A Mobile Health Care Social Networks In Cloud Computing Based On Secure Identity Based Data Sharing and Profile Matching
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.54-58, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.5458
Abstract
Cloud computing and social networks are providing real time data sharing by changing the way of healthcare in a cost-effective manner. However, data security issue is one of the main obstacles of mobile healthcare social networks (MHSN), since health information is considered to be highly sensitive and securable. In this paper, we introduce a mobile health care social networks in cloud computing based on profile matching and data sharing. The patients can outsource their encrypted health records to cloud storage with identity-based broadcast encryption (IBBE) technique, and share them with a group of doctors in a secure and efficient manner with domains and sub domains.
Key-Words / Index Term
conditional proxy re-encryption, data security, encryption, health information management, profile matching
References
[1] M. Li, S. Yu, Y. Zheng, K. Ren and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Trans on Parallel and Distrib. Syst., vol. 24, no. 1, pp. 131-143, Jan. 2013.
[2] M. Barua X. Liang, R. Lu and X. Shen, “ESPAC: Enabling Security and Patient-centric Access Control for eHealth in cloud computing,” International Journal of Security and Networks, vol. 6, no. 2/3, pp. 67-76, Nov. 2011
[3] S. Yu, C. Wang, K. Ren and W. Lou, “Achieving secure, scalable, and fine-grained data access control in cloud computing,” in Proc. 29th Conference on Information Communications, San Diego, CA, USA, 2010, pp. 534-542
[4] Y. Liu, Y. Zhang, J. Ling and Z. Liu, “Secure and fine-grained access control on e-healthcare records in mobile cloud computing,” Future Generat.Comput. Syst., vol. 78, pp. 1020-1026, Jan. 2017.
[5] Y. Yang, X. Liu, R. Deng and Y. Li, “Lightweight sharable and traceable secure mobile health system,” IEEE Trans. Depend. Sec Comput., Jul. 2017. [Online]. Available: https://doi.org/10.1109/TDSC.2017.2729556
[6] Y. Yang, X. Liu and R. Deng, “Lightweight break-glass access control system for healthcare internet-of-things,” IEEE Transactions on Industrial Informatics, Sept. 2017.[Online]. Available: https://doi.org/10. 1109/TII.2017.2751640
[7] M. Blaze, G. Bleumer and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Proc. Advances in Cryptology - EUROCRYPT` 98, Espoo, Finland, 1998, pp. 127-144.
[8] M. Green, G. Ateniese, “Identity-based proxy re-encryption,” in Proc. the 5th International Conference on Applied Cryptography and Network Security, Zhuhai, China, 2007, pp. 288-306.
[9] T. Matsuo, “Proxy re-encryption systems for identity-based encryption,” in Proc. 1st International Conference on Pairing-Based Cryptography, Tokyo, Japan, 2007, pp. 247-267.
[10] Y. Zhou, H. Deng, Q. Wu, B. Qin, J. Liu and Y. Ding, “Identity-based proxy re-encryption version 2: Making mobile access easy in cloud,” Future Generat. Comput. Syst., vol. 62, pp. 128-139, Sept. 2016.
[11] X. Wang, J. Ma, F. Xhafa, M. Zhang and X. Luo, “Cost-effective secure E-health cloud system using identity based cryptographic techniques,” Future Generat.Comput. Syst., vol. 67, pp. 242-254, Feb. 2017.
[12]J. Weng, R. Deng, X. Ding, C. Chu and J. Lai, “Conditional proxy re-encryption secure against chosen-ciphertext attack,” in Proc. 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia, 2009, pp. 322-332.
[13] P. Xu, T. Jiao, Q. Wu, W. Wang and H. Jin, “Conditional identity-based broadcast proxy re-encryption and its application to cloud email,” IEEE Transactions on Computers, vol. 65, no. 1, pp. 66-79, Jan. 2016.
[14] R. Zhang, J. Zhang, Y Zhang, J. Sun and G. Yan, “Privacy-preserving profile matching for proximity-based mobile social networking,” IEEE J. Sel. Areas Comm., vol. 31, no. 9, pp. 656-668, Sept. 2013.
[15]L. Zhang, X. Li, K. Liu, T. Jung and Y. Liu, “Message in a sealed bottle: Privacy preserving friending in mobile social networks,” IEEE Trans. Mob. Comput., vol. 14, no. 9, pp. 1888-1902, Sept. 2015.
Citation
A. Apoorva, K. Amoolya, K. Anil, M. Guruprasad, Vinodh H N, "A Mobile Health Care Social Networks In Cloud Computing Based On Secure Identity Based Data Sharing and Profile Matching", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.54-58, 2019.
TerrorBot- Python Based Cascade Classifier to Detect Terrorists and Soldiers
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.59-64, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.5964
Abstract
Most of the defense organization now takes the help of robots to carry out many risky jobs that cannot be done by soldiers. These robots used in defense or usually employed with integrated system, including video screens, sensors, laser gun, metal detector and cameras. The defense robots also have different shapes according to various purposes. Here the new system is proposed with the help of camera through we can trace out the intruders and the robot will be employed with integrated system, including video camera, sensors, gripper and weapon. The intruders face detection by Haar Cascade Classifier and face recognition by LBPH (Local Binary Pattern Histogram). This is specially designed robotic system to protect the country from enemies and to save soldiers life. The proposed algorithm is implemented using Opensource Computer Vision (OpenCV) and image processing with python.
Key-Words / Index Term
Face detection; Haar Cascade Classifiers; Face recognition; LBPH; OpenCV
References
[1] “Context-Aware local binary feature learning for face recognition” Yueqi Duan, Jiwen Lu, Jianjiang Feng,Jie Zhou,IEEE Transactions on pattern analysis and machine intelligence, vol 40, no 5, May 2018.
[2] “Simultaneous Local Binary Feature Learning and encoding for homogenous and heterogenous face recognition”,Jiwen Lu, Venice Erin Liong,Jie Zhou, IEEE Transactions on pattern analysis and machine intelligence,vol 40,no 8, August 2018.
[3]”Trunk- Branch Ensemble Convulational neuaral network for video based face recognition” Changxing Ding,” Dancheng Tao, IEEE Transcations on pattern analysis and machine intelligence, vol 40, no 4,April 2018.
[4]”Panoric Face Recogntion” Yun-Fu liu, Jing-Ming Guo,Po-Hisen Liu, Jiann-Der Lee, Chen-ChichYao, IEEE Transactions on circuits and systems for video Technology, Vol 28,No 8,August 2018.
