Weighted Graph Approach for Trust Reputation Management

Size: px
Start display at page:

Download "Weighted Graph Approach for Trust Reputation Management"

Transcription

1 Weighted Graph Approach for Reputation Management K.Thiagarajan, A.Raghunathan, Ponnammal Natarajan, G.Poonkuzhali and Prashant Ranjan Abstract In this paper, a two way approach of developing trust between an agent and its client is followed where the client s priority is given more precedence than agent s priority. A detailed unique trust is calculated based on weighted signed graph for all possibilities of agent interacting its client and vice versa. Finally, the obtained result implies client produces best trust s than agents. This concept of trust applied for Spam filtering in services is discussed. Keywords Agent, Client, Reputation Management, Weighted Signed Graph, TLR ( Level Rating). I. INTRODUCTION EPUTATION management is the process of tracking an R entity's actions and other entities' opinions about those actions; reporting on those actions and opinions; and reacting to that report creating a feedback loop. Reputation management systems use various predefined criteria for processing complex data to report reputation. Nowadays, reputation management plays a vital role in all business activities. There are many techniques by which trust reputation management can be implemented. Although, the existing methodologies for trust reputation management provides better consistency than the conventional security approaches for the interaction among agents in a distributed networking environment, there are problems such as spurious, selfishness, autonomy, cooperation etc., are to be addressed yet. This paper discusses the trust reputation management through Weighted Signed Graph approach to K.Thiagarajan is the Rajalakshmi Engineering College in the Department of Mathematics, Affiliated to Anna University Chennai, TamilNadu, India, phone: vidhyamannan@yahoo.com A.Raghunathan is the Rajalakshmi Engineering College in the Department of Computer science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, raghucse@ymail.com Ponnammal Natarajan is the Rajalakshmi Engineering in the Department of Computer Science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, and pamman01@yahoo.com G.Poonkuzhali is the Rajalakshmi Engineering College in the Department of Computer Science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, phone: , Kuzhal_s@yahoo.co.in Prashant Ranjan is the Rajalakshmi Engineering College in the Department of Computer science and Engineering, Affiliated to Anna University Chennai, Tamil Nadu, India, prashanthranjan@gmail.com. improve the efficiency, security and cooperation among agents in a large network. Today in the world of Internet and other distributed networking systems, interaction independent third party agents are increased drastically due to many reasons such as ecommerce, credit card transactions, knowledge sharing etc. In a distributed networking environment each agent in the system can validate the other agent s reliability in two ways, either by hard security approaches such as password protection, digital signatures, keyword identification or by Soft security approach of developing trust and faith on the other agent. Generally the soft security approach is preferred, because hard security approaches does not provide optimal results in finding a right client or agent; however, the soft security approach of developing trust between an agent and a client also faces the following problems 1. Only the client s based on trust is taken into consideration. Principle agent's precedence to the clients is neglected [1]-[3]. 2. Spurious s generated by malicious clients are not taken into account. 3. Difference in assigning trust to an agent in small and big community network 4. Modeling a user by the agent is not dealt. 5. Selfishness, Autonomy and Cooperation [9]. This paper overcomes the above drawbacks of reputation management systems by weighted signed graph approach. The methodology of using signed graph for the betterment of the trust reputation management is discussed in the following sections. Finally, this approach of trust for filtering Spam in services is discussed. Outline of the Paper: Section 1 presents Introduction, Section 2 deals flow diagram of the proposed system, Section 3 presents Signed Graph method of trust, Section 4 presents Generalized Model for Estimating Level Rating in a Weighted Graph, and Section 5 presents Experimental results. Finally Section 6 presents conclusion and future enhancements. 830

2 II. FLOW DIAGRAM OF PROPOSED SYSTEM TABLE I SPECIFICATION OF CONSTRAINTS R 1 = (P 1 +P 2 +P 3 +P 4 )/4 R 2 = ( P 1 + P 2 + P 3 +P 5 )/4 R 3 = ( P 2 + P 3 +2 P 5 )/4 R 4 = ( P 3 +3 P 5 )/4 R 5 = 4 P 5 /4 = P 5 III.SIGNED GRAPH METHOD OF TRUST RATING In proposed system, distributed network is considered as a signed graph, where each node in the graph is considered as agents and each edge is assigned a weight called precedence of acceptance. Signed weight (++, +-, -+, --) is attached to each node of the graph based on the agent-client combination. The sign assigned to the agents tend to change according to the client which it interacts. Initially, all the agents are assigned ++ weight. Then the client are allowed to give their precedence of acceptance (++, +-,-+,--) over the specified agent. Depending upon the precedence given by clients, the trust of agents having positive trust positive attitude is calculated. Similarly agents having positive trust a negative attitude, negative trust positive attitude and negative trust a negative attitude is estimated. Similarly, all the clients are assigned ++ weight. Then the agent are allowed to give their precedence of acceptance (++, +-,-+,--) over the specified client. Depending upon the precedence given by agents, the trust of clients having positive trust positive attitude is calculated. Similarly clients having positive trust a negative attitude, negative trust positive attitude and negative trust a negative attitude is estimated. Since the precedence of acceptance from both agent and client are considered, the treat of spurious by a malicious agent is reduced. A malicious agent can be easily traced since it will have the worst from all its clients. In this approach, the client is emphasized superior over the agent and hence client's has given a better preference than the agent's. When a client does not completely trust an agent then the trust will be 0, even though the agent is having complete trust over the client. The various combinations of precedence of acceptance between an agent and a client are explained in the next section. IV. MATHEMATICAL FORMULATION Fig. 1 Flow Diagram of the Proposed System Let us consider there are 'n' number of agents in a network. Each agent want to interact 'i' number of clients in the same network. A >A 1, A 2, A 3... A n C >C n1, C n2, C n3...c ni Where, n and ni are positive integers. 831

