Pub Date : 2018-03-31DOI: 10.14257/ijdta.2018.11.1.03
Waseem Jeelani Bakshi, Rana Hashmy, Majid Zaman, M. A. Butt
{"title":"Logical Data Integration Model for the Integration of Data Repositories","authors":"Waseem Jeelani Bakshi, Rana Hashmy, Majid Zaman, M. A. Butt","doi":"10.14257/ijdta.2018.11.1.03","DOIUrl":"https://doi.org/10.14257/ijdta.2018.11.1.03","url":null,"abstract":"","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"22 1","pages":"21-28"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76755050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJDTA.2018.11.1.01
Muhammad Arif
{"title":"Decision Tree Algorithms C4.5 and C5.0 in Data Mining: A Review","authors":"Muhammad Arif","doi":"10.14257/IJDTA.2018.11.1.01","DOIUrl":"https://doi.org/10.14257/IJDTA.2018.11.1.01","url":null,"abstract":"","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"3 1","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88153003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-31DOI: 10.14257/IJDTA.2018.11.1.02
Raghuram Bhukya, J. Gyani
{"title":"Fuzzy Associative Classification Driven MapReduce Computing Solution for Effective Learning from Uncertain and Dynamic Big Data","authors":"Raghuram Bhukya, J. Gyani","doi":"10.14257/IJDTA.2018.11.1.02","DOIUrl":"https://doi.org/10.14257/IJDTA.2018.11.1.02","url":null,"abstract":"","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"90 5 1","pages":"9-20"},"PeriodicalIF":0.0,"publicationDate":"2018-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87173841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-31DOI: 10.14257/IJDTA.2017.10.12.02
Wenjian Huang, T. Lu, Ning Gu
{"title":"ScaffdCF: A Prototype Interface for Managing Conflicts in Peer Review Process of Open Collaboration Projects","authors":"Wenjian Huang, T. Lu, Ning Gu","doi":"10.14257/IJDTA.2017.10.12.02","DOIUrl":"https://doi.org/10.14257/IJDTA.2017.10.12.02","url":null,"abstract":"","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"114 1","pages":"13-22"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77753926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-12-31DOI: 10.14257/ijdta.2017.10.12.01
N. Sarkar, Xiumin Wang, Liang Shan, Bo Hong, Jun Yu Li
{"title":"Evaluating Intelligent Search Agents in a Controlled Environment Using Complex Queries: An Empirical Study","authors":"N. Sarkar, Xiumin Wang, Liang Shan, Bo Hong, Jun Yu Li","doi":"10.14257/ijdta.2017.10.12.01","DOIUrl":"https://doi.org/10.14257/ijdta.2017.10.12.01","url":null,"abstract":"","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"18 1","pages":"1-12"},"PeriodicalIF":0.0,"publicationDate":"2017-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73707704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/IJDTA.2017.10.11.03
Rizwan Ur Rahman, D. Tomar
Enterprises generate an estimated ten to hundred billion events every day. Large enterprises collect over 500GB logs per day. Traditional systems are not capable to handle this massive amount of data and this becoming classic problem of Big Data. Security Analytics deals with these issues by utilizing the techniques from Big Data analytics to dig out valuable information for averting cyber attacks. In this paper the scalable framework for security analytics is proposed using MongoDB NoSQL database. An attack scenario is created to simulate the zero-day malware. Supervised and unsupervised learning techniques are applied for analytics on data collected from live application and experimental set-up. The outcome is 360 view of data by singling out an abnormal access behavior for given user. It is observed that False Positive rate has been reduced.