[5]”Real-time face detection based on YOLO” Wang Yang,Zheng Jiachun,1st IEEE International conference on knowledge Innovation and Invention 2018
[6] “Face Recogntion based door lock system using OpenCv and C# with Remote Access and Security Features”Prathamesh Timse,Pranav Aggarwal, Prakhar Sinha, Neel Vora, Prathamesh Timse et al Int. Journal of Engineering Research and Applications, ISSN: 2248-9622,Vol 4 ,Issue 4(Version 6),April 2018,pg.52-57
[7] “Face Recogntion and Tracking System based and Embedded Platform” Chen Zhang, Tianygue Li, Boquan Li,Xi Ye, 10th International conference on modelling Identification and control,July,2-4,2018, Guiyang, China
[8]”Multi- Faces Recognition Process Using Haar Cascades and EigebFace Methods” Teddy Mantoro,Suhendi, 10th International Conference, august ,2018
[9] “Automatic Door Access System Using Face Recogntion” Htelk Htar Lwin,Aung Soe Khaing,Hla Myo Tun,International Journal of Scientific and technology Research volume 4, Issue 06,June 2015
Citation
Kavya R, Keerthana A, Keerthana H N, Meena K N, Chetana Srinivas, "TerrorBot- Python Based Cascade Classifier to Detect Terrorists and Soldiers", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.59-64, 2019.
Prediction of Heart Disease with Claims Data using Machine Learning Method
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.65-68, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.6568
Abstract
Machine learning can be referred as discovery of relationships in larger datasets and in some cases it is used for predicting relationships based on the results discovered. Nowadays machine learning is achieving widespread in various fields such as healthcare industry, scientific and engineering. In healthcare industry, machine learning is mainly used for disease prediction. The main objective of our work is to predict heart disease using Naïve Bayes classifier. Naïve Bayes are the probabilistic classifiers used to classify the data using attributes. It retrieves the trained data and compares the attribute values with test data sets and predicts the result.
Key-Words / Index Term
Machine learning, prediction, healthcare industry, Naïve Bayes Classifier, Heartdisease
References
[1] E. Choi, M.T.Bahadori, L.Song, W.F. Stewart, and J.Sun, “Gram: Graph- based attention model for health acre representation learning,” in proceedings of the 23rd ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, ser. KDD ’17. New York,NY, USA:ACM, pp 787-795.
[2] D. Kartchner, T. Chirstensen, J. Humphreys, and S.Wade, “Code2vec: Embedding and clustering medical diagosis data,” in 2017 IEEE International Conference on Healthcare Informatics (ICHI), Aug 2017, pp. 386-390.
[3] R. Miotto, L. Li, B. A. Kidd, and J.Dudley, “Deep patient: An unsupervised representation to predict the future of patients from the electronic health records,” in Scientific reports, 2016
[4] Z. Che, Y. Cheng, S. Zhai, Z.Sun and Y.Liu, “Boosting deep learning risk prediction with generative adversarial netwoks for electronic health records, ” in 2017 IEEE International Conference on Data Mining (ICDM) , Nov 2017, pp. 787-792.
[5]. R.Snyderman, “Personalized health care: from theory to practice,” Biotechnology Journal, vol. 7, no. 8, pp. 973-979, Aug. 2012
[6] N.Razavian and D. Sontag, “Temporal convolution neural networks for diagnosis from lab tests,” CoRR, vol. abs/1511.07938, 2015.
[7] A. Perotte, R. Ranganath, J.S. Hirsch, D. Blei, and N.Elthadad, “Risk prediction forchronic kidney disease progression using heterogenous electronic helath record data and tie series analysis,” Journal of the American Medical Informatics Association: JAMLA, vol. 22, no. 4, pp. 872-880, Jul. 2015.
[8] N. Tangri, L.A. Stevens, J, Griffith, H. Tghiouart, O.Djurdjev, D. Naimark, A. Levin, and A.S levey, “A Predictive model for progression of chronic kidney disease to kidney failure,” Jama, vol.305, no.15, pp. 1553-1559, 2011.
[9] E. Choi, M.T. Bahadori, A Schuetz , W. F. Stewart, and J. Sun “Doctor ai: Predicting clinical events via recurrent neural networks ,” in Proceedings of the !st Machine Learning for Healthcare Conferences ser. Proceedings of Machine Learning Research, F. Doshi-Velez, J. Fackler, D.Kale, B. Wallace, and J.Wiens, Eds., vol.56. Children’s Hospital LA, Los Angeles, CA, USA: PMLR, 18-1, Aug 2016, pp.301-318
[10] M.Khalilia, S. Chakraborty, and M. Popescu, “Predicting disease risks from highly imbalanced data using random forest,” BMC medical informatics and decision making, vol.11, no. 1, p. 1,2011.
[11] X.Wang, D. Sontag, and F.Wang, “Unspervised learning of disease progression models,” in Proceedings of the 20th ACM SIGKDD International Conference on knowledge discovery and data mining. ACM, 2014, pp. 85-94.
[12] Z.C. Lipton, D.C. Kale, C.Elkan, and R. Wetzell, “Learning to diagnose with lstm recurrent neural networks,” arXiv preprint arXiv: 1511. 03677, 2015
[13]N.Barakat, A.P.Bradley, and M.N.H. Barakat, “Intelligible support vector Machine for Diagnosis of Diabetes Mellitus,” IEEE Transactions on Information Technology in Biomedicine, vol. 14, no, pp.1114- 1120, Jul. 2010.
[14] “Prediction Modelling Using HER data: Challenges, Strategies Medical Carehhtp://journals.lww.com/lwwmedcalcare/Fulltext/2010/06001/Prediction Modeling Using EHR data Challenges,.17.aspx.
[15] W. Yu, T. Liu, R. Valdez, M. Gwinn, and M.J. Khoury, “Application of support vector machine modelling for prediction of common disease: the case of diabetes and pre-diabetes,” BMc Medical Informatics and Decision Making, vol. 10, p. 16, 2010.
[16] A. V. Lebedev, E, Westman, G.J. P. Van Western, M.G. Kramberger, A. Lundervold, D, Aarsland, H. Soininen, I. Kloszewska, P. Mecocci, M. Tsolaki, B. Vellas, S. Lovestone, And A. Simmons, “Random Forest ensembles for detection and prediction of Alzheimer’s disease with good between- cohort robustness,” NeuroImage: Clinical, vol.6, pp. 115-125, 2014
Citation
Lavanya L, Megha V, Nagashree H, Pavithra S, Anusha K L, "Prediction of Heart Disease with Claims Data using Machine Learning Method", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.65-68, 2019.
Sentiment Analysis of Twitter Data Using Text Classification And Clustering
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.69-72, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.6972
Abstract
Information and data has always been consideredas the lifeline to run any business. The stability of an organization, the growth of the business, the profit gained or the loss suffered, all these factors depend on the information gained about the market trends and also most importantly public opinion. The sentiments of the people are therefore considered as the most crucial data that the organizations use in order to take effective decisions with minimum risk.In this paper we gather data from a type of social media that is twitter. This is because the public nowadays express their opinions and their feedbacks largely to through social media. In this paper we attempt to perform sentiment analysis using text classification by Naïve Bayes and text Clustering by K-means.
