Muhadith: A Cloud based Distributed Expert System for Classification of Ahadith
|
|
|
- Winfred Hall
- 9 years ago
- Views:
Transcription
1 th International Conference on Frontiers of Information Technology Muhadith: A Cloud based Distributed Expert System for Classification of Ahadith Kashif Bilal North Dakota State University, Fargo, ND, USA [email protected] Sajjad Mohsin COMSATS Institute of Information Technology, Islamabad, Pakistan [email protected] Abstract -- This paper presents a novel approach for the classification of the religious scriptures, the Hadith (sayings of Prophet Muhammad (plural Ahadith)). Muhadith is a distributed, Cloud based expert system that uses the Hadith science to classify Ahadith among 24 types from seven broad categories. Classification of the Hadith is a complex and sensitive task, and can only be performed by an expert of the Hadith sciences. Muhadith expert system is designed to imitate the Hadith experts for Hadith classification, and to enable a computer to behave like a Hadith expert to discriminate the authentic Ahadith from unauthentic ones. This paper presents the relationship and mapping of the expert system technology onto Hadith sciences, and technicalities involved in designing of the Muhadith expert system. We also propose solutions for the communicational and interoperability problems faced by the legacy web based distributed expert systems. We employ service oriented architecture to overcome the communicational problem and a candidature for the Software as a Service (SaaS) for the Cloud computing. The expert system also provides a reasoning facility that enables the user to look into the classification details. Muhadith expert system has been designed by merging the ideas from the domains of expert systems, Web technologies, and distributed computing systems. This type of an effort on the topic is rare and applying them in the domain of Hadith is our humble contribution. Keywords: Expert system, Cloud computing, Islam, Hadith I. INTRODUCTION Expert system is an intelligent system that utilizes the inference procedures and knowledge of the domain to solve problems that require significant expertise of a human expert for their solution [1, 2]. Expert systems are employed widely to solve the complex problem in multiple domains, such as medicine, disease identification, agriculture, power supply, and oil exploration [1]. Classification of Hadith is one of most required task for a Muslim, so that the authentic religious practices can be distinguished from the unauthentic ones. Classification of Hadith is a complex and sensitive task and can only be performed by an expert of Hadith sciences, as it involves huge knowledgebase and rules for the Hadith classification. With the advent of World Wide Web (WWW), many Web based expert system have been developed [5-10]. Web based expert system provide ease and pervasiveness of use. Distributed Expert Systems (DES) [11-15] are used to divide a complex problem in multiple sub-problems to solve the problems in parallel efficiently. Communication system is one of the foremost design concerns in DES [16, 17]. Conventional DES uses complex communication methods [12]. Muhadith is designed using Service Oriented Architecture (SOA). SOA is employed mainly to: (a) overcome the communicational problems faced by the legacy web based distributed expert systems [33, 35] and (b) enable the Muhadith for Cloud computing and Software as a Service (SaaS) [4]. It has been reported that SOA delivers the basic infrastructure for the successful cloud implementation [5]. Muhadith is a Cloud based, distributed expert system. Major modules of the Muhadith are: (a) inference engine, (b) knowledgebase, (c) parser and fact extractor, (d) distributor and combiner, (e) subinference modules, (f) explanation facility, and (g) database. Muhadith design and module details and explained in Section 3. Figure 1 presents the design of the Muhadith expert system. Muhadith is designed to extract facts from the provided data, apply Hadith rules on the extracted facts, and classify the Hadith among 24 types in seven classes. Muhadith also provides necessary reasoning for the classification. Major objectives in design of Muhadith are: Solve the identified communication problems of existing DES. Design rules for each class of Hadith, so that the application can act as a Hadith expert. Classification of Ahadith. Provide reasoning facility in expert system to find the cause for classification. Provide distributed infrastructure to process results efficiently. Provide multilingual architecture so that application can be localized /12 $ IEEE DOI /FIT
