The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification"

Transcription

1 The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification Cheng Xian-Yi1, Zhu Ling-ling,Zhu Qian,Wang Jin The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification Cheng Xian-Yi1 1,2, Zhu Ling-ling 1,Zhu Qian 2,Wang Jin 1 1.School of Computer Science and Technology Nantong University, Nantong , China 2.School of Computer Science and Communications Engineering Jiangsu University, Zhenjiang , China E-MIAL: doi: /jcit.vol5. issue10.7 Abstract Network has become important public platform for the public to express the opinion, to discuss public affairs, to participate in economic social and political life. The spread of network public opinion geometric progression growth, it is necessary to monitor and analyze network Public Opinion for the government to manage the public opinion and to timely discover hot spots and to correctly guide public opinion trends. Therefore, Network Public Opinion monitoring and analyzing have become a hot issue in recent years. Now the main mature technology is the statistical analysis based on key word. However, there is still much room for improving its effectiveness. This paper describes a framework of network Public Opinion monitoring and analyzing system based on semantic content identification to solve some key problems of the public opinion. 1. Introduction Keywords: Network Public Opinion, Natural Language Process, Semantic In recent years, with the development of Internet and the increasing number of netizens, some people disclosure and spread the sensitive and bad through forums, IM, and so on, which threat the social stability and people's life and property. On the one hand, the national legislation and regulations should put forward higher attentions in the focuses of public opinion to server the public better; on the other hand, Government should takes on vital responsibilities in takes on vital responsibilities in correctly monitoring the sensitive public opinion and guiding them which protect network users from bad and build a harmonious socialist country. According to the preliminary statistics data from Internet center, there have been large directly and indirectly losses since 1996, which we can be seen from Figure 1. Therefore, Network Public Opinion monitoring and analyzing have become an urgent and important issue [1]. Where the Y Axis express State loss (in million dollars on units) Figure 1. The statistics of the harm to society by spreading the Network Public Opinion The most important technologies about network Public Opinion analysis include text filtering, text classifying, clustering, viewpoint tendentiousness recognizing, tracking topics, automatic

2 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 summarizing and so on, which have been concerned about for a long time by domestic and foreign workers. In order to control more effectively, This paper describes a framework of network Public Opinion monitoring and analyzing system based on semantic content identification. 2. Research Situation Researchers from DARPA CMU University of Massachusetts and Dragon Systems, Inc have began to define topic detection and tracking study and developed TDT. The important technology of this project is content classification of, which resolves a contradiction between the processing speed and safety monitoring of the real-time monitoring and make it feasible. There are some studies about it abroad such as the PICS of the W3C which have become classification standard on WWW. There are two International general classification standards: SACi and Safesurf, which are both accord with the PICS. On the one hand, the classification technique is used for web page classification and filtering; on the other hand, the foreign policy and standards are not fully suitable for China's national conditions for various reasons. In China, Founder ZhiSi public opinion warning DSS [2] designed by Institute Founder is successful. The system has successfully achieved automatic real-time monitoring and analysis of the massive public opinion. It is more effective for government to monitor the public option than traditional manual mode.it also do some to strengthen the supervision of internet and play a certain role for the network sudden public events.this DSS provide the function including such as full text retrieval, automatic sorting, automatic cluster, subject examination/tracing, related recommendation and disappear heavy, connection and tendency analysis, automatic abstract and key word extraction, thunderbolt analyzes, generate statistics and so on. Goonie network Public Opinion and monitor system combines internet search technology; intellectualized process technology and knowledge manage method. It realize network public opinion monitor and special news trace to briefing, report and so on through auto collect, auto classify combine, subject collection, focus special topic. Therefore Goonie can master public opinion, make proper consensus and provide report analyze [3]. A framework of content security monitoring system was designed based on human-computer combination in literature [4]. The framework is a hierarchy, there are three levels: the data acquisition layer, content analysis, output layer. It s function mainly examine the based on content by the content analysis and identify the bad ; on the same time, it can provide electronic evidence for the bad use of by recording the source and content of and tracking them by effective audit analysis. Although there are many units engaged in domestic internet content filtering direction of the research, and try to achieve the purpose of purifying network environment. But these techniques are still in the bud, there are still some deficiencies in "the semantic filtering" 3. System Framework The purpose of the system is to achieve a large-scale network environment monitoring report of Network Public Opinion through testing, acquirement, theme, hot topics and events tracking, experiments monitoring and so on, which can form many representation modes of analysis results, such as brief, reports, charts etc. Therefore, the system can master public opinion, make proper consensus and provide report analyze. Monitoring system for network Public Opinion module function block diagram in Figure 2.There are five stages including resource discovery, selection, pattern discovery, extraction, public opinion handling

