IOSR Journal of Computer Engineering (IOSR-JCE)

July - Aug 2014 Volume 16 - Issue 4

Version 1 Version 2 Version 3 Version 4 Version 5 Version 6 Version 7

Paper Type : Research Paper
Title : Six Sigma and CMMI
Country : India
Authors : Neema Merlin Rodrigues, Anasuya K Lingappa
: 10.9790/0661-16410105     logo
Abstract: Quality is essential in every walks of life and in all business for their success and profitability. There are many quality improvement initiatives and they are doing their part well. The startups and initial organizations have to decide on which quality model to choose for their improvement and sustainability. CMMI has proved itself good in providing a proper infrastructure for the organizations. But it can be implemented in long term and is not useful in short term projects. Six Sigma can be applied in any field and has a statistical background. Integrating these two according to the need of the organization would give fast and sustainable success.
Keywords: Capability Maturity Model Integrated (CMMI), Six Sigma

[1] Stefan Wagner, Klaus Lochmann, Sebastian Vinter, Andrew Goeb, Michael Klaes, "Quality Models in Practice : A Preliminary Analysis"
[2] Rodney McAdam, Frances Fulton, "The impact of the ISO 9000:2000 quality standards in small software firms", Emerald Insight, 2002
[3] Zhedan Pan, et al., "A six sigma framework for software process improvements and its implementation", 14th Asia-Pacific Software Engineering Conference
[4] Tommy Y Lo, "Quality culture : A product of motivation within organization", Emerald - Managerial Auditing Journal, 2002
[5] Dr. Santwana Chaudhuri, "Knowledge Management in Indian IT Industries", 3rd international conference on information and financial engineering, 2011

Paper Type : Research Paper
Title : Neighbor-based Data Weight Collaborative Filtering
Country : China
Authors : Xuesong Yin, Jie Yu, Rongrong Jiang
: 10.9790/0661-16410610     logo
Abstract : Existing Collaborative Filtering (CF) based recommendation approaches suffer from the following issues: (1) the number of resources accessed and evaluated by each user is only such a very small part that leads to sparse rating matrix; (2) dynamic change of user interest makes recommended resources largely deviate from the need of the user. To address these problems, we develop a novel algorithm titled as neighborbased data weight CF recommendation of learning resources (NARR). Firstly, the neighbor of the user or the neighbor of the resource is selected in terms of the rating matrix; secondly, we compute data weight for representing dynamic change of user interest; finally, we use neighbor relationship and data weight in the objective of CF-based algorithm to choose learning resources. Experiments results show the feasibility and effectiveness of the proposed method.
Keywords: Collaborative Filtering, Data Weight, Similarity, Data Sparseness

[1] J. Bobadilla, F. Serradilla, A. Hernando, MovieLens, "Collaborative filtering adapted to recommender systems of e-learning", Knowledge-Based Systems, vol. 22, pp. 261-265, March 2009.
[2] J. Bobadilla, A. Hernando, F. Ortega, J. Bernal, "A framework for collaborative filtering recommender systems", Expert Systems with Applications, vol. 38, pp. 14609-14623, 2011.
[3] M. Wu, C. Chang, R. Liu, "Integrating content-based filtering with collaborative filtering using co-clustering with augmented matrices", Expert Systems with Applications, vol. 41, no. 6, pp. 2754-2761, 2014.
[4] A. Bilge, H. Polat, "A comparison of clustering-based privacy-preserving collaborative filtering schemes", Applied Soft Computing, vol. 13, no. 5, pp. 2478-2489, 2013.
[5] C. Birtolo, D. Ronca, "Advances in Clustering Collaborative Filtering by means of Fuzzy C-means and trust", Expert Systems with Applications, vol. 40, no. 17, pp. 6997-7009, 2013.

