Quantitative and Qualitative Analysis of Time-Series Classification using Dee...Nader Ale Ebrahim
Time-series classification is utilized in a variety of applications leading to the development of many data mining techniques for time-series analysis. Among the broad range of time-series classification algorithms, recent studies are considering the impact of deep learning methods on time-series classification tasks. The quantity of related publications requires a bibliometric study to explore most prominent keywords, countries, sources and research clusters. The paper conducts a bibliometric analysis on related publications in time-series classification, adopted from Scopus database between 2010 and 2019. Through keywords co-occurrence analysis, a visual network structure of top keywords in time-series classification research has been produced and deep learning has been introduced as the most common topic by additional inquiry of the bibliography. The paper continues by exploring the publication trends of recent deep learning approaches for time-series classification. The annual number of publications, the productive and collaborative countries, the growth rate of sources, the most occurred keywords and the research collaborations are revealed from the bibliometric analysis within the study period. The research field has been broken down into three main categories as different frameworks of deep neural networks, different applications in remote sensing and also in signal processing for time-series classification tasks. The qualitative analysis highlights the categories of top citation rate papers by describing them in details.
Vertical intent prediction approach based on Doc2vec and convolutional neural...IJECEIAES
Vertical selection is the task of selecting the most relevant verticals to a given query in order to improve the diversity and quality of web search results. This task requires not only predicting relevant verticals but also these verticals must be those the user expects to be relevant for his particular information need. Most existing works focused on using traditional machine learning techniques to combine multiple types of features for selecting several relevant verticals. Although these techniques are very efficient, handling vertical selection with high accuracy is still a challenging research task. In this paper, we propose an approach for improving vertical selection in order to satisfy the user vertical intent and reduce user’s browsing time and efforts. First, it generates query embeddings vectors using the doc2vec algorithm that preserves syntactic and semantic information within each query. Secondly, this vector will be used as input to a convolutional neural network model for increasing the representation of the query with multiple levels of abstraction including rich semantic information and then creating a global summarization of the query features. We demonstrate the effectiveness of our approach through comprehensive experimentation using various datasets. Our experimental findings show that our system achieves significant accuracy. Further, it realizes accurate predictions on new unseen data.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain
Multi Label Spatial Semi Supervised Classification using Spatial Associative ...cscpconf
Multi-label spatial classification based on association rules with multi objective genetic
algorithms (MOGA) enriched by semi supervised learning is proposed in this paper. It is to deal
with multiple class labels problem. In this paper we adapt problem transformation for the multi
label classification. We use hybrid evolutionary algorithm for the optimization in the generation
of spatial association rules, which addresses single label. MOGA is used to combine the single
labels into multi labels with the conflicting objectives predictive accuracy and
comprehensibility. Semi supervised learning is done through the process of rule cover
clustering. Finally associative classifier is built with a sorting mechanism. The algorithm is
simulated and the results are compared with MOGA based associative classifier, which out
performs the existing
New prediction method for data spreading in social networks based on machine ...TELKOMNIKA JOURNAL
Information diffusion prediction is the study of the path of dissemination of news, information, or topics in a structured data such as a graph. Research in this area is focused on two goals, tracing the information diffusion path and finding the members that determine future the next path. The major problem of traditional approaches in this area is the use of simple probabilistic methods rather than intelligent methods. Recent years have seen growing interest in the use of machine learning algorithms in this field. Recently, deep learning, which is a branch of machine learning, has been increasingly used in the field of information diffusion prediction. This paper presents a machine learning method based on the graph neural network algorithm, which involves the selection of inactive vertices for activation based on the neighboring vertices that are active in a given scientific topic. Basically, in this method, information diffusion paths are predicted through the activation of inactive vertices byactive vertices. The method is tested on three scientific bibliography datasets: The Digital Bibliography and Library Project (DBLP), Pubmed, and Cora. The method attempts to answer the question that who will be the publisher of thenext article in a specific field of science. The comparison of the proposed method with other methods shows 10% and 5% improved precision in DBL Pand Pubmed datasets, respectively.