3 The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification Cheng Xian-Yi1, Zhu Ling-ling,Zhu Qian,Wang Jin Theme managment Structure knowledge warning filter counter monitor decision public opinion handling client unstructure text structure text Topic search trend analysis abstract report event search extraction Text analysis audit Topic pattern Tendentious analysis Event pattern Semantic index Pattern Discovery Text purification server filter luster expression extracte the subject filtere noise select (Digital Collection format shifting Data Import / Export) text WEB Chatting room E- mail blog BBS Resources discovery Figure 2. logic structure of the network public opinion monitoring system function module Figure 3 is the system workflow. The systems include the following five databases: 1) Public opinion planning database: To collect demand of the Public opinion including the online news, BBS, RSS, chat room, blog, polymerization news (RSS), etc. 2) Public opinion analysis database: To collect the storage data through classification and clustering, keyword extraction, removal the duplication and filter, named entity recognition, semantic computing etc. which database is structured. 3) Public opinion database: To storage products related to public opinion analysis report, survey report, experience summary and related. 4) Semantic dictionary: Ontology knowledge, etc 5) HNC knowledge: 466 sentence knowledge, etc [6]. Public Sentiment Resources discovery Public opinion database programming select extraction Public opinion analysis Pattern Discovery Popular feelings handling Public opinion Products HNC knowledge semantic dictionary Figure 3. System workflow of the network public opinion monitoring

4 Figure 4 is the client workflow Journal of Convergence Information Technology Volume 5, Number 10. December 2010 user Show topic list modify the theme? no Theme selection yes Theme management Server-side processing continue extraction popular feelings handling exit Topic event retrieval retrieval Summary Topic of retrieval public opinion public report warn filter counter minor decision Figure 4. Client workflow Figure 5 is data flow charts of the system. The interaction between the various modules are different: Data interaction is based on file between the resources discovery module and select module; Select module deal with from the text to vector or ontology; Use GATE tagging to name entity in pattern discovery module and determine the relationship between entities and then discover the event pattern or the topic pattern; Information extraction module mainly do the semantic computing and transform the patterns into templates, which will make the unstructured into structure ; Public opinion handling module need to carry on the inquiry according to the user and give these results to user with the suitable manifestation. simultaneously, the module receive the user s establishment and inquiry request. Network Resources discovery extraction Popular feelings handling Analysis of unstructured text Vector, ontology Structured Results Database user requests Results show select Pattern Discovery Server client Figure 5.data flow charts of the system

5 The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification Cheng Xian-Yi1, Zhu Ling-ling,Zhu Qian,Wang Jin Figure 6 is an entire system network topology. The system can be a lot of users; each user can connect to a server. Servers can share data and exchange each other by network, network connection scenarios can be P2P or client-server. Future which will be constantly modified and optimized Network media Adminis trative Extranet Network Communication Office 4. Working Process law enforcement Special content management Figure 6. network topology 4.1. Resources discovery based on latent semantic analysis Resources discovery, which retrieve the necessary network resources, is a process to integrate consolidate mapping data by the different network pattern. There are different retrieval tools and the strategies between the recourses. The BBS, chat room, the are short and random. First, use the DTS to Import / Export the document, and then eliminate the problem of the algorithm which ignores the environment and synonyms misjudgment based on the theme of latent semantic analysis, while using SVD to achieve the filtering and noise removal purposes. We can find topics drift effectively and timely and meet the requirement of the public surveillance better according to the content of the document similarity calculation and clustering analysis select Select is to achieve specialized from the network by automatically selecting and pre-processing.first, filtered noise, recognize the named entity, extract the subject and the event ;Secondly, classification luster filter the text according to topics or events; Finally, discriminate the text. 1) Text classification based on semi-supervised learning Distinctive feature of public opinion is a short text, which should deal with massive data. The traditional text classification algorithm is a supervised learning, which to learn the calibration samples by the category tag settled and to determinate its category according to the text semantic content. It needs a large label samples trains to a good classifier. It s easy to access the large number of unmarked data but to be high costs and impractical for marked data, which will create a bottleneck When dealing with huge amounts of data by the traditional text classification. We use text classification based on semi-supervised learning to overcome the sparsely of the short text and to improve the accuracy of short text classification algorithm. And in order to increase the robustness of the algorithm, better to avoid falling into local optimal solution; will integrate the Bagging algorithm integrated into semi-supervised learning. 2) Bad detection

