6,342 research outputs found
Detection and Filtering of Collaborative Malicious Users in Reputation System using Quality Repository Approach
Online reputation system is gaining popularity as it helps a user to be sure
about the quality of a product/service he wants to buy. Nonetheless online
reputation system is not immune from attack. Dealing with malicious ratings in
reputation systems has been recognized as an important but difficult task. This
problem is challenging when the number of true user's ratings is relatively
small and unfair ratings plays majority in rated values. In this paper, we have
proposed a new method to find malicious users in online reputation systems
using Quality Repository Approach (QRA). We mainly concentrated on anomaly
detection in both rating values and the malicious users. QRA is very efficient
to detect malicious user ratings and aggregate true ratings. The proposed
reputation system has been evaluated through simulations and it is concluded
that the QRA based system significantly reduces the impact of unfair ratings
and improve trust on reputation score with lower false positive as compared to
other method used for the purpose.Comment: 14 pages, 5 figures, 5 tables, submitted to ICACCI 2013, Mysore,
indi
Is That Twitter Hashtag Worth Reading
Online social media such as Twitter, Facebook, Wikis and Linkedin have made a
great impact on the way we consume information in our day to day life. Now it
has become increasingly important that we come across appropriate content from
the social media to avoid information explosion. In case of Twitter, popular
information can be tracked using hashtags. Studying the characteristics of
tweets containing hashtags becomes important for a number of tasks, such as
breaking news detection, personalized message recommendation, friends
recommendation, and sentiment analysis among others.
In this paper, we have analyzed Twitter data based on trending hashtags,
which is widely used nowadays. We have used event based hashtags to know users'
thoughts on those events and to decide whether the rest of the users might find
it interesting or not. We have used topic modeling, which reveals the hidden
thematic structure of the documents (tweets in this case) in addition to
sentiment analysis in exploring and summarizing the content of the documents. A
technique to find the interestingness of event based twitter hashtag and the
associated sentiment has been proposed. The proposed technique helps twitter
follower to read, relevant and interesting hashtag.Comment: 10 pages, 6 figures, Presented at the Third International Symposium
on Women in Computing and Informatics (WCI-2015
Design and Development of a User Specific Dynamic E-Magazine
Internet and electronic media gaining more popularity due to ease and speed,
the count of Internet users has increased tremendously. The world is moving
faster each day with several events taking place at once and the Internet is
flooded with information in every field. There are categories of information
ranging from most relevant to user, to the information totally irrelevant or
less relevant to specific users. In such a scenario getting the information
which is most relevant to the user is indispensable to save time. The
motivation of our solution is based on the idea of optimizing the search for
information automatically. This information is delivered to user in the form of
an interactive GUI. The optimization of the contents or information served to
him is based on his social networking profiles and on his reading habits on the
proposed solution. The aim is to get the user's profile information based on
his social networking profile considering that almost every Internet user has
one. This helps us personalize the contents delivered to the user in order to
produce what is most relevant to him, in the form of a personalized e-magazine.
Further the proposed solution learns user's reading habits for example the news
he saves or clicks the most and makes a decision to provide him with the best
contents.Comment: 19 pages, 6 figure
Alert-BDI: BDI Model with Adaptive Alertness through Situational Awareness
In this paper, we address the problems faced by a group of agents that
possess situational awareness, but lack a security mechanism, by the
introduction of a adaptive risk management system. The Belief-Desire-Intention
(BDI) architecture lacks a framework that would facilitate an adaptive risk
management system that uses the situational awareness of the agents. We extend
the BDI architecture with the concept of adaptive alertness. Agents can modify
their level of alertness by monitoring the risks faced by them and by their
peers. Alert-BDI enables the agents to detect and assess the risks faced by
them in an efficient manner, thereby increasing operational efficiency and
resistance against attacks.Comment: 14 pages, 3 figures. Submitted to ICACCI 2013, Mysore, Indi
Is Stack Overflow Overflowing With Questions and Tags
Programming question and answer (Q & A) websites, such as Quora, Stack
Overflow, and Yahoo! Answer etc. helps us to understand the programming
concepts easily and quickly in a way that has been tested and applied by many
software developers. Stack Overflow is one of the most frequently used
programming Q\&A website where the questions and answers posted are presently
analyzed manually, which requires a huge amount of time and resource. To save
the effort, we present a topic modeling based technique to analyze the words of
the original texts to discover the themes that run through them. We also
propose a method to automate the process of reviewing the quality of questions
on Stack Overflow dataset in order to avoid ballooning the stack overflow with
insignificant questions. The proposed method also recommends the appropriate
tags for the new post, which averts the creation of unnecessary tags on Stack
Overflow.Comment: 11 pages, 7 figures, 3 tables Presented at Third International
Symposium on Women in Computing and Informatics (WCI-2015
Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS
Over the past couple of years, the extent of the services provided on the
mobile devices has increased rapidly. A special class of service among them is
the Location Based Service(LBS) which depends on the geographical position of
the user to provide services to the end users. However, a mobile device is
still resource constrained, and some applications usually demand more resources
than a mobile device can a ord. To alleviate this, a mobile device should get
resources from an external source. One of such sources is cloud computing
platforms. We can predict that the mobile area will take on a boom with the
advent of this new concept. The aim of this paper is to exchange messages
between user and location service provider in mobile device accessing the cloud
by minimizing cost, data storage and processing power. Our main goal is to
provide dynamic location-based service and increase the information retrieve
accuracy especially on the limited mobile screen by accessing cloud
application. In this paper we present location based restaurant information
retrieval system and we have developed our application in Android.Comment: 11 pages, 10 figure
Diagonal property of the symmetric product of a smooth curve
Let be an irreducible smooth projective curve defined over an
algebraically closed field. We prove that the symmetric product has the diagonal property for all . For any positive
integers and , let be the
Quot scheme parametrizing all the torsion quotients of of degree . We prove that has the weak point property.Comment: Final versio
- …