2 The rest of the paper is organized as follows. A discussion related to the domain knowledge is presented in Section 2. Design and the modules of the Muhadith are discussed in Section 3. Implementation details are discussed in Section 4, and the discussion is concluded in Section 4. II. DOMAIN BACKGROUND Hadith is defined as a tradition or the collection of the traditions of Muhammad, the Prophet of Islam, including his sayings and deeds, and his tacit approval of what was said or done in his presence [18]. Islam has two fundamental sources, Quran and Sunnah. It is agreed on that Quran is preserved in its real form, as narrated in Quran We have undoubtedly sent down the Reminder, and We will truly preserve it [19]. Sunnah of Prophet (PBUH) is also included in above promise by necessity, as a practical example of Quran implementation [20]. Quran cannot be understood correctly without Sunnah [20]. Companions of Prophet Muhammad and those coming after them has preserved Sunnah by memorizing, writing down, and then passing it, generation by generation to others [20]. Need for verification of chain of reporters arise, when people other than the companions started to narrate directly from the Prophet. A crucial reason for the verification was because of the different false sects that started the deliberate fabrication of Ahadith. So different scholars of Hadith (Muhaditheen) worked to collect Hadith knowledge and created strict rules for approval of Hadith. On the basis of these rules every Hadith can be checked and authentic Ahadith can be differentiated from the fabricated ones. Because of the complexity and massiveness of the related knowledge, only an expert of Hadith sciences can classify a Hadith. A normal person is unable to find whether the Hadith is authentic or unauthentic. A Hadith is composed of two parts, (a) text of the Hadith and (b) chain of the reporters. Authenticity of Hadith is checked by applying different rules on text of the Hadith and chain of reporters, known as Mustalahal-Hadith. Ahadith can be classified into seven major classes according to the: (a) Reference to a particular authority (ATR), (b) Links in the chain (ATL), (c) Number of Reporters (ATN), (d) Nature of text (ATNt), (e) Manner in which Hadith is reported (ATM), (f) to Hidden defect found in Isnad or text of Hadith (ATH), (g) Reliability and memory of reporters (ATR). Detailed discussion of these classes can be found in [2]. Muhadith uses the rules defined for these classes, and classifies the input Hadith in a sub-type of these classes along with the reason and explanation for classification. Muhadith can help experts of Hadith in taking decisions and also to a non-expert to understand that why a Hadith is said authentic and other as unauthentic. III. DESIGN OF MUHADITH Major modules of Muhadith are: (a) inference engine, (b) knowledgebase, (c) parser and fact extractor, (d) distributor and aggregator, (e) sub inference modules, (f) explanation facility, and (g) database. Muhadith provides a Web interface for the users to query the expert system. User s query is passed to the Web server. At Web server, query is parsed and required data is extracted from user s input. Extracted data is then sent to the fact extractor, which in turn connects the database to fetch the related information. The fact extractor extracts the facts from the information and these facts are then passed to distributor component, which in turn connects to six Web services to execute six sub-inference components in parallel. These six sub-inference components are developed for different classes of the Hadith. Each of these six sub-inference components deals with a specific class of Hadith. Each of these components has local inference capability and local knowledgebase. Each component connects to data provider to fetch specific facts from database. Each component is also attached with explanation module. This explanation module is used to explain the reason for the classification of Hadith to user. Every sub-inference components returns results to the combiner module that amalgamates and returns the results of all classes of Hadith to the user. Details for each module are as follows. A. Muhadith Inference Engine Muhadith inference engine possess dual interactivity. It interacts with the : (a) user query to extract the facts from the provided data, and (b) knowledgebase to fetch rules that can be applied on the extracted facts from the user. Inference engine is divided in following submodules. i) Parser and Facts Extractor Data provided by the user is passed to the parser module for parsing. User inputs the text of Hadith and may provide chain of the reporters. The chain of reporters is a string containing names of all the reporters and commonly used words in the chain. Parser extracts names of the reporters from the chain and passes the parsed information to the fact extraction module. The facts extraction module requires the information on the reporters to build and extract the facts for decision. Therefore, the facts extractor, prior to extracting facts, interacts with the facts provider module. The facts provider module is intended to provide the detailed information against the reporter s name. To find the reporters information, the fact provider interacts with the database and fetches the information on the reporters. 74
