Detection of E-Banking Phishing Websites
Review Paper | Journal Paper
Vol.07 , Issue.14 , pp.49-52, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.4952
Abstract
The term Phishing refers to a fraudulent technique of stealing people’s private data .The main aim of phishing attack is to steal consumer private data by provoking them to enter their details in the portals which are sent by the attacker .These portals resembles with the original website portal and provokes the users to enter their data like username and password ,bank account details and other sensible information .The main goal of this paper is to perform research on the machine learning data techniques to detect the phishing attacks and to assist the police in handling the complicated phishing activities
Key-Words / Index Term
Phishing, criminal technique, associative classification algorithms
References
[1] Abdulghani Ali Ahmed, Nurul Amirah Abdullah, “Real Time detection of phishing websites”.In the proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON 2016),USA,pp. 2-5,2016.
[2] Stuart McClure, “Hacking Exposed”, McGraw-Hill Education,pp. 28-45, 2012.
[3] Christopher Atikins,”Phishing attacks:Advanced Attack Techniques”, CreateSpace Independent Publishing Platform,pp. 55-75,2018.
[4] Dr.Radha D,”Study on Phishing attacks and antiphishing tools” International Research Journal of Engineering and Technology (IRJET),Vol 3,Issuse.1,pp.1-4,2016.
[5] Himani T,”A survey paper on Phishing detection” International Journal of Advanced Research in Computer Science,Vol 5,pp 1-4,2016.
Citation
N. Saivikas Reddy, Vinay Kumar M, "Detection of E-Banking Phishing Websites", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.49-52, 2019.
New Approach to Product Recommendation System by Using Blog Data for E-Commerce Applications
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.53-58, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.5358
Abstract
Communitarian sifting (CF) calculations have been generally used to manufacture recommender frameworks since they have recognizing ability of sharing aggregate wisdoms and encounters. Notwithstanding, they may effortlessly fall into the snare of the Matthew impact, which will in general prescribe prevalent things and consequently less famous things become progressively less well known. Under this situation, a large portion of the things in the proposal list are now well-known to clients and in this way the execution would truly deteriorate in discovering cold things, i.e., new things and specialty things. To address this issue, a client overview is first directed on the internet shopping propensities in China, in light of which a novel suggestion calculation named trend-setter based CF is recommended that can prescribe cold things to clients by presenting the idea of pioneers. In particular, trend-setters are an extraordinary subset of clients who can find cold things without the assistance of recommender framework. In this way, chilly things can be caught in the suggestion list through trailblazers, accomplishing the harmony among good fortune and precision
Key-Words / Index Term
Recommendation System; E-Commerce Applications; Machine Learning; Sentiment Analysis
References
[1]. J. Wang and Y. Zhang, “Opportunity model for e- commerce recommendation: Right product; right time,” in SIGIR, 2013.
[2]. M. Giering, “Retail sales prediction and item recommenda- tions using customer demographics at store level,” SIGKDD Explor. Newsl., vol. 10, no. 2, Dec.2008.
[3]. G. Linden, B. Smith, and J. York, “Amazon.com recommen- dations: Item-to-item collaborative filtering,” IEEE Internet Computing, vol. 7, no. 1, Jan. 2003.
[4]. A. Zeithaml, “The new demographicsand market fragmen- tation,” Journal of Marketing, vol. 49, pp. 64–75, 1985.
[5]. X. Zhao, Y. Guo, Y. He, H. Jiang, Y. Wu, and X. Li, “We know what you want tobuy: a demographic- based system for product recommendation on microblogs,” in SIGKDD, 2014.
[6]. J. Wang, W. X. Zhao, Y. He, and X. Li, “Leveraging product adopter information from online reviews for product recom- mendation,” in ICWSM, 2015.
[7]. Y. Seroussi, F. Bohnert, and I. Zukerman, “Personalised rating prediction for new users using latent factor models,” in ACM HH, 2011.
[8]. T. Mikolov, I. Sutskever, K. Chen, G. S. Corrado, and J. Dean, “Distributed representations of words and phrases and their compositionality,” in NIPS, 2013.
[9]. Q. V. Le and T. Mikolov, “ Distributed representations of sen- tences and documents,” CoRR, vol. abs/1405.4053, 2014.
[10]. J. Lin, K. Sugiyama, M. Kan, and T. Chua, “Addressing cold start in app recommendation: latent user models constructed from twitter followers,” in SIGIR, 2013.
[11]. T. Mikolov, K. Chen, G. Corrado, and J. Dean, “Efficient estimation of word representations in vector space,” CoRR, vol. abs/1301.3781, 2013.
[12]. Y. Koren, R. Bell, and C. Volinsky, “Matrix factorization techniques forrecommender systems,” Computer, vol. 42, no. 8, pp. 30–37, Aug. 2009.
[13]. Ning Wang, Qiaoling Zhang, Liejun Yang, Mingming Chen, “A Novel E-Commerce Recommendation System Model based on the Pattern Recognition and User Behavior Preference Analysis”, Advanced Science and Technology Letters Vol.138 (ISI 2016), pp.105-110.
[14]. Kota Charishma, , SK. Gopal Krishna, “Connecting OSN Media to E-commerce for Cold Start Product Recommendation using Micro Login Information”, ijitech, ISSN 2321-8665 Vol.06,Issue.01, January-2018, Pages:0014-0016.
[15]. Manish Raka, Prof. Sachin Godse, “Implementing Product Recommendation System using Neural Network by Connection Social Networking to E-Commerce”, IJIRST –International Journal for Innovative Research in Science & Technology, Volume 3, Issue 08, January 2017 ISSN (online): 2349-6010.