Quantitative and Qualitative Analysis of Time-Series Classification using Dee...Nader Ale Ebrahim
Time-series classification is utilized in a variety of applications leading to the development of many data mining techniques for time-series analysis. Among the broad range of time-series classification algorithms, recent studies are considering the impact of deep learning methods on time-series classification tasks. The quantity of related publications requires a bibliometric study to explore most prominent keywords, countries, sources and research clusters. The paper conducts a bibliometric analysis on related publications in time-series classification, adopted from Scopus database between 2010 and 2019. Through keywords co-occurrence analysis, a visual network structure of top keywords in time-series classification research has been produced and deep learning has been introduced as the most common topic by additional inquiry of the bibliography. The paper continues by exploring the publication trends of recent deep learning approaches for time-series classification. The annual number of publications, the productive and collaborative countries, the growth rate of sources, the most occurred keywords and the research collaborations are revealed from the bibliometric analysis within the study period. The research field has been broken down into three main categories as different frameworks of deep neural networks, different applications in remote sensing and also in signal processing for time-series classification tasks. The qualitative analysis highlights the categories of top citation rate papers by describing them in details.
Vertical intent prediction approach based on Doc2vec and convolutional neural...IJECEIAES
Vertical selection is the task of selecting the most relevant verticals to a given query in order to improve the diversity and quality of web search results. This task requires not only predicting relevant verticals but also these verticals must be those the user expects to be relevant for his particular information need. Most existing works focused on using traditional machine learning techniques to combine multiple types of features for selecting several relevant verticals. Although these techniques are very efficient, handling vertical selection with high accuracy is still a challenging research task. In this paper, we propose an approach for improving vertical selection in order to satisfy the user vertical intent and reduce user’s browsing time and efforts. First, it generates query embeddings vectors using the doc2vec algorithm that preserves syntactic and semantic information within each query. Secondly, this vector will be used as input to a convolutional neural network model for increasing the representation of the query with multiple levels of abstraction including rich semantic information and then creating a global summarization of the query features. We demonstrate the effectiveness of our approach through comprehensive experimentation using various datasets. Our experimental findings show that our system achieves significant accuracy. Further, it realizes accurate predictions on new unseen data.
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
Ontology is applied to impart knowledge in various fields of Information Technology made it more intelligent in the past few decades. Many Ontologies was built on various domains like biology, medicine,physics, chemistry, and mathematics. The Ontology in computer science domain are limited and even the Ontology is not explored in detail. The knowledge in the field of computer networks is very large, which makes it more difficult for a human to expertise in. This paper proposes the Ontology in computer network domain on various perspectives like scope, scale, topology, communication media, OSI model, TCP/ IP model, protocol, security, network operating system, network hardware and performance. The Ontology is developed in OWL format, which can be easily integrated with any other semantic based applications. The network Ontology can be employed in Semantic Web applications to help the users to search for concepts computer networks domain
Multi Label Spatial Semi Supervised Classification using Spatial Associative ...cscpconf
Multi-label spatial classification based on association rules with multi objective genetic
algorithms (MOGA) enriched by semi supervised learning is proposed in this paper. It is to deal
with multiple class labels problem. In this paper we adapt problem transformation for the multi
label classification. We use hybrid evolutionary algorithm for the optimization in the generation
of spatial association rules, which addresses single label. MOGA is used to combine the single
labels into multi labels with the conflicting objectives predictive accuracy and
comprehensibility. Semi supervised learning is done through the process of rule cover
clustering. Finally associative classifier is built with a sorting mechanism. The algorithm is
simulated and the results are compared with MOGA based associative classifier, which out
performs the existing
New prediction method for data spreading in social networks based on machine ...TELKOMNIKA JOURNAL
Information diffusion prediction is the study of the path of dissemination of news, information, or topics in a structured data such as a graph. Research in this area is focused on two goals, tracing the information diffusion path and finding the members that determine future the next path. The major problem of traditional approaches in this area is the use of simple probabilistic methods rather than intelligent methods. Recent years have seen growing interest in the use of machine learning algorithms in this field. Recently, deep learning, which is a branch of machine learning, has been increasingly used in the field of information diffusion prediction. This paper presents a machine learning method based on the graph neural network algorithm, which involves the selection of inactive vertices for activation based on the neighboring vertices that are active in a given scientific topic. Basically, in this method, information diffusion paths are predicted through the activation of inactive vertices byactive vertices. The method is tested on three scientific bibliography datasets: The Digital Bibliography and Library Project (DBLP), Pubmed, and Cora. The method attempts to answer the question that who will be the publisher of thenext article in a specific field of science. The comparison of the proposed method with other methods shows 10% and 5% improved precision in DBL Pand Pubmed datasets, respectively.
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
Pattern recognition is one of the prime concepts in current technologies in both private and public sectors.