Paper Type : Research Paper
Title : Removing Atmospheric Turbulence Using Restoration Algorithm
Country : India
Authors : Vani.M, Shruthi.M.K
: 10.9790/0661-16411117     logo
Abstract: It remains a challenge to simultaneously remove geometric distortion and space-time-varying blur in frames captured through a turbulent atmospheric medium. To solve, or to reduce these effects, we proposed a new approach in this paper for restoring a single high-quality image from a given image sequence distorted by atmospheric turbulence. This approach is used to reduce the space and time-varying deblurring problem to a shift invariant one. First we use a B-spline based non-rigid image registration algorithm to register each observed frame with respect to a reference image and it also suppresses geometric deformation. Next approach is image stitching algorithm in that the frames are stitched together using an edge-correlation algorithm. Finally, a sharpening high-pass filter is applied to the final image to generate a final high-quality output. This approach can effectively alleviate blur and distortions, recover details of the scene, and significantly improve visual quality

[1] W.E.K. Middleton, Vision through the Atmosphere. Univ.of Toronto Press 1958.
[2] M.C. Roggemann and B.M. Welsh, Imaging through Turbulence. CRC Press, 1996.
[3] D.Li, R.M. Mersereau, and S. Simske, "Atmospheric Turbulence- Degraded Image Restoration Using Principal Components
Analysis," IEEE Geoscience and Remote Sensing Letters, vol. 4, no. 3, pp. 340-344, July 2007.
[4] R.N. Tubbs, "Lucky Exposures: Diffraction Limited Astronomical Imaging through the Atmosphere," PhD thesis, Cambridge Univ,
Sept. 2003.
[5] M.A. Vorontsov and G.W. Carhart, "Anisoplanatic Imaging through Turbulent Media: Image Recovery by Local Information
Fusion from a Set of Short-Exposure Images," J. Optical Soc. Am. A, vol. 18, no. 6, pp. 1312-1324, June 2001.
[6] X. Zhu and P. Milanfar, "Image Reconstruction from Videos Distorted by Atmospheric Turbulence," Proc. SPIE Electronic
Imaging Conf. Visual Information Processing and Comm., Jan. 2010.

Paper Type : Research Paper
Title : Effect of Thermal Radiation on Unsteady Gravity Flow of a Power-Law Fluid with Viscous Dissipation through a Porous Medium
Country : Nigeria
Authors : A.W. Ogunsola, B.A. Peter
: 10.9790/0661-16411823     logo

Abstract: In this work, we studied the effect of thermal radiation on unsteady gravity flow of a power-law fluid with viscous dissipation through a porous medium. The modified Darcy's law is considered together with the equation of energy transfer in such media. It is assumed that the viscosity is temperature-dependent. We transformed the governing partial differential equations into ordinary differential equations in terms of a suitable similarity variable. We employed Galerkin weighted residual method to solve the resulting non-linear equations. The results show the effects of thermal radiation parameter and other physical parameters involve in the system of flow.

Keywords: Unsteady gravity flow, weighted residual method, Power-law fluid and thermal radiation

[1] Kumar, B. and Prasad (2014): Pulsatile flow through a porous medium. J. of Appl. Fluid Mech.,Vol.7,No.1,pp63-74,2014.
[2] Vajravelu, K, Prasad, K.V. Santh, S.R. and Umesh,V. (2014): Fluid flow and heat transfer over a permeable stretching cylinder. J.
of Applied Fluid Mech.,Vol.7,No.1,pp 111-120,2014.
[3] Salem, A.M. (2013):The effects of variable viscosity, viscous dissipation and chemical reaction on heat and mass transfer flow of
MHD micropolar fluid along a permeable stretching sheet in a non-Darcian porous medium. Journal of Mathematical Problems in
[4] GitimaPatowanj (2012): Effect of variable viscosity and thermal conductivity of micro polar fluid in a porous channel in the
presence of magnetic field. Int. J. of Basic Sciences and Social Sciences , Vol.3, pp.69-77.
[5] Rafael CortellBataller (2008): Unsteady gravity flows of a power- law fluid through a porous medium. Applied Maths.and
Computation 196 pp356-362.