6 Journal of Convergence Information Technology Volume 5, Number 10. December 2010 Bad detection is one of the key factor of monitoring system about website content. It is only based on keywords on network for recognizing and filtration for traditional network detection system. If you want to mask a number of cult sites, those who criticize the cult will aloes be filtered out. Therefore, we put forward a method to test poor content based on HNC(figure 7),which are not by way of matching keywords and to judge what text filtering needs according to the meaning of sentences Pattern Discovery Pattern discovery will achieve hot topic detection and concern about the incident tracking and orientation analysis by data mining and semantic computing based on the data from selecting module. The module is core of the system. Pattern Discovery is presented as follows: 1) First, we obtain four tables by using the ICTCLAS researched by the computer software of Chinese Academy of Sciences to achieve word segmentation and POS tagging: Theme Table (ID, title, text, author, time, vector) Comment table (ID, theme, title ID, text, author, time, tendentious value) Topics table (ID, Keywords group, the number of participants, time, polarity, viewpoint opposition, Notes) Topic - theme map table (topic ID, theme ID) A theme ID will be progressive distribution when inserting a database, we will keep on corresponding relations between comments and topic by the theme ID When saving comments. Moreover, the third table holds basic clustering ; the fourth table holds the theme of each cluster contained which is the subject of the topics. Article Pretreat Sentence semantic structure Elements of the framework text short-term memory Sentence Analysis Context Generation Position to judge the semantic HNC 概 念 知 识 库 词 语 知 识 库 HNC Judgments Semantic Library Network map object position Red and black check Red and black objects Library Text nature: 1 absolutely black, 2 absolutely red, 3 black, 4 suspicious III,5 suspicious II,6 suspicious 1,7 neutralities Figure 7. bad detection algorithm diagrams 2) Tendency Analysis First we get ready for tendency dictionary to achieve first dictionary based on marked polarity and strengthen by artificial labeled method in How-Net, and then manually add some common words. We should establish a good tendency dictionary using hash table provided by Java language because that there need to quickly check the inclination

7 The Framework of Network Public Opinion Monitoring and Analyzing System Based on Semantic Content Identification Cheng Xian-Yi1, Zhu Ling-ling,Zhu Qian,Wang Jin Next, read the text, process it sentence by sentence., remove the stop-words for each sentence, query tendency dictionary word by word, calculate its context polarity and strength for the polarity of the words. Then, add up all the polar components, receive sentences density situation divided by the square root of the number of comments Finally, represent with tendency value according to distributed situation division commentary tendency and rank. 3) Popular feelings key point analysis: Query the comments from the database according to the topic - theme map table and rank the basis for hot spot. Calculate incident concern by the opposition of the topic view combined with its comments. select an initial point based on the basic accumulation unit on a unit of time (for example: days), And then calculate the time point of the topic view by the opposition of counting only the comments before the point in time, latter, opinion in opposition to the added value of this time are received by subtracting the value of a point in time to previous time value.that the trend of events can be obtained 4.4. extraction This module mainly gets structure data and obtains several databases for analysis and confirm or esplanade the mode mined out. we can use GATE [6] : entity recognition, entity-relationship recognition, events recognition, summary generation, etc popular feelings handling 1) The warning Warning module of public opinion collects network ; discover the problem (things) and feedback. Warning is active at a given time period show with the theme related events, the topic of the trend. 2) Filtering Filtering is just too bad. The network management gets rid of negative news by monitoring at all times. Collect sensitive phrase from different fields and set a weight value for each phrase and use intelligent software to find sensitive phrase matching according to weights. The will be shielded beyond a certain threshold established. 3) Counter First, gain its IP, and then lock it. We can use each effective attack method to carry on the fixed-point attack disseminate for unsafe of Hub the website (for example seepage technology, viral technology, advanced hacker attack technology and so on).it can prevent the unsafe from spreading and countering. 4) Monitoring The system lists all the events or topics about the subject after entering the start time of monitoring, the users select the suspected event or topic, monitoring module will continuously monitor. Monitoring and early warning is different that the former is passive surveillance, early warning is active. 5) Decision A complete decision-making is often not possible, but an iterative process. In this process, human-computer interaction can be used by policy makers in the parameters of different options and alternatives. 5. Conclusions There are heavy workloads for the traditional machine learning methods which need to be manually tagging train classifiers netizens. This paper application content identification technology based on semantics to design a framework of analysis and monitoring network Public Opinion system for the comment being relatively short and broad emotional vocabulary. The next step we will pass the experiments to show that the system can achieve a more satisfactory result