3 Figure 1: Design of Muhadith Expert System 75
4 This information is sent back to the fact extractor, which in turns extract required facts from the received information. ii) Distributor and Combiner The distributor module acts as a scheduler and distributes the facts to different sub-inference modules for processing and classification. The combiner module collects results and explanations from the sub-inference modules, arranges them in a presentable format, and passes all the information back to user. iii) Sub-inference Modules Scholars have categorized the Hadith in seven major classes based on various attributes [20]. In the Muhadith expert system, we have developed separate sub-inference modules for each of these classes. Each sub-inference module has its own local knowledgebase that contains rules. Every sub-inference module targets a specific class among the seven Hadith classes and has different rules and information. A sub-inference module receives the facts from the distributor. Each sub module can interact directly with the fact provider to find any module specific information from the database. Each sub-inference module also interacts with the explanation module for reasoning and explanation. After applying rules on available facts and interaction with explanation facility, each module returns the results to combiner. B. Muhadith Knowledgebase Muhadith is a rule-based expert system. Knowledge is represented in form of binary decision-tables, and rules are defined in form of IF THEN ELSE statements. A comparative study of IF THEN rules and a decisiontable is provided in [21]. As we have multiple classes of Hadith, so each class of the Hadith has separate knowledgebase. Each component has its own decisiontable and rules. General format for knowledgebase rules of Muhadith is as follow. <Rule Id>: <Rule Name> [COMMENT :< Comment text >] IF <condition>+ THEN <conclusion> IF <condition>+ THEN <conclusion> [ELSE] <Conclusion> END IF An example of the first rule for this knowledgebase is ATR1 : Marfu1 COMMENT: This is rule to identify a Marfu Hadith under According to Reference (ATR) class of Hadith IF (Prophet = yes) AND (Companion = yes) AND (Successor=yes) THEN CONCLUSION: Marfu END IF An example of decision-table for class According to Reference to a particular authority (ATR) and rules derived from it is shown in Table 1. Inference chaining diagram for the above class of Hadith is shown in figure 2. Hadith type ATR Table 1: Sample Decision-table for Muhadith Knowledge representation Prophet Companion Successor Marfu Words Quranic Reference Marfu NA NA Marfu NA Marfu NA Mauquf Maqtu NA 76
5 MatchMafu( words[], text) n i= 1 result = Substring( If ( result == 1) returnmarfu text, words[i]) Figure 2: Inference Chaining Diagram for According to Reference Class 77
6 Each class has its own decision-table, rules and inference chaining diagram. Because of the space constraints, we have provided the decision-table, rules and inference chaining diagram only for a single class named According to reference to a particular authority in the paper. C. Muhadith Explanation Module Explanation facility is used in expert systems to provide details to user regarding how and why a conclusion has been drawn [29]. Muhadith explanation facility is used to provide the details for classification of Hadith. IV. MUHADITH IMPLEMENTATION Muhadith is implemented as a SOA based Cloud expert system accessible through Web. Microsoft.NET is used as development platform. Programming languages used for Muhadith are C#.Net and Asp.Net. SQL server is used as database management system. Users can enter the Hadith using the Web interface. Input information is passed to the inference engine and results along with the explanation are returned back to the users. V. CONCLUSIONS A novel approach has been used to simplify and digitize the task of Hadith classification. Service Oriented Architecture (SOA) is used for Cloud computing compatibility, and to solve the communication problems faced by the legacy Web based distributed expert systems. Muhadith enables a layman having little knowledge of Hadith sciences to distinguish authentic Ahadith form unauthentic ones. Ahadith can be successfully classified along with explanation. Fabricated Ahadith can be easily distinguished from authentic ones. Some aspects of Hadith classification that depends on common sense are not covered by the Muhadith. Muhadith is heavily dependent on data of