The analysis and recognition of two or more patterns is a complex task due to several factors. The
consideration of two or more patterns requires huge space for keeping the storage media as well as
computational aspect. Vector logic gives very good strategy for recognition of patterns. This paper
proposes pattern recognition in multimodal authentication system with the use of vector logic and makes
the computation model hard and less error rate. Using PCA two to three biometric patterns will be fusion
and then various key sizes will be extracted using LU factorization approach. The selected keys will be
combined using vector logic, which introduces a memory model often called Context Dependent Memory
Model (CDMM) as computational model in multimodal authentication system that gives very accurate and
very effective outcome for authentication as well as verification. In the verification step, Mean Square
Error (MSE) and Normalized Correlation (NC) as metrics to minimize the error rate for the proposed
model and the performance analysis will be presented.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This presentation discusses the following topics:
Object Oriented Databases
Object Oriented Data Model(OODM)
Characteristics of Object oriented database
Object, Attributes and Identity
Object oriented methodologies
Benefit of object orientation in programming language
Object oriented model vs Entity Relationship model
Advantages of OODB over RDBMS
Unstructured multidimensional array multimedia retrival model based xml databaseeSAT Journals
Abstract Unstructured Data derived from the thought of data warehouse, data cube and xml, this paper presents a new database structure model which organizes the unstructured data in a multidimensional data cube based on XML Database. In this data cube of XML, clustered data are stored in instance table. A leading data corresponding are stored in dimension table. The relational model is helpful to construct data model, but it lacks flexibility, now the new data model can complement the defect of relational model. When querying, a leading data is gained from dimension table of XML then receiving the unstructured data through XQuery. Thus we increase the flexibility of XML database. Keywords: XML, multimedia, Multi-dimension, Database, Retrieval Model, multidimensional array, unstructured data.
The technology of object oriented databases was introduced to system developers in
the late 1980’s. Object DBMSs add database functionality to object programming languages. A
major benefit of this approach is the unification of the application and database development into
a seamless data model and language environment. As a result, applications require less code, use
more natural data modeling, and code bases are easier to maintain.
Comparison of data recovery techniques on master file table between Aho-Coras...TELKOMNIKA JOURNAL
Data recovery is one of the tools used to obtain digital forensics from various storage media that rely entirely on the file system used to organize files in these media. In this paper, two of the latest techniques of file recovery from file system (new technology file system (NTFS)) logical data recovery, Aho-Corasick data recovery were studied, examined and a practical comparison was made between these two techniques according to the speed and accuracy factors using three global datasets. It was noted that all previous studies in this field completely ignored the time criterion despite the importance of this standard. On the other hand, algorithms developed with other algorithms were not compared. The proposed comparison of this paper aims to detect the weaknesses and strength of both algorithms to develop a new algorithm that is more accurate and faster than both algorithms. The paper concluded that the logical algorithm was superior to the Aho-Corasick algorithm according to the speed criterion, whereas the algorithms gave the same results according to the accuracy criterion. The paper leads to a set of suggestions for future research aimed at achieving a highly efficient and high-speed data recovery algorithm such as the file-carving algorithm.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
Pattern recognition is one of the prime concepts in current technologies in both private and public sectors.
The analysis and recognition of two or more patterns is a complex task due to several factors. The
consideration of two or more patterns requires huge space for keeping the storage media as well as
computational aspect. Vector logic gives very good strategy for recognition of patterns. This paper
proposes pattern recognition in multimodal authentication system with the use of vector logic and makes
the computation model hard and less error rate. Using PCA two to three biometric patterns will be fusion
and then various key sizes will be extracted using LU factorization approach. The selected keys will be
combined using vector logic, which introduces a memory model often called Context Dependent Memory
Model (CDMM) as computational model in multimodal authentication system that gives very accurate and
very effective outcome for authentication as well as verification. In the verification step, Mean Square
Error (MSE) and Normalized Correlation (NC) as metrics to minimize the error rate for the proposed
model and the performance analysis will be presented.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This presentation discusses the following topics:
Object Oriented Databases
Object Oriented Data Model(OODM)
Characteristics of Object oriented database
Object, Attributes and Identity
Object oriented methodologies
Benefit of object orientation in programming language
Object oriented model vs Entity Relationship model
Advantages of OODB over RDBMS
Unstructured multidimensional array multimedia retrival model based xml databaseeSAT Journals
Abstract Unstructured Data derived from the thought of data warehouse, data cube and xml, this paper presents a new database structure model which organizes the unstructured data in a multidimensional data cube based on XML Database. In this data cube of XML, clustered data are stored in instance table. A leading data corresponding are stored in dimension table. The relational model is helpful to construct data model, but it lacks flexibility, now the new data model can complement the defect of relational model. When querying, a leading data is gained from dimension table of XML then receiving the unstructured data through XQuery. Thus we increase the flexibility of XML database. Keywords: XML, multimedia, Multi-dimension, Database, Retrieval Model, multidimensional array, unstructured data.
