623 research outputs found

    A Personalized Travel Recommendation System Using Social Media Analysis

    Get PDF
    Personalization of recommender systems enables customized services to users. Social media is one resource that aids personalization. This study explores the use of twitter data to personalize travel recommendations. A machine learning classification model is used to identify travel related tweets. The travel tweets are then used to personalize recommendations regarding places of interest for the user. Places of interest are categorized as: historical buildings, museums, parks, and restaurants. To better personalize the model, travel tweets of the user\u27s friends and followers are also mined. Volunteer twitter users were asked to provide their twitter handle as well as rank their travel category preferences in a survey. We evaluated our model by comparing the predictions made by our model with the users choices in the survey. The evaluations show 68% prediction accuracy. The accuracy can be improved with a better travel-tweet training dataset as well as a better travel category identification technique using machine learning. The travel categories can be increased to include items like sports venues, musical events, entertainment, etc. and thereby fine-tune the recommendations. The proposed model lists \u27n\u27 places of interest from each category in proportion to the travel category score generated by the model

    An Agent Based Transaction Manager for Multidatabase Systems

    Get PDF
    A multidatabase system (MDBMS) is a facility that allows users to access data located in multiple autonomous database management systems (DBMSs) at different sites. To ensure global atomicity for multidatabase transactions, a reliable global atomic commitment protocol is a possible solution. In this protocol a centralized transaction manager (TM) receives global transactions, submits subtransactions to the appropriate sites via AGENTS. An AGENT is a component of MDBS that runs on each site; AGENTS after receiving subtransactions from the transaction manager perform the transaction and send the results back to TM. We have presented a unique proof-of-concept, a JAVA application for an Agent Based Transaction Manager that preserves global atomicity. It provides a user friendly interface through which reliable atomic commitment protocol for global transaction execution in multidatabase environment can be visualized. We demonstrated with three different test case scenarios how the protocol works. This is useful in further research in this area where atomicity of transactions can be verified for protocol correctness

    Global Semantic Integrity Constraint Checking for a System of Databases

    Get PDF
    In today’s emerging information systems, it is natural to have data distributed across multiple sites. We define a System of Databases (SyDb) as a collection of autonomous and heterogeneous databases. R-SyDb (System of Relational Databases) is a restricted form of SyDb, referring to a collection of relational databases, which are independent. Similarly, X-SyDb (System of XML Databases) refers to a collection of XML databases. Global integrity constraints ensure integrity and consistency of data spanning multiple databases. In this dissertation, we present (i) Constraint Checker, a general framework of a mobile agent based approach for checking global constraints on R-SyDb, and (ii) XConstraint Checker, a general framework for checking global XML constraints on X-SyDb. Furthermore, we formalize multiple efficient algorithms for varying semantic integrity constraints involving both arithmetic and aggregate predicates. The algorithms take as input an update statement, list of all global semantic integrity constraints with arithmetic predicates or aggregate predicates and outputs sub-constraints to be executed on remote sites. The algorithms are efficient since (i) constraint check is carried out at compile time, i.e. before executing update statement; hence we save time and resources by avoiding rollbacks, and (ii) the implementation exploits parallelism. We have also implemented a prototype of systems and algorithms for both R-SyDb and X-SyDb. We also present performance evaluations of the system

    Dictionary Attacks and Password Selection

    Get PDF
    Passwords, particularly text-based, are the most common authentication mechanisms across all platforms and services like computers, mobiles, web and network services. Existing password strength evaluators and online service providers (Gmail, Yahoo, Paypal, Twitter, etc) password strength estimators determine the effectiveness of passwords chosen by user based on entropy techniques or a similar function of the parameters: length, complexity and predictability. Such implementations often ignore passwords part of publicly available password dictionaries and password leaks which are often the primary choice for malicious adversaries and particularly script kiddies. This paper presents an application that would help in preventing the use of such passwords thereby reducing the impact of dictionary based password attacks significantly. The application maintains a database of unique passwords by gathering publicly available password dictionaries and passwords leaked over the Internet. The application provides users with an interface to query the database and verify if their passwords are already available on the Internet thereby preventing them from the use of such passwords

    Color Removal and Treatment of Dye and Sugar Waste Water Using Low Cost Adsorbents

    Get PDF
    This study was undertaken to determine the treatment of wastewater from dye and sugar industry for removal of color. This specific treatment consists of adsorption using low cost adsorbents and micro filtration using whatman-41 micro filters. Considerations of this treatment process is to take the samples using batch adsorption and avoid coagulation with further dilution. Numerous runs were made with the ideal waste samples prepared in the laboratory. As a first step in the study different dyes were considered using different concentrations of sugar wastewater. Samples were treated with three different low-cost adsorbents. These treated samples using low cost adsorbents and can be discharge into surface water through municipal sewage

    Gigantic Stomach: A Rare Manifestation of Duchenne Muscular Dystrophy

    Get PDF
    Duchenne muscular dystrophy (DMD) is characterized by degeneration and atrophy of skeletal, cardiac, and smooth muscles after a latent period of apparently normal development and function. The gastrointestinal manifestations start in the second decade of life and are mainly due to atrophy of smooth muscle layers. Refractory gastroparesis and chronic constipation can lead to severe gastric and small bowel dilatation, which can be life threatening. Here, we present a case of a 21-year-old male with a gigantic stomach secondary to DMD resolved with conservative management and no surgical intervention

    A Methodology for Engineering Collaborative and ad-hoc Mobile Applications using SyD Middleware

    Get PDF
    Today’s web applications are more collaborative and utilize standard and ubiquitous Internet protocols. We have earlier developed System on Mobile Devices (SyD) middleware to rapidly develop and deploy collaborative applications over heterogeneous and possibly mobile devices hosting web objects. In this paper, we present the software engineering methodology for developing SyD-enabled web applications and illustrate it through a case study on two representative applications: (i) a calendar of meeting application, which is a collaborative application and (ii) a travel application which is an ad-hoc collaborative application. SyD-enabled web objects allow us to create a collaborative application rapidly with limited coding effort. In this case study, the modular software architecture allowed us to hide the inherent heterogeneity among devices, data stores, and networks by presenting a uniform and persistent object view of mobile objects interacting through XML/SOAP requests and responses. The performance results we obtained show that the application scales well as we increase the group size and adapts well within the constraints of mobile devices
    corecore