Citation
G Kiran Prabhu, D Sai Kumar, Ayasya V Bulusu, E Poojitha, Raghavendra Reddy, "New Approach to Product Recommendation System by Using Blog Data for E-Commerce Applications", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.53-58, 2019.
A Survey on Machine Learning Techniques for Movie Recommendation System
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.59-63, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.5963
Abstract
Study includes information about the recommendation system using Machine Leaning. The Recommendation system could recommend the whole thing from songs, movies, jokes, restaurants with rankings. That may collect the relevant data from the web. And give a relevant outcome to the user. The author using a Collaborative Filtering technique is a basic path of any recommendation System. But only Collaborative Filtering cannot give sufficient result about scalability and accuracy and also provide a computation of sample value of the evaluation prediction and measures for evaluating the algorithm. The major consciousness of this paper, the author provides the methodology of Data Pre-processing, Singular Value Decomposition (SVD), Content-based Collaborative filtering algorithm based on the recommendation system. The similarity is determined using for a Collaborative Filtering (CF) set of rules based totally on person similarity, behaviour and personalized movie recommendation system. And this consists of an analysis of the outcomes and conclusions based totally at the simulations executed on the computer to assess how the algorithms work
Key-Words / Index Term
Data Preprocessing, Singular Value Decomposition(SVD), Content based Collaborative Filtering Algorithm
References
in big data”,9th International Conference on, Intelligent Systems and Control (ISCO), Sept 2015, pp 1-7.
[2] Swati Mittal Singal, Tejal, Bhawna Juneja “AdaBoosting for Case-Based Recommendation System” ,IEEE 2016.
[3] Sonali R. Gandhi, Prof. Jaydeep Gheewala “A Survey on Recommendation System with Collaborative Filtering using Big Data” ,ICIMIA ICIMIA 2017 International Conference Innovative Mechanism IndustryApplications.
[4] Sasmita Panigrahi, Rakesh Ku. Lenka, Ananya Stitipragyan, “A Hybrid Distributed Collaborative Filtering Recommender Engine Using Apache Spark”, Procedia Computer Science, 2016
[5] Karan Patel, Yash Sakaria and Chetashri Bhadane, “Real Time Data processing Framework”, International Journal of Data Mining and Knowledge Management Process (IJDKP) Vol.5, No.5, September 2015.
[6] Michael Stonebraker, Uur etintemel, Stan Zdonik, “The 8 Requirements of Real-Time Stream Processing”, IEEE 2017.
[7] Ms. Nishigandha Karbhari, Prof. Asmita Deshmukh ,Prof. Asmita Deshmukh “Recommendation System using Content Filtering” ,International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS-2017) .
[8] Ibrahim Hussein Mwinyi, Husnu S. Narman, Kuo-Chi Fang, and Wook-Sung Yoo “Predictive Self-Learning Content Recommendation System for Multimedia Contents”, WTS 2018 1570426345.
[9] Gopi Krishna Durbhaka, Barani Selvaraj “Predictive Maintenance for Wind Turbine Diagnostics using Vibration Signal Analysis based on Collaborative Recommendation”, Approach 2016 Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), Sept. 21-24, 2016, Jaipur, India.
[10] De˘ger Ayata, Yusuf Yaslan and Mustafa E.Kamasak “Emotion Based the Music Recommendation System Using Wearable Physiological Sensors” ,IEEE 2018.
[11] Ruchika1, Ajay Vikram Singh2, Mayank Sharma3. “Building an Effective Recommender System Using Machine Learning Based Framework”,@IEEE 2018.
[12] Wisuwat Sunhem Kitsuchart Pasupa “An Approach to Face Shape Classification for Hairstyle Recommendation”, 8th International Conference on Advanced Computational Intelligence Chiang Mai, Thailand; February 14- 16, 2016
[13] Fabiano A. Dorc¸a1, Vitor C. Carvalho1, Miller M. Mendes1, Rafael D. Ara´ujo1, Hiran N. Ferreira2, Renan G. Catellan1 “An Approach for Automatic and Dynamic Analysis of Learning Objects Repositories Through Ontologies and Data Mining Techniques for Supporting Personalized Recommendation of Content in Adaptive and Intelligent Educational Systems”, 2017 IEEE 17th International Conference on Advanced Learning Technologies
[14] Anurag Gulati Anish Batra Rohit Khurana Dr. MM Tripathi “Cognitive Learning Recommendation System in Indian Context” ,978-1- 5386-1922-3/17/$31.00 © 2017 IEEE
[15] Joseph Coelho, Paromita Nitu, and Praveen Madiraju “A Personalized Travel RecommendationSystem Using social Media Analysis” ,2018 IEEE International Congress on Big Data
[16] Sasmita Panigrahi, Rakesh Ku. Lenka, Ananya Stitipragyan, “A Hybrid Distributed Collaborative Filtering Recommender Engine Using Apache Spark”, Procedia Computer Science, 2016, pp 10001006.
[17] Lipi Shah, Hetal Gaudani and Prem Balani, “A Survey on Recommendation System”, International Journal of Computer Applications(IJCA),March 2016, pp. 43-49.
[18] A. D. a. V. S. N. Karbhari, “Recommender System in Machine Learning” , ICEMTE, vol. 5, no. 3, pp. 62-65, 2017. International.
[19] Ahmed, Muyeed, et al. “TV Series Recommendation Using Fuzzy Inference System, K-Means Clustering and Adaptive Neuro Fuzzy Inference System” ,2017, pp. 1512–1519.