3 TABLE II CONSTRAINT FIXING AND FLOW FIXING Precedence of acceptance Description Positive trust Positive attitude. Positive trust Negative attitude. Negative trust Positive attitude. Negative trust Negative attitude. Fig. 2 Interaction of agent A 1 clients C 1, C 2, C 3 the number of agents and corresponding clients connected to it. V. GENERALIZED MODEL FOR ESTIMATING RATING IN A WEIGHTED GRAPH In a weighted graph, P 1, P 2, P 3, P 4 and P 5 are considered as the trust s, where P 1 >P 2 > P 3 > P 4 > P 5. (i.e., P 1 is the highest trust and P 5 is the least trust ). If the values for trust is taken as P 1 =100, P 2 =75,P 3 =50, P 4 =25, P 5 =0, then the final decision will be based on the addition of these values divided by the number of agent-client or client-agent combinations. In such a case the complete trust will have a of 250/4, better trust will have a of 225/4, good trust will have a of 125/4, bad trust will have a of 50/4 and distrust will have a of 0. Similarly, if the values for P 1 =4, P 2 =3, P 3 =2, P 4 =1, P 5 =0 are assigned, then the complete trust will have a of 10/4, better trust will have a of 9/4, good trust will have a of 5/4, bad trust will have a of 2/4 and distrust will have a of 0. The ratio among the different trust decisions lies between 1 and 0 in decreasing order. The above assigned values for P i s have the trust ratio as 1: 0.9: 0.5: 0.2: 0. TABLE III RATING OF AGENT TO CLIENT Client Fig. 3 Interaction of agent A 2 clients C 1, C 2, C 3 Assume an agent A 1 wants to interact C 1, C 2 and C 3. Since the clients have different trust s according to the agent which it is interacting, by the expression (2), instance of clients are created i.e., C 11, C 12, C 13 for agent A 1 and C 21, C 22, C 23 for agent A 2. For example, Interaction between A 1 and C 1 may result in a best trust whereas interaction between A 2 and C 1 may give a worst trust. Hence the client s response to an agent is based on its precedence of acceptance. Here certain test cases are taken which the precedence of acceptance is assigned to the agents and the of trust is calculated. The first 16 figures from Fig 4 to Fig 7 represent the development of trust from the agent on the client and the next 16 figures from Fig 8 to Fig 11 represent the development of trust from the client on the agent. When an agent has complete trust on a client, and if the client also has complete trust on the agent then there will be a strong of trust between them, producing 100% trust. When an agent has ++ acceptance and client has + - of acceptance, then it means agent is willing to trust the client but the client is having a positive trust negative attitude on the agent, which results in a 75% trust. The detailed chart of trust scheme is given below in the tables 1 and 2. The final will be calculated according to Agent + + P 1 P 2 P 3 P P 2 P 3 P 3 P P 2 P 3 P 5 P P 3 P 5 P 5 P 5 TABLE IV RATING OF CLIENT TO AGENT Agent Client + + P 1 P 2 P 3 P P 2 P 3 P 3 P P 3 P 5 P 5 P P 5 P 5 P 5 P 5 832

4 TABLE V TRUST AGGREGATION: decision made ( P 1 + P 2 + P 3 + P 4 )/4 Complete ( P 1+ P 2+ P 3+ P 5)/4 Better ( P 2 + P 3 +2 P 5 )/4 Good ( P 3 +3 P 5 )/4 Bad 4 P 5/4 = P 5 Distrust AGENT VS CLIENT COMBINATIONS Fig. 5 Agent having trust over the client a negative attitude and client s trust changes TABLE VII RESULT OF RATING OF FIG P P 3 GOOD P P 5 ( P 2 + P 3 +2 P 5 )/4 Fig. 4 Agent having complete trust over the client and client s trust changes TABLE VI RESULT OF RATING OF FIG P P P P 5 BETTER (P 1+ P 2+ P 3+ P 5)/4 Fig. 6 Agent having negative trust over the client positive attitude and client s trust changes 833

5 TABLE VIII RESULT OF RATING OF FIG 6 Level P P P P 5 GOOD (P 2+ P 3+2P 5)/4 Fig. 8 Client having complete trust over the agent and agent s trust changes TABLE X RESULT OF RATING OF FIG 8 Level P P P 3 COMPLETE (P 1+ P 2+ P 3+ P 4)/ P 4 Fig. 7 Agent having distrust over the client. TABLE IX RESULT OF RATING OF FIG 7 Level P P 5 BAD P P 5 (P 3 +3 P 5 )/4 CLIENT VS AGENT COMBINATIONS: Fig. 9 Client having trust over the agent negative attitude and agent s trust changes 834

6 TABLE X1 RESULT OF RATING OF FIG P P P P 5 based on trust GOOD (P 2 + P 3 +2P 5 )/4 Fig. 11 Client having distrust over the agent TABLE XIII RESULT OF RATING OF FIG P P P 5 based on trust DIS 4 P 5 / P 5 V. EXPERIMENTAL RESULTS Here we assumed P 1 =30, P 2 =20, P 3 =15, P 4 =10, P 5 =5. Fig. 10 Client having negative trust over the agent positive attitude and agent s trust changes TABLE XII RESULT OF RATING OF FIG P P P P 5 based on trust BAD (P 3 +3P 5 )/4 Clien t TABLE XIV RATING BETWEEN AGENT VS CLIENT Agent Final Rating Calculated Client (P 1 +P 2 +P 3 +P 4 )/4 =75/ ( P 2 + 2P 3 +P 5 )/4 = 55/ ( P 2+ P 3+2 P 5)/4 =30/ (4 P 5 )/4 = 200/4 TABLE XV RATING BETWEEN CLIENT VS AGENT Final Rating Calculated Agen t (P 1+P 2+P 3+P 5)/4 = 70/ ( P 2+ P 3+2 P 5)/4 =45/ ( P 2 + P 3 +2 P 5 )/4 =45/ ( P 3+3 P 5)/4 = 30/4 Ratio obtained Decision Made 1.0 Complete 0.7 Good 0.4 Bad Distrust Ratio obtained Decision Made Better 0.6 Good 0.6 Good 0.4 Bad VI. REAL TIME APPLICATIONS This type of signed graph approach for reputation management can be used in the spam guards. Here the sender of a mail will be considered as an agent and the receiver will be considered as the client. The precedence of acceptance of the client will be assigned based on the content of the mail send by the sender. Similarly based on the agent s response 835