Key-Words / Index Term
Twitter, Sentiment Analysis, Social Media, Naïve Bayes, K-means
References
[1] “Application of text classification and clustering of Twitter data for business analytics”, Alrence Santiago Halibas ; Abubucker Samsudeen Shaffi ; Mohamed Abdul Kader Varusai Mohamed,2018 Majan International Conference (MIC), 2018.
[2] “Text Analytics Market by Component (Software, Services), Application (Customer Experience Management, Marketing Management, Governance, Risk and Compliance Management), Deployment Model, Organization Size, Industry Vertical, Region - Global Forecast to 20,” 2017.
[3] H. S. Yaram, “Machine learning algorithms for document clustering and fraud detection,” in Proceedings of the 2016 International Conference on Data Science and Engineering, ICDSE 2016, 2017.
[4] L. P. Khobragade and V. Jethani, “Sentiment Analysis of Movie Review,”
Int. J. Adv. Res. Comput. Sci., vol. 8, no. 5, p. 19411948, 2017.
[5] R. A. Jain and P. Dandannavar, “text analytics framework using apache spark and combination of lexical and maching learning techniques,” Int.
J. Bus. Anal. Intell., vol. 5, no. 1, pp. 36–42, 2017.
[6]S.M. Allahyari et al., “A Brief Survey of Text Mining: Classification, Clustering and Extraction Techniques,” arXiv Prepr. arXiv, vol. 1707, no. 2919, pp. 1–13, 2017.
[7] V. K. S. Rawat, “Comparative Analysis of Data Mining Techniques, Tools and Maching Learning Algorithms for Efficient Data Analytics,” JOSR J. Comput. Eng., vol. 19, no. 4, pp. 56–60, 2017.
[8] P. Gonçalves and M. Araújo, “Comparing and combining sentiment analysis methods,” Proc. first ACM Conf. Online Soc. networks. ACM, pp. 27–38, 2013.
[9] W. H. Kaur and V. Mangat, “Dictionary based Sentiment Analysis of Hinglish text,” Int. J. Adv. Res. Comput. Sci., vol. 8, no. 5, pp. 816–822, 2017.
[10] C. F. N. Ribeiro, M. Araújo, P. Gonçalves, M. André Gonçalves, and F. Benevenuto, “SentiBench - a benchmark comparison of state-of-the- practice sentiment analysis methods,” EPJ Data Sci., vol. 5, no. 1, 2016.
[11] D. A. Moreno and T. Redondo, “Text Analytics: the convergence of Big Data and Artificial Intelligence,” Int. J. Interact. Multimed. Artif. Intell., vol. 3, no. 6, p. 57, 2016.
[12] E. V. A. Kharde and S. S. Sonawane, “Sentiment Analysis of Twitter Data: A Survey of Techniques,” Int. J. Comput. Appl., vol. 139, no. 11, pp. 975–8887, 2016.
[13] G. L. Ziora, “The sentiment analysis as a tool of business analytics in contemporary organizations,” Stud. Ekon., pp. 234–241, 2016.
[14] K. O. Muller, I. Junglas, S. Debortoli, and J. Von Brocke, “Using Text Analytics to Derive Customer Service Management Benefits from Unstructured Data,” MIS Q. Exec., vol. 15, no. 4, pp. 64–73, 2016.
[15] T. A. Trevino, “Introduction to K-means Clustering,” Datascience.com. 2016.
[16] X. M. H. Peetz, M. De Rijke, and R. Kaptein, “Estimating Reputation Polarity on Microblog Posts,” Inf. Process. Manag., vol. 52, no. 2, pp. 193–216, 2016.
[17] I. N. Yussupova, M. Boyko, and D. Bogdanova, “A Decision Support Approach based on Sentiment Analysis Combined with Data Mining for Customer Satisfaction Research,” Int. J. Adv. Intell. Syst., vol. 1&2, 2015.
[18] J. S. K. Markham, M. Kowolenko, and T. L. Michaelis, “Unstructured Text Analytics to Support New Product Development Decisions,” Res. Technol. Manag., vol. 58, no. 2, pp. 30–39, 2015..
[19] F. W. Medhat, A. Hassan, and H. Korashy, “Sentiment analysis algorithms and applications: A survey,” Ain Shams Eng. J., vol. 5, no. 4, pp. 1093– 1113, 2014.
[20] U. M. Hofmann; and R. Klinkenberg;, “RapidMiner: Data Mining Use Cases and Business Analytics Applications,” Zhurnal Eksp. i Teor. Fiz., 2013.
Citation
Kumari Ashmita Sinha, Maanasa VKP, Nikhitha SP, Ramya S, Mangala CN, "Sentiment Analysis of Twitter Data Using Text Classification And Clustering", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.69-72, 2019.
Attitude and Heading Reference System for Aerospace Application
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.73-77, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.7377
Abstract
Many experiments have been conducted for attitude estimation with low cost micro electro-mechanical system (MEMS), even though it was of low cost and less weight it causes certain noise and errors over time. The main objective of the paper is to introduce accelerometer portion of basic attitude and heading reference system for aerospace application using Internet of Things (IoT) which can be used to find the optimal weight value such error of the Attitude and Heading Reference (AHRS) is minimised. The proposed system also assures the body rate by using 2 axis gyro and it provides distance rate measurement and angular rotation. This system consumes low power and easy to handle.
Key-Words / Index Term
ArdiunoUno, Accelerometer, Gyroscope, Magnetometer
References
[1] M. Wang, Y. C. Yang, R. R. Hatch, Y. H. Zhang, Adaptive filter for a miniature MEMS based attitude and heading reference system. In Proceedings of IEEE Position Location and Navigation Symposium, Monterey, CA, USA, April 26-29, 2004.
[2] R. Zhu, D. Sun, Z. Y. Zhou, D. Q. Wang, A linear fusion algorithm for attitude determination using low cost MEMS-based sensors. Measurement, 40, 322-328, 2007.
[3] E. Mu˜noz, A. R. Jim´enez, F. de Ponte, F. Zampella, Evaluation of AHRS Algorithms for Inertial Personal Localization in Industrial Environments, Proceedings of the 2015 IEEE International Conference on Industrial Technology (ICIT), pp. 3412 - 3417 Seville, Spain, March 17-19, 2015.
[4] A. E. Eiben, and J. E. Smith, Introduction to Evolutionary Computing, Springer, Natural Computing Series, 1st edition, 2003.
[5] Foot Mounted IMU data sets for the evaluation of PDR algorithms, LOPSI Research group, Spain, http://lopsi.weebly.com/downloads.html, 2017.
[6] A. G. Cutti, A. Giovanardi, L. Rocchi, A. Davalli, R. Sacchetti, Ambulatory measurement of shoulder and elbow kinematics through inertial and magnetic sensors. Med. Boil. Eng. Comput., 46, 169-178, 2008.
[7] W. M. Chung, S. Yeung, W. W. Chan, R. Lee, Validity of VICON Motion Analysis System for Upper Limb Kinematic Measurement AComparisonStudy with Inertial Tracking Xsens System. Hong Kong Physiother. J.2011.