[20] Robert J. Durkin, AakashVerma. “Experiential Learning in Engineering Technology”, A Case Study on Problem Solving in Project-Based Learning at the Undergraduate Level", Journal of Engineering Technology, 2016.
Citation
Sushmita Nageshwar, Laxmi B Rananavare, "A Survey on Machine Learning Techniques for Movie Recommendation System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.59-63, 2019.
Sentiment Analysis on Twitter Data: A Study of methods based on negativity or positivity
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.64-67, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.6467
Abstract
This venture explanation is the issue of idea for examination in twitter that is arranging tweets according to the thought verbalized in them: positive, negative or unprejudiced. The aim of this paper is to develop a functional classifier for accurate and automatic sentiment classification of an unknown tweet stream Twitter is an online micro-blogging and social-networking platform which allows users to write short status updates. It is a rapidly developing administration with more than millions enlisted clients. Due to this large amount of usage all of us hope to achieve a reflection of public sentiment by analysing the sentiments expressed in the tweets. Analysing the public sentiment is important for many applications such as firms trying to find out the response of their products in the market, predicting political elections and predicting socio-economic phenomena like stock exchange
Key-Words / Index Term
NLP, Sentiment Analysis, Polarity, DMT, Support Vector Machine (SVM)
References
[1] A.Pak and P. Paroubek. “Twitter as a Corpus for Sentiment Analysis and Opinion Mining". In Proceedings of the Seventh Conference on International Language Resources and Evaluation, 2010, pp.1320-1326
[2] R. Parikh and M. Movassate, “Sentiment Analysis of User- GeneratedTwitter Updates using Various Classification Techniques",CS224N Final Report, 2009
[3] Go, R. Bhayani, L.Huang. “Twitter Sentiment ClassificationUsing Distant Supervision". Stanford University, Technical Paper.2009
[4] L. Barbosa, J. Feng. “Robust Sentiment Detection on Twitterfrom Biased and Noisy Data". COLING 2010: Poster Volume,pp. 36-44.
[5] Bifet and E. Frank, "Sentiment Knowledge Discovery in Twitter Streaming Data", In Proceedings of the 13th International Conference on Discovery Science, Berlin, Germany: Springer,2010, pp. 1-15.
[6] Agarwal, B. Xie, I. Vovsha, O. Rambow, R. Passonneau, “Sentiment Analysis of Twitter Data", In Proceedings of the ACL 2011Workshop on Languages in Social Media,2011 , pp. 30-38
[7] Dmitry Davidov, Ari Rappaport." Enhanced Sentiment Learning Using Twitter Hashtags and Smileys". Coling 2010: Poster Volume pages 241{249, Beijing, August 2010
[8] Po-Wei Liang, Bi-Ru Dai, “Opinion Mining on Social Media Data", IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3 - 6, 2013, pp 91-96, ISBN: 978-1-494673-6068-5,
Citation
Amit Malik, Ashish Yadav, Boby, Manju More, "Sentiment Analysis on Twitter Data: A Study of methods based on negativity or positivity", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.64-67, 2019.
Sentiment Analysis Using Machine Learning: A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.68-71, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.6871
Abstract
Social media is flooded with data that is generated by bloggers, committee, business, health, marketing, education, etc., in large amount. Extracting the data information from various fields like social media, marketing, reviews, conference publications and advertisement is done to perform sentiment analysis. These text data have some emotions hidden in it, and data analysing is carried out by natural language processing (NLP). NLP is application of artificial intelligence that help machine to read text by simulating the human capability to know language. Sentiment analysis is type of data mining that measures the opinion of the users or the customer or the blogger through the natural language processing, which can be utilized to extricate and dissect emotional data from web for the most part web based life. The main purpose of sentiment analysis is to classify emotions into positive, negative and neutral. The applications of sentiment analysis are in the financial market, area of reviews of consumer services and products to monitor customer sentiment and catch the trending topics. Sentiment analysis has challenges like multilingual sentiment analysis, emotion detection, and data sparsity from the different data by social media, marketing, emails, advertisement, movie review etc.
Key-Words / Index Term
Sentiment analysis, natural language processing, artificial intelligence
References
[1] Zhao Jianqiang1, Gui Xiaolin1- Deep Convolution Neural Networks for Twitter Sentiment Analysis IEEE 2017.
[2] Pennington, Jeffrey, Richard Socher, and Christopher D. Manning. "Glove: Global vectors for word representation." In EMNLP, vol. 14, pp. 1532-1543. 2014.
[3] Nurulhuda Zainuddin, Ali Selamat- Sentiment Analysis Using Support Vector Machine Conference Paper • September 2014
[4] Jianqiang Z. Combing Semantic and Prior Polarity Features for Boosting Twitter Sentiment Analysis Using Ensemble Learning. In Proc. Data Science in Cyberspace (DSC), IEEE International Conference on. IEEE, pp.709-714,2016
[5] Hagen, M., Potthast, M., Büchner, M., & Stein, B.. Twitter Sentiment Detection via Ensemble Classification Using Averaged Confidence Scores. In European Conference on Information Retrieval, Springer, Cham, 2015, pp. 741-754,2015
[6] Bhumika M. Jadav M.E. Scholar, L. D. College of Engineering Ahmedabad, India- Sentiment Analysis using Support Vector Machine based on Feature Selection and Semantic Analysis , International Journal of Computer Applications Volume 146 – No.13, July 2016
[7] Abdalraouf Hassan1, Ausif Mahmood, Convolutional Recurrent Deep Learning Model for Sentence Classification, 2017 IEEE.
