Weighted Graph Approach for Trust Reputation Management
|
|
- Matthew Higgins
- 8 years ago
- Views:
Transcription
1 Weighted Graph Approach for Reputation Management K.Thiagarajan, A.Raghunathan, Ponnammal Natarajan, G.Poonkuzhali and Prashant Ranjan Abstract In this paper, a two way approach of developing trust between an agent and its client is followed where the client s priority is given more precedence than agent s priority. A detailed unique trust is calculated based on weighted signed graph for all possibilities of agent interacting its client and vice versa. Finally, the obtained result implies client produces best trust s than agents. This concept of trust applied for Spam filtering in services is discussed. Keywords Agent, Client, Reputation Management, Weighted Signed Graph, TLR ( Level Rating). I. INTRODUCTION EPUTATION management is the process of tracking an R entity's actions and other entities' opinions about those actions; reporting on those actions and opinions; and reacting to that report creating a feedback loop. Reputation management systems use various predefined criteria for processing complex data to report reputation. Nowadays, reputation management plays a vital role in all business activities. There are many techniques by which trust reputation management can be implemented. Although, the existing methodologies for trust reputation management provides better consistency than the conventional security approaches for the interaction among agents in a distributed networking environment, there are problems such as spurious, selfishness, autonomy, cooperation etc., are to be addressed yet. This paper discusses the trust reputation management through Weighted Signed Graph approach to K.Thiagarajan is the Rajalakshmi Engineering College in the Department of Mathematics, Affiliated to Anna University Chennai, TamilNadu, India, phone: vidhyamannan@yahoo.com A.Raghunathan is the Rajalakshmi Engineering College in the Department of Computer science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, raghucse@ymail.com Ponnammal Natarajan is the Rajalakshmi Engineering in the Department of Computer Science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, and pamman01@yahoo.com G.Poonkuzhali is the Rajalakshmi Engineering College in the Department of Computer Science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, phone: , Kuzhal_s@yahoo.co.in Prashant Ranjan is the Rajalakshmi Engineering College in the Department of Computer science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, prashanthranjan@gmail.com. improve the efficiency, security and cooperation among agents in a large network. Today in the world of Internet and other distributed networking systems, interaction independent third party agents are increased drastically due to many reasons such as ecommerce, credit card transactions, knowledge sharing etc. In a distributed networking environment each agent in the system can validate the other agent s reliability in two ways, either by hard security approaches such as password protection, digital signatures, keyword identification or by Soft security approach of developing trust and faith on the other agent. Generally the soft security approach is preferred, because hard security approaches does not provide optimal results in finding a right client or agent; however, the soft security approach of developing trust between an agent and a client also faces the following problems 1. Only the client s based on trust is taken into consideration. Principle agent's precedence to the clients is neglected [1]-[3]. 2. Spurious s generated by malicious clients are not taken into account. 3. Difference in assigning trust to an agent in small and big community network 4. Modeling a user by the agent is not dealt. 5. Selfishness, Autonomy and Cooperation [9]. This paper overcomes the above drawbacks of reputation management systems by weighted signed graph approach. The methodology of using signed graph for the betterment of the trust reputation management is discussed in the following sections. Finally, this approach of trust for filtering Spam in services is discussed. Outline of the Paper: Section 1 presents Introduction, Section 2 deals flow diagram of the proposed system, Section 3 presents Signed Graph method of trust, Section 4 presents Generalized Model for Estimating Level Rating in a Weighted Graph, and Section 5 presents Experimental results. Finally Section 6 presents conclusion and future enhancements. 830
