contextual model of recommending resources on an academic networking portalcsandit
Artificial Intelligence techniques have been instrumental in helping users to handle the large
amount of information on the Internet. The idea of recommendation systems, custom search
engines, and intelligent software has been widely accepted among users who seek assistance in
searching, sorting, classifying, filtering and sharing this vast quantity of information. In this
paper, we present a contextual model of recommendation engine which keeping in mind the
context and activities of a user, recommends resources in an academic networking portal. The
proposed method uses the implicit method of feedback and the concepts relationship hierarchy
to determine the similarity between a user and the resources in the portal. The proposed
algorithm has been tested on an academic networking portal and the results are convincing.
Recommender systems have grown to be a critical research subject after the emergence of the first paper on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems, has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation and classification of that research. Because of this, we reviewed articles on recommender structures, and then classified those based on sentiment analysis. The articles are categorized into three techniques of recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to find out the research papers related to sentimental analysis based recommender system. To classify research done by authors in this field, we have shown different approaches of recommender system based on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in recommender structures research, and gives practitioners and researchers with perception and destiny route on the recommender system using sentimental analysis. We hope that this paper enables all and sundry who is interested in recommender systems research with insight for destiny.
User Identity Linkage: Data Collection, DataSet Biases, Method, Control and A...IIIT Hyderabad
Online Social Networks (OSNs) are popular platforms for online users. Users typically register and maintain their accounts (user identities) across different OSNs to share a variety of content and remain connected with their friends. Consequently, linking user identities across OSN platforms, referred to as user identity linkage (UIL) becomes a critical problem. Solving this problem enables us to build a more comprehensive view of user’s activities across OSNs, which is highly beneficial for targeted advertisements, recommendations, and many more applications. In the thesis, we propose approaches for analyzing data collection methods, investigating biases in identity linkage datasets, linkage of user identities across social networks, control-ability of user identity linkage, and application of user identity linkage solutions to solve related problems.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
DESIGN OF SOFT VITERBI ALGORITHM DECODER ENHANCED WITH NON-TRANSMITTABLE CODE...IJCSEA Journal
Viterbi Algorithm Decoder Enhanced with Non-transmittable Codewords is one of the best decoding
algorithm which effectively improves forward error correction performance. HoweverViterbi decoder
enhanced with NTCs is not yet designed to work in storage media devices. Currently Reed Solomon (RS)
Algorithm is almost the dominant algorithm used in correcting error in storage media. Conversely, recent
studies show that there still exist low reliability of data in storage media while the demand for storage
media increases drastically. This study proposes a design of the Soft Viterbi Algorithm decoder enhanced
with Non-transmittable Codewords (SVAD-NTCs) to be used in storage media for error correction. Matlab
simulation was used in this design in order to investigate behavior and effectiveness of SVAD-NTCs in
correcting errors in data retrieving from storage media.Sample data of one million bits are randomly
generated, Additive White Gaussian Noise (AWGN) was used as data distortion model and Binary Phase-
Shift Keying (BPSK) was applied for simulation modulation. Results show that,behaviors of SVAD-NTC
performance increase as you increase the NTCs, but beyond 6NTCs there is no significant change and
SVAD-NTCs design drastically reduce the total residual error from 216,878 of Reed Solomon to 23,900.
Secure cloud transmission protocol (SCTP) was proposed to achieve strong authentication and secure
channel in cloud computing paradigm at preceding work. SCTP proposed with its own techniques to attain
a cloud security. SCTP was proposed to design multilevel authentication technique with multidimensional
password generations System to achieve strong authentication. SCTP was projected to develop multilevel
cryptography technique to attain secure channel. SCTP was proposed to blueprint usage profile based
intruder detection and prevention system to resist against intruder attacks. SCTP designed, developed and
analyzed using protocol engineering phases. Proposed SCTP and its techniques complete design has
presented using Petrinet production model. We present the designed SCTP petrinet models and its
analysis. We discussed the SCTP design and its performance to achieve strong authentication, secure
channel and intruder prevention. SCTP designed to use in any cloud applications. It can authorize,
authenticates, secure channel and prevent intruder during the cloud transaction. SCTP designed to protect
against different attack mentioned in literature. This paper depicts the SCTP performance analysis report
which compares with existing techniques that are proposed to achieve authentication, authorization,
security and intruder prevention.