Paper Type : Research Paper
Title : Numerical Solution of unsteady gravity flow of power-law fluids through a porous medium
Country : Nigeria
Authors : A.W. Ogunsola, B. A. Peter
: 10.9790/0661-16412431     logo
Abstract: In this paper, we present a numerical study of the rheological behaviour effect of non-Newtonian, power-law fluids on the unsteady gravity flow through a porous medium. The governing equations are derived and similarity solutions are determined. The finite difference method is employed to obtain solution of the nonlinear problem. The results show the existence of traveling waves. It is assumed that the viscosity is temperature dependent. We investigate the effects of velocity on the temperature field. We investigate the effect of the power-law viscosity index, and the results were discussed.
Keywords: Unsteady gravity flow; Porous media; Non – Newtonian power- law fluids and Finite difference method.

[1] B. A. Peter and R.O.Ayeni(2011): A note on unsteady temperature equation for gravity flow of a power -law fluids through a
porous medium. Journal of the Nigerian Association of Mathematical Physics (NAMPS). Vol.18, pp 181-186.
[2] R. Cortell Bataller (2008): Unsteady gravity flows of a power-law fluid through a porous medium. Applied Mathematics and
Computation. 196, pp356-362.
[3] B.I.Olajuwon and R.O.Ayeni(2004):Flow of a power-law fluid with memory past an infinite plate. Journal of the Nigerian
Association of Mathematical Physics (NAMPS). Vol.8, pp 161.
[4] J.P. Pascal and H. Pascal (1993): Similarity solutions to some gravity flows of non-Newtonian fluids through a porous medium, Int.
J. Non-Linear Mech. 38, pp 157 – 167.
[5] B.A.Peter and R.O.Ayeni(2011): Analytical solution of unsteady gravity flow of a power -law fluids through a porous medium.
Journal of the Nigerian Association of Mathematical Physics (NAMPS), Vol.19 pp 223-228

Paper Type : Research Paper
Title : Enhanced Adaptive Acknowledgement method for detecting malicious nodes in MANETs
Country : India
Authors : Akshatha.Y, Dr Rashmi M.Jogdand
: 10.9790/0661-16413238     logo

Abstract: Mobile Ad hoc Network is a collection of mobile nodes that communicate with each other without base station. These networks are developed instantly or on-demand when some nodes come in the mobility range of each other and decide to cooperate for data transfer and communication. MANETs are more vulnerable to various types of attacks due to its deployment nature. The security in the mobile ad hoc network is very hard to achieve because of its fundamental characteristics such as dynamic topology, open medium, limited power, limited bandwidth and remote transmission. The prevention mechanisms like cryptography or authentication alone cannot detect malicious nodes in Ad-hoc networks. Hence we propose and implement a new intrusion detection system named Enhanced Adaptive Acknowledgement method specially designed for MANETs. Using MRA scheme, this method is capable of detecting malicious nodes even in the presence of false misbehavior report. Compared to other detection methods, this method is capable of detecting high malicious nodes and hence increases the security and network performances.
Keywords: Mobile ad-hoc network, Intrusion detection system, Enhanced Adaptive Acknowledgement, AODV, MD5 hash algorithm.

[1] EAACK – A Secure Intrusion Detection System for MANETs Elhadi M. Shakshuki, Senior Member, IEEE, Nan Kang and
Tarek R. Sheltami, Member, IEEE
[2] Investigating Intrusion and Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes Marjan
Kuchaki Rafsan,Ali Movaghar and Faroukh Koroupi,World Academic of Science Engineering and Technology 44 2008.
[3] L. Zhou, Z.J. Haas, Cornell Univ., "Securing ad hoc networks," IEEE Network, Nov/Dec 1999.
[4] [5] S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th
Annu. Int. Conf. Mobile Comput. Netw., Boston, MA, 2000, pp. 255–265.
[5] "A study of different types of attacks on multicast in mobile ad hoc networks" Hoang Lan Nguyen, Uyen Trang Nguyen,
Elsevier AdHoc Networks(2008) 32-46. [7] D. Johnson and D. Maltz, "Dynamic Source Routing in ad hoc wireless
networks," in Mobile computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181.