The technology of object oriented databases was introduced to system developers in
the late 1980’s. Object DBMSs add database functionality to object programming languages. A
major benefit of this approach is the unification of the application and database development into
a seamless data model and language environment. As a result, applications require less code, use
more natural data modeling, and code bases are easier to maintain.
Comparison of data recovery techniques on master file table between Aho-Coras...TELKOMNIKA JOURNAL
Data recovery is one of the tools used to obtain digital forensics from various storage media that rely entirely on the file system used to organize files in these media. In this paper, two of the latest techniques of file recovery from file system (new technology file system (NTFS)) logical data recovery, Aho-Corasick data recovery were studied, examined and a practical comparison was made between these two techniques according to the speed and accuracy factors using three global datasets. It was noted that all previous studies in this field completely ignored the time criterion despite the importance of this standard. On the other hand, algorithms developed with other algorithms were not compared. The proposed comparison of this paper aims to detect the weaknesses and strength of both algorithms to develop a new algorithm that is more accurate and faster than both algorithms. The paper concluded that the logical algorithm was superior to the Aho-Corasick algorithm according to the speed criterion, whereas the algorithms gave the same results according to the accuracy criterion. The paper leads to a set of suggestions for future research aimed at achieving a highly efficient and high-speed data recovery algorithm such as the file-carving algorithm.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
Model-Driven Architecture for Cloud Applications Development, A surveyEditor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering
now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage
are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring
software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with
a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research
problems.
Model-Driven Architecture for Cloud Applications Development, A survey Editor IJCATR
Model Driven Architecture and Cloud computing are among the most important paradigms in software service engineering now a days. As cloud computing continues to gain more activities, more issues and challenges for many systems with its dynamic usage are introduced. Model Driven Architecture (MDA) approach for development and maintenance becomes an evident choice for ensuring software solutions that are robust, flexible and agile for developing applications.
This paper aims to survey and analyze the research issues and challenges that have been emerging in cloud computing applications with a focus on using Model Driven architecture (MDA) development. We discuss the open research issues and highlight future research problems.
Linked Open Data about Springer Nature conferences. The story so farAliaksandr Birukou
Despite many efforts for making data about scholarly publications available on the Web of Data, lots of information about academic conferences is still contained in (at best) free-text format. When available in a structured format, these data would provide an essential input for the decisions researchers, libraries, publishers, funding and evaluation bodies take every day.
This talk will describe the project about having such data available as Linked Open Data (LOD) at lod.springer.com for around 10,000 computer science conferences. In addition, we will have a closer look at the lessons learnt from launching this portal and cover other Linked Data projects in Springer Nature. Finally, a novel semi-automated approach for classifying conference proceedings in Springer Nature will also be presented.
IEEE 2014 DOTNET CLOUD COMPUTING PROJECTS A scientometric analysis of cloud c...IEEEMEMTECHSTUDENTPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
International Refereed Journal of Engineering and Science (IRJES) is a peer reviewed online journal for professionals and researchers in the field of computer science. The main aim is to resolve emerging and outstanding problems revealed by recent social and technological change. IJRES provides the platform for the researchers to present and evaluate their work from both theoretical and technical aspects and to share their views.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
LoCloud - D2.1: Core Infrastructure Specifications (including Business Proces...locloud
The document introduces the core technical infrastructure specifications of the LoCloud project. The various technical aspects of the infrastructure are presented in detail, focusing on their advantages and limitations. The challenges of implementing this infrastructure are also described throughout this deliverable.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Search and Society: Reimagining Information Access for Radical Futures
N0176195102
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 6, Ver. I (Nov – Dec. 2015), PP 95-102
www.iosrjournals.org
DOI: 10.9790/0661-176195102 www.iosrjournals.org 95 | Page
A Proposed Method to Develop Shared Papers for Researchers at
Conference
Dr. Reem Jafar Ismail
(Department of Computer Science, Cihan University, Iraq)
Abstract: In conferences, the topics of interest for papers include variety of subjects, if the researcher wants to
write a shared researched paper on specific subject with another researcher who is also interested in the same
subject and wants to participate in the same conference, here the problem will arise especially when the topics
of interest and number of researchers become large. The aim of the paper is to solve this problem by finding a
suitable representation of researcher information of topics of interest that can be easily represented and then
found shared researcher on the same topics of interest. Two proposed system algorithms are implemented to
find the shared researchers in conference which gives an easy and efficient implementation.