““USATESTDOWN” A PROPOSAL OF A USABILITY TESTING GUIDE FOR MOBILE APPLICATION...csandit
The usability testing of mobile applications involving persons with Down syndrome is an issue
that has not be comprehensively investigated and there is no single proposal that takes on board
all the issues that could be taken into account[1]. This study aims to propose a practical guide
¨USATESTDOWN¨ to measure and evaluate the usability of mobile applications focusing on
Down syndrome users and their primary limitations. The study starts with an analysis of
existing methodologies and tools to evaluate usability and integrates concepts related to
inspection and inquiry methods into a proposal. The proposal includes the opinions of experts
and representative users; their limitations, the applicability during the development process and
the accessibility. This guide is based on the literature review and the author
A WIND POWER PREDICTION METHOD BASED ON BAYESIAN FUSIONcsandit
Wind power prediction (WPP) is of great importance to the safety of the power grid and the
effectiveness of power generations dispatching. However, the accuracy of WPP obtained by
single numerical weather prediction (NWP) is difficult to satisfy the demands of the power
system. In this research, we proposed a WPP method based on Bayesian fusion and multisource
NWPs. First, the statistic characteristics of the forecasted wind speed of each-source
NWP was analysed, pre-processed and transformed. Then, a fusion method based on Bayesian
method was designed to forecast the wind speed by using the multi-source NWPs, which is more
accurate than any original forecasted wind speed of each-source NWP. Finally, the neural
network method was employed to predict the wind power with the wind speed forecasted by
Bayesian method. The experimental results demonstrate that the accuracy of the forecasted
wind speed and wind power prediction is improved significantly.
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultancsandit
The National Institute of Standards and Technology (NIST) has issued a framework to provide
guidance for organizations within critical infrastructure sectors to reduce the risk associated
with cyber security. The framework is called NIST Cyber Security Framework for Critical
Infrastructure (CSF). Many organizations are currently implementing or aligned to different
information security frameworks. The implementation of NIST CSF needs to be aligned with and
complement the existing frameworks. NIST states that the NIST CSF is not a maturity
framework. Therefore, there is a need to adopt an existing maturity model or create one to have
a common way to measure the CSF implementation progress. This paper explores the
applicability of number of maturity models to be used as a measure to the security poster of
organizations implementing the NIST CSF. This paper reviews the NIST CSF and compares it to
other information security related frameworks such as COBIT, ISO/IEC 27001 and the ISF
Standard of Good Practice (SoGP) for Information Security. We propose a new information
security maturity model (ISMM) that fills the gap in the NIST CSF.
SEGMENTATION AND CLASSIFICATION OF BRAIN TUMOR CT IMAGES USING SVM WITH WEIGH...csandit
In this article a method is proposed for segmentation and classification of benign and malignant
tumor slices in brain Computed Tomography (CT) images. In this study image noises are
removed using median and wiener filter and brain tumors are segmented using Support Vector
Machine (SVM). Then a two-level discrete wavelet decomposition of tumor image is performed
and the approximation at the second level is obtained to replace the original image to be used
for texture analysis. Here, 17 features are extracted that 6 of them are selected using Student’s
t-test. Dominant gray level run length and gray level co-occurrence texture features are used for
SVM training. Malignant and benign tumors are classified using SVM with kernel width and
Weighted kernel width (WSVM) and k-Nearest Neighbors (k-NN) classifier. Classification
accuracy of classifiers are evaluated using 10 fold cross validation method. The segmentation
results are also compared with the experienced radiologist ground truth. The experimental
results show that the proposed WSVM classifier is able to achieve high classification accuracy
effectiveness as measured by sensitivity and specificity.
EXPOSURE AND AVOIDANCE MECHANISM OF BLACK HOLE AND JAMMING ATTACK IN MOBILE A...ijcseit
Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node
carries on as host or router and every node can participate in the transmission of packets. Because of its
dynamic behaviour such system is more susceptible against various sorts of security threats, for example,
Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block the transmission of
the system. Black hole attack and Jamming attack is one of them which promote itself has shortest or new
fresh route to the destination while jamming attack which make activity over the system. This paper
introduces the thorough literature study for the Black hole attack and jamming attack of both the attack by
various researchers.
CORRELATION BASED FUNDAMENTAL FREQUENCY EXTRACTION METHOD IN NOISY SPEECH SIGNALijcseit
This paper proposed a correlation based method using the autocorrelation function and the YIN. The
autocorrelation function and also YIN is a popular measurement in estimating fundamental frequency in
time domain. The performance of these two methods, however, is effected due to the position of dominant
harmonics (usually the first formant) and the presence of spurious peaks introduced in noisy conditions.
The experimental results of computer simulations on female and male voices in different noises perform
that the gross pitch errors are lower in proposed method as compared to other related method in different
types of signal to noise ratio conditions.
QUALITY OF SERVICE STABILITY BASED MULTICAST ROUTING PROTOCOL FOR MANETScseij
Mobile Ad Hoc Networking Does Not Own Any Fixed Infrastructure And Hence, Stable Routing Is The
Major Problem. The Mobility Nature Of Manet’s Node Facilitates Rediscovery Of A New Path To
Organizing A Routing. In Order To Intensify The Quality Of Service And Routing Stability In Manet, We
Propose A Dynamic Quality Of Service Stability Based Multicast Routing Protocol By Modifying The
Cuckoo Search Algorithm Through A Modernizing Mechanism Which Is Derived From The Differential
Evolution Algorithm. Tuned Csa Is A Combined Feature Of Csa And De Algorithms. Periodically, Each
Node In The Network Creates Neighbour Stability And Qos Database At Every Node By Calculating The
Parameters Like Node And Link Stability Factor, Bandwidth Availability, And Delays. Finally, Multicast
Path Constructs Route Request And Route Reply Packets, Stability Information And Performing Route
Maintenance.