[8] D. Hamacher, D. Bertram, C. Folsch, L. Schega, Evaluation of a visual feedback system in gait retraining: A pilot study. Gait Posture, 36, 182- 186, 2012.
[9] K. Saber-Sheikh, E. C. Bryant, C. Glazzard, A. Hamel, R. Y. Lee,Feasibility of using inertial sensors to assess human movement. Man.Ther., 15, 122-125, 2010.
[10] Foot Mounted IMU data sets for the evaluation of PDR algorithms, LOPSI Research group, Spain, http: //lopsi.weebly.com/downloads.html, 2017.
[11] A. G. Cutti, A. Giovanardi, L. Rocchi, A. Davalli, R. Sacchetti, Ambulatory measurement of shoulder and elbow kinematics through inertial and magnetic sensors. Med. Boil. Eng. Comput., 46, 169-178, 2008.
[12] W. M. Chung, S. Yeung, W. W. Chan, R. Lee, Validity of VICON Motion Analysis System for Upper Limb Kinematic Measurement A Comparison Study with Inertial Tracking Xsens System. Hong Kong Physiother. J. 2011.
[13] D. Hamacher, D. Bertram, C. Folsch, L. Schega, Evaluation of a visual feedback system in gait retraining: A pilot study. Gait Posture, 36, 182-186, 2012.
[14] K. Saber-Sheikh, E. C. Bryant, C. Glazzard, A. Hamel, R. Y. Lee, Feasibility of using inertial sensors to assess human movement. Man. Ther., 15, 122-125, 2010.
[15] T.H.Cox,C. J.Nagy,M. A. Skoog, and I.A. Somers, “Civil UAV capabil it y assessment,” The National Aeronautics and Space Administration, pp. 1–10, 2014
[16] Z. Wachter, “A cost effective motion platform for performance testing of MEMS-based attitude and heading reference systems,” Journal of Intelligent & Robotic Systems, vol. 70, no. 411, pp. 1–9, 2013.
[17] S. J. Zaloga, D. Rockwell, and P. Finnegan, World Unmanned Aerial Vehicle Systems Market Profile and Forecast, Teal GroupCorporation, 2014
[18] R. Schneiderman, “Unmanned drones are flying high in the military/aerospace sector,” IEEE Signal Processing Magazine, vol. 29, no. 1, pp. 8–11, 2014
[19] Qiang Zhu, Shaokang Li, Zhen Xu, Study of Solving Nonlinear Least Squares Under Large Residual Based on Levenberg-Marquardt Algorithm, China Measurement and Testing Technology, 42(03): 12–16, 2016.
[20] Xu Yang, XingLong Wang, Discussion on the Method of Eliminating Abnormal Data in Measurement Test,Technology Wind, (15): 136, 2016.
Citation
Kirthana B, Madhushree K, Madhushree M S, Megha P H, Dhanraj S, "Attitude and Heading Reference System for Aerospace Application", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.73-77, 2019.
Salary Prediction in It Job Market
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.78-84, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.7884
Abstract
In this study, Random Forest Regression machine learning rule is applied to predict salary levels of individuals supported their years of expertise. Random forest regression is employed since it gave higher accuracy compared to decision tree regression and Support Vector Regression classifier. Choosing the foremost effective machine learning rule so as to unravel the problems of classification and prediction of data is the most vital part of machine learning which depends on dataset likewise. The predictive accuracy of the Random forest regression on test data is 97%, while the accuracy of Decision tree regression and Support Vector Regression is 85% and 90% respectively. The model has been used on the training data to predict dependent variables and to extract features with highest impact on salary prediction.
Key-Words / Index Term
Machine learning, Random forest regression, Decision tree regression, Support vector regression, salary prediction
References
[1] A. Parkavi1, K. Lakshmi “Predicting the Course Knowledge Level of Students using Data Mining Techniques “,IEEE International Conference on Smart Technologies and Management for Computing, Communication, Controls, Energy and Materials (ICSTM), (2017).
[2] A. M Shahiri, W. Husain and N.A Rashid, “A Review on Predicting Students‟ Performance using Data mining Techniques,” in The Third Information System Information Council
[3] R.A. Huebner, “A survey of educational data mining research,” Research in Higher Education Journal.
[4] Improving Students‟ Motivation to Study using Salary
Prediction System Pornthep Khongchai, Pokpong Songmuang Department of Computer Science Faculty of Science and Technology
[5] S. Anupama Kumar Vijayalakshmi M.N. “Inference of Naïve Baye‟s Technique on Student Assessment Data”, R.V.
College of Engineering, Bangalore, India
[6] John Jerrim, “Do college students make better predictions of their future income than young adults in the labor force?”, Education Economics, 23:2, p 162-179, 2013.
[7] Karlar Hamlen and William A. Hamlen,” Faculty Salary as a predictor of student outgoing salaries from MBA programs”, Journal of Education for Business
[8] ”Efficient Classification of Data Using Decision Tree” by Bhaskar N. Patel, Satish G. Prajapati, and Dr. Kamaljit I. Lakhtaria.
[9] Kayah, F. “Discretizing Continuous Features for Naive Bayes and C4. Classifiers”. University of Maryland publications: College Park, MD, USA.
[10] S. Taruna, Mrinal Pandey, “An empirical analysis of
classification techniques for predicting academic performance”, IEEE Advances Computing Conference (2004).All references arranged in the following format for and remove website (URL) references or replaced by Journal references.
[11] F. Amato, R. Boselli, M. Cesarini, F. Mercorio, M. Mezzanzanica, V. Moscato, F. Persia, and A. Picariello. Challenge: Processing web texts for classifying job offers. In Semantic Computing (ICSC), 2015 IEEE International Conference on, pages 460– 463, Feb 2015.
[12] Y. Abbound, A. Boyer, and A. Brun. Predict the emergence: Application to competencies in job offers. In Tools with Artificial Intelligence (ICTAI), 2015 IEEE 27th International Conference on, pages 612– 619, Nov 2015.
[13] Hamidah Jantan, Abdul Razak Hamdan, and Zulaiha Ali Othman. Knowledge discovery techniques for talent forecasting in human resource application. World Academy of Science, Engineering and Technology, 50:775–783, 2009.
[14] Chen-Fu Chien and Li-Fei Chen. Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry. Expert Systems with Applications, 34(1):280 – 290, 2008.
[15] Alessandro Bozzon, Marco Brambilla, Stefano Ceri, Matteo Silvestri, and Giuliano Vesci. Choosing the right crowd: expert finding in social networks. In Proceedings of the 16th International Conference on Extending Database Technology, pages 637–648. ACM, 2013.
[16] R Schlogel, I Marchesini, M Alvioli, P Reichenbach, ¨ M Rossi, and J-P Malet. Optimizing landslide susceptibility zonation: Effects of dem spatial resolution and slope unit delineation on logistic regression models. Geomorphology, 2017.