[8] S. Behdenn, F. Barigo, G. Belalem- Document Level Sentiment Analysis: A survey, EAI 2018
[9] Bhumika M. Jadav Ahmedabad, Sentiment Analysis using Support Vector Machine based on Feature Selection and Semantic Analysis International Journal of Computer ApplicationsVolume 146 – No.13, July 2016
[10] Alena Neviarouskaya, Helmut Prendinger, and Mitsuru Ishizuka- SentiFul: A Lexicon for Sentiment Analysis, IEEE Transactions on affective computing, vol. 2, no. 1, January- 2011
[11] S.M.Shamimul Hasan, Donald A. Adjeroh- Proximity-Based Sentiment Analysis, 2011 IEEE
[12] Montejo-Ráez, A., Martníez-Cámara, E., Martní-Valdivia, M. T., &Ureña-López, L. A..A knowledge-based approach for polarity classification in Twitter.Journal of the Association for Information Science and Technology, 65(2), pp.414-425, 2014
Citation
Pooja Mahaling, P.V Bhaskar Reddy, "Sentiment Analysis Using Machine Learning: A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.68-71, 2019.
Comparative Study of Encryption Algorithms for Improved Security:A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.72-75, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.7275
Abstract
The issue of information security is one of the most important issues of the modern day. Since the internet has become hugely wide spread, it has unbelievably helped in fast and efficient access to the cloud services and information on the cloud. The issue of securing this information has become an extremely serious problem. As previously known that the hash algorithms are one-way algorithms and cannot be retrieved. These algorithms provided a solution to the problem of analyzing the frequency of characters within a particular text by using encryption for more than characters. The proposed algorithm will provide a better model for finding scattered value. This system is characterized by its ability to face the threat of dictionary attacks, making it difficult to prepare a dictionary of scattered values. In this survey, a comparison was made between the proposed model and the MD5, SHA1 systems.
Key-Words / Index Term
hash algorithm, one-way, attack dictionary, strong collision, MD5, SHA1 systems
References
[1] S. Debnath, A. Chattopadhyay, and S. Dutta, “Brief review on journey of secured hash algorithms,” 2017 4th International Conference on Opto-Electronics and Applied Optics, Optronix 2017, vol. 2018–Janua, pp. 1–5, 2018.
[2] S. Gupta, N. Goyal, and K. Aggarwal, “A Review of Comparative Study of MD5 and SSH Security Algorithm,” International Journal of Computer Applications, vol. 104, no. 14, pp. 1–4, 2014.
[3] the free encyclopedia Wikipedia, “Cryptography/MD5,SHA.” .
[4] M. J. (Mustansiriya/University) Reda, “Implementation of ( MD5 ) Algorithm,” DIYALA JOURNAL FOR PURE SCINCES, no. 1, pp. 131–139, 2013.
[5] M. Stevens, E. Bursztein, P. Karpman, A. Albertini, and Y. Markov, “The first collision for full SHA-1,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 10401 LNCS, pp. 570–596, 2017.
[6] V. Chiriaco, A. Franzen, R. Thayil, and X. Zhang, “Finding partial hash collisions by brute force parallel programming,” 2017 IEEE Long Island Systems, Applications and Technology Conference, LISAT 2017, vol. 5, pp. 1–6, 2017.
[7] Gayan Samarakoon, “Cryptographic essence of Bitcoin part.” [Online]. Available: https://hackernoon.com/cryptographic-essence-of-bitcoin-part-1-what-is-a-hash-function-f468e7f72daa.
[8] William Stallings, Cryptography and Network Security (Various Hash Algorithms), Fourth Edi. 2005.
[9] R. J. Rodríguez, M. Martín-Pérez, and I. Abadía, “A tool to compute approximation matching between windows processes,” 6th International Symposium on Digital Forensic and Security, ISDFS 2018 - Proceeding, vol. 2018–Janua, pp. 1–6, 2018.
[10] J. Mittmann, “One-Way Encryption and Message Authentication Security of Hash Functions,” p. 13, 2005.
Citation
Abdulrahman M. Zeyad, Chandra Shekar Loganathan, Gopal K Rishna, "Comparative Study of Encryption Algorithms for Improved Security:A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.72-75, 2019.
Security in Cloud Computing: A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.76-82, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.7682
Abstract
As per a Forbes` report distributed in 2015, cloud-based security spending is required to increment by 42 percent. As per another examination, the IT security use had expanded to 79.1 percent by 2015, demonstrating an expansion of something beyond than 10 percent every year. Worldwide Data Corporation (IDC) in 2011 demonstrated that 74.6 percent of big business clients positioned security as a noteworthy test. It is a normally acknowledged actuality that since 2008, cloud is a reasonable facilitating stage; be that as it may, the recognition regarding security in the cloud is that it needs critical upgrades to acknowledge higher rates of adaption in the venture scale. As recognized by another examination, a large number of the issues standing up to the distributed computing should be settled direly. The industry has made huge advances in combatting dangers to distributed computing, yet there is something else entirely to be done to accomplish a dimension of development that at present exists with conventional/on-start facilitating. This paper outlines various companion looked into articles on security dangers in cloud figuring and the preventive techniques. The goal of my examination is to comprehend the cloud parts, security issues, and dangers, alongside developing arrangements that may possibly alleviate the vulnerabilities in the cloud.
Key-Words / Index Term
Security Issues, Distributed Computing
References
[1] Qi Jiang, Jianfeng Ma, Fushan Wei, “On the Security of a Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services”, 2018,
[2] Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan, “A Comprehensive Survey on Security in Cloud Computing”, 2017.