Paper Type : Research Paper
Title : Auto-Scaling, Load Balancing and Monitoring As service in public cloud
Country : India
Authors : Gopal Dhaker, , Dr. Savita Shiwani
: 10.9790/0661-16413946     logo
Abstract: Cloud computing[1][2][3] word has changed the classical computing environment in IT industries. it is most emerging & popular technology in IT & research field because of its great feature such as virtualization and on-demand resource allocating (dynamic) . Now - a – days because of increased use of internet the associate resource are increasing rapidly resulting generation of high work load. To provide the reliable service to client with QOS[5 ] the load balancing mechanism is necessary in cloud environment, to prevent system from overloading and crash an autoscaling mechanism must also be provided according to the application and incoming user traffic. load balancing mechanism provides the distribution of load among one or more nodes of cloud system, for efficient service model autoscaling feature also enabled with the load balancer to handle the excess load. Auto scaling scaled-up and scaled down the platform dynamically according to the clients incoming traffic this save money and physical resources. Latency based routing is the new concept in cloud computing which provide the load balancing based on DNS latency to global client by mapping domain name system (DNS) [10 )through the different hosted zone .provide the load balancing based on geographical service region. To achieve above mentioned we use the public cloud services such as amazons'EC2. ELB. This research is divided in four part such as: i) load balancing ii) auto scaling iii)latency based routing iv) resource monitoring . while discussing each topic in detailed we will implement the individual service and test while providing load from external software tool putty we will produce result for efficient load balancing.
Keywords: load balancing, autoscaling, latency based routing, resource monitoring, cloud computing.

[1] Eddy Caron: Auto-Scaling, Load Balancing and Monitoring in Commercial and Open-Source Clouds
[2] Miss.Rudra Koteswaramma : Client-Side Load Balancing and Resource Monitoring in Cloud , ISSN: 2248-9622
[3] N. Ajith Singh, M. Hemalatha, "An approach on semi distributed load balancing algorithm for cloud computing systems" International Journal of Computer Applications Vol-56 No.12 2012.
[4] Nitika, Shaveta, Gaurav Raj, International Journal of advanced research in computer engineering and technology Vol-1 issue-3 May-2012
[5] Zenon Chaczko, Venkatesh Mahadevan, Shahrzad Aslanazadeh, and Christopher, IPCSIT Vol-14, IACSIT Press Singapore 2011
[6] Ali M. Alakeel, A Guide to Dynamic Load Balancing in Distributed
[7] Ali M. Alakeel, A Guide to Dynamic Load Balancing in Distributed Computer Systems, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.6, June 2010.

Paper Type : Research Paper
Title : Evaluate the Effectiveness of Test Suite Prioritization Techniques Using APFD Metric
Country : India
Authors : Mr. Anil Mor
: 10.9790/0661-16414751     logo
Abstract: Regression testing is a testing activity that is performed to provide confidence that changes do not harm the existing behavior of the software. Test suites tend to grow in size as software evolves often making it too costly to execute entire test suites. To reduce the cost of regression testing, test cases are prioritized. One goal of test case prioritization technique is to increase a test suite's rate of fault detection and to reduce the cost of regression testing. We have provided a metric Average Percentage of Fault Detected (APFD), for measuring rate of fault detection during prioritization. APFD is also being used in its mutant form as APFDc, APFDp, ASFD, WPFD, TSFD, APBC, APDC, APSC, NAPFD, APMC, TPFD, APRC and BPFG. This paper presents a review of all metrics used for assessing the rate of fault detection of prioritized test cases based on coverage criteria for the various prioritization techniques.
Keywords: Regression Testing, Test case prioritization, Average Percentage of Fault Detection (APFD), APFD Metric

[1] Elbaum, S. G., Malishevaky, A. G., & Rothermel, G. (2002). Test Case Prioritization: A Family of Emperical Studies. IEEE Transaction on Software Engineering .
[2] Elbaum, S., Gable, D., & Rothermel, G. (2001). Understanding and Measuring the Sources of Variation in the Prioritization of Regression Test Suites. International Software Metrics Symposium.
[3] G, R., R, U., C., C., & M.J., H. (2001). Prioritization for Regression Testing. IEEE Transation for Software Engineering .
[4] H, D., & G, R. (2006). On the Use of Mutation Faults in Emperical Assesment of Test Case Prioritization Techniques. IEEE Transaction of Software Engineering .
[5] Hou, S. S., Zhang, L., Xie, T., & Sun, J. S. (2008). Quota-Constrained Test Case Prioritization for Regression Testing of Service Centric Systems. IEEE International Conference on Software Maintenance (ICSM 2008).