7 from the client, the precedence of acceptance of the agent will be assigned initially. Whenever the client receives a spam, the above approach can be applied to filter spam in a distributed network. VII. CONCLUSION AND FUTURE WORK In this study, trust reputation management through weighted signed graph is reemphasized the age old golden rule: The Client is supreme over the Agent. This method can be applied for finding redundancy in web pages, for removing spurious ranking of products in retail industry and in avoiding unwanted short messages in the mobile phones from the mobile networks. REFERENCES [1] Bin Yu, Munindar P.Singh, An Evidential model for distributed reputation Management, AAMAS 02, July 15-19,2002, Bologna, Italy. [2] B. Yu and M. P. Singh. and reputation management in a smallworld network. In Proceedings of the 4th International Conference on MultiAgent Systems, pages , [3] B.Yu and M.P.Singh. A social Mechanism of reputation management in electronic communities. In proceedings of the 4th International Workshop on Cooperative Information Agents, [4] E.Sampathkumar, (Eds: M.M Shikare and B.N.Waphare) Semigraphs Narosa Publishing house, New Delhi, (2004), [5] F.Harary Addision-Wesley, Reading Graph Theory, Mass, (1969). [6] G. Zacharia and P. Maes. management through reputation mechanisms. Applied Artificial Intelligence, 14: , [7] K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the 10th International Conference on Information and Knowledge Management (CIKM), pages , [8] L.Xiong and L.Liu. Vulnerabilities and security issues in structured overlay networks: A quantitative analysis. In proceedings of the Annual Computer Security Applications Conference (ACSAC), [9] Rajesh Turlapati; Huhns, M.N., Multiagent reputation management to achieve robust software using redundancy,intelligent Agent Technology, IEEE/WIC/ACM International Conference on Volume, Issue, Sept Page(s): [10] S.Kamvar, M.Schlosser, H. Garcia-Molina, Eigen : Reputation management in p2p networks. In proceedings of the 12th WWW [11] conference, [12] S.P.Srinivasan, P.Malliga, K.Thiagarajan, An Algorithmic Graphical approach for Ground logistics management of Jatropha seed distribution.,ultra Scientist of Physical Sciences, Vol. 20, No:3,(M)(2008), Page(s): [13] Zhengqiang Liang and Weisong Shi, Enforcing Cooperative Resource Sharing in Untrusted P2P Computing Environments Available: K.Thiagarajan working as Senior Lecturer in the Department of Mathematics in Rajalakshmi Engineering College- Chennai-India. He has totally 14 years of experience in teaching. He has attended and presented research articles in 33 National and International Conferences and published one national journal and 29 international journals. Currently he is working on web mining through automata and set theory. His area of specialization is coloring of graphs and DNA Computing. A.Raghunathan is a final year B.E student of Rajalakshmi Engineering College- Chennai, India. He has presented 3 Papers in National symposiums and a paper in an international Conference. He is a student member of Computer Society of India (CSI). Ponnammal Natarajan finished her Ph.D from Texas A&M University in the year She has more than 35 years of experience in teaching and research guidance. She is former Director of research, Anna University Chennai-India. Currently Advisor, (Research and Development), Rajalakshmi Engineering College Chennai- India. She has conducted many national and International workshops, Seminars, Symposiums and Conferences. G.Poonkuzhali received B.E degree in Computer Science and Engineering from University of Madras, Chennai, India, in 1998, and the M.E degree in Computer Science and Engineering from Sathyabama University, Chennai, India, in Currently she is pursuing Ph.D programme in the Department of Information and Communication Engineering at Anna University Chennai, India. She has presented and published 3 international journals and authored 5 books. She is a life member of ISTE (Indian Society for Technical Education) and CSI (Computer Society of India). Prashant Ranjan is a final year B.E student of Rajalakshmi Engineering College- Chennai, India. He has presented 4 Papers in National symposiums and a paper in an international Conference. He is a student member of Computer Society of India (CSI) 836

Spam Filtering using Signed and Trust Reputation Management

Spam Filtering using Signed and Trust Reputation Management Spam Filtering using Signed and Trust Reputation Management G.POONKUZHALI 1, K.THIAGARAJAN 2,P.SUDHAKAR 3, R.KISHORE KUMAR 4, K.SARUKESI 5 1,4 Department of Computer Science and Engineering, Rajalakshmi

More information

Multiagent Reputation Management to Achieve Robust Software Using Redundancy

Multiagent Reputation Management to Achieve Robust Software Using Redundancy Multiagent Reputation Management to Achieve Robust Software Using Redundancy Rajesh Turlapati and Michael N. Huhns Center for Information Technology, University of South Carolina Columbia, SC 29208 {turlapat,huhns}@engr.sc.edu

More information

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks

Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks Markovian Process and Novel Secure Algorithm for Big Data in Two-Hop Wireless Networks K. Thiagarajan, Department of Mathematics, PSNA College of Engineering and Technology, Dindigul, India. A. Veeraiah,

More information

Fuzzy Logic for E-Mail Spam Deduction

Fuzzy Logic for E-Mail Spam Deduction Fuzzy Logic for E-Mail Spam Deduction P.SUDHAKAR 1, G.POONKUZHALI 2, K.THIAGARAJAN 3,R.KRIPA KESHAV 4, K.SARUKESI 5 1 Vernalis systems Pvt Ltd, Chennai- 600116 2,4 Department of Computer Science and Engineering,

More information

Trust Based Infererence Violation Detection Scheme Using Acut Model

Trust Based Infererence Violation Detection Scheme Using Acut Model www.ijcsi.org 668 Trust Based Infererence Violation Detection Scheme Using Acut Model Mr. K. Karthikeyan 1, Dr. T. Ravichandran 2 1 Research Scholar, Department of Computer Science, Karpagam University,