Seeking a “balanced” family of yours? Through Gender Selection procedures you can do so easily. Raise a beautiful baby girl or boy! Contact us for more information.
A Proposal on Social Tagging Systems Using Tensor Reduction and Controlling R...ijcsa
Social Tagging System is the process in which user makes their interest by tagging on a particular item. These STS are in associated with web 2.0 and has sourceful information for the users with their recommendations. It provides different types of recommendations are modeled by a 3-order tensor, on which multiway latent semantic analysis and dimensionality reduction is performed using both the Higher Order Singular Value Decomposition (HOSVD) method and the KernelSVD smoothing technique. We provide now with the 4-order tensor approach, which we named as Tensor Reduction. Here the items that are tagged can be viewed by the user who are recommended the same item and tagged over it. There by can improve the social tagging recommendations efficiency and also the unwanted request has been controlled. The results show significant improvements in terms of effectiveness.
Social bookmarking system is a web-based resource sharing system that allows users to upload, share and
organize their resources i.e. bookmarks and publications. The system has shifted the paradigm of
bookmarking from an individual activity limited to desktop to a collective activity on the web. It also
facilitates user to annotate his resource with free form tags that leads to large communities of users to
collaboratively create accessible repositories of web resources. Tagging process has its own challenges
like ambiguity, redundancy or misspelled tags and sometimes user tends to avoid it as he has to describe
tag at his own. The resultant tag space is noisy or very sparse and dilutes the purpose of tagging. The
effective solution is Tag Recommendation System that automatically suggests appropriate set of tags to
user while annotating resource. In this paper, we propose a framework that does not depend on tagging
history of the resource or user and thereby capable of suggesting tags to the resources which are being
submitted to the system first time. We model tag recommendation task as multi-label text classification
problem and use Naive Bayes classifier as the base learner of the multilabel classifier. We experiment with
Boolean, bag-of-words and term frequency-inverse document frequency (TFIDF) representation of the
resources and fit appropriate distribution to the data based on the representation used. Impact of feature
selection on the effectiveness of the tag recommendation is also studied. Effectiveness of the proposed
framework is evaluated through precision, recall and f-measure metrics.
IMPLEMENTATION OF FOLKSONOMY BASED TAG CLOUD MODEL FOR INFORMATION RETRIEVAL ...ijscai
In the magnitude of internet one need to devote extra time to investigate anticipated resource, especially
when one need to search information from documents. For the higher range internet there is serious need
to demand the essentiality to discover the reserved resources. One of the solutions for information retrieval
from document repository is to attach tags to documents. Numerous online social bookmarking services
permit users to attach tags with resources which are eventually meta-data, frequently stated as folksonomy.
In current paper, authors implemented this model for information retrieval by utilizing these tags, after
retrieving by using delicious API and synthesize tag cloud in an Indian University to search and retrieve
information from document repository.
Implementation of Folksonomy Based Tag Cloud Model for Information Retrieval ...IJSCAI Journal
In the magnitude of internet one need to devote extra time to investigate an
ticipated resource, especially
when one need to search information from documents. For the higher range internet there is serious need
to demand the essentiality to discover the reserved resources. One of the solutions for information retrieval
from docume
nt repository is to attach tags to documents. Numerous online social bookmarking services
permit users to attach tags with resources which are eventually meta
-
data, frequently stated as folksonomy.
In current paper, authors implemented this model for infor
mation retrieval by utilizing these tags, after
retrieving by using delicious API and synthesize tag cloud in an Indian University to search and retrieve
information from document repository
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...cscpconf
Social groups in the form of different discussion forums are proliferating rapidly. Most of these forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore, recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members needs and favorites. It is noteworthy that not only the users comments and posts can have valuable information, but also there are some other valuable information which can be obtained from social data; moreover, it could be extracted from relations and interactions among users. Hence, association rules mining techniques are one of the techniques which can be applied in order to extract more implicit data as input to the recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have defined new hybrid rules by considering both users and posts’ content data. Each of the defined rules has been examined on an asynchronous discussion group in this study. In addition, the impact of the defined rules on the precision and recall values of the recommender system has been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
Good ideas come from many different sources. However,the majority of internauts is still anchored to the traditional web search engines.Internet is a fast growing space that grows by compartments and different data sources.Open-data are the emblematic example of this discontinuity: many data sources but no centralizing tools.Vestige is intended to fill this gap: a bridge between compartments.Its aim is to let users find their answers from heterogeneous data and collaborate to refine the results.