[3] State of the Cloud Report, 2017.
[4] State of Cloud Adoption And Security, 2017.
[5] Coppolino L, D’Antonio S, Mazzeo G, Romano L, “Cloud security: Emerging threats and current solutions Computers and Electrical Engineering”, 2016.
[6] Sharma. R. and Trivedi. R. K, “Literature review: Cloud Computing –Security Issues, Solution and Technologies”, International Journal of Engineering Research, Vol. 3, Issue 4, pp. 221-225, 2014.
[7] Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing”, 2012.
[8] Amlan Jyoti Choudhury, Pardeep Kumar, Mangal Sain, Hyotaek Lim, Hoon Jae-Lee, “A Strong User Authentication Framework for Cloud Computing”, 2011.
[9] S. Subashini N, V.Kavitha, “A survey on security issues in service delivery models of cloud computing”, 2010.
[10] Meiko Jensen, Jorg Schwenk, Nils Gruschka, Luigi Lo Iacono., “On Technical Security Issues in Cloud Computing”, 2009.
Citation
Abhishek Gaur, Sohini Bhar, Gopal Krishna Shyam, "Security in Cloud Computing: A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.76-82, 2019.
Comparative Study on Prediction of Personality of a Person Using Text
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.83-87, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.8387
Abstract
Every person is unique in its own way; every person has a different personality. Personality detection gives an idea of behaviour of the person or gives an idea of how a person will react in a particular situation. Study of the relationship between word-use and personality traits has been successful in giving insight into human behaviour. Questionnaires is the most commonly used methods in the earlier times to detect personality traits from text but is not that effective. Due to emergence in technology different new methods are now available to detect personality of a person automatically. This paper is a summarized study of various methods used to automatically predict personality of a person from its text. Beginning with various methods used in earlier times to the methods newly emerged, this paper is a detailed study of all the different types of methods which are used for personality prediction along with different personality prediction models.
Key-Words / Index Term
Personality Prediction, Linguistics, LIWC, DISC, MBTI, Big Five Model
References
[1] J. W. Pennebaker, L. A. King, "Linguistic Styles: Language Use as an Individual Difference", Journal of Personality and Social Psychology, Vol. 77, No.6, 1296-1312, 1999.
[2] S. M. Mohammad, S. Kiritchenko, "Using Nuances of Emotion to Identify Personality", In AAAI -2012, pp: 27-30.
[3] K. C. Pramodh, Y. Vijayalata, "Automatic Personality Recognition of Authors UsingBig Five Factor Model", IEEE International Conference on Advances in Computer Applications (ICACA), 2016.
[4] H. Wei, F. Zhang, N. J. Yuan, C. Cao, H. Fu, X. Xie, Y. Rui, and W. Ma, "Beyond the words: Predicting user personality from heterogeneous information", In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, pages 305–314. ACM, 2017.
[5] N. Majumder, S. Poria, A. Gelbukh, and E. Cambria, "Deep learning-based document modeling for personality detection from text", IEEE Intelligent Systems, 32(2):74–79, 2017.
[6] L. Gou, M. X. Zhou, and H. Yang,"Knowme and shareme: understanding automatically discovered personality traits from social media and user sharing preferences", In Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pages 955–964. ACM, 2014.
[7] J. Digman, “Personality Structure: Emergence of the Five- Factor Model”, Ann. Rev. Psychology, vol. 41, no. 1, 1990, pp. 417–440.
[8] S. J, B. Lepri , Aharony N, Pianesi F, Sebe N, Pentland A.S., "Friends dont Lie - Inferring Personality Traits from Social Network Structure", In Proceedings of International Conference on Ubiquitous Computing. 2012
[9] S. Poria et al., “Convolutional MKL Based Multimodal Emotion Recognition and Sentiment Analysis”, Proc. IEEE Int’l Conf. Data Mining, 2016, pp. 439–448.
[10] L. Qiu, H. Lin, J. Ramsay, F. Yang, "You are what you tweet: Personality expression and perception on twitter", Journal of Research in Personality, 46(6):710–718, 2012
[11] B. Plank,D. Hovy, "Personality Traits on Twitter", Proceedings of the 6th Workshop on Computational Approaches to Subjectivity, Sentiment and Social Media Analysis (WASSA 2015), pages 92–98,Lisboa, Portugal, 17 September, 2015.
[12] A. Tyagi,"Personality Profiles Identification Using MBTI Test for Management Students: An Empirical Study",Journal of the Indian Academy of Applied Psychology,January 2008, Vol. 34, No.1, 151-162.
[13] B. Verhoeven, W. Daelemans, "TWISTY: a Multilingual Twitter Stylometry Corpus for Gender and Personality Profiling", In LREC, 2014.
[14] C. A. Bhardwaj, M. Mishra, S. Hemalatha,"An Automated Compatibility Prediction Engine using DISC Theory Based Classification and Neural Networks", VIT, Chennai.
[15] Y. Hernández1, C. A. Peña, A. Martínez, "Model for Personality Detection based on Text Analysis".
[16] Kosinski, D. Stillwell, T. Graepel," Private traitsand attributes are predictable from digital records of human behavior", Proceedings of the National Academy of Sciences, 110(15):5802–5805,2013.
[17] Y. R. Tausczik, J. W. Pennebaker, "The psychological meaning of words: Liwc and computerized text analysis methods", Journal oflanguage and social psychology, 29(1):24–54, 2010.
[18] J. W. Pennebaker, M. E. Francis, R. J. Booth, "Linguistic inquiry and word count", Technical Report, Dallas, TX: Southern Methodist University, 1993.