Faruk Bulut and Mehmet Fatih Amasyali. Locally adaptive k parameter selection for nearest neighbor classifier: one nearest cluster. Pattern Analysis and Applications, 20(2):415–425, 2017.
[17] Antonio Alarcon-Paredes, Gustavo Adolfo Alonso, ´ Eduardo Cabrera, and Rene Cuevas-Valencia. Simul- ´ taneous gene selection and weighting in nearest neighbor classifier for gene expression data. In International Conference on Bioinformatics and Biomedical Engineering, pages 372–381. Springer, 2017.
[18] Binh Thai Pham, Dieu Tien Bui, Hamid Reza Pourghasemi, Prakash Indra, and MB Dholakia. Landslide susceptibility assesssment in the uttarakhand area (india) using gis: a comparison study of prediction capability of na¨ıve bayes, multilayer perceptron neural networks, and functional trees methods. Theoretical and Applied Climatology, 128(1-2):255–273, 2017.
[19] Yudong Zhang, Yi Sun, Preetha Phillips, Ge Liu, Xingxing Zhou, and Shuihua Wang. A multilayer perceptron based smart pathological brain detection system by fractional fourier entropy. Journal of medical systems, 40(7):173, 2016.
[20] Jie Xu, Xianglong Liu, Zhouyuan Huo, Cheng Deng, Feiping Nie, and Heng Huang. Multi-class support vector machine via maximizing multi-class margins. In The 26th International Joint Conference on Artificial Intelligence (IJCAI 2017), 2017.
[21] Ying Zhou, Wanjun Su, Lieyun Ding, Hanbin Luo, and Peter ED Love. Predicting safety risks in deep foundation pits in subway infrastructure projects: Support vector machine approach. Journal of Computing in Civil Engineering, 31(5):04017052, 2017.
[22] F Provost, C Hibert, and J-P Malet. Automatic classification of endogenous landslide seismicity using the random forest supervised classifier. Geophysical Research Letters, 44(1):113–120, 2017.
[23] Siddharth Hariharan, Siddhesh Tirodkar, Alok Porwal, Avik Bhattacharya, and Aurore Joly. Random forest-based prospectivity modelling of greenfield terrains using sparse deposit data: An example from the tanami region, western australia. Natural Resources Research, pages 1–19, 2017.
[24] Michael Sprenger, Sebastian Schemm, Roger Oechslin, and Johannes Jenkner. Nowcasting foehn wind events using the adaboost machine learning algorithm. Weather and Forecasting, 32(3):1079–1099, 2017.
Citation
Navyashree M, Navyashree M K, Neetu M, Pooja G R, Arun Biradar, "Salary Prediction in It Job Market", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.78-84, 2019.
An Innovative Dashboard to Order Images with Respect to Shuffled and Smile Frequencies
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.85-89, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.8589
Abstract
A principled method to manage, uncover the structure of visual data by understanding significant learning task initiated by visual stage learning is presented. The target of this task is to find the phase that recovers the structure of data from revamped types of it. By virtue of standard pictures, this task comes down to recovering the primary picture from patches improved by a dark change and organised. Stage grids are discrete in this way introduces inconveniences for slant based streamlining techniques. To this end, we resort to a perpetual gauge using doubly-stochastic cross sections and define a novel bi-level streamlining issue on such systems that makes sense of how to recover the change. Such a plan prompts costly inclination calculations. We go around this issue by further proposing a computationally shoddy pattern for producing doubly stochastic frameworks dependent on PCA and DWT. The utility is exhibited on three testing PC vision issues, to be specific, relative traits learning, managed figuring out how to rank and self-directed portrayal learning. Our outcome shows condition of the craftsmanship execution on the open figure and osr benchmarks for relative qualities.
Key-Words / Index Term
visual permutation learning, PCA, DWT, CNN
References
[1] A. H. Abdulnabi, G. Wang, J. Lu, and K. Jia, “Multi-task cnn model for attribute prediction,” IEEE Transactions on Multimedia, vol. 17, no. 11, pp. 1949–1959,2015.
[2] R. P. Adams and R. S. Zemel, “Ranking via Sinkhorn propaga- tion,” arXiv preprint arXiv:1106.1925,2011.
[3] A. Agrawal, M. Dontcheva, M. Agrawala, S. Drucker, A. Col- burn, B. Curless, D. Salesin, and M. Cohen,“Interactive digital photomontage,” ACM Trans. Graph., vol. 23, no. 3,2004.
[4] Y. Bengio, Y. LeCunet al., “Scaling learning algorithms towards AI,” Large-scale kernel machines, vol. 34, no.5, pp. 1–41, 2007.
[5] G. Birkhoff, “Three observations on linear algebra,”Univ. Nac. Tucuma´n.RevistaA,vol.5,pp.147–151,1946.
[6] P. Bojanowski and A. Joulin, “Unsupervised learning bypredict- ing noise,” arXiv preprint arXiv:1704.05310,2017.
[7] S. Boyd and L. Vandenberghe, Convex Optimization. Cam- bridge University Press,2004.
[8] S. Branson, O. Beijbom, and S. Belongie, “Efficient large-scale structured learning,” in CVPR,2013.
[9] B. J. Brown, C. Toler-Franklin, D. Nehab, M. Burns, D.Dobkin, Vlachopoulos, C. Doumas, S. Rusinkiewicz, and T. Weyrich, “A system for high-volume acquisition and matching of fresco fragments: Reassembling theran wall paintings,” in ACM Trans- actions on Graphics (TOG), vol. 27, no. 3,2008.
[10] R. A. Brualdi, “Some applications of doubly stochastic matri- ces,” Linear Algebra and its Applications, vol. 107,pp.77–100,1988.
Citation
Nisha Prakash, Niveditha G, Poojitha M, Rakshitha H D, Swetha N, "An Innovative Dashboard to Order Images with Respect to Shuffled and Smile Frequencies", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.85-89, 2019.
Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.90-98, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.9098
Abstract
Along with the development of cloud computing more and more applications are moved to the cloud. With cloud storage services, users can remotely store their data to the cloud and realize the data sharing with others on the condition that the sensitive information is hidden in order to guarantee the integrity and confidentiality of the data stored in the cloud. Remote data integrity auditing is proposed to guarantee the integrity of the data stored in the cloud. In some common cloud storage systems such as the electronic health records system, the cloud file might contain some sensitive information. The sensitive information should not be exposed to others when the cloud file is shared. Encrypting the whole shared file can realize the sensitive information hiding but will make this shared file unable to be used by others. How to realize data sharing with sensitive information hiding in remote data integrity auditing scheme with time seal management still has not been explored In order to address this problem, we propose a remote data integrity auditing scheme with appropriate time management thereby providing limited access that realizes data sharing with sensitive information hiding in this paper. In this scheme, a sanitizer is used to sanitize the data blocks corresponding to the sensitive information of the file and transforms these data blocks’ signatures into valid ones for the sanitized file. These signatures are used to verify the integrity of the sanitized file in the phase of integrity auditing. As a result, our scheme makes the file stored in the cloud able to be shared and used by others on the condition that the sensitive information is hidden, while the remote data integrity auditing is still able to be execute efficiently. Meanwhile, the proposed scheme is based on Identity-based cryptography, which simplifies the complicated certificate management and also solves key exposure problem. The security analysis and the performance evaluation show that the proposed scheme is secure and efficient.