2 II. FLOW DIAGRAM OF PROPOSED SYSTEM TABLE I SPECIFICATION OF CONSTRAINTS R 1 = (P 1 +P 2 +P 3 +P 4 )/4 R 2 = ( P 1 + P 2 + P 3 +P 5 )/4 R 3 = ( P 2 + P 3 +2 P 5 )/4 R 4 = ( P 3 +3 P 5 )/4 R 5 = 4 P 5 /4 = P 5 III.SIGNED GRAPH METHOD OF TRUST RATING In proposed system, distributed network is considered as a signed graph, where each node in the graph is considered as agents and each edge is assigned a weight called precedence of acceptance. Signed weight (++, +-, -+, --) is attached to each node of the graph based on the agent-client combination. The sign assigned to the agents tend to change according to the client which it interacts. Initially, all the agents are assigned ++ weight. Then the client are allowed to give their precedence of acceptance (++, +-,-+,--) over the specified agent. Depending upon the precedence given by clients, the trust of agents having positive trust positive attitude is calculated. Similarly agents having positive trust a negative attitude, negative trust positive attitude and negative trust a negative attitude is estimated. Similarly, all the clients are assigned ++ weight. Then the agent are allowed to give their precedence of acceptance (++, +-,-+,--) over the specified client. Depending upon the precedence given by agents, the trust of clients having positive trust positive attitude is calculated. Similarly clients having positive trust a negative attitude, negative trust positive attitude and negative trust a negative attitude is estimated. Since the precedence of acceptance from both agent and client are considered, the treat of spurious by a malicious agent is reduced. A malicious agent can be easily traced since it will have the worst from all its clients. In this approach, the client is emphasized superior over the agent and hence client's has given a better preference than the agent's. When a client does not completely trust an agent then the trust will be 0, even though the agent is having complete trust over the client. The various combinations of precedence of acceptance between an agent and a client are explained in the next section. IV. MATHEMATICAL FORMULATION Fig. 1 Flow Diagram of the Proposed System Let us consider there are 'n' number of agents in a network. Each agent want to interact 'i' number of clients in the same network. A >A 1, A 2, A 3... A n C >C n1, C n2, C n3...c ni Where, n and ni are positive integers. 831
3 TABLE II CONSTRAINT FIXING AND FLOW FIXING Precedence of acceptance Description Positive trust Positive attitude. Positive trust Negative attitude. Negative trust Positive attitude. Negative trust Negative attitude. Fig. 2 Interaction of agent A 1 clients C 1, C 2, C 3 the number of agents and corresponding clients connected to it. V. GENERALIZED MODEL FOR ESTIMATING RATING IN A WEIGHTED GRAPH In a weighted graph, P 1, P 2, P 3, P 4 and P 5 are considered as the trust s, where P 1 >P 2 > P 3 > P 4 > P 5. (i.e., P 1 is the highest trust and P 5 is the least trust ). If the values for trust is taken as P 1 =100, P 2 =75,P 3 =50, P 4 =25, P 5 =0, then the final decision will be based on the addition of these values divided by the number of agent-client or client-agent combinations. In such a case the complete trust will have a of 250/4, better trust will have a of 225/4, good trust will have a of 125/4, bad trust will have a of 50/4 and distrust will have a of 0. Similarly, if the values for P 1 =4, P 2 =3, P 3 =2, P 4 =1, P 5 =0 are assigned, then the complete trust will have a of 10/4, better trust will have a of 9/4, good trust will have a of 5/4, bad trust will have a of 2/4 and distrust will have a of 0. The ratio among the different trust decisions lies between 1 and 0 in decreasing order. The above assigned values for P i s have the trust ratio as 1: 0.9: 0.5: 0.2: 0. TABLE III RATING OF AGENT TO CLIENT Client Fig. 3 Interaction of agent A 2 clients C 1, C 2, C 3 Assume an agent A 1 wants to interact C 1, C 2 and C 3. Since the clients have different trust s according to the agent which it is interacting, by the expression (2), instance of clients are created i.e., C 11, C 12, C 13 for agent A 1 and C 21, C 22, C 23 for agent A 2. For example, Interaction between A 1 and C 1 may result in a best trust whereas interaction between A 2 and C 1 may give a worst trust. Hence the client s response to an agent is based on its precedence of acceptance. Here certain test cases are taken which the precedence of acceptance is assigned to the agents and the of trust is calculated. The first 16 figures from Fig 4 to Fig 7 represent the development of trust from the agent on the client and the next 16 figures from Fig 8 to Fig 11 represent the development of trust from the client on the agent. When an agent has complete trust on a client, and if the client also has complete trust on the agent then there will be a strong of trust between them, producing 100% trust. When an agent has ++ acceptance and client has + - of acceptance, then it means agent is willing to trust the client but the client is having a positive trust negative attitude on the agent, which results in a 75% trust. The detailed chart of trust scheme is given below in the tables 1 and 2. The final will be calculated according to Agent + + P 1 P 2 P 3 P P 2 P 3 P 3 P P 2 P 3 P 5 P P 3 P 5 P 5 P 5 TABLE IV RATING OF CLIENT TO AGENT Agent Client + + P 1 P 2 P 3 P P 2 P 3 P 3 P P 3 P 5 P 5 P P 5 P 5 P 5 P 5 832