[19] Mairesse, M. A. Walker, M. R. Mehl, R. K. Moore, "Using linguistic cues for the automatic recognition of personalityin conversation and text", Journal of artificial intelligence research, 30:457–500, 2007.
[20] F. Liu, J. Perez, S. Nowson, "A language-independent and compositional model for personality trait recognition from short texts", arXiv preprint arXiv:1610.04345, 2016.
[21] X. Sun, B. Liu, J. Cao, J. Luo, "Who Am I? Personality Detection based on Deep Learning for Texts ", IEEE, 978-1-5386-3180-5/18, 2018.
Citation
Susmita S. Kunde, A. U. Bapat, "Comparative Study on Prediction of Personality of a Person Using Text", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.83-87, 2019.
Click-n-Purchase: A Shopping guide with Image Retrieval based on Mobile Visual Search in Fashion Domain: A Survey
Survey Paper | Journal Paper
Vol.07 , Issue.14 , pp.88-92, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.8892
Abstract
In the recent years, the use of e-commerce based applications via Internet has grown rapidly, thus increasing the volume of data in the web. Therefore it necessary to have faster retrieval of required data from the web. This paper provides a comprehensive review of various image retrieval techniques with their problems. The survey presents various techniques used so far for the Image Retrieval from the Web based applications, in order to make more efficient way of retrieving the information by using image retrieval techniques. The survey describes which techniques are used for image retrieval and the problem faced during the retrieval process. Finally, based on the use of existing techniques and the demand from the real-time applications a shopping guide will be presented with enhanced features of image retrieval techniques named as Click-n-Purchase, where the input for this application is taken from the mobiles and the visual search of the related images can be extracted from web based fashion domain based applications, so that user can be able to search their favourite items in less amount of time.
Key-Words / Index Term
Image Retrieval Techniques, Mobile Visual Search, Fashion domain, Click-n-Purchase
References
[1] Mehmood, Zahid and Abbas, Fakhar and Mahmood, Toqeer and Javid, Muhammad Arshad and Rehman, Amjad and Nawaz, Tabassam, Content-Based Image Retrieval Based on Visual Words Fusion Versus Features Fusion of Local and Global Features, Arabian Journal for Science and Engineering, 2018, pp. 1-20.
[2] Katrien Laenen, Susana Zoghbi, and Marie-Francine Moens, Web Search of Fashion Items with Multimodal Querying, Eleventh ACM International Conference on Web Search and Data Mining (WSDM `18), 2018, pp. 342-350.
[3] Angelo Nodari, Matteo Ghiringhelli, Alessandro Zamberletti, Marco Vanetti, Simone Albertini, Ignazio Gallo, “A mobile visual search application for content based image retrieval in the fashion domain”, 10th International Workshop on Content-Based Multimedia Indexing, 2012.
[4] J. Cychnerski, A. Brzeski, A. Boguszewski, M. Marmolowski and M. Trojanowicz, "Clothes detection and classification using convolutional neural networks," 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, 2017, pp. 1-8. doi: 10.1109/ETFA.2017.8247638
[5] Zhou, Dibin & Hu, Baokun & Wang, Qihui & Hu, Bin & Jia, Leiping & Wu, Yingfei & Xie, Lijun. “Design of Shopping Guide System with Image Retrieval Based on Mobile Platform”. 10.2991/3ca-13.2013.37, 2013.
[6] Liu Shuguang, Qu Pingge “Fabric Texture Classification Based on Wavelet Packet”, The Eighth International Conference on Electronic Measurement and Instruments,2017.
[7] Tom Yeh1, Kristen Grauman1, Konrad Tollmar2, Trevor Darrell, “A Picture is Worth a Thousand Keywords: Image-Based Object Search on a Mobile Platform”, CHI 2005, April 2-7, 2005. Portland, Oregon, USA.
[8] Yixin Chen, Member, IEEE, Jinbo Bi, Member, IEEE, and James Z. Wang, Senior Member, IEEE, “MILES: Multiple-Instance Learning”, IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, VOL. 28, NO. 12, DECEMBER 2006
[9] P. F. Li, J. Wang, H. H. Zhang and J. F. Jing, "Automatic woven fabric classification based on support vector machine," International Conference on Automatic Control and Artificial Intelligence (ACAI 2012), Xiamen, 2012, pp. 581-584.
[10] Min, Weiqing and Jiang, Shuqiang and Wang, Shuhui and Xu, Ruihan and Cao, Yushan and Herranz, Luis and He, Zhiqiang,”A survey on context-aware mobile visual recognition, Multimedia Systems, 23(6), 2017, pp. 647-665.
[11] Weiqing Min, Shuqiang Jiang, Shuhui Wang, Ruihan Xu, Yushan Cao, Luis Herranz, and Zhiqiang He, “A survey on context-aware mobile visual recognition”. Multimedia Systems, 2017, pp. 647-665.
[12] Mitul Kumar Ahirwal, Anil Kumar, and Girish Kumar Singh, “An Approach to Design Self Assisted CBIR System”, International Conference on Graphics and Signal Processing (ICGSP`17),pp. 21-25.
[13] Xin Ji, Wei Wang, Meihui Zhang, and Yang Yang, “Cross-Domain Image Retrieval with Attention Modelling”, ACM on Multimedia Conference(MM`17),2017,pp.1654-1662.
[14] C. Huang, S. Zhang, X. Lin, X. Liu and R. Ji, "Deep-based fisher vector for mobile visual search“, IEEE International Conference on Image Processing (ICIP), 2017, pp. 3430-3434.