Ahadith and reporters. Our aim was not to build the Hadith and reporters database, rather our humble contribution was to provide a platform and infrastructure for the expert system. Moreover, we are also working to implement the Muhadith as SaaS for Cloud computing. REFERENCES 1. Y. Gao, Y. Liu, C. Wang, X. Li, G. Ou, Design and Evaluation of a High Performance Distributed Expert System (HPDES) for Aerospace Ground Verification System, Procedia Computer Science, Vol. 9, 2012, pp E. A. Feigenbaum, Knowledge engineering in 1980 s, Department of Computer Science, Stanford University, Stanford, CA. 3. M. El-Refaey and B. Rimal, Grid, SOA, and Cloud Computing: On-Demand Computing Models, Grid and Cloud Computing: Concepts, Methodologies, Tools and Applications. IGI Global, Fillmore Bowen, How SOA can ease your move to cloud computing, IBM Software Group, Y. Zeng, Y. Cai, P. Jia, H. Jee, Development of a webbased decision support system for supporting integrated water resources management in Daegu city, South Korea, Expert Systems with Applications, Vol. 39, No. 11, L. Sabucedo, L. Rifón, F. Corradini, B. Re, Knowledgebased platform for egovernment agents: A Web-based solution using semantic technologies, Expert Systems with Applications, Vol. 37, 2010, pp J. Huang, Y. Jou, L. Zhang, S. Wang, C. Huang, A web-based model for developing: A mold base design system, Expert Systems with Applications, Vol. 36, 2009, pp J. Tang and Q. Wang, Online fault diagnosis and prevention expert system for dredgers, Expert Systems with Applications, Vol. 34, 2008, pp F. Zetiana,, X. Fengb,, Z. Yunb,and Z. XiaoShuana, Pig-vet: a web-based expert system for pig disease diagnosis, Expert Systems with Applications, Vol. 29, 2005, pp V. Papic, N. Rogulj, V. Pleština, Identification of sport talents using a web-oriented expert system with a fuzzy module, Expert Systems with Applications, Vol. 36, 2009, pp J. Bardina andr. Thirumalainambi, A distributed web based expert system for launch operation, Proceedings of the 2005 Winter Simulation Conference, C. Zhang," The Design and Implementation of a Knowledge-Based Communication System in a Framework for Distributed Expert Systems ", IEEE Transactions on Communications, Vol. 43. No Y. Cheung, G. Hong, K. Ang, A dynamic project allocation algorithm for a distributed expert system, Expert Systems with Applications, Vol. 26, 2004, C. Lin, S. Lin, S. Horng, A parallelized DPPQN based Expert System method and implementation, Expert Systems with Applications, Vol. 37, 2010, pp E. Cardozo and S. Talukdar, "a distributed expert system for fault diagnosis", IEEE Transactions on Power Systems,Vol. 3, No M. Zhang,C. Zhang, Potential Cases, Methodologies,and Strategies of Synthesis of Solutions in Distributed Expert Systems, IEEE Transactions on Knowledge and Data Engineering, Vol. 11, No. 3, June G. Andrews and F. Schneider, Concepts and notations for concurrent programming, ACM Computing Surveys, Vol W. Graham, Divine Word and Prophetic Word in Early Islam, accessed Dec Al-Quran, Surah al-hijr, 15:9 20. S. Hassan, An Introduction to the Science of Hadith, Darussalam Riyadh, R. Halverson, An Empirical Investigation Comparing IF-THEN Rules and Decision Tables for Programming Rule-Based Expert Systems, Proceeding of the 26 th Hawaii International Conference on System Sciences. 78
Method of Fault Detection in Cloud Computing Systems
, pp.205-212 http://dx.doi.org/10.14257/ijgdc.2014.7.3.21 Method of Fault Detection in Cloud Computing Systems Ying Jiang, Jie Huang, Jiaman Ding and Yingli Liu Yunnan Key Lab of Computer Technology Application,
A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan
, pp.217-222 http://dx.doi.org/10.14257/ijbsbt.2015.7.3.23 A Framework for Data Warehouse Using Data Mining and Knowledge Discovery for a Network of Hospitals in Pakistan Muhammad Arif 1,2, Asad Khatak
INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS
INTEROPERABLE FEATURES CLASSIFICATION TECHNIQUE FOR CLOUD BASED APPLICATION USING FUZZY SYSTEMS * C. Saravanakumar 1 and C. Arun 2 1 Department of Computer Science and Engineering, Sathyabama University,
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING
EFFICIENT DATA PRE-PROCESSING FOR DATA MINING USING NEURAL NETWORKS JothiKumar.R 1, Sivabalan.R.V 2 1 Research scholar, Noorul Islam University, Nagercoil, India Assistant Professor, Adhiparasakthi College
Towards Cloud Factory Simulation. Abstract
Towards Cloud Factory Simulation 第 十 八 屆 決 策 分 析 研 討 會 Toly Chen Department of Industrial Engineering and Systems Management, Feng Chia University *[email protected] Abstract An important and practical
Cloud Computing Services and its Application
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 4, Number 1 (2014), pp. 107-112 Research India Publications http://www.ripublication.com/aeee.htm Cloud Computing Services and its