4 TABLE V TRUST AGGREGATION: decision made ( P 1 + P 2 + P 3 + P 4 )/4 Complete ( P 1+ P 2+ P 3+ P 5)/4 Better ( P 2 + P 3 +2 P 5 )/4 Good ( P 3 +3 P 5 )/4 Bad 4 P 5/4 = P 5 Distrust AGENT VS CLIENT COMBINATIONS Fig. 5 Agent having trust over the client a negative attitude and client s trust changes TABLE VII RESULT OF RATING OF FIG P P 3 GOOD P P 5 ( P 2 + P 3 +2 P 5 )/4 Fig. 4 Agent having complete trust over the client and client s trust changes TABLE VI RESULT OF RATING OF FIG P P P P 5 BETTER (P 1+ P 2+ P 3+ P 5)/4 Fig. 6 Agent having negative trust over the client positive attitude and client s trust changes 833
5 TABLE VIII RESULT OF RATING OF FIG 6 Level P P P P 5 GOOD (P 2+ P 3+2P 5)/4 Fig. 8 Client having complete trust over the agent and agent s trust changes TABLE X RESULT OF RATING OF FIG 8 Level P P P 3 COMPLETE (P 1+ P 2+ P 3+ P 4)/ P 4 Fig. 7 Agent having distrust over the client. TABLE IX RESULT OF RATING OF FIG 7 Level P P 5 BAD P P 5 (P 3 +3 P 5 )/4 CLIENT VS AGENT COMBINATIONS: Fig. 9 Client having trust over the agent negative attitude and agent s trust changes 834
6 TABLE X1 RESULT OF RATING OF FIG P P P P 5 based on trust GOOD (P 2 + P 3 +2P 5 )/4 Fig. 11 Client having distrust over the agent TABLE XIII RESULT OF RATING OF FIG P P P 5 based on trust DIS 4 P 5 / P 5 V. EXPERIMENTAL RESULTS Here we assumed P 1 =30, P 2 =20, P 3 =15, P 4 =10, P 5 =5. Fig. 10 Client having negative trust over the agent positive attitude and agent s trust changes TABLE XII RESULT OF RATING OF FIG P P P P 5 based on trust BAD (P 3 +3P 5 )/4 Clien t TABLE XIV RATING BETWEEN AGENT VS CLIENT Agent Final Rating Calculated Client (P 1 +P 2 +P 3 +P 4 )/4 =75/ ( P 2 + 2P 3 +P 5 )/4 = 55/ ( P 2+ P 3+2 P 5)/4 =30/ (4 P 5 )/4 = 200/4 TABLE XV RATING BETWEEN CLIENT VS AGENT Final Rating Calculated Agen t (P 1+P 2+P 3+P 5)/4 = 70/ ( P 2+ P 3+2 P 5)/4 =45/ ( P 2 + P 3 +2 P 5 )/4 =45/ ( P 3+3 P 5)/4 = 30/4 Ratio obtained Decision Made 1.0 Complete 0.7 Good 0.4 Bad Distrust Ratio obtained Decision Made Better 0.6 Good 0.6 Good 0.4 Bad VI. REAL TIME APPLICATIONS This type of signed graph approach for reputation management can be used in the spam guards. Here the sender of a mail will be considered as an agent and the receiver will be considered as the client. The precedence of acceptance of the client will be assigned based on the content of the mail send by the sender. Similarly based on the agent s response 835
7 from the client, the precedence of acceptance of the agent will be assigned initially. Whenever the client receives a spam, the above approach can be applied to filter spam in a distributed network. VII. CONCLUSION AND FUTURE WORK In this study, trust reputation management through weighted signed graph is reemphasized the age old golden rule: The Client is supreme over the Agent. This method can be applied for finding redundancy in web pages, for removing spurious ranking of products in retail industry and in avoiding unwanted short messages in the mobile phones from the mobile networks. REFERENCES [1] Bin Yu, Munindar P.Singh, An Evidential model for distributed reputation Management, AAMAS 02, July 15-19,2002, Bologna, Italy. [2] B. Yu and M. P. Singh. and reputation management in a smallworld network. In Proceedings of the 4th International Conference on MultiAgent Systems, pages , [3] B.Yu and M.P.Singh. A social Mechanism of reputation management in electronic communities. In proceedings of the 4th International Workshop on Cooperative Information Agents, [4] E.Sampathkumar, (Eds: M.M Shikare and B.N.Waphare) Semigraphs Narosa Publishing house, New Delhi, (2004), [5] F.Harary Addision-Wesley, Reading Graph Theory, Mass, (1969). [6] G. Zacharia and P. Maes. management through reputation mechanisms. Applied Artificial Intelligence, 14: , [7] K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM), pages , [8] L.Xiong and L.Liu. Vulnerabilities and security issues in structured overlay networks: A quantitative analysis. In proceedings of the Annual Computer Security Applications Conference (ACSAC), [9] Rajesh Turlapati; Huhns, M.N., Multiagent reputation management to achieve robust software using redundancy,intelligent Agent Technology, IEEE/WIC/ACM International Conference on Volume, Issue, Sept Page(s): [10] S.Kamvar, M.Schlosser, H. Garcia-Molina, Eigen : Reputation management in p2p networks. In proceedings of the 12th WWW [11] conference, [12] S.P.Srinivasan, P.Malliga, K.Thiagarajan, An Algorithmic Graphical approach for Ground logistics management of Jatropha seed distribution.,ultra Scientist of Physical Sciences, Vol. 20, No:3,(M)(2008), Page(s): [13] Zhengqiang Liang and Weisong Shi, Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments Available: K.Thiagarajan working as Senior Lecturer in the Department of Mathematics in Rajalakshmi Engineering College- Chennai-India. He