-------------
This is the presentation of Vestige idea for Apps4Italy 2012 Contest. By Manh Luong Bui and Simone Campora
Tagging: Can User-Generated Content Improve Our Services?Katja Šnuderl
A couple of years ago there was a lot of discussion about how to improve search engines on the statistical websites. We are still struggling to make them better. On the other hand, in the last few years user-generated content on the internet, with impressive growth of Web 2.0 tools and services, introduced not only user-generated content, but also user-defined classification of items. The so called "folksonomy" introduced a new, complementary way of classifying items, significantly different from the pre-defined, authoritative taxonomies. Folksonomy is a result of tagging. In applications like YouTube (video clip database), Flickr (picture database), SlideShare (presentation database), blogs and others, users attach one or more words (tags) to every object in the database. Tags support search and aggregation lists.
It takes just one step to move from entering search keywords ourselves, using all of our knowledge, experiences and intuition in order to tailor the search results to user needs, to allowing our own users to enter tags themselves. This step creates a paradigm shift, exactly the same one as has turned Web 2.0 applications into a big success: Users – not producers – control the way they find and use information. By allowing users to enter tags we can actually allow users to help themselves by helping us.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
Providing Globus Services to Users of JASMIN for Environmental Data AnalysisGlobus
JASMIN is the UK’s high-performance data analysis platform for environmental science, operated by STFC on behalf of the UK Natural Environment Research Council (NERC). In addition to its role in hosting the CEDA Archive (NERC’s long-term repository for climate, atmospheric science & Earth observation data in the UK), JASMIN provides a collaborative platform to a community of around 2,000 scientists in the UK and beyond, providing nearly 400 environmental science projects with working space, compute resources and tools to facilitate their work. High-performance data transfer into and out of JASMIN has always been a key feature, with many scientists bringing model outputs from supercomputers elsewhere in the UK, to analyse against observational or other model data in the CEDA Archive. A growing number of JASMIN users are now realising the benefits of using the Globus service to provide reliable and efficient data movement and other tasks in this and other contexts. Further use cases involve long-distance (intercontinental) transfers to and from JASMIN, and collecting results from a mobile atmospheric radar system, pushing data to JASMIN via a lightweight Globus deployment. We provide details of how Globus fits into our current infrastructure, our experience of the recent migration to GCSv5.4, and of our interest in developing use of the wider ecosystem of Globus services for the benefit of our user community.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Understanding Nidhi Software Pricing: A Quick Guide 🌟
Choosing the right software is vital for Nidhi companies to streamline operations. Our latest presentation covers Nidhi software pricing, key factors, costs, and negotiation tips.
📊 What You’ll Learn:
Key factors influencing Nidhi software price
Understanding the true cost beyond the initial price
Tips for negotiating the best deal
Affordable and customizable pricing options with Vector Nidhi Software
🔗 Learn more at: www.vectornidhisoftware.com/software-for-nidhi-company/
#NidhiSoftwarePrice #NidhiSoftware #VectorNidhi
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Globus
Large Language Models (LLMs) are currently the center of attention in the tech world, particularly for their potential to advance research. In this presentation, we'll explore a straightforward and effective method for quickly initiating inference runs on supercomputers using the vLLM tool with Globus Compute, specifically on the Polaris system at ALCF. We'll begin by briefly discussing the popularity and applications of LLMs in various fields. Following this, we will introduce the vLLM tool, and explain how it integrates with Globus Compute to efficiently manage LLM operations on Polaris. Attendees will learn the practical aspects of setting up and remotely triggering LLMs from local machines, focusing on ease of use and efficiency. This talk is ideal for researchers and practitioners looking to leverage the power of LLMs in their work, offering a clear guide to harnessing supercomputing resources for quick and effective LLM inference.
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeAftab Hussain
Understanding variable roles in code has been found to be helpful by students
in learning programming -- could variable roles help deep neural models in
performing coding tasks? We do an exploratory study.
- These are slides of the talk given at InteNSE'23: The 1st International Workshop on Interpretability and Robustness in Neural Software Engineering, co-located with the 45th International Conference on Software Engineering, ICSE 2023, Melbourne Australia
Graspan: A Big Data System for Big Code AnalysisAftab Hussain
We built a disk-based parallel graph system, Graspan, that uses a novel edge-pair centric computation model to compute dynamic transitive closures on very large program graphs.
We implement context-sensitive pointer/alias and dataflow analyses on Graspan. An evaluation of these analyses on large codebases such as Linux shows that their Graspan implementations scale to millions of lines of code and are much simpler than their original implementations.
These analyses were used to augment the existing checkers; these augmented checkers found 132 new NULL pointer bugs and 1308 unnecessary NULL tests in Linux 4.4.0-rc5, PostgreSQL 8.3.9, and Apache httpd 2.2.18.
- Accepted in ASPLOS ‘17, Xi’an, China.
- Featured in the tutorial, Systemized Program Analyses: A Big Data Perspective on Static Analysis Scalability, ASPLOS ‘17.
- Invited for presentation at SoCal PLS ‘16.
- Invited for poster presentation at PLDI SRC ‘16.