Paper Type : Research Paper
Title : Comparing Ethernet and Soft RoCE for MPI Communication
Country : India
Authors : Gurkirat Kaur, Manoj Kumar, Manju Bala
: 10.9790/0661-16415258     logo
Abstract: RDMA has pleasant consideration in the late 1990 when the Virtual Interface Architecture was introduced. This growth has accelerated with the introduction of Open Fabrics Alliance's (OFA's) Verb Interface. The stability & independence of OFA verb interface facilitated significant growth of software applications that exploit the benefits of RDMA. RoCE is an emerging trend that can be made to work on the Ethernet infrastructures. In this paper, we evaluate the Linux cluster, having multi nodes with fast interconnects i.e. Gigabit Ethernet & Soft RoCE and evaluates its performance using IMB and OSU Micro Benchmarks. A comparison between the IMB and OSU Micro benchmark is done and our results shows that IMB Benchmark is performing better in case of collective Benchmark class as OSU Micro benchmark is performing better in other classes of benchmark.
Keywords: Ethernet, RDMA, RoCE, Soft RoCE

[1] Basem Madani, raed al-Shaikh, "Performance Benchmark and MPI Evaluation Using Westmere based Infiniband HPC cluster", IJSSST, Volume 12, Number 1, page no 20-26, Feb. 2011
[2] Jalel Chergui, Isabelle Dupays, Denis Girou, Pierre-FrancoisLavallee, dimitri Lecas, Philippe Wautelet, "Message Passing Interface (MPI)", May 2013.
[3] (2013), The Wikipedia Website.[Online] available at:
[4] (2013), The System Fabrics Works Website, [Online] Available at over-converged-ethernet-roce
[5] (2002-2014), The mvapich website. [Online] available at

Paper Type : Research Paper
Title : Fast Remote data access for control of TCP/IP network using android Mobile device
Country : India
Authors : Vaibhav Muddebihalkar, R.M. Goudar
: 10.9790/0661-16415964     logo

Abstract: In today's world most of the mobile have the use more than its basic functionality. As mobile becomes more advance to be have same architecture same as desktop system. Hence this feature should be used as to create application that controls the desktop nodes in the network with help of client server architecture. This paper purpose x The application connects the system node by server and server connects to android mobile which will easy to control network from any mobile place. The application having functionality to capture a screenshot of client node to know the state of system which will have to capture picture and send over network which will required some time. By adding compression technique for image as screenshot which helps to send faster over the network. This all implemented using JAVA and servlets which also increase performance

Keywords: Android, Remote control, JAVA- Servlets, image compression.

[1] Remote Control of Mobile Devices in Android Platform , Angel Gonzalez Villan, and Josep Jorba Esteve, , IEEE 2012
[2] PocketDroid - A PC Remote Control Chaitali Navasare, Deepa Nagdev and Jai Shree, IPCSIT vol. 37 (2012)
[3] Design and Application of Remote Control System Using Mobile Phone with JNI Interface Lingyan Bi1, Weining Wang1, Haobin Zhong1,Wenxuan Liu ,International Conference on Embedded Software and Systems Symposia (ICESS2008) .
[4] Vnc Architecture Based Remote Desktop Access Through Android Mobile Phones, Archana Jadhav , International Journal of Advanced Research in Computer and Communication Engineering Vol. 1, Issue 2, April 2012.
[5] Adam, Skurski, Bartlomiej Swiercz, "VNC- based Remote Control for Symbian OS smartphones", MIXDES (Mixed Design of Integrated Circuits and Systems) 2009, June 25-27, 2009