has totally 14 years of experience in teaching. He has attended and presented research articles in 33 National and International Conferences and published one national journal and 29 international journals. Currently he is working on web mining through automata and set theory. His area of specialization is coloring of graphs and DNA Computing. A.Raghunathan is a final year B.E student of Rajalakshmi Engineering College- Chennai, India. He has presented 3 Papers in National symposiums and a paper in an international Conference. He is a student member of Computer Society of India (CSI). Ponnammal Natarajan finished her Ph.D from Texas A&M University in the year She has more than 35 years of experience in teaching and research guidance. She is former Director of research, Anna University Chennai-India. Currently Advisor, (Research and Development), Rajalakshmi Engineering College Chennai- India. She has conducted many national and International workshops, Seminars, Symposiums and Conferences. G.Poonkuzhali received B.E degree in Computer Science and Engineering from University of Madras, Chennai, India, in 1998, and the M.E degree in Computer Science and Engineering from Sathyabama University, Chennai, India, in Currently she is pursuing Ph.D programme in the Department of Information and Communication Engineering at Anna University Chennai, India. She has presented and published 3 international journals and authored 5 books. She is a life member of ISTE (Indian Society for Technical Education) and CSI (Computer Society of India). Prashant Ranjan is a final year B.E student of Rajalakshmi Engineering College- Chennai, India. He has presented 4 Papers in National symposiums and a paper in an international Conference. He is a student member of Computer Society of India (CSI) 836
Spam Filtering using Signed and Trust Reputation Management
Spam Filtering using Signed and Trust Reputation Management G.POONKUZHALI 1, K.THIAGARAJAN 2,P.SUDHAKAR 3, R.KISHORE KUMAR 4, K.SARUKESI 5 1,4 Department of Computer Science and Engineering, Rajalakshmi
More informationMultiagent Reputation Management to Achieve Robust Software Using Redundancy
Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu
More informationMarkovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks
Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks K. Thiagarajan, Department of Mathematics, PSNA College of Engineering and Technology, Dindigul, India. A. Veeraiah,
More informationFuzzy Logic for E-Mail Spam Deduction
Fuzzy Logic for E-Mail Spam Deduction P.SUDHAKAR 1, G.POONKUZHALI 2, K.THIAGARAJAN 3,R.KRIPA KESHAV 4, K.SARUKESI 5 1 Vernalis systems Pvt Ltd, Chennai- 600116 2,4 Department of Computer Science and Engineering,
More informationTrust Based Infererence Violation Detection Scheme Using Acut Model
www.ijcsi.org 668 Trust Based Infererence Violation Detection Scheme Using Acut Model Mr. K. Karthikeyan 1, Dr. T. Ravichandran 2 1 Research Scholar, Department of Computer Science, Karpagam University,
More informationAn Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
More informationA Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
More informationA QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
More informationM. Sugumaran / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 1001-1006
A Design of Centralized Meeting Scheduler with Distance Metrics M. Sugumaran Department of Computer Science and Engineering,Pondicherry Engineering College, Puducherry, India. Abstract Meeting scheduling
More informationA HIGHLY EFFICIENT RESOURCE OBTAINING SCHEME DESIGN IN CLOUD COMPUTING
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A HIGHLY EFFICIENT RESOURCE OBTAINING SCHEME DESIGN IN CLOUD COMPUTING E.Manoranjetha 1, S.Prasanna 2 1 M.E. CSE,
More informationASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL
International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationIDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS
IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS Farag Azzedin King Fahd University of Petroleum and Minerals, Information and Computer Science Department, Dhahran, 31261, Saudi Arabia. ABSTRACT Reputation
More informationFirewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov
More informationInternational Journal of Computer Engineering and Applications, Volume V, Issue III, March 14
International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 PREDICTION OF RATE OF IMPROVEMENT OF SOFTWARE QUALITY AND DEVELOPMENT EFFORT ON THE BASIS OF DEGREE OF EXCELLENCE
More informationISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationvii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK
vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF SYMBOLS LIST OF APPENDICES
More informationPRO - ACTIVE DISCLOSURES OF UNDER SEC 4 (1) OF THE RIGHT TO INFORMATION ACT 2005 OFFICE OF THE DIRECTOR GENERAL OF POLICE, CHENNAI-4.