8 Journal of Convergence Information Technology Volume 5, Number 10. December References [1] Li Yonghao. Simulation and analysis of Rapid screening algorithms about network hot topics. Computer Communication Laboratory, Beijing Jiaotong University, internal communication documents [2] Founder Technology Research Institute. Public opinion on science and technology means to support network monitoring and analysis of unexpected events - Founder ZhiSi public opinion warning DSS. Informatization. 2005:50-52 [3] [4]Li Yanling. Security monitoring system framework and its key technology of BBS content. Research Institute of China Electronics. 2007,2(4): [5] Jin Yaohong. HNC language understanding technology and its applications [M]. Beijing: Science Press [6]

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

IT services for analyses of various data samples

IT services for analyses of various data samples IT services for analyses of various data samples Ján Paralič, František Babič, Martin Sarnovský, Peter Butka, Cecília Havrilová, Miroslava Muchová, Michal Puheim, Martin Mikula, Gabriel Tutoky Technical

More information

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,

More information

Research of Postal Data mining system based on big data

Research of Postal Data mining system based on big data 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication

More information

Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis

Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Towards SoMEST Combining Social Media Monitoring with Event Extraction and Timeline Analysis Yue Dai, Ernest Arendarenko, Tuomo Kakkonen, Ding Liao School of Computing University of Eastern Finland {yvedai,

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

SPATIAL DATA CLASSIFICATION AND DATA MINING

SPATIAL DATA CLASSIFICATION AND DATA MINING , pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

UPS battery remote monitoring system in cloud computing

UPS battery remote monitoring system in cloud computing , pp.11-15 http://dx.doi.org/10.14257/astl.2014.53.03 UPS battery remote monitoring system in cloud computing Shiwei Li, Haiying Wang, Qi Fan School of Automation, Harbin University of Science and Technology

More information

A Comparative Study on Sentiment Classification and Ranking on Product Reviews

A Comparative Study on Sentiment Classification and Ranking on Product Reviews A Comparative Study on Sentiment Classification and Ranking on Product Reviews C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan

More information

Hexaware E-book on Predictive Analytics

Hexaware E-book on Predictive Analytics Hexaware E-book on Predictive Analytics Business Intelligence & Analytics Actionable Intelligence Enabled Published on : Feb 7, 2012 Hexaware E-book on Predictive Analytics What is Data mining? Data mining,

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Network Big Data: Facing and Tackling the Complexities Xiaolong Jin

Network Big Data: Facing and Tackling the Complexities Xiaolong Jin Network Big Data: Facing and Tackling the Complexities Xiaolong Jin CAS Key Laboratory of Network Data Science & Technology Institute of Computing Technology Chinese Academy of Sciences (CAS) 2015-08-10

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

Research on News Video Multi-topic Extraction and Summarization

Research on News Video Multi-topic Extraction and Summarization International Journal of New Technology and Research (IJNTR) ISSN:2454-4116, Volume-2, Issue-3, March 2016 Pages 37-39 Research on News Video Multi-topic Extraction and Summarization Di Li, Hua Huo Abstract

More information

ANALYTICS IN BIG DATA ERA

ANALYTICS IN BIG DATA ERA ANALYTICS IN BIG DATA ERA ANALYTICS TECHNOLOGY AND ARCHITECTURE TO MANAGE VELOCITY AND VARIETY, DISCOVER RELATIONSHIPS AND CLASSIFY HUGE AMOUNT OF DATA MAURIZIO SALUSTI SAS Copyr i g ht 2012, SAS Ins titut

More information

Overseas Investment in Oil Industry and the Risk Management System

Overseas Investment in Oil Industry and the Risk Management System Overseas Investment in Oil Industry and the Risk Management System XI Weidong, JIN Qingfen Northeast Electric Power University, China, 132012 jelinc@163.com Abstract: Based on risk management content,

More information

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy

What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy What do Big Data & HAVEn mean? Robert Lejnert HP Autonomy Much higher Volumes. Processed with more Velocity. With much more Variety. Is Big Data so big? Big Data Smart Data Project HAVEn: Adaptive Intelligence

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Email Spam Detection Using Customized SimHash Function

Email Spam Detection Using Customized SimHash Function International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 1, Issue 8, December 2014, PP 35-40 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org Email