Atelier - Innover avec l’IA Générative et les graphes de connaissancesNeo4j
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Allez au-delà du battage médiatique autour de l’IA et découvrez des techniques pratiques pour utiliser l’IA de manière responsable à travers les données de votre organisation. Explorez comment utiliser les graphes de connaissances pour augmenter la précision, la transparence et la capacité d’explication dans les systèmes d’IA générative. Vous partirez avec une expérience pratique combinant les relations entre les données et les LLM pour apporter du contexte spécifique à votre domaine et améliorer votre raisonnement.
Amenez votre ordinateur portable et nous vous guiderons sur la mise en place de votre propre pile d’IA générative, en vous fournissant des exemples pratiques et codés pour démarrer en quelques minutes.
Do you want Software for your Business? Visit Deuglo
Deuglo has top Software Developers in India. They are experts in software development and help design and create custom Software solutions.
Deuglo follows seven steps methods for delivering their services to their customers. They called it the Software development life cycle process (SDLC).
Requirement — Collecting the Requirements is the first Phase in the SSLC process.
Feasibility Study — after completing the requirement process they move to the design phase.
Design — in this phase, they start designing the software.
Coding — when designing is completed, the developers start coding for the software.
Testing — in this phase when the coding of the software is done the testing team will start testing.
Installation — after completion of testing, the application opens to the live server and launches!
Maintenance — after completing the software development, customers start using the software.
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Zoom is a comprehensive platform designed to connect individuals and teams efficiently. With its user-friendly interface and powerful features, Zoom has become a go-to solution for virtual communication and collaboration. It offers a range of tools, including virtual meetings, team chat, VoIP phone systems, online whiteboards, and AI companions, to streamline workflows and enhance productivity.
In the ever-evolving landscape of technology, enterprise software development is undergoing a significant transformation. Traditional coding methods are being challenged by innovative no-code solutions, which promise to streamline and democratize the software development process.
This shift is particularly impactful for enterprises, which require robust, scalable, and efficient software to manage their operations. In this article, we will explore the various facets of enterprise software development with no-code solutions, examining their benefits, challenges, and the future potential they hold.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Looking for a reliable mobile app development company in Noida? Look no further than Drona Infotech. We specialize in creating customized apps for your business needs.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
2. 2 Computer Science & Information Technology (CS & IT)
Majority social media platforms allow any user to state tags. Thus, the users would judge the
resources according to their personal experience. Sometimes, users just do not have any idea in
mind, not sure which tags are suitable for the resources. Concerning folksonomy, it can be
collected a group of users under cooperation and sharing condition in public, adding tags or
marks to provide meaning to certain resource. In this research, a social-driven tags computing
(SDT) can be represented and used to help the users for their tagging and further facilitate the
video searching.
2. LITERATURE REVIEW
Social tagging is the practice of generating electronic tags by users rather than specialists as a
way to classify and describe content. Comparing with the information based on scholars or
experts, social-driven tags computing (SDT) is a kind of new tagging model, which is also a user-
generated classification. The reason why social media include tagging function is to help the
users classify their video resources, and the increase of spam tags would destroy the good will of
SDT function. Hence, the paper still adopts and implements the SDT computing, and expects the
improvements of tagging mechanism on social media.
2.1 Tagging
Most of tagging websites include bookmark, photos, index, video, and blog [1]. Basically, if there
is no word on the resource such as photos and videos, what we need most importantly would be
users or resource authors’ tag for sorting the resources. Since resources like video and photos
normally lack word descriptions, it would be too hard to classify tags for the users. If we add a
great amount of tags from users or authors’ perceptive it would give us a hand for resources
indexing and or searching [2]. Even if the resources from blog are mainly formed with words,
sometimes these blogs would cause the problems such as too much content or the meaning of
words with diverse meaning.
Annotating tags can be defined as a tagging behavior likes keyword for describing the Internet
resource. Basically, a definition of tags is similar to keyword indexing. Tagging also possesses
the function of content resource classifications [3]. Tagging is the first level analysis, and
classification is the second level analysis-paralysis activity [4]. It would be a magnificent task to
form a sorting framework, and then reorganize the tags with the framework and model. In
comparison with traditional sorting system, bookmark, tagging is relatively easy for users to learn
and use, it would not increase the burden of cognitive, and it’s easier for maintaining.
Generally speaking, SDT is the organizing model which combines the public’s tags or keywords
to form the main topic/theme for classification. Every Internet user has his or her own
information management model, including personal bookmark, tags, index, email file document
etc. Some are sorted with the set level or classification framework; some are sorted with the
keywords that are qualified to be recognized, still other even without sorting in advance [5].
2.2 Folksonomy
Folksonomy is the combination of “Taxonomy” and “Folk,” which means classification and
people [6]. One of the meanings of Folksonomy is a group of users under cooperation and sharing
condition in public, adding tags or marks to provide meaning to certain resource. It does not have
concept of level, but it has the trait of clustering, meaning that once the resource is tagged more
3. Computer Science & Information Technology (CS & IT) 3
and more times, it could create new definition to the resource and replace the definition laid by
experts. Folksonomy does not request the people who classify the resource with professional
knowledge, what’s more, it encourage the users to sort the resource freely so that the loose
classification structure could become convergent gradually and form the definition that could be
accepted by the public and scholars.