PRO - ACTIVE DISCLOSURES OF UNDER SEC 4 (1) OF THE RIGHT TO INFORMATION ACT 2005 OFFICE OF THE DIRECTOR GENERAL OF POLICE, CHENNAI-4. (Extract of Rule 4(1) (b) of the Right to Information Act 2005.) (i)
More informationIntegrated Dual Degree Programme
Curriculum Model Integrated Dual Degree Programme (B.Tech + MBA) K L UNIVERSITY Green Fields, Vaddeswaram 522 502, Guntur District, A.P., INDIA. Ph: 08645 246948, Fax: 08645 247249 CONTENTS S. No Page
More informationFRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
More informationSIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
More informationNew Metrics for Reputation Management in P2P Networks
New for Reputation in P2P Networks D. Donato, M. Paniccia 2, M. Selis 2, C. Castillo, G. Cortesi 3, S. Leonardi 2. Yahoo!Research Barcelona Catalunya, Spain 2. Università di Roma La Sapienza Rome, Italy
More informationFiltering Noisy Contents in Online Social Network by using Rule Based Filtering System
Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College
More informationDecoupling Service and Feedback Trust in a Peer-to-Peer Reputation System
Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu
More informationAchieving Focused Program Outcomes through Centre of Excellence (COE) Approach
Achieving Focused Program Outcomes through Centre of Excellence (COE) Approach M. Somasundaram, Professor, Dept. of Computer Science and Engineering, RMK Engineering College, Kavaraipettai, Tamilnadu,
More informationPROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP
TSE015 PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP Course Outline I. Introduction and Course Objectives A. About PMI B. PMP and CAPM
More informationE-LEARNING SYSTEM ANALYSIS USING SMART AIDED TOOLS THROUGH WEB SERVICES
E-LEARNING SYSTEM ANALYSIS USING SMART AIDED TOOLS THROUGH WEB SERVICES M. Balakrishnan 1 and K. Duraiswamy 2 1 Assistant professor, Department of Computer Science Engineering, Selvam College of Technology,
More informationImplementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of
More informationReputation Management: Experiments on the Robustness of ROCQ
Reputation Management: Experiments on the Robustness of ROCQ Anurag Garg Roberto Battiti Roberto Cascella Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive 4, 385 Povo
More informationRULE-BASE DATA MINING SYSTEMS FOR
RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES A.Kaleeswaran 1, V.Ramasamy 2 Assistant Professor 1&2 Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India. 1&2 Abstract: The main
More informationTCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support
Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence
More informationA SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD
A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana
More informationDegree Institution University Specialization. Name and address of the Employer Period Designation
K.ANAND, M.E., (Ph.D) Assistant Professor Senior Grade, PSG College of Technology, Coimbatore 641 004. Tamil Nadu, India Mobile: 9791333205 E-mail: mechanand@gmail.com kan@pro.psgtech.ac.in 1. Academic
More informationTricyclic biregular graphs whose energy exceeds the number of vertices
MATHEMATICAL COMMUNICATIONS 213 Math. Commun., Vol. 15, No. 1, pp. 213-222 (2010) Tricyclic biregular graphs whose energy exceeds the number of vertices Snježana Majstorović 1,, Ivan Gutman 2 and Antoaneta
More informationPredictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization
182 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010 Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization P.Radhakrishnan
More informationA Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor
I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification
More informationProfile Based Personalized Web Search and Download Blocker
Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,
More informationA Simplified Framework for Data Cleaning and Information Retrieval in Multiple Data Source Problems
A Simplified Framework for Data Cleaning and Information Retrieval in Multiple Data Source Problems Agusthiyar.R, 1, Dr. K. Narashiman 2 Assistant Professor (Sr.G), Department of Computer Applications,
More informationAStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationDual Strategy based Negotiation for Cloud Service During Service Level Agreement
Dual Strategy based for Cloud During Level Agreement Lissy A Department of Information Technology Maharashtra Institute of Technology Pune, India lissyask@gmail.com Debajyoti Mukhopadhyay Department of
More informationA Robustness Simulation Method of Project Schedule based on the Monte Carlo Method
Send Orders for Reprints to reprints@benthamscience.ae 254 The Open Cybernetics & Systemics Journal, 2014, 8, 254-258 Open Access A Robustness Simulation Method of Project Schedule based on the Monte Carlo
More informationA Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
More informationTEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION
TEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION Bharti Suri Computer Science Department Assistant Professor, USIT, GGSIPU New Delhi, India bhartisuri@gmail.com Shweta Singhal Information
More informationFault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
More informationPotentiality of Online Sales and Customer Relationships
Potentiality of Online Sales and Customer Relationships P. Raja, R. Arasu, and Mujeebur Salahudeen Abstract Today Internet is not only a networking media, but also as a means of transaction for consumers
More informationThe Right to Decide. to the health care professionals who provide the care? All persons have the fundamental right to
The Right to Decide We have the right to make health care decisions, but how do we communicate them clearly to the health care professionals who provide the care? All persons have the fundamental right
More informationApplied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.
Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing
More informationSchneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.
New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New
More informationSoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities
SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities Roman Špánek, Pavel Tyl Abstract The paper proposes a SoundMeGood trust model being able to establish
More informationONLINE REPUTATION SYSTEMS
ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people
More informationResearch on Task Planning Based on Activity Period in Manufacturing Grid
Research on Task Planning Based on Activity Period in Manufacturing Grid He Yu an, Yu Tao, Hu Da chao Abstract In manufacturing grid (MG), activities of the manufacturing task need to be planed after the
More informationIntelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
More informationEvaluating the Teacher Effectiveness of Secondary and Higher Secondary School Teachers
IOSR Journal of Research & Method in Education (IOSR-JRME) e-issn: 2320 7388,p-ISSN: 2320 737X Volume 4, Issue 1 Ver. V (Feb. 2014), PP 52-56 Evaluating the Teacher Effectiveness of Secondary and Higher
More informationDetecting Deception in Reputation Management
Detecting Deception in Reputation Management Bin Yu Department of Computer Science North Carolina State University Raleigh, NC 27695-7535, USA byu@eos.ncsu.edu Munindar P. Singh Department of Computer
More informationAmerican Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access
More informationAlgorithm to Filter & Redirect the Web Content for Kids
Algorithm to Filter & Redirect the Web Content for Kids Neha Gupta Research Scholar, FET Manav Rachna International University Faridabad, Haryana, India Neha.fbc@mriu.edu.in Dr. Saba Hilal Professor, School
More informationA MULTI-STAGE HEURISTIC APPROACH TO RESOURCE ALLOCATION (AMHARA) FOR AUTOMATED SCHEDULING
エシアン ゾロナル オフ ソシルサエニセズ アンドヒオメニテズ ISSN: 2186-8492, ISSN: 2186-8484 Print A MULTI-STAGE HEURISTIC APPROACH TO RESOURCE ALLOCATION (AMHARA) FOR AUTOMATED SCHEDULING Mehryar Nooriafshar * Faculty of Business,
More informationA Sarsa based Autonomous Stock Trading Agent
A Sarsa based Autonomous Stock Trading Agent Achal Augustine The University of Texas at Austin Department of Computer Science Austin, TX 78712 USA achal@cs.utexas.edu Abstract This paper describes an autonomous
More informationA SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS
A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS B. Kanagasabapathi 1 and K. Ananthanarayanan 2 Building Technology and Construction Management Division, Department of Civil
More informationFault-Tolerant Application Placement in Heterogeneous Cloud Environments. Bart Spinnewyn, prof. Steven Latré
Fault-Tolerant Application Placement in Heterogeneous Cloud Environments Bart Spinnewyn, prof. Steven Latré Cloud Application Placement Problem (CAPP) Application Placement admission control: decide on
More informationThe Survey on Inventory Management System for Supermarket Using Android Application
The Survey on Inventory Management System for Supermarket Using Android Application M.Rajeswari 1, M.Parvathi 2, G.Savitha 3, S.Shirley 4 Asst. Professor, Dept. of IT, Panimalar Institute of Technology,
More informationInternational Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop
ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com
More informationEfficiency Testing of Self-adapting Systems by Learning of Event Sequences
Efficiency Testing of Self-adapting Systems by Learning of Event Sequences Jonathan Hudson, Jörg Denzinger Department of Computer Science, University of Calgary Calgary, Canada Email: {hudsonj, denzinge}@cpsc.ucalgary.ca
More informationTABLE OF CONTENTS CHAPTER TITLE PAGE
viii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII
More informationLearn AX: A Beginner s Guide to Microsoft Dynamics AX. Managing Users and Role Based Security in Microsoft Dynamics AX 2012. Dynamics101 ACADEMY
Learn AX: A Beginner s Guide to Microsoft Dynamics AX Managing Users and Role Based Security in Microsoft Dynamics AX 2012 About.com is a Rand Group Knowledge Center intended to provide our clients, and
More informationMSc Financial Economics.