More information

Sentiment Analysis on Big Data

Sentiment Analysis on Big Data SPAN White Paper!? Sentiment Analysis on Big Data Machine Learning Approach Several sources on the web provide deep insight about people s opinions on the products and services of various companies. Social

More information

The Big Data methodology in computer vision systems

The Big Data methodology in computer vision systems The Big Data methodology in computer vision systems Popov S.B. Samara State Aerospace University, Image Processing Systems Institute, Russian Academy of Sciences Abstract. I consider the advantages of

More information

Sentiment analysis on tweets in a financial domain

Sentiment analysis on tweets in a financial domain Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International

More information

Intelligent Agents Serving Based On The Society Information

Intelligent Agents Serving Based On The Society Information Intelligent Agents Serving Based On The Society Information Sanem SARIEL Istanbul Technical University, Computer Engineering Department, Istanbul, TURKEY sariel@cs.itu.edu.tr B. Tevfik AKGUN Yildiz Technical

More information

Information & Data Visualization. Yasufumi TAKAMA Tokyo Metropolitan University, JAPAN ytakama@sd.tmu.ac.jp

Information & Data Visualization. Yasufumi TAKAMA Tokyo Metropolitan University, JAPAN ytakama@sd.tmu.ac.jp Information & Data Visualization Yasufumi TAKAMA Tokyo Metropolitan University, JAPAN ytakama@sd.tmu.ac.jp 1 Introduction Contents Self introduction & Research purpose Social Data Analysis Related Works

More information

Construction of Library Management Information System

Construction of Library Management Information System Construction of Library Management Information System Lian-feng Zhang, Rui-jin Zhou, Li-ping Sui, and Guo-qing Wu Henan Institute of Science and Technology Xin-xiang, China zlfmail@126.com Abstract. Library

More information

Search and Information Retrieval

Search and Information Retrieval Search and Information Retrieval Search on the Web 1 is a daily activity for many people throughout the world Search and communication are most popular uses of the computer Applications involving search

More information

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.

DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM. DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 ushaduraisamy@yahoo.co.in 2 anishgracias@gmail.com Abstract A vast amount of assorted

More information

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014

International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014 RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer

More information

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer

More information

Voice of the Customer: How to Move Beyond Listening to Action Merging Text Analytics with Data Mining and Predictive Analytics

Voice of the Customer: How to Move Beyond Listening to Action Merging Text Analytics with Data Mining and Predictive Analytics WHITEPAPER Voice of the Customer: How to Move Beyond Listening to Action Merging Text Analytics with Data Mining and Predictive Analytics Successful companies today both listen and understand what customers

More information

5.5 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall. Figure 5-2

5.5 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall. Figure 5-2 Class Announcements TIM 50 - Business Information Systems Lecture 15 Database Assignment 2 posted Due Tuesday 5/26 UC Santa Cruz May 19, 2015 Database: Collection of related files containing records on

More information

A Survey on Product Aspect Ranking

A Survey on Product Aspect Ranking A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,

More information

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin *

Open Access Research on Application of Neural Network in Computer Network Security Evaluation. Shujuan Jin * Send Orders for Reprints to reprints@benthamscience.ae 766 The Open Electrical & Electronic Engineering Journal, 2014, 8, 766-771 Open Access Research on Application of Neural Network in Computer Network

More information

Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words

Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words , pp.290-295 http://dx.doi.org/10.14257/astl.2015.111.55 Efficient Techniques for Improved Data Classification and POS Tagging by Monitoring Extraction, Pruning and Updating of Unknown Foreign Words Irfan

More information

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines

Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines , 22-24 October, 2014, San Francisco, USA Automatic Mining of Internet Translation Reference Knowledge Based on Multiple Search Engines Baosheng Yin, Wei Wang, Ruixue Lu, Yang Yang Abstract With the increasing

More information

A Time Efficient Algorithm for Web Log Analysis

A Time Efficient Algorithm for Web Log Analysis A Time Efficient Algorithm for Web Log Analysis Santosh Shakya Anju Singh Divakar Singh Student [M.Tech.6 th sem (CSE)] Asst.Proff, Dept. of CSE BU HOD (CSE), BUIT, BUIT,BU Bhopal Barkatullah University,

More information

Big Data Text Mining and Visualization. Anton Heijs

Big Data Text Mining and Visualization. Anton Heijs Copyright 2007 by Treparel Information Solutions BV. This report nor any part of it may be copied, circulated, quoted without prior written approval from Treparel7 Treparel Information Solutions BV Delftechpark

More information

Why are Organizations Interested?