[15] Y. H. Kuo and W. H. Hsu, "Dehashing: Server-Side Context-Aware Feature Reconstruction for Mobile Visual Search“, IEEE Transactions on Circuits and Systems for Video Technology, 27(1), 2017, pp. 139-148.
[16] A. Rahman, E. Winarko and M. E. Wibowo, "Mobile content based image retrieval architectures,“ 4th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), 2017, pp.1-4.
[17] C. Corbière, H. Ben-Younes, A. Ramé and C. Ollion, "Leveraging Weakly Annotated Data for Fashion Image Retrieval and Label Prediction,“ IEEE International Conference on Computer Vision Workshops (ICCVW), 2017, pp. 2268-2274.
[18] J. Sivic and A. Zisserman, “Video Google: A text retrieval approach to object matching in videos,” in IEEE Conference on Computer Vision and Pattern Recognition, 2003, pp. 1470–1477.
[19] J. Philbin, O. Chum, M. Isard, J. Sivic and A. Zisserman, Object retrieval with large vocabularies and fast spatial matching, 2007 IEEE Conference on Computer Vision and Pattern Recognition, Minneapolis, MN, 2007, pp. 1-8.
[20] W. Zhou, Y. Lu, H. Li, Y. Song, and Q. Tian, “Spatial coding for large scale partial-duplicate web image search,” in ACM International Conference on Multimedia, 2010, pp. 511–520.
[21] O. Chum, J. Philbin, J. Sivic, M. Isard, and A. Zisserman, “Total recall: Automatic query expansion with a generative feature model for object retrieval,” in International Conference on Computer Vision, 2007, pp. 1–8.
[22] D. Nister and H. Stewenius, “Scalable recognition with a vocabulary tree,” in IEEE Conference on Computer Vision and Pattern Recognition, vol. 2, 2006, pp. 2161–2168.
[23] Z. Wu, Q. Ke, M. Isard, and J. Sun, “Bundling features for large scale partial-duplicate web image search,” in IEEE Conference on Computer Vision and Pattern Recognition, 2009, pp. 25–32.
[24] X. Wang, M. Yang, T. Cour, S. Zhu, K. Yu, and T. X. Han, “Contextual weighting for vocabulary tree based image retrieval,” in International Conference on Computer Vision, 2011, pp. 209–216.
[25] L. Zheng, S. Wang, and Q. Tian, “Coupled binary embedding for large-scale image retrieval,” IEEE Transactions on Image Processing (TIP), vol. 23, no. 8, pp. 3368–3380, 2014.
[26] Y. Cao, C. Wang, L. Zhang, and L. Zhang, “Edgel index for largescale sketch-based image search,” in IEEE Conference on C Vision and Pattern Recognition (CVPR), 2011, pp. 761–768.
[27] J.-P. Heo, Y. Lee, J. He, S.-F. Chang, and S.-E. Yoon, “Spherical hashing,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2012, pp. 2957–2964.
[28] J. Tang, Z. Li, M. Wang, and R. Zhao, “Neighborhood discriminant hashing for large-scale image retrieval,” IEEE Transactions on Image Processing (TPI), vol. 24, no. 9, pp. 2827–2840, 2015.
[29] L. Wu, K. Zhao, H. Lu, Z. Wei, and B. Lu, “Distance preserving marginal hashing for image retrieval,” in IEEE International Conference on Multimedia and Expo (ICME), 2015, pp. 1–6.
[30] K. Jiang, Q. Que, and B. Kulis, “Revisiting kernelized localitysensitive hashing for improved large-scale image retrieval,” in IEEE Conference on Computer Vision and Pattern Recognition (CVPR), 2015, pp. 4933–4941.
Citation
Nikhil. S. Tengli, Suvarna Nandyal, "Click-n-Purchase: A Shopping guide with Image Retrieval based on Mobile Visual Search in Fashion Domain: A Survey", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.88-92, 2019.
Kernel Induced Possiblistic Unsupervised Clustering Techniques in Analyzing Breast Cancer Database
Research Paper | Journal Paper
Vol.07 , Issue.14 , pp.93-98, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si14.9398
Abstract
The challenge in medical breast cancer database is to differentiate the sub types of cancers in the data. Analyzing the medical breast cancer database is most important one in identifying cancer types which cause deaths. Therefore in order to analyze the types of diseases in cancer databases this paper develops fuzzy set based unsupervised effective clustering technique and implements it with breast cancer database to divide it into available subtypes. This paper introduces the objective function of unsupervised effective proposed clustering technique by incorporating kernel induced distance, kernel functions, and possibilistic memberships. Through the experimental part of this paper the efficiency of proposed method is proved.
Key-Words / Index Term
Clustering, Fuzzy C-Means, Kernel Distance, Breast Cancer Data
References
[1] Akay, Mehmet Fatih, "Support vector machines combined with feature selection for breast cancer diagnosis" , Expert systems with applications, Vol.36, Issue 2, PP.3240-3247, 2009.
[2] Antony, S. Julian Savari, "Detected Breast Cancer on Mammographic Image Classification Using Fuzzy C-Means Algorithm", International Journal of Innovations in Engineering and Technology, Vol.36, Issue 2, 2014.
[3] Basha, S. Saheb, K. Satya Prasad, "Automatic detection of breast cancer mass in mammograms using morphological operators and Fuzzy C-Means clustering”, Journal of Theoretical & Applied Information Technology, Vol.5, Issue.6, 2009
[4] Bezdek J.C, “Pattern Recognition with Fuzzy Objective Function Algorithms”, Plenum Press, New York, 1981.