This kind of sorting mechanism is called Folksonomy. Folksonomy’s meaning is close to Social-
driven tags computing (SDT). This concept was created by Thomas Vander [6]. Folksonomy is a
different way of classification from the traditional systematic classification system. It is
conducted by the public, which would come up with the tags or comments toward the resources
that are closer to the opinions or feedbacks given by the users.
3. SOCIAL-DRIVEN TAGS COMPUTING
The research proposes a social-driven tags computing (SDT) which can provide online users an
enhanced list of tags from the existing tags’ database as well as video search. In terms of search
engine optimization (SEO), majority online video web sites adopt various advanced or innovative
recommendation technologies that can efficiently help their users to share their videos and tag
their videos’ metadata as shown in Figure one.
Figure 1. Social-driven tags computing (SDT) framework
3.1 Social-Driven Tags Computing
The first step of this research is to estimate a similarity measurement. Similarity in common use
has twofold: symmetric measurement and asymmetric measurement.
Symmetric similarity measurement: Jaccard coefficient can be used to measure the co-occurrence
value between tag t୧ and tag t୨ to measure the degree of similarity shown in Equation 1 [7].
4. 4 Computer Science & Information Technology (CS & IT)
ܬ൫ݐ, ݐ൯: =
หݐ ∩ ݐห
หݐ ∪ ݐห
(1)
Jaccard coefficient J( t୧, t୨) indicates that the interaction of tag t୧ and tag t୨,divide the union of
tag t୧ and tagt୨. Jaccard coefficient is applied to measure the similarity of relative tags to
determine the tag candidate in this VPA.
Asymmetric similarity measurement: The count of single tag can be normalized to further assess
the tag co-occurrence value as follows in Equation 2.
P൫t୨หt୧൯: =
หt୧ ∩ t୨ห
|t୧|
(2)
The probability of tag t୧and tag t୨ represents simultaneously while tag t୧ appears.
3.1.1 Tags Aggregation
The tagging candidates can be determined when the co-occurrence of tags was assessed. In the
next procedure, the candidate tags can be integrated into a candidate tags list. The first step
indicates that these candidate tags need to sort by aggregation using vote and sum. The second
step indicates the filtered tags and recommended tag list can be generated through ‘Borda count’
[8].
While similarity measurements are done with calculation, the tagging aggregation function is the
second procedure and the third promotion function for the determination of ranking objects. In
the next voting process, the recommended tags can be decided by Borda count. The tags derived
from the different candidate tags are compared to the other sets of tags. These selected tags can be
voted 1 or 0 and further determined for recommended tags in the next process.
,ݑ(݁ݐݒ ܿ) = ቄ
1 ݂݅ ܿ ∈ ܥ௨
0 ݐℎ݁݁ݏ݅ݓݎ
(3)
If the recommended tags that are selected from the candidate tags are determined, the scores of
recommendation can be rated by the counts of voting (u, c) in the voting process.
(݁ݎܿݏ ܿ ): = (݁ݐݒ ,ݑ ܿ )
௨∈
(4)
3.1.2 Tags Promotions
Most of tags are annotated in the shared tag archive; these tags are usually identified as the
unstable tags for recommendation. On the contrary, some tags would be useful to describe the
shared object more so than others. However, the tag promotion functions are threefold: stability-
promotion, descriptiveness-promotion, and ranking-promotion.
5. Computer Science & Information Technology (CS & IT) 5
3.2 Integrated Tags Computing
The tag prompt approach is to facilitate the further determinations of ranking scores from the
candidates for recommended tag.
Stability-promotion: In order to promote those tags for which the statistics are more stable, the
frequency of usages of tags can be measured to represent the levels of stability shown in Equation
5.
)ݑ(ݕݐ݈ܾ݅݅ܽݐݏ ≔
݇௦
݇௦ − ܾܽ݇(ݏ௦ − log (|))|ݑ
(5)
where |u| represents the frequency of tag u, kୱ is a parameter for training.
Descriptiveness-promotion: If the descriptiveness-promotion is high frequency, the shared tags
can increase the high frequency for the recommendation of shared objects shown in Equation 6.
݀݁)ܿ(݁ݒ݅ݐ݅ݎܿݏ ≔
݇ௗ
݇ௗ + ܾܽ݇(ݏௗ − log (|ܿ|))
(6)
where ݇ௗ is a pre-defined training parameter; c is one set of candidate tags.
Ranking-promotion: The co-occurrence provides a good evaluation that can estimate the
relationships among the shared tags (u) and change to the ranking(r) for candidate tags (c ∈ C୳)
shown in Equation 7.
,ݑ(݇݊ܽݎ ܿ): =
݇
݇ + (ݎ − 1)
(7)
ݓℎ݁݁ݎ ݇ is a damping parameter.