Key-Words / Index Term
Cloud storage, key management, Remote data Integrity, Confidentiality, Sensitive Information Hiding
References
[1] J. Yu, R. Hao, H. Xia, H. Zhang, X. Cheng, and F. Kong, “Intrusionresilient identity-based signatures: Concrete scheme in the standard model and generic construction,” Inf. Sci., vols. 442–443, pp. 158–172, May 2018.
[2] W. Shen, G. Yang, J. Yu, H. Zhang, F. Kong, and R. Hao, “Remote data possession checking with privacy-preserving authenticators for cloud storage,” Future Gener. Comput. Syst., vol. 76, pp. 136–145, Nov. 2017.
[3] Y. Yu et al., “Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 4, pp. 767–778, Apr. 2017.
[4] J. Yu and H. Wang, “Strong key-exposure resilient auditing for secure cloud storage,” IEEE Trans. Inf. Forensics Security, vol. 12, no. 8, pp. 1931–1940, Aug. 2017.
[5] W. Shen, J. Yu, H. Xia, H. Zhang, X. Lu, and R. Hao, “Light-weight and privacy-preserving secure cloud auditing scheme for group users via the third party medium,” J. Netw. Comput. Appl., vol. 82, pp. 56–64, Mar. 2017.
[6] J. Hur, D. Koo, Y. Shin, and K. Kang, “Secure data deduplication with dynamic ownership management in cloud storage,” IEEE Trans. Knowl. Data Eng., vol. 28, no. 11, pp. 3113–3125, Nov. 2016.
[7] J. Li, J. Li, D. Xie, and Z. Cai, “Secure auditing and deduplicating data in cloud,” IEEE Trans. Comput., vol. 65, no. 8, pp. 2386–2396, Aug. 2016.
[8] H. Wang, D. He, and S. Tang, “Identity-based proxy-oriented data uploading and remote data integrity checking in public cloud,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1165–1176, Jun. 2016.
[9] G. Yang, J. Yu, W. Shen, Q. Su, Z. Fu, and R. Hao, “Enabling public auditing for shared data in cloud storage supporting identity privacy and traceability,” J. Syst. Softw., vol. 113, pp. 130–139, Mar. 2016.
[10] J. Yu, K. Ren, and C. Wang, “Enabling cloud storage auditing with verifiable outsourcing of key updates,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 6, pp. 1362–1375, Jun. 2016.
[11] Z. Fu, X. Wu, C. Guan, X. Sun, and K. Ren, “Toward efficient multikeyword fuzzy search over encrypted outsourced data with accuracy improvement,” IEEE Trans. Inf. Forensics Security, vol. 11, no. 12, pp. 2706–2716, Dec. 2016.
[12] Q. Jiang, M. K. Khan, X. Lu, J. Ma, and D. He, “A privacy preserving three-factor authentication protocol for e-health clouds,” J. Supercomput., vol. 72, no. 10, pp. 3826–3849, 2016.
[13] Z. Xia, X. Wang, X. Sun, and Q. Wang, “A secure and dynamic multikeyword ranked search scheme over encrypted cloud data,” IEEE Trans. Parallel Distrib. Syst., vol. 27, no. 2, pp. 340–352, Feb. 2016.
[14] Z. Fu, X. Sun, Q. Liu, L. Zhou, and J. Shu, “Achieving efficient cloud search services: Multi-keyword ranked search over encrypted cloud data supporting parallel computing,” IEICE Trans. Commun., vol. 98, no. 1, pp. 190–200, 2015.
[15] J. Shen, H. Tan, S. Moh, I. Chung, Q. Liu, and X. Sun, “Enhanced secure sensor association and key management in wireless body area networks,” J. Commun. Netw., vol. 17, no. 5, pp. 453–462, 2015.
[16] C. Guan, K. Ren, F. Zhang, F. Kerschbaum, and J. Yu, “Symmetrickey based proofs of retrievability supporting public verification,” in Computer Security—ESORICS. Cham, Switzerland: Springer, 2015, pp. 203–223.
[17] J. Yu, K. Ren, C. Wang, and V. Varadharajan, “Enabling cloud storage auditing with key-exposure resistance,” IEEE Trans. Inf. Forensics Security, vol. 10, no. 6, pp. 1167–1179, Jun. 2015.
[18] B. Wang, B. Li, and H. Li, “Panda: Public auditing for shared data with efficient user revocation in the cloud,” IEEE Trans. Serv. Comput., vol. 8, no. 1, pp. 92–106, Jan./Feb. 2015.
[19] Y. Luo, M. Xu, S. Fu, D. Wang, and J. Deng, “Efficient integrity auditing for shared data in the cloud with secure user revocation,” in Proc. IEEE Trustcom/BigDataSE/ISPA, Aug. 2015, pp. 434–442.
[20] H. Wang, “Identity-based distributed provable data possession in multicloud storage,” IEEE Trans. Serv. Comput., vol. 8, no. 2, pp. 328–340, Mar./Apr. 2015.
[21] S. G. Worku, C. Xu, J. Zhao, and X. He, “Secure and efficient privacypreserving public auditing scheme for cloud storage,” Comput. Electr. Eng., vol. 40, no. 5, pp. 1703–1713, 2014.
[22] D. A. B. Fernandes, L. F. B. Soares, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, “Security issues in cloud environments: A survey,” Int. J. Inf. Secur., vol. 13, no. 2, pp. 113–170, Apr. 2014.
[23] L. F. B. Soares, D. A. B. Fernandes, J. V. Gomes, M. M. Freire, and P. R. M. Inácio, Cloud Security: State of the Art. Berlin, Germany: Springer, 2014.
[24] H. Shacham and B. Waters, “Compact proofs of retrievability,” J. Cryptol., vol. 26, no. 3, pp. 442–483, Jul. 2013.
[25] C. Wang, S. S. M. Chow, Q. Wang, K. Ren, and W. Lou, “Privacypreserving public auditing for secure cloud storage,” IEEE Trans. Comput., vol. 62, no. 2, pp. 362–375, Feb. 2013
[26] M. Green, “The threat in the cloud,” IEEE Security Privacy, vol. 11, no. 1, pp. 86–89, Jan./Feb. 2013.
[27] K. Yang and X. Jia, “Data storage auditing service in cloud computing: Challenges, methods and opportunities,” World Wide Web, vol. 15, no. 4, pp. 409–428, 2012.
[28] B. Wang, B. Li, and H. Li, “Oruta: Privacy-preserving public auditing for shared data in the cloud,” in Proc. IEEE 5th Int. Conf. Cloud Comput. (CLOUD), Jun. 2012, pp. 295–302.