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

A QoS-Aware Web Service Selection Based on Clustering

A QoS-Aware Web Service Selection Based on Clustering International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,

More information

M. Sugumaran / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 1001-1006

M. Sugumaran / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3), 2011, 1001-1006 A Design of Centralized Meeting Scheduler with Distance Metrics M. Sugumaran Department of Computer Science and Engineering,Pondicherry Engineering College, Puducherry, India. Abstract Meeting scheduling

More information

A HIGHLY EFFICIENT RESOURCE OBTAINING SCHEME DESIGN IN CLOUD COMPUTING

A HIGHLY EFFICIENT RESOURCE OBTAINING SCHEME DESIGN IN CLOUD COMPUTING INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 A HIGHLY EFFICIENT RESOURCE OBTAINING SCHEME DESIGN IN CLOUD COMPUTING E.Manoranjetha 1, S.Prasanna 2 1 M.E. CSE,

More information

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL

ASSOCIATION RULE MINING ON WEB LOGS FOR EXTRACTING INTERESTING PATTERNS THROUGH WEKA TOOL International Journal Of Advanced Technology In Engineering And Science Www.Ijates.Com Volume No 03, Special Issue No. 01, February 2015 ISSN (Online): 2348 7550 ASSOCIATION RULE MINING ON WEB LOGS FOR

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 11, November 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS

IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS IDENTIFYING HONEST RECOMMENDERS IN REPUTATION SYSTEMS Farag Azzedin King Fahd University of Petroleum and Minerals, Information and Computer Science Department, Dhahran, 31261, Saudi Arabia. ABSTRACT Reputation

More information

Firewall Verification and Redundancy Checking are Equivalent

Firewall Verification and Redundancy Checking are Equivalent Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov

More information

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14

International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 International Journal of Computer Engineering and Applications, Volume V, Issue III, March 14 PREDICTION OF RATE OF IMPROVEMENT OF SOFTWARE QUALITY AND DEVELOPMENT EFFORT ON THE BASIS OF DEGREE OF EXCELLENCE

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK

vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF ABBREVIATIONS LIST OF SYMBOLS LIST OF APPENDICES

More information

PRO - ACTIVE DISCLOSURES OF UNDER SEC 4 (1) OF THE RIGHT TO INFORMATION ACT 2005 OFFICE OF THE DIRECTOR GENERAL OF POLICE, CHENNAI-4.

PRO - ACTIVE DISCLOSURES OF UNDER SEC 4 (1) OF THE RIGHT TO INFORMATION ACT 2005 OFFICE OF THE DIRECTOR GENERAL OF POLICE, CHENNAI-4. PRO - ACTIVE DISCLOSURES OF UNDER SEC 4 (1) OF THE RIGHT TO INFORMATION ACT 2005 OFFICE OF THE DIRECTOR GENERAL OF POLICE, CHENNAI-4. (Extract of Rule 4(1) (b) of the Right to Information Act 2005.) (i)

More information

Integrated Dual Degree Programme

Integrated Dual Degree Programme Curriculum Model Integrated Dual Degree Programme (B.Tech + MBA) K L UNIVERSITY Green Fields, Vaddeswaram 522 502, Guntur District, A.P., INDIA. Ph: 08645 246948, Fax: 08645 247249 CONTENTS S. No Page

More information

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE

FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam

More information

SIP Service Providers and The Spam Problem

SIP Service Providers and The Spam Problem SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation

More information

New Metrics for Reputation Management in P2P Networks

New Metrics for Reputation Management in P2P Networks New for Reputation in P2P Networks D. Donato, M. Paniccia 2, M. Selis 2, C. Castillo, G. Cortesi 3, S. Leonardi 2. Yahoo!Research Barcelona Catalunya, Spain 2. Università di Roma La Sapienza Rome, Italy

More information

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System

Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Filtering Noisy Contents in Online Social Network by using Rule Based Filtering System Bala Kumari P 1, Bercelin Rose Mary W 2 and Devi Mareeswari M 3 1, 2, 3 M.TECH / IT, Dr.Sivanthi Aditanar College

More information

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System

Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System Gayatri Swamynathan, Ben Y. Zhao and Kevin C. Almeroth Department of Computer Science, UC Santa Barbara {gayatri, ravenben, almeroth}@cs.ucsb.edu

More information

Achieving Focused Program Outcomes through Centre of Excellence (COE) Approach

Achieving Focused Program Outcomes through Centre of Excellence (COE) Approach Achieving Focused Program Outcomes through Centre of Excellence (COE) Approach M. Somasundaram, Professor, Dept. of Computer Science and Engineering, RMK Engineering College, Kavaraipettai, Tamilnadu,

More information

PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP

PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP TSE015 PROJECT MANAGEMENT PROFESSIONAL CERTIFIED ASSOCIATE IN PROJECT MANAGEMENT (PMP & CAPM) EXAM PREPARATION WORKSHOP Course Outline I. Introduction and Course Objectives A. About PMI B. PMP and CAPM

More information

E-LEARNING SYSTEM ANALYSIS USING SMART AIDED TOOLS THROUGH WEB SERVICES

E-LEARNING SYSTEM ANALYSIS USING SMART AIDED TOOLS THROUGH WEB SERVICES E-LEARNING SYSTEM ANALYSIS USING SMART AIDED TOOLS THROUGH WEB SERVICES M. Balakrishnan 1 and K. Duraiswamy 2 1 Assistant professor, Department of Computer Science Engineering, Selvam College of Technology,

More information

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains P.Satheesh Associate professor Dept of Computer Science and Engineering MVGR college of

More information

Reputation Management: Experiments on the Robustness of ROCQ

Reputation Management: Experiments on the Robustness of ROCQ Reputation Management: Experiments on the Robustness of ROCQ Anurag Garg Roberto Battiti Roberto Cascella Dipartimento di Informatica e Telecomunicazioni, Università di Trento, Via Sommarive 4, 385 Povo