According to the three different promotion-functions, a holistic promotion value can be estimated
by multiplication shown in Equation 8.
,ݑ(݊݅ݐ݉ݎ ܿ) ≔ ,ݑ(݇݊ܽݎ ܿ) ∙ )ݑ(ݕݐ݈ܾ݅݅ܽݐݏ ∙ ݀݁)ܿ(݁ݒ݅ݐ݅ݎܿݏ (8)
Based on the aggregation methods of Vote and Sum, the score can be computed by vote and
promotion.
)ܿ(݁ݎܿݏ ≔ ,ݑ(݁ݐݒ ܿ) ∙ ,ݑ(݊݅ݐ݉ݎ ܿ)
௨∈
(9)
)ܿ(݁ݎܿݏ ≔ ,ݑ(݁ݐݒ ܿ) ∙ ,ݑ(݇݊ܽݎ ܿ) ∙ )ݑ(ݕݐ݈ܾ݅݅ܽݐݏ ∙ ݀݁)ܿ(݁ݒ݅ݐ݅ݎܿݏ
௨∈
(10)
Where score is the voting results; the three promotion functions use the multiplication
of ݇݊ܽݎ (,ݑ ܿ),ݕݐ݈ܾ݅݅ܽݐܽݏ (,)ݑ and ݀݁ݒ݅ݐ݅ݎݎܿݏe (c).
In terms of another mode, it can combine Sum and promotion function.
6. 6 Computer Science & Information Technology (CS & IT)
)ܿ(݁ݎܿݏ ≔ (ܲ(ܿ
௨∈
)ܿ(݁ݎܿݏ ≔ (ܲ(ܿ|ݑ) , ݂݅ ∈
௨∈
Where score (c) is the sum of voting and promotion functions,
multiplication of ,ݑ(݇݊ܽݎ ܿ), ݕݐ݈ܾ݅݅ܽݐݏ
Different combinations of vote, sum, promotion function, and no
to focus on the different types of shared videos and tags archive
In terms of the recommendation technology, the vote
ranking scores based on vote value
results of video-tag relationship prediction. VPA is capable of measuring the degrees of relevance
in a numerous collection of tags from the shared video ar
The algorithm of tagging computing can help the distributors predict a ranking list of
recommended tags and videos based on the other relative tags. Figure 6 shows that the
recommended tags can be analyzed and determined when users post the initia
distributor can obtain 6 recommended tags (i.e., Billie Jean, Michael Jackson, Singer, soul, live,
and mj) if he posts two tags ‘Thri
3.3 System Process of SDT Computing
The proposed social-driven tags computing (SDT) adopts a ‘Crawler’ system to search for the
relative tags on the video sharing websites. All the names and tags of the shared videos
in a video database shown in Fig
Figure 2. Source codes of AC/DC video web pages on Youtube
Figure 3. Tag resources from Wikipedia
Computer Science & Information Technology (CS & IT)
(ܿ|ݑ) , ݂݅ ܿ ∈ ܥ௨) ∙ ,ݑ(݊݅ݐ݉ݎ ܿ)
∈ ܥ௨) ∙ ,ݑ(݇݊ܽݎ ܿ) ∙ )ݑ(ݕݐ݈ܾ݅݅ܽݐݏ ∙ ݀݁)ܿ(݁ݒ݅ݐ݅ݎܿݏ
Where score (c) is the sum of voting and promotion functions, ݊݅ݐ݉ݎ
,)ݑ(ݕݐ݈ܾ݅݅ܽݐݏ ܽ݊݀ ݀݁.)ܿ(݁ݒ݅ݐ݅ݎܿݏ
Different combinations of vote, sum, promotion function, and no-promotion function can be used
to focus on the different types of shared videos and tags archive [9].
In terms of the recommendation technology, the vote-promotion algorithm (VPA) estimates
value, stability value, descriptive value, and rank
tag relationship prediction. VPA is capable of measuring the degrees of relevance
in a numerous collection of tags from the shared video archives.
The algorithm of tagging computing can help the distributors predict a ranking list of
recommended tags and videos based on the other relative tags. Figure 6 shows that the
recommended tags can be analyzed and determined when users post the initial two tags. This
distributor can obtain 6 recommended tags (i.e., Billie Jean, Michael Jackson, Singer, soul, live,
and mj) if he posts two tags ‘Thriller’ and ‘Moonwalk’.
3.3 System Process of SDT Computing
driven tags computing (SDT) adopts a ‘Crawler’ system to search for the
relative tags on the video sharing websites. All the names and tags of the shared videos
Figure 2 as resources for video query.