Paper Type : Research Paper
Title : Implementation of Ecc Using Socket Programming In Java
Country : India
Authors : Ms. Shubhi Gupta, Ms. Swati Vashisht
: 10.9790/0661-16416568     logo

Abstract: Elliptic Curve Cryptography (ECC) has attracted the attention of researchers and developers as it has got robust mathematical structure and higher security compared to algorithms like RSA (Rivest Adleman and Shameer Public key Algorithm). It increases the security compared to RSA or at least give comparable security with lesser key size than RSA. This research shows the implementation of ECC algorithm on a data that is sent from one computer device to another connected through LAN using socket programming in Java.

Index terms: ECC, Socket programming, ASCII

[1]. William Stallings, Cryptography and network security, 2nd edition, Prentice Hall publications
[2]. B.Schiener, Applied Cryptography. John Wiley publications and sons, 2nd edition, 1996
[3]. Victor Miller, "Uses of elliptic curves in cryptography", Advances in cryptology, 1986
[4]. N.Koblitz, A course in number theory and cryptography. [5].
[6]. Kohlekar Megha, Jadhav Anita, 2011." Implementation of Elliptic Curve Cryptography on Text and Image", International Journal of Enterprise Computing and Business Systems, Vol. 1 Issue 2 July 2011.

Paper Type : Research Paper
Title : A Reconfigurable Model In Wireless Sensor Network for saving wild life
Country : India
Authors : Milan Kr. Singha, Mr. Amit Bindal
: 10.9790/0661-16416973     logo

Abstract: The paper presents the design and evaluation of Wireless Sensor Network for prompt detection of forest fires. At first it presents the vital aspects in sculpting forest fires. It is being ensured by scrutinizingthe fire endures index (FEI) Structure, and spectacle how its diverseconstituents can be castoff in deceitful efficient fire revealing structure. FEI structure is one ofbestample forest fire vulnerability rating systems in NorthAmerica and it is backed by numerous decades of forestry exploration. The analysis of the FEI System could be of concernin its peculiarfactual to scholar'swaged in sensor networkarea and sensor industrialists who can optimize the communication and sensing segments of their yields to enhance fit in forest fire revealing systems. Forest fire is revealing delinquent as k-coverage problem in Wireless Sensor Networks. In accumulation, itpresents a simple data aggregation scheme based on the FEI System. This data aggregation scheme ominously prolongs the network epoch, because it delivers statistics that is of concerntosolicitation. Itvalidates numerous aspects of this design expending simulation.

Keywords: Wireless Sensor Network (WSN), Re-Configurable, Cluster Head

[1] Mohamed Hefeeda and Majid Bagheri.Wireless Sensor Networks for Early Detection of Forest Fires, School of Computing Science, Simon Fraser University, Surrey, BC, Canada.
[2] I. Akyildiz,S. Weilian,Y. Sankarasubramaniam, andE. Cayirci.A survey on sensor networks IEEE Communications Magazine, 40(8):102-114, August 2002.
[3] A. Mainwaring, D. Culler, J. Polastre,R. Szewczyk and J. Anderson.Wireless sensor networks for habitat intensive care.In Proc. of the First International Workshop on Wireless Sensor Networks and Applications (WSNA'02), pages88–97, Atlanta, Georgia, September 2002.
[4] B. Son, Y. Her, and J. Kim. A design and implementationof foresty-vigors surveillance system based onwireless sensornetworks for South Korea mountains. International Journalof Computer Science and NetworkSecurity (IJCSNS),6(9):124–130, 2006.
[5] D. M. Doolin and N. Sitar. Wireless sensors for wildfire monitoring. In Proc. of SPIE Symposium on SmartStructures and Materials, pages 477–484, San Diego, CA, March2005.