Why are Organizations Interested? SAS Text Analytics Mary-Elizabeth ( M-E ) Eddlestone SAS Customer Loyalty M-E.Eddlestone@sas.com +1 (607) 256-7929 Why are Organizations Interested? Text Analytics 2009: User Perspectives on Solutions

More information

Delivering Smart Answers!

Delivering Smart Answers! Companion for SharePoint Topic Analyst Companion for SharePoint All Your Information Enterprise-ready Enrich SharePoint, your central place for document and workflow management, not only with an improved

More information

Questions to be responded to by the firm submitting the application

Questions to be responded to by the firm submitting the application Questions to be responded to by the firm submitting the application Why do you think this project should receive an award? How does it demonstrate: innovation, quality, and professional excellence transparency

More information

TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse

TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse TSRR: A Software Resource Repository for Trustworthiness Resource Management and Reuse Junfeng Zhao 1, 2, Bing Xie 1,2, Yasha Wang 1,2, Yongjun XU 3 1 Key Laboratory of High Confidence Software Technologies,

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Facilitating Business Process Discovery using Email Analysis

Facilitating Business Process Discovery using Email Analysis Facilitating Business Process Discovery using Email Analysis Matin Mavaddat Matin.Mavaddat@live.uwe.ac.uk Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course

The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course The Design Study of High-Quality Resource Shared Classes in China: A Case Study of the Abnormal Psychology Course Juan WANG College of Educational Science, JiangSu Normal University, Jiangsu, Xuzhou, China

More information

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks

A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks A Systemic Artificial Intelligence (AI) Approach to Difficult Text Analytics Tasks Text Analytics World, Boston, 2013 Lars Hard, CTO Agenda Difficult text analytics tasks Feature extraction Bio-inspired

More information

B.Sc (Computer Science) Database Management Systems UNIT-V

B.Sc (Computer Science) Database Management Systems UNIT-V 1 B.Sc (Computer Science) Database Management Systems UNIT-V Business Intelligence? Business intelligence is a term used to describe a comprehensive cohesive and integrated set of tools and process used

More information

Chapter ML:XI. XI. Cluster Analysis

Chapter ML:XI. XI. Cluster Analysis Chapter ML:XI XI. Cluster Analysis Data Mining Overview Cluster Analysis Basics Hierarchical Cluster Analysis Iterative Cluster Analysis Density-Based Cluster Analysis Cluster Evaluation Constrained Cluster

More information

Analecta Vol. 8, No. 2 ISSN 2064-7964

Analecta Vol. 8, No. 2 ISSN 2064-7964 EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,

More information

Inner Classification of Clusters for Online News

Inner Classification of Clusters for Online News Inner Classification of Clusters for Online News Harmandeep Kaur 1, Sheenam Malhotra 2 1 (Computer Science and Engineering Department, Shri Guru Granth Sahib World University Fatehgarh Sahib) 2 (Assistant

More information

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2

Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model WangLinjing1, ZhangHan2 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Network Intrusion Detection System and Its Cognitive Ability based on Artificial Immune Model

More information

Text Analytics Beginner s Guide. Extracting Meaning from Unstructured Data

Text Analytics Beginner s Guide. Extracting Meaning from Unstructured Data Text Analytics Beginner s Guide Extracting Meaning from Unstructured Data Contents Text Analytics 3 Use Cases 7 Terms 9 Trends 14 Scenario 15 Resources 24 2 2013 Angoss Software Corporation. All rights

More information

Medical Big Data Interpretation

Medical Big Data Interpretation Medical Big Data Interpretation Vice president of the Xiangya Hospital, Central South University The director of the ministry of mobile medical education key laboratory Professor Jianzhong Hu BIG DATA

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Big Data: Rethinking Text Visualization

Big Data: Rethinking Text Visualization Big Data: Rethinking Text Visualization Dr. Anton Heijs anton.heijs@treparel.com Treparel April 8, 2013 Abstract In this white paper we discuss text visualization approaches and how these are important

More information

ERNW Newsletter 29 / November 2009

ERNW Newsletter 29 / November 2009 ERNW Newsletter 29 / November 2009 Dear Partners and Colleagues, Welcome to the ERNW Newsletter no. 29 covering the topic: Data Leakage Prevention A Practical Evaluation Version 1.0 from 19th of november

More information

The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage

The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage The Research and Design of Intelligent IPS Model Based on Dynamic Cloud Firewall Linkage 1 Tiejun Jia, 2 Xiaogang Wang *1 College of Electronics & Information, Shanghai Dianji University, Shanghai 200240,

More information

Search Result Optimization using Annotators

Search Result Optimization using Annotators Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,

More information

Build Your Knowledge!