V&V and QA throughout the M&S Life Cycle
Introduction to Modeling and Simulation and throughout the M&S Life Cycle Osman Balci Professor Department of Computer Science Virginia Polytechnic Institute and State University (Virginia Tech) Blacksburg,
Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine
Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine 99 Fuzzy Knowledge Base System for Fault Tracing of Marine Diesel Engine Faculty of Computers and Information Menufiya University-Shabin
Multi-Tenant Engineering Architecture in SaaS
Multi-Tenant Engineering Architecture in SaaS Sunil Kumar Khatri Himanshu Singhal Khushboo Bahri ABSTRACT Multi-Tenancy in SaaS (Software as a Service) architecture is the concept leveraging cloud computing
Chapter 1: Introduction
Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases
Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1
, pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and
Expert System and Knowledge Management for Software Developer in Software Companies
Expert System and Knowledge Management for Software Developer in Software Companies 1 M.S.Josephine, 2 V.Jeyabalaraja 1 Dept. of MCA, Dr.MGR University, Chennai. 2 Dept.of MCA, Velammal Engg.College,Chennai.
An Approach Towards Customized Multi- Tenancy
I.J.Modern Education and Computer Science, 2012, 9, 39-44 Published Online September 2012 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2012.09.05 An Approach Towards Customized Multi- Tenancy
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges
Managing Cloud Server with Big Data for Small, Medium Enterprises: Issues and Challenges Prerita Gupta Research Scholar, DAV College, Chandigarh Dr. Harmunish Taneja Department of Computer Science and
http://www.paper.edu.cn
5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission
Dr. Anuradha et al. / International Journal on Computer Science and Engineering (IJCSE)
HIDDEN WEB EXTRACTOR DYNAMIC WAY TO UNCOVER THE DEEP WEB DR. ANURADHA YMCA,CSE, YMCA University Faridabad, Haryana 121006,India [email protected] http://www.ymcaust.ac.in BABITA AHUJA MRCE, IT, MDU University
A Framework for Data Migration between Various Types of Relational Database Management Systems
A Framework for Data Migration between Various Types of Relational Database Management Systems Ahlam Mohammad Al Balushi Sultanate of Oman, International Maritime College Oman ABSTRACT Data Migration is
Remote Sensitive Image Stations and Grid Services
International Journal of Grid and Distributed Computing 23 Remote Sensing Images Data Integration Based on the Agent Service Binge Cui, Chuanmin Wang, Qiang Wang College of Information Science and Engineering,
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
DBaaS Using HL7 Based on XMDR-DAI for Medical Information Sharing in Cloud
, pp.111-120 http://dx.doi.org/10.14257/ijmue.2015.10.9.12 DBaaS Using HL7 Based on XMDR-DAI for Medical Information Sharing in Cloud Ho-Kyun Park 1 and Seok-Jae Moon 2 1 School of IT Convergence Engineering,
ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM
Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.
Establishment of Fire Control Management System in Building Information Modeling Environment
Establishment of Fire Control Management System in Building Information Modeling Environment Yan-Chyuan Shiau 1, Chong-Teng Chang 2 Department of Construction Management, Chung Hua University, 707, Wu-Fu
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency
Fault Localization in a Software Project using Back- Tracking Principles of Matrix Dependency ABSTRACT Fault identification and testing has always been the most specific concern in the field of software
Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing
Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
A Survey on Product Aspect Ranking
A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,
Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking
Business Intelligence through Hybrid Intelligent System Approach: Application to Retail Banking Rajendra M Sonar, Asst Professor (IT), SJM School of Management, Indian Institute of Technology Bombay Powai,
Capability Service Management System for Manufacturing Equipments in
Capability Service Management System for Manufacturing Equipments in Cloud Manufacturing 1 Junwei Yan, 2 Sijin Xin, 3 Quan Liu, 4 Wenjun Xu *1, Corresponding Author School of Information Engineering, Wuhan
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud
Secure Alternate Viable Technique of Securely Sharing The Personal Health Records in Cloud K.S. Aswathy 1, G. Venifa Mini 2 1 M.E. Student, 2 Assistant Professor, Computer Science and Engineering, Noorul
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA
SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. [email protected] Mrs.