More information

RULE-BASE DATA MINING SYSTEMS FOR

RULE-BASE DATA MINING SYSTEMS FOR RULE-BASE DATA MINING SYSTEMS FOR CUSTOMER QUERIES A.Kaleeswaran 1, V.Ramasamy 2 Assistant Professor 1&2 Park College of Engineering and Technology, Coimbatore, Tamil Nadu, India. 1&2 Abstract: The main

More information

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support

TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence Support Vol. 3 Issue 1, January-2014, pp: (32-36), Impact Factor: 1.252, Available online at: www.erpublications.com TCM: Transactional Completeness Measure based vulnerability analysis for Business Intelligence

More information

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD

A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD A SECURE FRAMEWORK WITH KEY- AGGREGATION FOR DATA SHARING IN CLOUD Yerragudi Vasistakumar Reddy 1, M.Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.Professor, Dept. of CSE, Vignana

More information

Degree Institution University Specialization. Name and address of the Employer Period Designation

Degree Institution University Specialization. Name and address of the Employer Period Designation K.ANAND, M.E., (Ph.D) Assistant Professor Senior Grade, PSG College of Technology, Coimbatore 641 004. Tamil Nadu, India Mobile: 9791333205 E-mail: mechanand@gmail.com kan@pro.psgtech.ac.in 1. Academic

More information

Tricyclic biregular graphs whose energy exceeds the number of vertices

Tricyclic biregular graphs whose energy exceeds the number of vertices MATHEMATICAL COMMUNICATIONS 213 Math. Commun., Vol. 15, No. 1, pp. 213-222 (2010) Tricyclic biregular graphs whose energy exceeds the number of vertices Snježana Majstorović 1,, Ivan Gutman 2 and Antoaneta

More information

Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization

Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization 182 IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010 Predictive Analytics using Genetic Algorithm for Efficient Supply Chain Inventory Optimization P.Radhakrishnan

More information

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor

A Review of Cloud Environment and Recognition of Highly Secure Public Data Verification Architecture using Secure Public Verifier Auditor I J C International Journal of lectrical, lectronics ISSN No. (Online): 2277-2626 and Computer ngineering 3(2): 144-148(2014) A Review of Cloud nvironment and Recognition of Highly Secure Public Data Verification

More information

Profile Based Personalized Web Search and Download Blocker

Profile Based Personalized Web Search and Download Blocker Profile Based Personalized Web Search and Download Blocker 1 K.Sheeba, 2 G.Kalaiarasi Dhanalakshmi Srinivasan College of Engineering and Technology, Mamallapuram, Chennai, Tamil nadu, India Email: 1 sheebaoec@gmail.com,

More information

A Simplified Framework for Data Cleaning and Information Retrieval in Multiple Data Source Problems

A Simplified Framework for Data Cleaning and Information Retrieval in Multiple Data Source Problems A Simplified Framework for Data Cleaning and Information Retrieval in Multiple Data Source Problems Agusthiyar.R, 1, Dr. K. Narashiman 2 Assistant Professor (Sr.G), Department of Computer Applications,

More information

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity

AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals

More information

Dual Strategy based Negotiation for Cloud Service During Service Level Agreement

Dual Strategy based Negotiation for Cloud Service During Service Level Agreement Dual Strategy based for Cloud During Level Agreement Lissy A Department of Information Technology Maharashtra Institute of Technology Pune, India lissyask@gmail.com Debajyoti Mukhopadhyay Department of

More information

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method

A Robustness Simulation Method of Project Schedule based on the Monte Carlo Method Send Orders for Reprints to reprints@benthamscience.ae 254 The Open Cybernetics & Systemics Journal, 2014, 8, 254-258 Open Access A Robustness Simulation Method of Project Schedule based on the Monte Carlo

More information

A Direct Numerical Method for Observability Analysis

A Direct Numerical Method for Observability Analysis IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method

More information

TEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION

TEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION TEST CASE SELECTION & PRIORITIZATION USING ANT COLONY OPTIMIZATION Bharti Suri Computer Science Department Assistant Professor, USIT, GGSIPU New Delhi, India bhartisuri@gmail.com Shweta Singhal Information

More information

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency

Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software

More information

Potentiality of Online Sales and Customer Relationships

Potentiality of Online Sales and Customer Relationships Potentiality of Online Sales and Customer Relationships P. Raja, R. Arasu, and Mujeebur Salahudeen Abstract Today Internet is not only a networking media, but also as a means of transaction for consumers

More information

The Right to Decide. to the health care professionals who provide the care? All persons have the fundamental right to

The Right to Decide. to the health care professionals who provide the care? All persons have the fundamental right to The Right to Decide We have the right to make health care decisions, but how do we communicate them clearly to the health care professionals who provide the care? All persons have the fundamental right

More information

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.

Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013. Applied Mathematical Sciences, Vol. 7, 2013, no. 112, 5591-5597 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2013.38457 Accuracy Rate of Predictive Models in Credit Screening Anirut Suebsing

More information

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i.

Schneps, Leila; Colmez, Coralie. Math on Trial : How Numbers Get Used and Abused in the Courtroom. New York, NY, USA: Basic Books, 2013. p i. New York, NY, USA: Basic Books, 2013. p i. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=2 New York, NY, USA: Basic Books, 2013. p ii. http://site.ebrary.com/lib/mcgill/doc?id=10665296&ppg=3 New

More information

SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities

SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities SoundMeGood: A Trust Model Supporting Preliminary Trust Establishment Between Mutually Unknown Entities Roman Špánek, Pavel Tyl Abstract The paper proposes a SoundMeGood trust model being able to establish

More information

ONLINE REPUTATION SYSTEMS

ONLINE REPUTATION SYSTEMS ONLINE REPUTATION SYSTEMS YUYE WANG 1 CPSC 557: Sensitive Information in a Wired World Professor: Joan Feigenbaum Date: 12 Nov, 2013 Identity Reput ation Trust 2 TRUST SYSTEM Trust system, guide people