[29] P. Mell and T. Grance, “The NIST definition of cloud computing,” Nat. Inst. Standards Technol., vol. 53, no. 6, p. 50, 2011.
[30] Q. Wang, C. Wang, K. Ren, W. Lou, and J. Li, “Enabling public auditability and data dynamics for storage security in cloud computing,” IEEE Trans. Parallel Distrib. Syst., vol. 22, no. 5, pp. 847–859, May 2011.
[31] R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, “Cloud computing and emerging IT platforms: Vision, hype,and reality for delivering computing as the 5th utility,” Future Generat. Comput. Syst., vol. 25, no. 6, pp. 599–616, 2009.
[32] C. Erway, A. Küpçü, C. Papamanthou, and R. Tamassia, “Dynamic provable data possession,” in Proc. 16th ACM Conf. Comput. Commun. Secur., 2009, pp. 213–222
[33] G. Ateniese, R. D. Pietro, L. V. Mancini, and G. Tsudik, “Scalable and efficient provable data possession,” in Proc. 4th Int. Conf. Secur. Privacy Commun. Netw., 2008, Art. no.9.
[34] G. Ateniese et al., “Provable data possession at untrusted stores,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 598–609.
[35] A. Juels and B. S. Kaliski, Jr., “Pors: Proofs of retrievability for large files,” in Proc. 14th ACM Conf. Comput. Commun. Secur., 2007, pp. 584–597.
[36] G. Ateniese, D. H. Chou, B. de Medeiros, and G. Tsudik, “Sanitizable signatures,” in Proc. 10th Eur. Symp. Res. Comput. Secur. Berlin, Germany: Springer-Verlag, 2005, pp. 159–177.
[37] G. Ateniese and B. de Medeiros, “On the key exposure problem in chameleon hashes,” in Security in Communication Networks. Berlin, Germany: Springer, 2005, pp. 165–179.
[38] Q. Jiang, J. Ma, and F. Wei, “On the security of a privacy-aware authentication scheme for distributed mobile cloud computing services,” IEEE Syst. J., to be published.
[39] A. Fu, S. Yu, Y. Zhang, H. Wang, and C. Huang, “NPP: A new privacy-aware public auditing scheme for cloud data sharing with group users,” IEEE Trans. Big Data, to be published, doi: 10.1109/TBDATA.2017.2701347.
[40] H. Wang, D. He, J. Yu, and Z. Wang, “Incentive and unconditionally anonymous identity-based public provable data possession,” IEEE Trans. Serv. Comput., to be published, doi: 10.1109/TSC.2016.2633260.
[41] Y. Zhang, J. Yu, R. Hao, C. Wang, and K. Ren, “Enabling efficient user revocation in identity-based cloud storage auditing for shared big data,” IEEE Trans. Depend. Sec. Comput., to be published, doi: 10.1109/TDSC.2018.2829880.
Citation
Divya. U, Nagaveni. S, Pooja. S, Ramya. R, Supritha. N, "Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.90-98, 2019.
Advanced Encryption Standard Strategy for Big Data in Cloud
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.99-104, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.99104
Abstract
In the era of information age, due to different electronic, information & communication technology devices and process like sensors, cloud, individual archives, social networks, internet activities and enterprise data are growing exponentially .The most challenging issues are how to effectively manage these large and different type of data .Big data is one of the term named for this large and different type of data .Due to its extraordinary scale, privacy and security is one of the critical challenge of big data.Many current applications abandon data encryptions in order to reach an adoptive performance level companioning with privacy concerns. In this paper, we concentrate on privacy and propose a novel data encryption approach, which is called Dynamic Data Encryption Strategy (D2ES). Our proposed approach aims to selectively encrypt data and use privacy classification methods under timing constraints. This approach is designed to maximize the privacy protection scope by using a selective encryption strategy within the required execution time requirements.
Key-Words / Index Term
Privacy-preserving,data-encryption-strategy,BigData,mobile-cloudcomputing
References
[1] S. Yu, W. Zhou, S. Guo, and M. Guo. A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Transactions on Computers, 2018.
[2] S. Yu, G. Gu, A. Barnawi, S. Guo, and I. Stojmenovic.Malware propagation in large-scale networks. IEEE Transactions on Knowl-edge and Data Engineering, 2018.
[3] S. Liu, Q. Qu, L. Chen, and L. Ni. SMC: A practical schema for privacy-preserved data sharing over distributed data streams. IEEE Transactions on Big Data, 2017.
[4] S. Rho, A. Vasilakos, and W. Chen. Cyber physical systems technolo-gies and applications. Future Generation Computer Systems, 2017.
[5] L.Wu, K. Wu, A. Sim, M. Churchill, J. Choi, A.Stathopoulos, C. Chang, and S. Klasky. Towards real-time detection and tracking of spatio-temporal features: Blob-filaments in fusion plasma. IEEE Transactions on Big Data,2017.
[6]S. Maharjan, Q. Zhu, Y. Zhang, S. Gjessing, and T. Basar. Dependable demand response management in the smart grid: A stackelberg game approach. IEEE Transactions on Smart Grid, 2017.
[7] M. Qiu, M. Zhong, J. Li, K. Gai, and Z. Zong. Phase- change memory optimization for green cloud with genetic algorithm. IEEE Transactions on Computers, 2017.
[8] H. Liu, H. Ning, Y. Zhang, Q. Xiong, and L. Yang. Role- dependent privacy preservation for secure V2G networks in the smart grid. IEEE Transactions on Information Forensics and Security, 2016.
[9] F. Tao, Y. Cheng, D. Xu, L. Zhang, and B. Li. CCIoT- CMfg: cloud computing and internet of things-based cloud manufacturing service system. IEEE Transactions on Industrial Informatics, 2016.
[10]G. Wu, H. Zhang, M. Qiu, Z. Ming, J. Li, and X. Qin. A decentralized approach for mining event correlations in distributed system monitor-ing. Journal of parallel and Distributed Computing, 2016.
[11]S. Yu, W. Zhou, R. Doss, and W. Jia. Traceback of DDoS attacks using entropy variations. IEEE Transactions on Parallel and Distributed Systems, 2016..
[12]Y. Li, W. Dai, Z. Ming, and M. Qiu. Privacy protection for preventing data over-collection in smart city. IEEE Transactions on Computers, 2016.
[13]Yu, M. Au, G. Ateniese, X. Huang, W. Susilo, Y. Dai, and Min. Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Transactions on Information Forensics and Security,2015.
[14]L. Weng, L. Amsaleg, A. Morton, and S. Marchand-Maillet. A privacy-preserving framework for large-scale content-based infor-mation retrieval. IEEE Transactions on Information Forensics and Security,2015.
[15]K. Gai, M. Qiu, H. Zhao, and J. Xiong. Privacy-aware adaptive data encryption strategy of big data in cloud computing. In The 2nd IEEE International Conference of Scalable and Smart Cloud, 2014.