Build Your Knowledge! About this Course This 3-day Instructor led course Explore several advanced topics of working with SharePoint 2013 sites. Topics include SharePoint Server site definitions (Business Intelligence, Document

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

EHR CURATION FOR MEDICAL MINING

EHR CURATION FOR MEDICAL MINING EHR CURATION FOR MEDICAL MINING Ernestina Menasalvas Medical Mining Tutorial@KDD 2015 Sydney, AUSTRALIA 2 Ernestina Menasalvas "EHR Curation for Medical Mining" 08/2015 Agenda Motivation the potential

More information

Sentiment Analysis. D. Skrepetos 1. University of Waterloo. NLP Presenation, 06/17/2015

Sentiment Analysis. D. Skrepetos 1. University of Waterloo. NLP Presenation, 06/17/2015 Sentiment Analysis D. Skrepetos 1 1 Department of Computer Science University of Waterloo NLP Presenation, 06/17/2015 D. Skrepetos (University of Waterloo) Sentiment Analysis NLP Presenation, 06/17/2015

More information

Discussion on Airport Business Intelligence System Architecture

Discussion on Airport Business Intelligence System Architecture Discussion on Airport Business Intelligence System Architecture WANG Jian-bo FAN Chong-jun FU Hui-gang Business School University of Shanghai for Science and Technology Shanghai 200093, P. R. China Abstract

More information

SINAI at WEPS-3: Online Reputation Management

SINAI at WEPS-3: Online Reputation Management SINAI at WEPS-3: Online Reputation Management M.A. García-Cumbreras, M. García-Vega F. Martínez-Santiago and J.M. Peréa-Ortega University of Jaén. Departamento de Informática Grupo Sistemas Inteligentes

More information

FOR IMMEDIATE RELEASE

FOR IMMEDIATE RELEASE FOR IMMEDIATE RELEASE Hitachi Developed Basic Artificial Intelligence Technology that Enables Logical Dialogue Analyzes huge volumes of text data on issues under debate, and presents reasons and grounds

More information

Search Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc

Search Engines. Stephen Shaw <stesh@netsoc.tcd.ie> 18th of February, 2014. Netsoc Search Engines Stephen Shaw Netsoc 18th of February, 2014 Me M.Sc. Artificial Intelligence, University of Edinburgh Would recommend B.A. (Mod.) Computer Science, Linguistics, French,

More information

Ensuring Security in Cloud with Multi-Level IDS and Log Management System

Ensuring Security in Cloud with Multi-Level IDS and Log Management System Ensuring Security in Cloud with Multi-Level IDS and Log Management System 1 Prema Jain, 2 Ashwin Kumar PG Scholar, Mangalore Institute of Technology & Engineering, Moodbidri, Karnataka1, Assistant Professor,

More information

CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING

CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING CAPTURING THE VALUE OF UNSTRUCTURED DATA: INTRODUCTION TO TEXT MINING Mary-Elizabeth ( M-E ) Eddlestone Principal Systems Engineer, Analytics SAS Customer Loyalty, SAS Institute, Inc. Is there valuable

More information

Tibetan-Chinese Bilingual Sentences Alignment Method based on Multiple Features

Tibetan-Chinese Bilingual Sentences Alignment Method based on Multiple Features , pp.273-280 http://dx.doi.org/10.14257/ijdta.2015.8.4.27 Tibetan-Chinese Bilingual Sentences Alignment Method based on Multiple Features Lirong Qiu School of Information Engineering, MinzuUniversity of

More information

DSS based on Data Warehouse

DSS based on Data Warehouse DSS based on Data Warehouse C_13 / 6.01.2015 Decision support system is a complex system engineering. At the same time, research DW composition, DW structure and DSS Architecture based on DW, puts forward

More information

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING

GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING MEDIA MONITORING AND ANALYSIS GRAPHICAL USER INTERFACE, ACCESS, SEARCH AND REPORTING Searchers Reporting Delivery (Player Selection) DATA PROCESSING AND CONTENT REPOSITORY ADMINISTRATION AND MANAGEMENT