More information

Research on Task Planning Based on Activity Period in Manufacturing Grid

Research on Task Planning Based on Activity Period in Manufacturing Grid Research on Task Planning Based on Activity Period in Manufacturing Grid He Yu an, Yu Tao, Hu Da chao Abstract In manufacturing grid (MG), activities of the manufacturing task need to be planed after the

More information

Intelligent Database Monitoring System using ARM9 with QR Code

Intelligent Database Monitoring System using ARM9 with QR Code Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India

More information

Evaluating the Teacher Effectiveness of Secondary and Higher Secondary School Teachers

Evaluating the Teacher Effectiveness of Secondary and Higher Secondary School Teachers IOSR Journal of Research & Method in Education (IOSR-JRME) e-issn: 2320 7388,p-ISSN: 2320 737X Volume 4, Issue 1 Ver. V (Feb. 2014), PP 52-56 Evaluating the Teacher Effectiveness of Secondary and Higher

More information

Detecting Deception in Reputation Management

Detecting Deception in Reputation Management Detecting Deception in Reputation Management Bin Yu Department of Computer Science North Carolina State University Raleigh, NC 27695-7535, USA byu@eos.ncsu.edu Munindar P. Singh Department of Computer

More information

American Journal of Engineering Research (AJER) 2013 American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-2, Issue-4, pp-39-43 www.ajer.us Research Paper Open Access

More information

Algorithm to Filter & Redirect the Web Content for Kids

Algorithm to Filter & Redirect the Web Content for Kids Algorithm to Filter & Redirect the Web Content for Kids Neha Gupta Research Scholar, FET Manav Rachna International University Faridabad, Haryana, India Neha.fbc@mriu.edu.in Dr. Saba Hilal Professor, School

More information

A MULTI-STAGE HEURISTIC APPROACH TO RESOURCE ALLOCATION (AMHARA) FOR AUTOMATED SCHEDULING

A MULTI-STAGE HEURISTIC APPROACH TO RESOURCE ALLOCATION (AMHARA) FOR AUTOMATED SCHEDULING エシアン ゾロナル オフ ソシルサエニセズ アンドヒオメニテズ ISSN: 2186-8492, ISSN: 2186-8484 Print A MULTI-STAGE HEURISTIC APPROACH TO RESOURCE ALLOCATION (AMHARA) FOR AUTOMATED SCHEDULING Mehryar Nooriafshar * Faculty of Business,

More information

A Sarsa based Autonomous Stock Trading Agent

A Sarsa based Autonomous Stock Trading Agent A Sarsa based Autonomous Stock Trading Agent Achal Augustine The University of Texas at Austin Department of Computer Science Austin, TX 78712 USA achal@cs.utexas.edu Abstract This paper describes an autonomous

More information

A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS

A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS A SIMULATION MODEL FOR RESOURCE CONSTRAINED SCHEDULING OF MULTIPLE PROJECTS B. Kanagasabapathi 1 and K. Ananthanarayanan 2 Building Technology and Construction Management Division, Department of Civil

More information

Fault-Tolerant Application Placement in Heterogeneous Cloud Environments. Bart Spinnewyn, prof. Steven Latré

Fault-Tolerant Application Placement in Heterogeneous Cloud Environments. Bart Spinnewyn, prof. Steven Latré Fault-Tolerant Application Placement in Heterogeneous Cloud Environments Bart Spinnewyn, prof. Steven Latré Cloud Application Placement Problem (CAPP) Application Placement admission control: decide on

More information

The Survey on Inventory Management System for Supermarket Using Android Application

The Survey on Inventory Management System for Supermarket Using Android Application The Survey on Inventory Management System for Supermarket Using Android Application M.Rajeswari 1, M.Parvathi 2, G.Savitha 3, S.Shirley 4 Asst. Professor, Dept. of IT, Panimalar Institute of Technology,

More information

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop

International Journal of Advanced Engineering Research and Applications (IJAERA) ISSN: 2454-2377 Vol. 1, Issue 6, October 2015. Big Data and Hadoop ISSN: 2454-2377, October 2015 Big Data and Hadoop Simmi Bagga 1 Satinder Kaur 2 1 Assistant Professor, Sant Hira Dass Kanya MahaVidyalaya, Kala Sanghian, Distt Kpt. INDIA E-mail: simmibagga12@gmail.com

More information

Efficiency Testing of Self-adapting Systems by Learning of Event Sequences

Efficiency Testing of Self-adapting Systems by Learning of Event Sequences Efficiency Testing of Self-adapting Systems by Learning of Event Sequences Jonathan Hudson, Jörg Denzinger Department of Computer Science, University of Calgary Calgary, Canada Email: {hudsonj, denzinge}@cpsc.ucalgary.ca

More information

TABLE OF CONTENTS CHAPTER TITLE PAGE

TABLE OF CONTENTS CHAPTER TITLE PAGE viii TABLE OF CONTENTS CHAPTER TITLE PAGE TITLE PAGE DECLARATION DEDICATION ACKNOWLEDGEMENT ABSTRACT ABSTRAK TABLE OF CONTENTS LIST OF TABLES LIST OF FIGURES LIST OF APPENDICES I II III IV VI VII VIII

More information

Learn AX: A Beginner s Guide to Microsoft Dynamics AX. Managing Users and Role Based Security in Microsoft Dynamics AX 2012. Dynamics101 ACADEMY

Learn AX: A Beginner s Guide to Microsoft Dynamics AX. Managing Users and Role Based Security in Microsoft Dynamics AX 2012. Dynamics101 ACADEMY Learn AX: A Beginner s Guide to Microsoft Dynamics AX Managing Users and Role Based Security in Microsoft Dynamics AX 2012 About.com is a Rand Group Knowledge Center intended to provide our clients, and

More information

MSc Financial Economics.