The Application and Development of Software Testing in Cloud Computing Environment
2012 International Conference on Computer Science and Service System The Application and Development of Software Testing in Cloud Computing Environment Peng Zhenlong Ou Yang Zhonghui School of Business
Context Model Based on Ontology in Mobile Cloud Computing
Context Model Based on Ontology in Mobile Cloud Computing Changbok Jang, Euiin Choi * Dept. Of Computer Engineering, Hannam University, Daejeon, Korea [email protected], [email protected] Abstract.
An Efficient Cost Calculation Mechanism for Cloud and Non Cloud Computing Environment in Java
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.31 An Efficient Cost Calculation Mechanism
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Log Mining Based on Hadoop s Map and Reduce Technique
Log Mining Based on Hadoop s Map and Reduce Technique ABSTRACT: Anuja Pandit Department of Computer Science, [email protected] Amruta Deshpande Department of Computer Science, [email protected]
[Rokadiya,5(4): October-December 2015] ISSN 2277 5528 Impact Factor- 3.145
INTERNATIONALJOURNALOFENGINEERING SCIENCES&MANAGEMENT A MODEL FOR WEB BASED APPLICATION USING MANUAL AND AUTOMATED TESTING TECHNIQUES AND ALSO STUDY FAULTS, THEIR EFFECTS AND TESTING CHALLENGES IN WEB
APPLYING CASE BASED REASONING IN AGILE SOFTWARE DEVELOPMENT
APPLYING CASE BASED REASONING IN AGILE SOFTWARE DEVELOPMENT AIMAN TURANI Associate Prof., Faculty of computer science and Engineering, TAIBAH University, Medina, KSA E-mail: [email protected] ABSTRACT
Data Mining Governance for Service Oriented Architecture
Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY [email protected] Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,
Cloud Database Storage Model by Using Key-as-a-Service (KaaS)
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 7 July 2015, Page No. 13284-13288 Cloud Database Storage Model by Using Key-as-a-Service (KaaS) J.Sivaiah
Adopting Hadith Verification Techniques in to Digital Evidence Authentication
Journal of Computer Science 6 (6): 613-618, 2010 ISSN 1549-3636 2010 Science Publications Adopting Hadith Verification Techniques in to Digital Evidence Authentication Yunus Yusoff, Roslan Ismail and Zainuddin
IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource Virtualization
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore IMAV: An Intelligent Multi-Agent Model Based on Cloud Computing for Resource
A Framework of Personalized Intelligent Document and Information Management System
A Framework of Personalized Intelligent and Information Management System Xien Fan Department of Computer Science, College of Staten Island, City University of New York, Staten Island, NY 10314, USA Fang
Towards Privacy aware Big Data analytics
Towards Privacy aware Big Data analytics Pietro Colombo, Barbara Carminati, and Elena Ferrari Department of Theoretical and Applied Sciences, University of Insubria, Via Mazzini 5, 21100 - Varese, Italy
Component Approach to Software Development for Distributed Multi-Database System
Informatica Economică vol. 14, no. 2/2010 19 Component Approach to Software Development for Distributed Multi-Database System Madiajagan MUTHAIYAN, Vijayakumar BALAKRISHNAN, Sri Hari Haran.SEENIVASAN,
A QoS-Aware Web Service Selection Based on Clustering
International Journal of Scientific and Research Publications, Volume 4, Issue 2, February 2014 1 A QoS-Aware Web Service Selection Based on Clustering R.Karthiban PG scholar, Computer Science and Engineering,
The Power Marketing Information System Model Based on Cloud Computing
2011 International Conference on Computer Science and Information Technology (ICCSIT 2011) IPCSIT vol. 51 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V51.96 The Power Marketing Information
Fault Analysis in Software with the Data Interaction of Classes
, pp.189-196 http://dx.doi.org/10.14257/ijsia.2015.9.9.17 Fault Analysis in Software with the Data Interaction of Classes Yan Xiaobo 1 and Wang Yichen 2 1 Science & Technology on Reliability & Environmental
The WAMS Power Data Processing based on Hadoop
Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore The WAMS Power Data Processing based on Hadoop Zhaoyang Qu 1, Shilin
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of
IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD
Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated
Master of Science Service Oriented Architecture for Enterprise. Courses description
Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,
A Novel Switch Mechanism for Load Balancing in Public Cloud
International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) A Novel Switch Mechanism for Load Balancing in Public Cloud Kalathoti Rambabu 1, M. Chandra Sekhar 2 1 M. Tech (CSE), MVR College
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING
TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING Sunghae Jun 1 1 Professor, Department of Statistics, Cheongju University, Chungbuk, Korea Abstract The internet of things (IoT) is an
DESIGN OF AN ONLINE EXPERT SYSTEM FOR CAREER GUIDANCE
DESIGN OF AN ONLINE EXPERT SYSTEM FOR CAREER GUIDANCE S. Saraswathi 1, M. Hemanth Kumar Reddy 2, S. Udaya Kumar 3, M. Suraj 4, Sk. Khaja Shafi 5 1 Professor, Information Technology, Pondicherry Engineering
Requirement Engineering in Service-Oriented Architecture
2012 International Conference on Networks and Information (ICNI 2012) IPCSIT vol. 57 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V57.19 Requirement Engineering in Service-Oriented Architecture
Big Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades
Blog Post Extraction Using Title Finding
Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School
Near Sheltered and Loyal storage Space Navigating in Cloud
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata
Monitoring Performances of Quality of Service in Cloud with System of Systems
Monitoring Performances of Quality of Service in Cloud with System of Systems Helen Anderson Akpan 1, M. R. Sudha 2 1 MSc Student, Department of Information Technology, 2 Assistant Professor, Department
Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved
Indian Journal of Science The International Journal for Science ISSN 2319 7730 EISSN 2319 7749 2016 Discovery Publication. All Rights Reserved Perspective Big Data Framework for Healthcare using Hadoop
Semantic Model based on Three-layered Metadata for Oil-gas Data Integration
Semantic Model based on Three-layered Metadata for Oil-gas Data Integration School of Computer & Communication Engineering, Beijing University of Science and Technology, 100083 Beijing, China e-mail:[email protected],
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.707 A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource
An Agent-Based Concept for Problem Management Systems to Enhance Reliability
An Agent-Based Concept for Problem Management Systems to Enhance Reliability H. Wang, N. Jazdi, P. Goehner A defective component in an industrial automation system affects only a limited number of sub
A Mind Map Based Framework for Automated Software Log File Analysis
2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
Trust Model to Enhance Security and Interoperability of Cloud Environment
Trust Model to Enhance Security and Interoperability of Cloud Environment Wenjuan Li 1,2 and Lingdi Ping 1 1 College of Computer Science and Technology, Zhejiang University, Hangzhou, Zhejiang 310058,
A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture
, March 12-14, 2014, Hong Kong A Framework for the Design of Cloud Based Collaborative Virtual Environment Architecture Abdulsalam Ya u Gital, Abdul Samad Ismail, Min Chen, and Haruna Chiroma, Member,
A Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic
Knowledge Based System for Detection and Prevention of DDoS Attacks using Fuzzy logic Amit Khajuria 1, Roshan Srivastava 2 1 M. Tech Scholar, Computer Science Engineering, Lovely Professional University,
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA
A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,
Resource Management In Cloud Computing With Increasing Dataset
Resource Management In Cloud Computing With Increasing Dataset Preeti Agrawal 1, Yogesh Rathore 2 1 CSE Department, CSVTU, RIT, Raipur, Chhattisgarh, INDIA Abstract In this paper we present the cloud computing
Search Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
Comparative Study of Automated testing techniques for Mobile Apps
Comparative Study of Automated testing techniques for Mobile Apps Anureet Kaur, Dr.Kulwant Kaur, Amritpal Singh Ph.D., Research Scholar, PTU, Jalandhar(India), Dean and Asst Prof, Apeejay Institute of
COMBINE DIFFERENT TRUST MANAGEMENT TECHNIQUE: RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE. B.Brithi #1, K. Kiruthikadevi *2
COMBINE DIFFERENT TRUST : RECOMMENDATIONAND REPUTATION IN CLOUD SERVICE B.Brithi #1, K. Kiruthikadevi *2 1 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology, Erode.