Keywords: Binary vector, conference topics, decimal vector, researcher interesting topics.
I. Introduction
There has been growing interest in the use of binary-valued features [1]. These binary features have
several advantages as they can be faster to compute, more compact to store, and more efficient to compare.
Although it is fast to compute the Hamming distance between pairs of binary features, particularly on modern
architectures, it can still be too slow to use linear search in the case of large datasets [2], it introduce a new
algorithm for approximate matching of binary features, based on priority search of multiple hierarchical
clustering trees. Their work has been compared to existing alternatives, and show that it performs well for large
datasets, both in terms of speed and memory efficiency. In [3] Faro and Lecroq presented two efficient binary
string matching algorithms for the problem adapted to completely avoid any reference to bits allowing to
process pattern and text byte by byte.
In [4] Choi, Cha and Charles showed that dissimilarity and similarity through binary vectors has many
measures. Some studies as in [4] tried to find a dissimilarity measures between a set of binary vectors for pattern
recognition, other studies as in [6] uses similarity measures to identify binary vectors which are: SMC and
Cosine similarity measures.
II. Enhancing The Proposed EDM System
This work will enhances the proposed EDM system in ISMAIL (2012) where the interesting subjects
will increase the length of the binary vector. As shown in (Table 1), when the conference announce about the
topics of interest that specified in the field the researcher can select his own interested topics and submit it to the
conference, here the proposed system will store these data in files for further processing. As researchers
continue registering their interesting topics, there will be a deadline for submitting. After that the proposed
system will analysis these files to find another researcher how is also interested at same topics, as explained
below:
Proposed System Outline
1. Conference announcement for topics of interest
2. Researcher registration for his own interesting topics using interface shown in (Fig. 1).
3. Proposed system analysis to find shared researcher:
Proposal I: Convert interesting topics of the researcher to binary vector.
Proposal II: Convert interesting topics of the researcher to decimal vector depending on index.
4. Construct a report for each researcher that gives all his interesting topics in the conference with a list of e-
mails for the other researchers who has the sharing interest.
III. Design And Implementation Of The Proposed System
3.1 Conference Announcement for topics
When the conference wants to be established it announced for specific topics for example as in IJANS
which is the International Journal on Ad Hoc Networking Systems on http://airccse.org/journal/ijans/ijans.html
web site has 41 topics of interest for Ad Hoc Networking Systems [7], (Table 1).
2. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 96 | Page
Table 1: Interesting Topics in Ad Hoc Networking Systems Conference
1. Wireless mesh networks and cognitive networks
2. Vehicular networks and protocols
3. Mobile Ad Hoc Networks
4. Sensor networks
5. MAC layer design for ad-hoc networks and WSNs
6. MAC protocols (802.11, 802.15.4, UWB)
7. Multi-channel, multi-radio and MIMO technologies
8. Cross layer design and optimization
9. Wireless Local and Personal Area Networks
10. Home Networks
11. Ad Hoc Networks of Autonomous Intelligent Systems
12. Novel Architectures for Ad Hoc and Sensor Networks
13. Self-organizing Network Architectures and Protocols
14. Transport Layer Protocols
15. Routing protocols (unicast, multicast, geocast, etc.)
16. Media Access Control Techniques, routing and transport Protocols
17. Error Control Schemes
18. Power-Aware, Low-Power and Energy-Efficient Designs
19. Synchronization and Scheduling Issues
20. Mobility Management
21. Capacity planning and admission control in ad-hoc and sensor networks
22. Handoff / mobility management and seamless internetworking
23. Resource management and wireless QoS Provisioning
24. Key management, trust establishment in wireless networks
25. Security and privacy issues in ad hoc and sensor networks
26. Reliability, resiliency and fault tolerance techniques
27. Security, privacy issues in vehicular, DTNs, and mesh networks
28. Operating systems and middle-ware support
29. Novel applications and architectures for WSNs
30. Modeling, analysis and performance evaluation
31. Measurements and Hardware and Software Platforms, Systems, and Test bed
32. Mobility-Tolerant Communication Protocols
33. Location Tracking and Location-based Services
34. Resource and Information Management
35. Security , Privacy and Fault-Tolerance Issues
36. Experimental and Prototype and test beds
37. Quality-of-Service Issues
38. OFDM and MIMD techniques
39. Cross-Layer Interactions
40. Scalability Issues
41. Performance Analysis and Simulation of Protocols
Here the Interesting Topics in Ad Hoc Networking Systems Conference has many fields, so these subjects
are converted into visual interface as shown in (Fig. 1): Visual Interface of the interesting topics in the
conference, where the researcher will select the interesting topics easily.
3. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 97 | Page
Figure 1: Visual Interface for the Interesting topics in the Conference
3.2 Researcher registration and selection the interesting topics
The researcher must enter his name and e-mail for registration then he can select any topics from the
visual interface by clicking on the specified checked box, (Fig. 1). He has the ability to change his selection by
click on the checked box again but after submission it is not allow to be changed. When the user press submit
button a warning message will be appeared to have the permission from the user to share his e-mail and
information with other researchers. All user information is stored in file for further processing.
Here, with each researcher it is important to have the e-mail to know the other researchers that will be
have shared papers so they can send e-mail to them. All this information is stored in database that has:
Researcher name, E-Mail and a file name that have the interesting topics.
3.3 Proposed system analysis to find shared researcher
This section will explain the two proposed system algorithms that are implemented to find the shared
researchers in conference. In the first algorithm it is supposed to have a binary vector for interesting topics and
in the second algorithm it is supposed to have a decimal vector for interesting topics that indicate the index of
researcher selection of topics of interest in the conference.
3.3.1 Proposal I: Convert interesting topics of the researcher to binary vector
This proposal will find the shared researchers in conference that supposed to have a binary vector for
interesting topics by following these steps:
Step 1: Binary vector representation of researcher information of topics of interest
Step 2: Converting binary vector to decimal vector for each researcher
Step 3: Searching for shared interesting between researchers
- Constructing 2D Array for all researchers
- Shared researchers topics
Steps and Algorithms of Proposal I:
Step 1: Binary vector representation of researcher information of topics of interest Researchers' interesting area
is converted into binary vector where 1 indicates that the researcher is interested in the field that is specified in
the proposed vector of subject for computer science and 0 indicates that the researcher is not interested in the
field in the sequence as in conference topics where the length of the binary vector will equal to the number of
interesting topics in the conference, so the proposed binary vector length will be 41 and initially it is all 0's.
4. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 98 | Page
Initial binary vector: 00000000000000000000000000000000000000000
Here the sequence is important;
- Index 1 in the binary vector indicates the first interesting topic in the table (1) which is "Wireless
mesh networks and cognitive networks".
- Index 2 in the binary vector indicates the second interesting topic in the table (1) which is "Vehicular
networks and protocols".
- Index 3 in the binary vector indicates the second interesting topic in the table (1) which is "Mobile Ad
Hoc Networks".
For example suppose that the researcher after registration select the following topics of interest:
-Wireless mesh networks and cognitive networks
(which in no. 1 in the list that shown in table 1)
-Home Networks
(which in no. 10 in the list that shown in table 1)
-Location Tracking and Location-based Services
(which in no. 33 in the list that shown in table 1)
Index 1 2 3 4 5 6 7 8 9 10 11 12 …… 29 30 31 32 33 34 35 36 37 38 39 40 41
Binary 1 0 0 0 0 0 0 0 0 1 0 0 …… 0 0 0 0 1 0 0 0 0 0 0 0 0
So the researcher vector that represents the interesting topics will be:
10000000010000000000000000000000100000000
Here the proposed system will put 1 in the vector to indicate selection and 0 for non selection. So in
index 1, 10 and 33 in the vector it has 1's and other indices will be 0's and the sequence is important in the
binary vector.
Each researcher will have a binary vector that represents his interesting topics.
Researchers' vectors that represent the interesting topics:
Researcher 1:00000000000000000010000000000
Researcher 2:00000000000000000010000000000
Researcher 3:01000000000000000000000000000
Researcher 4:10000000000000000010000000000
Researcher 5:10001000000000000000000000000
Researcher 6:01000000000000000000000000010
Researcher 7: 10111000000001001010000001000
Researcher 8: 10000000011001001010100000010
And so on then all these vectors will be stored in files.
Step 2: Converting binary vector to decimal vector for each researcher
Then the proposed system will convert these binary bits to decimal numbers by arranging it as groups
of 4-bits for each decimal number.