MSc Financial Economics. MSc Financial Economics Programme Specification Course Title MSc Financial Economics. Course Overview The MSc in Financial Economics degree is a one-year full-time course for graduates who wish to apply

More information

SuperViz: An Interactive Visualization of Super-Peer P2P Network

SuperViz: An Interactive Visualization of Super-Peer P2P Network SuperViz: An Interactive Visualization of Super-Peer P2P Network Anthony (Peiqun) Yu pqyu@cs.ubc.ca Abstract: The Efficient Clustered Super-Peer P2P network is a novel P2P architecture, which overcomes

More information

HOW TO RETAIN THE CUSTOMERS BY USING EFFECTIVE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM

HOW TO RETAIN THE CUSTOMERS BY USING EFFECTIVE CUSTOMER RELATIONSHIP MANAGEMENT (CRM) SYSTEM International Journal of Sales & Marketing Management Research and Development (IJSMMRD) ISSN 2249-6939 Vol. 3, Issue 1, Mar 2013, 61-66 TJPRC Pvt. Ltd. HOW TO RETAIN THE CUSTOMERS BY USING EFFECTIVE CUSTOMER

More information

Subject CT7 Business Economics Core Technical Syllabus

Subject CT7 Business Economics Core Technical Syllabus Subject CT7 Business Economics Core Technical Syllabus for the 2016 exams 1 June 2015 Aim The aim of the Business Economics subject is to introduce students to the core economic principles and how these

More information

Detecting Deception in Reputation Management

Detecting Deception in Reputation Management Detecting Deception in Reputation Management Bin Yu Department of Computer Science North Carolina State University Raleigh, NC 27695-7535, USA byu@eos.ncsu.edu Munindar P. Singh Department of Computer

More information

A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps

A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-4, Issue-3 E-ISSN: 2347-2693 A Novel Approach of Investigating Deceptive Activities of Developer for Ranking apps

More information

IJPSS Volume 2, Issue 3 ISSN: 2249-5894

IJPSS Volume 2, Issue 3 ISSN: 2249-5894 A STUDY ON PROBLEM AND PROSPECTS OF WOMEN ENTREPRENEURS WITH SPECIAL REFERENCE TO G. PALANIAPPAN* C. S. RAMANIGOPAL** A. MANI*** ERODE DISTRICT ABSTRACT: Women have been successful in breaking their confinement

More information

SCHEME FOR INTELLECTUAL PROPERTY EDUCATION, RESEARCH AND PUBLIC OUTREACH

SCHEME FOR INTELLECTUAL PROPERTY EDUCATION, RESEARCH AND PUBLIC OUTREACH SCHEME FOR INTELLECTUAL PROPERTY EDUCATION, RESEARCH AND PUBLIC OUTREACH BP and Copyright Division is implementing a scheme namely Scheme for Intellectual Property Education, Research and Public Outreach

More information

FACTORS AFFECTING SUCCESSFUL IMPLEMENTATION OF NICHE MARKETING IN TEHRAN METROPOLIS

FACTORS AFFECTING SUCCESSFUL IMPLEMENTATION OF NICHE MARKETING IN TEHRAN METROPOLIS Revista Empresarial Inter Metro / Inter Metro Business Journal Spring 2012 / Vol. 8 No. 1 / p. 33 FACTORS AFFECTING SUCCESSFUL IMPLEMENTATION OF NICHE MARKETING IN TEHRAN METROPOLIS By Mehdi Noursina Management

More information

Index: Micro grids, Demand, Algoritham, Renewable Energy source.

Index: Micro grids, Demand, Algoritham, Renewable Energy source. Economic Analysis of a Micro Grid Power Generation 1 M. VIVEK, S.VIJAYA RAJ, 2 C.THIRUGOMATHI 1 Research Scholar, Periyar Maniammai University, Vallam, Thanjavur 2 Asst.Prof. Dept. Electrical and Electronics

More information

Adaptation of the ACO heuristic for sequencing learning activities

Adaptation of the ACO heuristic for sequencing learning activities Adaptation of the ACO heuristic for sequencing learning activities Sergio Gutiérrez 1, Grégory Valigiani 2, Pierre Collet 2 and Carlos Delgado Kloos 1 1 University Carlos III of Madrid (Spain) 2 Université

More information

Factors Influencing Retail Investors Attitude Towards Investing in Equity Stocks: A Study in Tamil Nadu

Factors Influencing Retail Investors Attitude Towards Investing in Equity Stocks: A Study in Tamil Nadu Journal of Modern Accounting and Auditing, ISSN 1548-6583 March 2011, Vol. 7, No. 3, 316-321 Factors Influencing Retail Investors Attitude Towards Investing in Equity Stocks: A Study in Tamil Nadu Ebenezer

More information

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network

Impelling Heart Attack Prediction System using Data Mining and Artificial Neural Network General Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Impelling

More information

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS

A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS A MACHINE LEARNING APPROACH TO FILTER UNWANTED MESSAGES FROM ONLINE SOCIAL NETWORKS Charanma.P 1, P. Ganesh Kumar 2, 1 PG Scholar, 2 Assistant Professor,Department of Information Technology, Anna University

More information

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP

University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP University of Portsmouth PORTSMOUTH Hants UNITED KINGDOM PO1 2UP This Conference or Workshop Item Adda, Mo, Kasassbeh, M and Peart, Amanda (2005) A survey of network fault management. In: Telecommunications

More information

Development of Resource-Driven Scheduling Model for Mass Housing Construction Projects

Development of Resource-Driven Scheduling Model for Mass Housing Construction Projects Development of Resource-Driven Scheduling Model for Mass Housing Construction Projects Ar. A. Cindrela Devi and K. Ananthanarayanan Abstract Resource continuity is a key issue for Mass housing construction

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

Super-Consumer Based Reputation Management for Web Service Systems

Super-Consumer Based Reputation Management for Web Service Systems Super-Consumer Based Reputation Management for Web Service Systems Yao Wang, Julita Vassileva Department of Computer Science, University of Saskatchewan, Canada, e-mail:{yaw181, jiv}@cs.usask.ca Abstract

More information

SOFTWARE SECURITY TESTING A PERTINENT FRAMEWORK

SOFTWARE SECURITY TESTING A PERTINENT FRAMEWORK Volume 5, No. 3, March 2014 Journal Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info SOFTWARE SECURITY TESTING A PERTINENT FRAMEWORK Rajeev Kumar *1, Suhel Ahmad Khan