MSc Financial Economics Programme Specification Course Title MSc Financial Economics. Course Overview The MSc in Financial Economics degree is a one-year full-time course for graduates who wish to apply
More informationSuperViz: An Interactive Visualization of Super-Peer P2P Network
SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu pqyu@cs.ubc.ca Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes
More informationHOW TO RETAIN THE CUSTOMERS BY USING EFFECTIVE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM
International Journal of Sales & Marketing Management Research and Development (IJSMMRD) ISSN 2249-6939 Vol. 3, Issue 1, Mar 2013, 61-66 TJPRC Pvt. Ltd. HOW TO RETAIN THE CUSTOMERS BY USING EFFECTIVE CUSTOMER
More informationSubject CT7 Business Economics Core Technical Syllabus
Subject CT7 Business Economics Core Technical Syllabus for the 2016 exams 1 June 2015 Aim The aim of the Business Economics subject is to introduce students to the core economic principles and how these
More informationDetecting Deception in Reputation Management
Detecting Deception in Reputation Management Bin Yu Department of Computer Science North Carolina State University Raleigh, NC 27695-7535, USA byu@eos.ncsu.edu Munindar P. Singh Department of Computer
More informationA Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps
International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps
More informationIJPSS Volume 2, Issue 3 ISSN: 2249-5894
A STUDY ON PROBLEM AND PROSPECTS OF WOMEN ENTREPRENEURS WITH SPECIAL REFERENCE TO G. PALANIAPPAN* C. S. RAMANIGOPAL** A. MANI*** ERODE DISTRICT ABSTRACT: Women have been successful in breaking their confinement
More informationSCHEME FOR INTELLECTUAL PROPERTY EDUCATION, RESEARCH AND PUBLIC OUTREACH
SCHEME FOR INTELLECTUAL PROPERTY EDUCATION, RESEARCH AND PUBLIC OUTREACH BP and Copyright Division is implementing a scheme namely Scheme for Intellectual Property Education, Research and Public Outreach
More informationFACTORS AFFECTING SUCCESSFUL IMPLEMENTATION OF NICHE MARKETING IN TEHRAN METROPOLIS
Revista Empresarial Inter Metro / Inter Metro Business Journal Spring 2012 / Vol. 8 No. 1 / p. 33 FACTORS AFFECTING SUCCESSFUL IMPLEMENTATION OF NICHE MARKETING IN TEHRAN METROPOLIS By Mehdi Noursina Management
More informationIndex: Micro grids, Demand, Algoritham, Renewable Energy source.