[5] Bing Liu, Chunru Wan, L.P. Wang, "An efficient semi-unsupervised gene selection method via spectral biclustering", IEEE Transactions on Nano-Bioscience, Vol.5, Issue.2, pp.110-114, 2006.
[6] Carlos Alzate, Johan A.K. Suykens, “Sparse kernel spectral clustering models for large scale dataanalysis”, Neurocomputing, Vol.74, Issue.9, pp.1382-1390, 2011.
[7] Chen, Hui-Ling, "A support vector machine classifier with rough set-based feature selection for breast cancer diagnosis", Expert Systems with Applications, Vol.38, Issue.7, pp. 9014-9022, 2011.
[8] Chih-Hsuan Wang, “Outlier identification and market segmentation using kernel-based clustering techniques”, Expert Systems with Applications Vol.36, Issue.2, pp. 3744-3750, 2009.
[9] Ching-Hao Lai et al., “Oncogenes and Subtypes of Diffuse Large B-Cell Lymphoma Discoveries from Microarray Database”, JCIS, Atlantis Press, 2006.
[10] Etehad Tavakol, M., Saeed Sadri, E. Y. K. Ng, "Application of K-and fuzzy c-means for color segmentation of thermal infrared breast images", Journal of medical systems, Vol.34, Issue.1, pp. 35-42, 2010.
[11] Francesco Masulli, Schenone A, “A fuzzy clustering based segmentation system as support to diagnosis in medical imaging”, Artificial Intelligence in Medicine, Vol.16, Issue.2, pp.129-147, 1999.
[12] Frank Klawonn, “What Can Fuzzy Cluster Analysis Contribute to Clustering of High-Dimensional Data?”, International workshop on Fuzzy Logic and Applications, Springer, Cham,pp.1-47, 2013.
[13] Hongmei Zhang, Guidong Yu, “A Novel Clustering and Mining Algorithm for High Dimensional Data based on Uncertainty Criteria and Fuzzy Mathematics”, Rev. Téc. Ing. Univ. Zulia, Vol.39, Issue.2, pp.1-11, 2016.
[14] Hu Yang, Nicolino J. Pizzi, “Biomedical Data Classification Using Hierarchical Clustering”, Proc IEEE Canadian Conf Elect Comput. Eng, Niagara Falls, Vol.4, pp.1861-1864, 2004.
[15] Jezewski M, “An application of modified fuzzy clustering to medical data classification”, Journal of Medical Informatics and Technologies, Vol.17, pp.51-57, 2011.
[16] Klifa, C., et al. "Quantification of breast tissue index from MR data using fuzzy clustering", Engineering in medicine and biology society, IEEE, Vol.3, pp.1667-70, 2004.
[17] Liu, Xiaoming, et al. "Microcalcification detection in full-field digital mammograms with PFCM clustering and weighted SVM-based method", EURASIP Journal on Advances in Signal Processing, Vol.1, Issue.73, 2015.
[18] Muhic Indira, "Fuzzy analysis of breast cancer disease using fuzzy c-means and pattern recognition", Southeast Europe Journal of Soft Computing, Vol.39, Issue.2, 2013.
[19] Roland Winkler, Frank Klawonn, Rudolf Kruse, “Fuzzy C-Means in High Dimensional Spaces, International Journal of Fuzzy System Applications”, Vol.1, Issue.1, pp.1-16, 2011.
[20] Rousseeuw PJ, “Silhouettes: a Graphical Aid to the Interpretation and Validation of Cluster Analysis”, Journal of Computational and Applied Mathematics, vol.20, pp.53-65, 1987.
[21] Şahan, S., Polat, K., Kodaz, H., & Güneş, S, “A new hybrid method based on fuzzy-artificial immune system and k-nn algorithm for breast cancer diagnosis”, Computers in Biology and Medicine, Vol.37, Issue.3, pp.415-423, 2007.
[22] Senthilkumar, B., and G. Umamaheswari, "Combination of novel enhancement technique and fuzzy c means clustering technique in breast cancer detection", Biomedical Research, Vol.24, Issue.2, pp.252-256, 2013.
[23] Soria, Daniele et al., "A methodology to identify consensus classes from clustering algorithms applied to immunohistochemical data from breast cancer patients", Computers in biology and medicine,Vol. 40, Issue.3, pp.318-330, 2010.
[24] Singh Nalini et al., "GUI Based Automatic Breast Cancer Mass and Calcification Detection in Mammogram Images using K-means and Fuzzy C-means Methods", International Journal of Machine Learning and Computing, Vol.2, Issue.1, pp.7-12, 2012.
[25] D.Vanisri, C.Loganathan, “An Efficient Fuzzy Possibilistic C-Means with Penalized and Compensated Constraints”, Global Journal of Computer Science and Technology, Vol.11, Issue.3, pp.15-22, 2011.
[26] Vivona Letizia, et al., "Fuzzy technique for micro calcifications clustering in digital mammograms", BMC medical imaging, Vol.14, Issue.1, 23, 2014.
[27] Zheng, Bichen, Sang Won Yoon, Sarah S. Lam, "Breast cancer diagnosis based on feature extraction using a hybrid of K-means and support vector machine algorithms", Expert Systems with Applications, Vol.41, Issue.4, pp.1476-1482, 2014.
Citation
S.R. Kannan, M. Siva, R. Devi, Mark Last, Ramathilagam, "Kernel Induced Possiblistic Unsupervised Clustering Techniques in Analyzing Breast Cancer Database", International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.93-98, 2019.