Binary
vector
1000 0000 0100 0000 0000 0000 0000 0000 1000 0000 0
Decimal
vector
1 0 4 0 0 0 0 0 8 0 0
Algorithm (1): Converting binary vector to decimal vector
Input: Researcher file that contains Binary vector of interesting topics
Output: Decimal vector
Processing:
Begin
Step1: open researcher file
Step2: read the binary vector from file
Step3: for each 4-bit convert it to decimal
Step4: put it in the decimal vector and save it as file
Step5: close researcher file
End
5. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 99 | Page
Step 3: Searching for shared interesting between researchers
Each researcher will have a file that contains decimal vector; all these files are opened to read it and
stored in 2D array and scan it in order column by column to organize shared interesting between researchers as
explained in algorithm (2) and algorithm (3).
Algorithm (2): Constructing 2D Array for all researchers
Input: Researcher files that contains decimal vector of interesting topics
Output: 2D Array of decimal vectors that contains all researchers interesting topics
Processing:
Begin
Step1: read the no._ researchers
Step2: for i = 1 to no._ researchers
for j = 1 to 10
open researcher file #i
a[i, j]= read researcher file #i
next j
close researcher file #i
next i
End
Algorithm (3): Shared researchers topics
Input: 2D Array of decimal vectors that contains all researchers interesting topics and researcher files
Output: Shared researchers topics stored in file for each researcher
Processing:
Begin
Step1: read the no._ researchers
Step2: For i = 1 To 10
For j = 1 To no._ researchers
entity = a(i, j)
For k = 1 To no._ researchers
If entity = a(k, j) Then
Store researcher#k e-mail in file#i
MsgBox(i & j & k & j)
End If
Next k
Next j
Next i
End
Example
Start searching column by column to find equal decimal numbers; means finding shared interesting
topics.
Researcher 1: 0000 0000 0000 0000 0010 0000 0000 0 .......
Decimal : 0 0 0 0 2 0 0
Researcher 2: 0000 0000 0000 0000 0010 0000 0000 0 …….
Decimal: 0 0 0 0 2 0 0
Researcher 3: 0100 0000 0000 0000 0000 0000 0000 0 …….
Decimal: 4 0 0 0 0 0 0
As in the example Researcher 1 and Researcher 2 have sharing topics (decimal 2 is found).
3.3.2 Convert interesting topics of the researcher to decimal vector depending on index
This proposal will find the shared researchers in conference that supposed to have a decimal vector for
interesting topics by following these steps:
6. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 100 | Page
Step 1: Decimal vector representation of researcher information of topics of interest depending on index
Step 2: Searching for shared interesting between researchers
Steps and Algorithms of Proposal II
Step 1: Decimal vector representation of researcher information of topics of interest depending on index
If we limit the researchers' interesting area to 4 topics only that can be selected form conference then
the length of the decimal vector will be 4, so each decimal vector will hold an index for the topic that is selected.
(4 topics is chosen over 41 topics because it is found after implementing the proposed system that over 60
researchers each researcher choose between 5%-10% of the interesting topics of the conference)
For example suppose that the researcher after registration select the following topics of interest:
-Wireless mesh networks and cognitive networks
(which in no. 1 in the list that shown in table 1) (index 1)
-Home Networks
(which in no. 10 in the list that shown in table 1) (index 10)
-Location Tracking and Location-based Services
(which in no. 33 in the list that shown in table 1) (index 33)
-Scalability Issues
(which in no. 40 in the list that shown in table 1) (index 40)
So in index 1, 10, 33 and 40 will be the selected interesting topics for the researcher, then the researcher decimal
vector that represents the interesting topics will be:
1 10 33 40
Each researcher will have a decimal vector that represents his interesting topics.
Researchers' vectors that represent the interesting topics as index
Researcher 1: 6 8 20 25
Researcher 2: 1 4 7 30
Researcher 3: 3 15 23 40
Researcher 4: 9 11 28 32
And so on then all these vectors will be stored in files.
Step 2: Searching for shared interesting between researchers
Each researcher will have a file that contains decimal vector of 4 topics; all these files are opened to
read it and stored in 2D array and scan it in order row by row to organize shared interesting between researchers
as explained in algorithm (2) and algorithm (4). Call algorithm (2) to construct 2D array for all researchers then
algorithm (4) as explained below:
Algorithm (4): Shared researchers topics
Input: 2D Array of decimal vectors that contains all researchers interesting topics and researcher files
Output: Shared researchers topics stored in file for each researcher
Processing:
Begin
Step1: read the no._ researchers
Step2: For i = 1 To 4
For j = 1 To 4
xx = a(i, j)
For ii = 1 To 4
For jj = 1 To 4
If xx = a(ii, jj) Then
Store researcher#ii e-mail in file#i
MsgBox(i & j & ii & jj )
End If
Next jj
Next ii
Next j
Next i
End
7. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 101 | Page
Example
Start searching row by row in 2D array to find equal decimal numbers; means finding shared
interesting topics. This example searches for topic 8 in all array of 2D to find a shared researcher.