Economic Analysis of a Micro Grid Power Generation 1 M. VIVEK, S.VIJAYA RAJ, 2 C.THIRUGOMATHI 1 Research Scholar, Periyar Maniammai University, Vallam, Thanjavur 2 Asst.Prof. Dept. Electrical and Electronics
More informationAdaptation of the ACO heuristic for sequencing learning activities
Adaptation of the ACO heuristic for sequencing learning activities Sergio Gutiérrez 1, Grégory Valigiani 2, Pierre Collet 2 and Carlos Delgado Kloos 1 1 University Carlos III of Madrid (Spain) 2 Université
More informationFactors Influencing Retail Investors Attitude Towards Investing in Equity Stocks: A Study in Tamil Nadu
Journal of Modern Accounting and Auditing, ISSN 1548-6583 March 2011, Vol. 7, No. 3, 316-321 Factors Influencing Retail Investors Attitude Towards Investing in Equity Stocks: A Study in Tamil Nadu Ebenezer
More informationImpelling Heart Attack Prediction System using Data Mining and Artificial Neural Network
General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling
More informationA MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS
A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University
More informationUniversity of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP
University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications
More informationDevelopment of Resource-Driven Scheduling Model for Mass Housing Construction Projects
Development of Resource-Driven Scheduling Model for Mass Housing Construction Projects Ar. A. Cindrela Devi and K. Ananthanarayanan Abstract Resource continuity is a key issue for Mass housing construction
More informationReliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
More informationSuper-Consumer Based Reputation Management for Web Service Systems
Super-Consumer Based Reputation Management for Web Service Systems Yao Wang, Julita Vassileva Department of Computer Science, University of Saskatchewan, Canada, e-mail:{yaw181, jiv}@cs.usask.ca Abstract
More informationSOFTWARE SECURITY TESTING A PERTINENT FRAMEWORK
Volume 5, No. 3, March 2014 Journal Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info SOFTWARE SECURITY TESTING A PERTINENT FRAMEWORK Rajeev Kumar *1, Suhel Ahmad Khan
More informationP. Mohanraj 3 Assistant Professor in Management Studies Nandha Arts and Science College Erode, Tamil Nadu, India
ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Conceptual
More informationE-learning for Graphical System Design Courses: A Case Study
E-learning for Graphical System Design Courses: A Case Study Yucel Ugurlu Education & Research Programs National Instruments Japan Corporation Tokyo, Japan e-mail: yucel.ugurlu@ni.com Hiroshi Sakuta Department
More informationAchieve more with less
Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering
More informationE-MAIL - Spam Filtering
E-MAIL - Spam Filtering SPAM FILTERING OVERVIEW... USER S GUIDE...... Common Login Errors......... Lists Tab... 5 Profile Tab... 7 Quarantine Tab... 0 LOGGING IN MAIN SCREEN SPAMBLOCKER TABS (LISTS, PROFILE
More informationReputation Management Algorithms & Testing. Andrew G. West November 3, 2008
Reputation Management Algorithms & Testing Andrew G. West November 3, 2008 EigenTrust EigenTrust (Hector Garcia-molina, et. al) A normalized vector-matrix multiply based method to aggregate trust such
More informationHow To Understand And Understand The Science Of Engineering In India
RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.
More informationAn Integrated Production Inventory System for. Perishable Items with Fixed and Linear Backorders
Int. Journal of Math. Analysis, Vol. 8, 2014, no. 32, 1549-1559 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.46176 An Integrated Production Inventory System for Perishable Items with
More informationAN INVESTIGATION ABOUT THE CHARACTERISTICS OF AN ENGINEERING COLLEGE TEACHER IN THE CURRENT SCENARIO
AN INVESTIGATION ABOUT THE CHARACTERISTICS OF AN ENGINEERING COLLEGE TEACHER IN THE CURRENT SCENARIO Sreelekshmy Pillai G. 1, Kiron K.R. 2, Anoop Kumar G. 3, Santhosh Kumar S. 4,Rajesh Menon B. 5 Assistant
More informationKeywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm.
Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effective Information
More informationContent-Based Discovery of Twitter Influencers
Content-Based Discovery of Twitter Influencers Chiara Francalanci, Irma Metra Department of Electronics, Information and Bioengineering Polytechnic of Milan, Italy irma.metra@mail.polimi.it chiara.francalanci@polimi.it
More informationANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD
ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,
More informationEconomic Production Quantity (EPQ) Model with Time- Dependent Demand and Reduction Delivery Policy
ISSN NO:: 348 537X Economic Production Quantity (EPQ) Model with Time- Dependent Demand and Reduction Delivery Policy Dr. Neeraj Agarwal Professor & Head, Department of Hotel Management, Graphic Era University,
More informationSimulating the Multiple Time-Period Arrival in Yield Management
Simulating the Multiple Time-Period Arrival in Yield Management P.K.Suri #1, Rakesh Kumar #2, Pardeep Kumar Mittal #3 #1 Dean(R&D), Chairman & Professor(CSE/IT/MCA), H.C.T.M., Kaithal(Haryana), India #2
More informationExpert Finding Using Social Networking
San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 1-1-2009 Expert Finding Using Social Networking Parin Shah San Jose State University Follow this and
More informationPermanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=19474
Citation: Chang, Elizabeth and Hussain, Farookh and Dillon, Tharam. 2005. : Reputation ontology for reputation systems, in Herrero, P. and Meersman, R. and Tari, Z. (ed), First IFIP/WG2.12 and WG12.4 International
More informationReputation Rating Mode and Aggregating Method of Online Reputation Management System *
Reputation Rating Mode and Aggregating Method of Online Reputation Management System * Yang Deli ** Song Guangxing *** (School of Management, Dalian University of Technology, P.R.China 116024) Abstract
More information