Figure 2. Source codes of AC/DC video web pages on Youtube
Figure 3. Tag resources from Wikipedia
(11)
(12)
,ݑ(݊݅ݐ݉ݎ ܿ) is a
promotion function can be used
promotion algorithm (VPA) estimates the
value for the
tag relationship prediction. VPA is capable of measuring the degrees of relevance
The algorithm of tagging computing can help the distributors predict a ranking list of
recommended tags and videos based on the other relative tags. Figure 6 shows that the
l two tags. This
distributor can obtain 6 recommended tags (i.e., Billie Jean, Michael Jackson, Singer, soul, live,
driven tags computing (SDT) adopts a ‘Crawler’ system to search for the
relative tags on the video sharing websites. All the names and tags of the shared videos are stored
7. Computer Science & Information Technology (CS & IT)
Wikipedia can be used to refer to the determination process and further adjust the sequence of
tags according to the relative tags or terms form
‘Thriller’ tags can be changed its relative list of tags.
Figure 4. Wikipedia data facilitate the tag determination
When a user intends to upload a video and needs to provide the tags at the same time, the tags
system developed by the research can then generate a list of recommended tags from the video
database and wikipedia as shown in
represented for ranking (Fig. 5)
Figure 5. SDT Computing User Interface
SDT estimates the ‘Jaccard coefficient’ to calculate the co
candidate tags based on the particular tags from the user queries
Computer Science & Information Technology (CS & IT)
Wikipedia can be used to refer to the determination process and further adjust the sequence of
tags according to the relative tags or terms form searched tags estimations. For example,
‘Thriller’ tags can be changed its relative list of tags.
Figure 4. Wikipedia data facilitate the tag determination
When a user intends to upload a video and needs to provide the tags at the same time, the tags
system developed by the research can then generate a list of recommended tags from the video
as shown in Figure 3 and 4. Determined by SDT, the weights are also
Figure 5. SDT Computing User Interface
SDT estimates the ‘Jaccard coefficient’ to calculate the co-occurrence values to provide the
candidate tags based on the particular tags from the user queries as the follows figure 6
7
Wikipedia can be used to refer to the determination process and further adjust the sequence of
searched tags estimations. For example,
When a user intends to upload a video and needs to provide the tags at the same time, the tags
system developed by the research can then generate a list of recommended tags from the video
he weights are also
occurrence values to provide the
as the follows figure 6.
8. 8 Computer Science & Information Technology (CS & IT)
Figure 6. Tags recommended for Video Search
To improve the efficiency ranking of search, more detailed tags should be given higher weight
than general tags as shown in Table 1. To adjust the weights of tags by the computing of ranking,
the promotion estimations can be facilitated for video search (Fig. 7)
Table 1. Tags Estimations by Promotion
Tags Parachutes Stories Ghost Magic Paradise
Ranking Promotion 0.9523 1 0.9090 0.7820 0.8
Stable Promotion 0.6356 0.6356 0.6356 0.6356 0.6356
Describe
Promotion
0.7153 0.6705 0.5670 0.7820 0.5916
Usage Frequency 4 31 58 19 49
Figure 7. The weights of tags can be adjusted by SDT computing
9. Computer Science & Information Technology (CS & IT) 9
4. CONCLUSION
Social-driven tags computing is to facilitate online video search and even sharing. As most of the
videos shared on social media are aimed at the more number of views from audiences, the users
(distributors) want to annotate some valuable tags. What and how many videos the users make
decision by themselves, but this research can help the users to choice the other recommended tags
for the specific video resources. The SDT methodology includes the co-occurrence estimations
and tags voting as well as promotions like stability, descriptive, and rank. Those algorithms are
able to determine the valuable tags according to the existing tags’ databases in the social media.
REFERENCES
[1] Hammond, T., et al. , “Social bookmarking tool”, D-Lib Magazine Vol. 11, no. 4, 2005.
[2] Trant, J. and Wyman, B., “Investigating social tagging and folksonomy in art museums with
Steve.Museum”, Proceedings of the Www Collaborative Web Tagging Workshop, 2006.
[3] Marlow, C., Naaman, M., and Boyd, D. “HT06, tagging paper, taxonomy, Flickr, academic article, to
read”, Conference on Hypertext. 2006.
[4] Sinha, R.(2005, September). A cognitive analysis of tagging. [online] Available:
http://www.rashmisinha.com/archives/05_09/tagging-cognitive.html.
[5] Jones, W., Dumais, S., and Bruce, H. “Once found, what then? A study of “keeping” behaviors in the
personal use of Web information”. Proceedings of the American Society for Information Science &
Technology, p.p. 391-402. 2002.
[6] Thomas Vander Wal. Explaining and showing broad and narrow folksonomies. 2005.
[7] Loet Leydesdorff, “Regional Development in the Knowledge-Based Economy: The Construction of
Advantage”. Journal of Technology Transfer. Special Issue, pp. 1–15, 2006.
[8] Singurbjornsson, B. and Zwol, R. V., “Flickr tag recommendation based on collective knowledge”,
Proceeding of the 17th International Conference on World Wide Web, 2008, pp.327–336.
[9] Christian Wartena, Rogier Brussee, and Martin Wibbels, “Using Tag Co-occurrence for Recommen-
dation”, International Conference on Intelligent Systems Design & Applications, 2009, pp.273-278.