Loop 1:
Researcher 1: 6 8 20 25
Researcher 2: 1 4 7 30
Researcher 3: 3 15 23 40
Researcher 4: 9 11 28 32
Loop 2:
Researcher 1: 6 8 20 25
Researcher 2: 1 4 7 30
Researcher 3: 3 15 23 40
Researcher 4: 9 11 28 32
Loop 3:
Researcher 1: 6 8 20 25
Researcher 2: 1 4 7 30
Researcher 3: 3 15 23 40
Researcher 4: 9 11 28 32
.
.
.
3.4 Constructing report for the researcher
Finally, as algorithm (3) and algorithm (4) will find the shared researchers topics for all researcher a
final report will have the E-mails for other shared researchers as shown in (table 2) Where each researcher will
have a report.
Table 2: Final Report for the researcher that contains E-mails for other shared researchers
Name: John S. Smith
E-mail: john_smith@yahoo.com
Researcher Interesting Topics Researchers' E-mail
Wireless mesh networks and cognitive networks
DrMD@yahoo.com
Home Networks
engFRF@gmail.com; DrFK@yahoo.com
Location Tracking and Location-based Services
softwareIT@yahoo.com
IV. Results
All the researchers' information is stored in files including; name, e-mail and interesting topics these
files can be used for analysis to find another researcher how is also interested at same topics. In the ISMAIL
(2012), the SMC similarity measure and COS similarity measure are implemented between the researchers in
order to find the similarity. To enhanced the proposed EDM this proposed system is searching for any topic that
is shared between researchers that are selected from the conference topics and not full matching so the SMC and
COS are not used. In this Enhanced EDM (proposal I and II) system the 2D data structure with linear search
over columns and rows as processing instead of and logic operator.
As shown in (table 3) which explains the relationship between the number of researchers that registered
in the conference of Enhances EDM system and the number of bits that will be processed. As the number of the
researchers increase the number of bits will be increase which then effects the time for processing and
searching.
Table 3: Proposed Enhanced EDM for No. of researchers Vs. No. of bits to be processed
No. of researchers 20 60 100 250
No. of bits to be
processed
820 2460 4100 10250
The final reports for researchers are important both to the researcher himself and to the conference
committee to give indicator for the conference committee about the ideas of researchers that want to participate
in the conference and the shared papers over researchers.
8. A Proposed Method to Develop Shared Papers for Researchers at Conference
DOI: 10.9790/0661-176195102 www.iosrjournals.org 102 | Page
V. Conclusion And Recommendations
The binary representation of researcher interesting gives less size for storing information compared to
text and also less time when searching for the pattern. Also the decimal representation which depends on index
of researcher selection can give less size and time when searching for interesting topics. Here in the proposed
system it is not necessary to have full matching between researchers, the proposed system are searching for any
topic that is shared between researchers that are selected from the conference topics and not full matching.
For developing the proposed system the researcher may change his interesting areas after registering
and submission for future works, but now to solve this problem the proposed system suppose that the researcher
will not have the ability to change his selection after submission.
References
[1]. Choi Seung-Seok, Cha Sung-Hyuk and Charles C. Tappert, Enhancing binary feature vector similarity measures. Pace University,
2005.
[2]. Muja Marius and Lowe David G. Fast matching of binary features. Published in: Computer and Robot Vision (CRV). Ninth
Conference on 28-30 May 2012. IEEE- Toronto, 2012.
[3]. Faro Simone and LECROQ Thierry, Efficient pattern matching on binary strings. CS.DS 15 Oct, 2008.
[4]. Choi Seung-Seok, Cha Sung-Hyuk and Charles C. Tappert, A survey of binary similarity and distance measures. Pace University,
2006.
[5]. Bin Zhang and Sargur N. Srihari, Properties of binary vector dissimilarity measures, 2003.
[6]. Ismail R., Mining tutors’ interesting areas to develop researched papers using a propose educational data mining system.
Engineering and Technology Journal. Vol. 30 (No. 10) p. 1732-1748, 2012.
[7]. IJANS (2015) International Journal on Ad Hoc Networking Systems. Available from: http://airccse.org/journal/ijans/ijans.html
[Accessed: 10th October 2014].