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

IBM Social Media Analytics

IBM Social Media Analytics IBM Analyze social media data to improve business outcomes Highlights Grow your business by understanding consumer sentiment and optimizing marketing campaigns. Make better decisions and strategies across

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Content Problems of managing data resources in a traditional file environment Capabilities and value of a database management

More information

Social Media Implementations

Social Media Implementations SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Massive Cloud Auditing using Data Mining on Hadoop

Massive Cloud Auditing using Data Mining on Hadoop Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

Foundations of Business Intelligence: Databases and Information Management

Foundations of Business Intelligence: Databases and Information Management Foundations of Business Intelligence: Databases and Information Management Problem: HP s numerous systems unable to deliver the information needed for a complete picture of business operations, lack of

More information

Nagarjuna College Of

Nagarjuna College Of Nagarjuna College Of Information Technology (Bachelor in Information Management) TRIBHUVAN UNIVERSITY Project Report on World s successful data mining and data warehousing projects Submitted By: Submitted

More information

IBM Social Media Analytics

IBM Social Media Analytics IBM Social Media Analytics Analyze social media data to better understand your customers and markets Highlights Understand consumer sentiment and optimize marketing campaigns. Improve the customer experience

More information

SharePoint 2010 End User - Level II

SharePoint 2010 End User - Level II Course Outline Module 1: Overview A simple introduction module. Understand your course, classroom, classmates, facility and instructor. Module 2: Server Site Definitions In this module we will explore

More information

Beyond listening Driving better decisions with business intelligence from social sources

Beyond listening Driving better decisions with business intelligence from social sources Beyond listening Driving better decisions with business intelligence from social sources From insight to action with IBM Social Media Analytics State of the Union Opinions prevail on the Internet Social

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

TIM 50 - Business Information Systems

TIM 50 - Business Information Systems TIM 50 - Business Information Systems Lecture 15 UC Santa Cruz March 1, 2015 The Database Approach to Data Management Database: Collection of related files containing records on people, places, or things.

More information

Big Data Analytics for United Security

Big Data Analytics for United Security Big Data Analytics for United Security What Advantages Does an Agile Network Bring? (Issue 2) By Swift Liu, President Enterprise Networking Product Line Huawei Enterprise Business Group Agile means quick

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distributed Computing and Big Data: Hadoop and MapReduce Bill Keenan, Director Terry Heinze, Architect Thomson Reuters Research & Development Agenda R&D Overview Hadoop and MapReduce Overview Use Case:

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

Crowdsourcing Fraud Detection Algorithm Based on Psychological Behavior Analysis

Crowdsourcing Fraud Detection Algorithm Based on Psychological Behavior Analysis , pp.138-142 http://dx.doi.org/10.14257/astl.2013.31.31 Crowdsourcing Fraud Detection Algorithm Based on Psychological Behavior Analysis Li Peng 1,2, Yu Xiao-yang 1, Liu Yang 2, Bi Ting-ting 2 1 Higher

More information

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice

Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice Siemens Intelligence Platform Agenda Challenges Requirements Intelligence Tools System Aspects Summary 2 Did you ever wonder If the person flying into your country at a particular date every month is visiting

More information

Performance Evaluation On Human Resource Management Of China S Commercial Banks Based On Improved Bp Neural Networks

Performance Evaluation On Human Resource Management Of China S Commercial Banks Based On Improved Bp Neural Networks Performance Evaluation On Human Resource Management Of China S *1 Honglei Zhang, 2 Wenshan Yuan, 1 Hua Jiang 1 School of Economics and Management, Hebei University of Engineering, Handan 056038, P. R.

More information

KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE

KNOWLEDGE-BASED IN MEDICAL DECISION SUPPORT SYSTEM BASED ON SUBJECTIVE INTELLIGENCE JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 22/2013, ISSN 1642-6037 medical diagnosis, ontology, subjective intelligence, reasoning, fuzzy rules Hamido FUJITA 1 KNOWLEDGE-BASED IN MEDICAL DECISION

More information

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING

EFFICIENT DATA PRE-PROCESSING FOR DATA MINING EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College

More information

An Imbalanced Spam Mail Filtering Method

An Imbalanced Spam Mail Filtering Method , pp. 119-126 http://dx.doi.org/10.14257/ijmue.2015.10.3.12 An Imbalanced Spam Mail Filtering Method Zhiqiang Ma, Rui Yan, Donghong Yuan and Limin Liu (College of Information Engineering, Inner Mongolia

More information

Framework model on enterprise information system based on Internet of things

Framework model on enterprise information system based on Internet of things International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675

More information