[16]Y. Zhang, C. Xu, S. Yu, H. Li, and X. Zhang. SCLPV: Se-cure certificateless public verification for cloud-based cyber-physical-social systems against malicious auditors.IEEE Transactions on Computational Social Systems,2014.
[17] C. Wang, S. Chow, Q. Wang, K. Ren, and W. Lou.Privacy-preserving public auditing for secure cloud storage.IEEE Transactions on Computers,2013.
[18] K. Gai, L. Qiu, M. Chen, H. Zhao, and M. Qiu. SA-EAST: security-aware efficient data transmission for ITS in mobile heterogeneous cloud computing. ACM Transactions on Embedded Computing System, 2012.
[19] C. Lai, M. Chen, M. Qiu, A. Vasilakos, and J. Park. A RF4CE-based remote controller with interactive graphical user interface applied to home automation system. ACM Transactions on Embedded Computing Systems,2012.
[20] S. Backhaus, R. Bent, J. Bono, R. Lee, B. Tracey, D. Wolpert, D. Xie, and Y. Yildiz. Cyber-physical security: A game theory model of humans interacting over control systems. IEEE Transactions on Smart Grid, 2011.
[21]K. Gai, M. Qiu, H. Zhao, and W. Dai. Privacy- preserving adaptive multi-channel communications timing constraints. In The IEEE International Conference on Smart Cloud 2016, page 1, New York, USA, 2010.
[22]L. Tang, X. Yu, Q. Gu, J. Han, G. Jiang, A. Leung, and T. Porta. A framework of mining trajectories untrustworthy data in cyber-physical system. ACM Transactions on Knowledge Discovery from Data,2010.
[23]F. Schuster, M. Costa, C. Fournet, C. Gkantsidis, M.Peinado,Mainar-Ruiz,andM.Russinovich.VC3: Trustworthy data ana-lytics in the cloud using SGX. In IEEE Symposium on Security and Privacy, 2010.
Citation
Praveen G, Pratheek R, Rahul Mogar Y, Patil G B, Prasanna G, "Advanced Encryption Standard Strategy for Big Data in Cloud", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.99-104, 2019.
A Framework for Detection of Accuracy of Spam in Twitter
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.105-110, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.105110
Abstract
With millions of users tweeting around the world, real time search systems and different types of mining tools are emerging to allow people tracking the repercussion of events and news on Twitter. Trending topics, the most talked about items on Twitter at a given point in time, have been seen as an opportunity to generate traffic and revenue. Spammers post tweets containing typical words of a trending topic and URLs, usually obfuscated by URL shortness, that lead users to completely unrelated websites. This kind of spam can contribute to de-value real time search services unless mechanisms to fight and stop spammers can be found. To solve this issue, we propose to take tweet text features along with user-based features. We have evaluated our approach with natural language processing and the naïve-Bayes machine learning algorithm.
Key-Words / Index Term
Twitter, tweets, spam, navie bayes, natural lanugage processing
References
[1] C. P.-Y. Chin, N. Evans, and K.-K. R. Choo, “Exploring factors influencingthe use of enterprise social networks in multinational professionalservice firms,” J. Organizat. Comput. Electron. Commerce, vol. 25, no. 3, pp. 289–315, 2017.
[2] H. T sukayama, “Twitter turns 7: Users send over 400 million tweets per day,” Washingon Post, Mar. 2017.
[3] T. Wu, S. Liu, J. Zhang, and Y. Xiang, “Twitter spam detection based on deep learning,” in Proceedings of the Australasian Computer Science Week Multiconference, ser. ACSW ’17. New York, NY,USA.
[4] C. Chen, J. Zhang, X. Chen, Y. Xiang, and W. Zhou, “6 million spam tweets: A large ground truth for timely twitter spam detection,” in 2016 IEEE International Conference on Communications (ICC), June 2015, pp. 7065–7070.
[5] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting spammer on Twitter,” presented at the 7th Annu. Collab. Electron. Messaging Anti-Abuse Spam Conf., Redmond, WA, USA, Jul. 2017.
[6] L. Timson, “ Electoral commission Twitter account hacked, voters asked not to click,” Sydney Morning Herald, Aug. 2013 [Online]. Available: http://www.s mh.com.au/it-pro/security- it/electoral-commission-twitteraccount- hacked-voters-asked- not-to-click-20130807-hv1b 5.html
[7] Z. Miller, B. Dickinson, W. Deitrick, W. Hu, and A. H. Wang, “Twitter spammer detection using data stream clustering,” Inf. Sci., vol. 260, pp. 64– 73.
[8] K. Thomas, C. Grie r, D. Song, and V. Pa xson, Suspended accounts in retrospect: An analysis of Twitter spam,” in Proc. ACM SIGCOMM Conf. Internet Meas., pp. 243– 258.
[9] K. Thomas, C. Grie r, D. Song, and V. Pa xson, Suspended accounts in retrospect: An analysis of Twitter spam,” in Proc. ACM SIGCOMM Conf. Internet Meas.,pp. 243– 258.
[10] F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, “Detecting spammers on twitter,” in In Collaboration, Electronic messaging, Anti- Abuse and Spam Conference.
[11] C. Pash., “The lure of Naked Hollywood Star Photos Sent the Internet into Meltdown in New Zealand, Bus. Insider, accessed on Aug. 1, 2015,” https://tinyurl.com/yc93ssj4,2017.
[12] “BotMaker,” blog.twitter,us/a/2014fighting-spam-with-botmaker.
[13] Witten and E. Frank. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2016.
[14] C. Wu, K. Cheng, Q. Zhu, and Y. Wu. Using visual features for anti-spam filtering. In IEEE Int’l Conference on Image Processing (ICIP), 2017.
[15] Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: Signatures and characteristics. In ACM SIGCOMM,.
[16] D. Fetterly, M. Manasse, and M. Najork. Spam, damn spam, and statistics: Using statistical analysis to locate spam web pages. In Int’l Workshop on the Web and Databases (WebDB),.
[17] S. Garriss, M. Kaminsky, M. Freedman, B. Karp,
[18] D. Mazi`eres, and H. Yu. Re: Reliable email. In USENIX Conference on Networked Systems Design & Implementation (NSDI), 2016.
[19] Z. Gy¨ongyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with trustrank. In Int’l. Conference on Very Large Data Bases (VLDB), 2017.
[20] P. Heymann, G. Koutrika, and H. Garcia-Molina. Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing, 11, 2017.
[21] A Framework for Real-Time Spam Detection in Twitter
Himank Gupta, Mohd. Saalim Jamal, Sreekanth Madisetty and Maunendra Sankar Desarkar Department of Computer Science and Engineering,Indian Institute of Technology Hyderabad, India,2018.
Citation
Pooja Naik, Monisha S, Supritha Shetty, Pooja NR, Anoop N Prasad, "A Framework for Detection of Accuracy of Spam in Twitter", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.105-110, 2019.