More information

P. Mohanraj 3 Assistant Professor in Management Studies Nandha Arts and Science College Erode, Tamil Nadu, India

P. Mohanraj 3 Assistant Professor in Management Studies Nandha Arts and Science College Erode, Tamil Nadu, India ISSN: 2321-7782 (Online) Volume 2, Issue 5, May 2014 International Journal of Advance Research in Computer Science and Management Studies Research Paper Available online at: www.ijarcsms.com A Conceptual

More information

E-learning for Graphical System Design Courses: A Case Study

E-learning for Graphical System Design Courses: A Case Study E-learning for Graphical System Design Courses: A Case Study Yucel Ugurlu Education & Research Programs National Instruments Japan Corporation Tokyo, Japan e-mail: yucel.ugurlu@ni.com Hiroshi Sakuta Department

More information

Achieve more with less

Achieve more with less Energy reduction Bayesian Filtering: the essentials - A Must-take approach in any organization s Anti-Spam Strategy - Whitepaper Achieve more with less What is Bayesian Filtering How Bayesian Filtering

More information

E-MAIL - Spam Filtering

E-MAIL - Spam Filtering E-MAIL - Spam Filtering SPAM FILTERING OVERVIEW... USER S GUIDE...... Common Login Errors......... Lists Tab... 5 Profile Tab... 7 Quarantine Tab... 0 LOGGING IN MAIN SCREEN SPAMBLOCKER TABS (LISTS, PROFILE

More information

Reputation Management Algorithms & Testing. Andrew G. West November 3, 2008

Reputation Management Algorithms & Testing. Andrew G. West November 3, 2008 Reputation Management Algorithms & Testing Andrew G. West November 3, 2008 EigenTrust EigenTrust (Hector Garcia-molina, et. al) A normalized vector-matrix multiply based method to aggregate trust such

More information

How To Understand And Understand The Science Of Engineering In India

How To Understand And Understand The Science Of Engineering In India RESUME Dr. Shabana Mehfuz Associate Professor Address for correspondence Office Address Nationality Dr Shabana Mehfuz, A- 536, Sector-19, NOIDA, U.P. India, Ph No 09818413081 E-mail-mehfuz_shabana@yahoo.com.

More information

An Integrated Production Inventory System for. Perishable Items with Fixed and Linear Backorders

An Integrated Production Inventory System for. Perishable Items with Fixed and Linear Backorders Int. Journal of Math. Analysis, Vol. 8, 2014, no. 32, 1549-1559 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.46176 An Integrated Production Inventory System for Perishable Items with

More information

AN INVESTIGATION ABOUT THE CHARACTERISTICS OF AN ENGINEERING COLLEGE TEACHER IN THE CURRENT SCENARIO

AN INVESTIGATION ABOUT THE CHARACTERISTICS OF AN ENGINEERING COLLEGE TEACHER IN THE CURRENT SCENARIO AN INVESTIGATION ABOUT THE CHARACTERISTICS OF AN ENGINEERING COLLEGE TEACHER IN THE CURRENT SCENARIO Sreelekshmy Pillai G. 1, Kiron K.R. 2, Anoop Kumar G. 3, Santhosh Kumar S. 4,Rajesh Menon B. 5 Assistant

More information

Keywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm.

Keywords: Information Retrieval, Vector Space Model, Database, Similarity Measure, Genetic Algorithm. Volume 3, Issue 8, August 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Effective Information

More information

Content-Based Discovery of Twitter Influencers

Content-Based Discovery of Twitter Influencers Content-Based Discovery of Twitter Influencers Chiara Francalanci, Irma Metra Department of Electronics, Information and Bioengineering Polytechnic of Milan, Italy irma.metra@mail.polimi.it chiara.francalanci@polimi.it

More information

ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD

ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD ANALYSIS OF WORKFLOW SCHEDULING PROCESS USING ENHANCED SUPERIOR ELEMENT MULTITUDE OPTIMIZATION IN CLOUD Mrs. D.PONNISELVI, M.Sc., M.Phil., 1 E.SEETHA, 2 ASSISTANT PROFESSOR, M.PHIL FULL-TIME RESEARCH SCHOLAR,

More information

Economic Production Quantity (EPQ) Model with Time- Dependent Demand and Reduction Delivery Policy

Economic Production Quantity (EPQ) Model with Time- Dependent Demand and Reduction Delivery Policy ISSN NO:: 348 537X Economic Production Quantity (EPQ) Model with Time- Dependent Demand and Reduction Delivery Policy Dr. Neeraj Agarwal Professor & Head, Department of Hotel Management, Graphic Era University,

More information

Simulating the Multiple Time-Period Arrival in Yield Management

Simulating the Multiple Time-Period Arrival in Yield Management Simulating the Multiple Time-Period Arrival in Yield Management P.K.Suri #1, Rakesh Kumar #2, Pardeep Kumar Mittal #3 #1 Dean(R&D), Chairman & Professor(CSE/IT/MCA), H.C.T.M., Kaithal(Haryana), India #2

More information

Expert Finding Using Social Networking

Expert Finding Using Social Networking San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research 1-1-2009 Expert Finding Using Social Networking Parin Shah San Jose State University Follow this and

More information

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=19474

Permanent Link: http://espace.library.curtin.edu.au/r?func=dbin-jump-full&local_base=gen01-era02&object_id=19474 Citation: Chang, Elizabeth and Hussain, Farookh and Dillon, Tharam. 2005. : Reputation ontology for reputation systems, in Herrero, P. and Meersman, R. and Tari, Z. (ed), First IFIP/WG2.12 and WG12.4 International

More information

Reputation Rating Mode and Aggregating Method of Online Reputation Management System *

Reputation Rating Mode and Aggregating Method of Online Reputation Management System * Reputation Rating Mode and Aggregating Method of Online Reputation Management System * Yang Deli ** Song Guangxing *** (School of Management, Dalian University of Technology, P.R.China 116024) Abstract

More information