Paper Type : Research Paper
Title : Predict Fault-Proneness Module Using Pattern Recognization (A Review)
Country : India
Authors : Puneet Chopra, Er. Gurdeep Kaur
: 10.9790/0661-16417479     logo

Abstract: Background: The accurate prediction of where faults are likely to occur in code can help direct test effort, reduce costs and improve the quality of software. Objective of this paper is We investigate how the context of models, the independent variables used and the modeling techniques applied, influence the performance of fault prediction models. Method on We used a systematic literature review to identify 208 fault prediction studies published from January 2000 to December 2012. We synthesise the quantitative and qualitative results of 36 studies which report sufficient contextual and methodological information according to the criteria we develop and apply. Combinations of independent variables have been used by models that perform well. Feature selection has been applied to these combinations when models are performing particularly well. Conclusion: The methodology used to build models seems to be influential to predictive performance. Although there are a set of fault

Keywords: Systematic Literature Review, Software Fault Prediction

[1]. T.M. Khoshgoftaar and N. Seliya, The Necessity of Assuring Quality in Soft-ware Measurement Data, Proc. 10th Int'l Symp. Software Metrics (MET-RICS 04), IEEE CS Press, 2004, pp. 119_130.
[2]. L. Guo et al., "Robust Prediction of Fault Proneness by Random Forests," Proc. 15th Int'l Symp. Software Reliability Eng. (ISSRE 04), IEEE CS Press, 2004, pp. 417_428.
[3]. A.G. Koru and J. Tian, "An Empirical Comparison and Characterization of High Defect and High Complexity Modules," J. Systems and Software, vol.67, no. 3, 2003, pp. 153_163.
[4]. J.S. Shirabad and T.J. Menzies, "The PROMISE Repository of Software Engineering Databases," School of Information Technology and Engineering, University of Ottawa, Canada, 2005.
[5]. Lan Guo, Yan Ma, Bojan Cukic, Harshinder Singh, "Robust Prediction of Fault-proneness of Random Forests".
[6]. An H. Witten and Eibe Frank, "Data Mining- Practical Machine learning Tools and Techniques," Second Edition, © 2005 by Elsevier Inc.

Paper Type : Research Paper
Title : Customized Ontology model for Web Information Gathering using Clustering
Country : India
Authors : Archana Chaugule, Tushar Ghorpade, Puja Padiya
: 10.9790/0661-16418086     logo

Abstract: The explosion of data leads to the problem on how information should be retrieved accurately and effectively. To address this issue, ontology's are widely used to represent user profiles in personalized web information gathering. As a model for knowledge description and formalization, ontology's are widely used to represent user profiles in personalized web information gathering. When representing user profiles, many models have utilized only knowledge from either a global knowledge base or local knowledge base. Ontology model learns user profiles from both a world knowledge base and local knowledge base. A non-content based customized ontology model is proposed for knowledge representation and reasoning over user profiles. This model generates user Local Instance Repository which includes non-content based descriptors referring to the subjects. This model has improvement over former models in hit/miss ratio, precision and recall parameters.

Keywords: ontology model ,customize, user profile, clustering

[1]. Xiaohui Tao, Yuefeng Li and NingZhong, ‖A Personalized Ontology Model for Web Information Gathering‖, IEEE Transactions on Knowledge and Data Engineering, vol.23, no.4, April 2011.

[2]. S. Gauch, J. Chaffee, and A. Pretschner,― Ontology-Based Personalized Search―, Web Intelligence and Agent Systems, vol. 1, nos. 3/4 , pp.219-234, 2003.

[3]. X. Tao, Y. Li, N. Zhong, and R. Nayak, ―Automatic Acquiring Training Sets for Web Information Gathering,‖ Proc. IEEE/WIC/ACM Int'l Conf. Web Intelligence, pp. 532-535, 2006.

[4]. Y. Li and N. Zhong, ―Web Mining Models and Its Applications for Information Gathering‖ ,Knowledge-Based Systems, vol. 17, pp.207-217, 2004.

[5]. S.E. Robertson and I. Soboroff, ―The TREC 2002 Filtering Track Report,‖ proc. Text Retrieval Conf., 2002 .

Researcher can also search IOSR published article contents through

IOSR Xplore