Figure 1. The cloud scales: Amazon EC2 growth [2].
- Chung-Cheng Li and Kuochen Wang Department of Computer Science National Chiao Tung University Hsinchu, Taiwan 300 [email protected], [email protected] Abstract One of the most important issues
Migrating Legacy Software Systems to CORBA based Distributed Environments through an Automatic Wrapper Generation Technique
Migrating Legacy Software Systems to CORBA based Distributed Environments through an Automatic Wrapper Generation Technique Hyeon Soo Kim School of Comp. Eng. and Software Eng., Kum Oh National University
ENHANCED AUTONOMIC NETWORKING MANAGEMENT ARCHITECTURE (ENAMA) Asif Ali Laghari*, Intesab Hussain Sadhayo**, Muhammad Ibrahim Channa*
ENHANCED AUTONOMIC NETWORKING MANAGEMENT ARCHITECTURE (ENAMA) Asif Ali Laghari*, Intesab Hussain Sadhayo**, Muhammad Ibrahim Channa* ABSTRACT A Computer Network which automatically configures itself and
Development of a Network Configuration Management System Using Artificial Neural Networks
Development of a Network Configuration Management System Using Artificial Neural Networks R. Ramiah*, E. Gemikonakli, and O. Gemikonakli** *MSc Computer Network Management, **Tutor and Head of Department
PHP Web Authoring for Database Management based on MVC Pattern
, October 19-21, 2011, San Francisco, USA PHP Web Authoring for Database Management based on MVC Pattern Chanchai Supaartagorn Abstract Nowadays, the MVC pattern is the effective method for the development
Enabling Public Auditing for Secured Data Storage in Cloud Computing
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 5 (May. 2013), V3 PP 01-05 Enabling Public Auditing for Secured Data Storage in Cloud Computing 1 Er.Amandeep Kaur,
A Framework for Developing the Web-based Data Integration Tool for Web-Oriented Data Warehousing
A Framework for Developing the Web-based Integration Tool for Web-Oriented Warehousing PATRAVADEE VONGSUMEDH School of Science and Technology Bangkok University Rama IV road, Klong-Toey, BKK, 10110, THAILAND
Introduction to Shariah (part 2 of 2)
Introduction to Shariah (part 2 of 2) Description: The lessons cover the basics of Shariah and fiqh that are necessary to understand the workings of Islamic rules and regulations. By C. Mofty ( 2013 NewMuslims.com)
A Framework for Software Architecture Visualization and Evaluation
A Framework for Software Architecture Visualization and Evaluation Dr. S. Margret Anouncia Merin Cherian Anubhuti Parija Professor, M.S Software Engg M.S Software Engg School of Computing Sciences VITU,
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications
Comparison of Request Admission Based Performance Isolation Approaches in Multi-tenant SaaS Applications Rouven Kreb 1 and Manuel Loesch 2 1 SAP AG, Walldorf, Germany 2 FZI Research Center for Information
Research on Storage Techniques in Cloud Computing
American Journal of Mobile Systems, Applications and Services Vol. 1, No. 1, 2015, pp. 59-63 http://www.aiscience.org/journal/ajmsas Research on Storage Techniques in Cloud Computing Dapeng Song *, Lei
TIME AND ATTENDANCE MANAGEMENT WEB
I N F I N I T Y Z U C C H E T T I TIME AND ATTENDANCE MANAGEMENT WEB TIME AND ATTENDANCE MANAGEMENT WEB The first ever entirely web-based attendance management application Time and Attendance Management
SPATIAL DATA CLASSIFICATION AND DATA MINING
, pp.-40-44. Available online at http://www. bioinfo. in/contents. php?id=42 SPATIAL DATA CLASSIFICATION AND DATA MINING RATHI J.B. * AND PATIL A.D. Department of Computer Science & Engineering, Jawaharlal