{"title":"Scalable Security Analytics Framework Using NoSQL Database","authors":"Rizwan Ur Rahman, D. Tomar","doi":"10.14257/IJDTA.2017.10.11.03","DOIUrl":"https://doi.org/10.14257/IJDTA.2017.10.11.03","url":null,"abstract":"Enterprises generate an estimated ten to hundred billion events every day. Large enterprises collect over 500GB logs per day. Traditional systems are not capable to handle this massive amount of data and this becoming classic problem of Big Data. Security Analytics deals with these issues by utilizing the techniques from Big Data analytics to dig out valuable information for averting cyber attacks. In this paper the scalable framework for security analytics is proposed using MongoDB NoSQL database. An attack scenario is created to simulate the zero-day malware. Supervised and unsupervised learning techniques are applied for analytics on data collected from live application and experimental set-up. The outcome is 360 view of data by singling out an abnormal access behavior for given user. It is observed that False Positive rate has been reduced.","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"44 1","pages":"27-46"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72551263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-30DOI: 10.14257/IJDTA.2017.10.11.02
D. Tiwari, S. Singh, S. Sharma
Cloud computing is one of the emerging technology in the field of IT industries. It enables to access IT related resources with the help of the high-speed network. It's become so popular in the IT industries because of their attractive features. Due to the popularity, demand for the cloud resources increases exponentially in the past few decades. To fulfill this demands numbers of datacenter is deployed which consume huge amount of energy. One of the main challenging issue for the provider is to utilize their hardware and software resources effectively with minimum response time. The performance of the system mainly depends on the server load. As the load on the server increases, performance of the cloud system leads to decreases. Hence, provider needs to balance the tradeoff between server load and performance. In order to deal with load balancing several loads balancing approach have been proposed in the past few decades. Bio-inspired approaches are also used to deal with the load imbalancing, resource allocation, performance optimization etc., because they provide the optimized solutions. In spite of the fact that it is not used in cloud computing to a more noteworthy degree, it is mainly used in data mining, networking, grid computing, pattern recognition etc. The paper gives a broad study of bio-inspired algorithms which are used to resolve various issues like load balancing, energy consumption, performance improvement etc.
{"title":"Theoretical Analysis of Bio-Inspired Load Balancing Approach in Cloud Computing Environment","authors":"D. Tiwari, S. Singh, S. Sharma","doi":"10.14257/IJDTA.2017.10.11.02","DOIUrl":"https://doi.org/10.14257/IJDTA.2017.10.11.02","url":null,"abstract":"Cloud computing is one of the emerging technology in the field of IT industries. It enables to access IT related resources with the help of the high-speed network. It's become so popular in the IT industries because of their attractive features. Due to the popularity, demand for the cloud resources increases exponentially in the past few decades. To fulfill this demands numbers of datacenter is deployed which consume huge amount of energy. One of the main challenging issue for the provider is to utilize their hardware and software resources effectively with minimum response time. The performance of the system mainly depends on the server load. As the load on the server increases, performance of the cloud system leads to decreases. Hence, provider needs to balance the tradeoff between server load and performance. In order to deal with load balancing several loads balancing approach have been proposed in the past few decades. Bio-inspired approaches are also used to deal with the load imbalancing, resource allocation, performance optimization etc., because they provide the optimized solutions. In spite of the fact that it is not used in cloud computing to a more noteworthy degree, it is mainly used in data mining, networking, grid computing, pattern recognition etc. The paper gives a broad study of bio-inspired algorithms which are used to resolve various issues like load balancing, energy consumption, performance improvement etc.","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"340 1","pages":"15-26"},"PeriodicalIF":0.0,"publicationDate":"2017-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73910931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-31DOI: 10.14257/ijdta.2017.10.10.01
H. Choi, M. Cho, Soongoo Hong, Doo-hwan Kim, H. Kim
Co-creation models have been proposed as a new way to solve social problems with the cooperation of various stakeholders to overcome limitations of administrative agency-led policy development and implementations. Case studies on the co-creation-model-based policy development are necessary because co-creation models require new procedures different from the existing policy development. The aim of this study is to design a knowledge storage that can access and utilize previous cases of co-creation models in developing and implementing policies to solve social problems and promote regional innovations. For this purpose, this study reviews the basic requirements of the knowledge storage and designs a logical and physical model of the co-creation-based knowledge storage. This study contributes to academic researches that can lead to subsequent studies on co-creation models and platforms.
{"title":"A Study on Co-creation based Knowledge Storage Design","authors":"H. Choi, M. Cho, Soongoo Hong, Doo-hwan Kim, H. Kim","doi":"10.14257/ijdta.2017.10.10.01","DOIUrl":"https://doi.org/10.14257/ijdta.2017.10.10.01","url":null,"abstract":"Co-creation models have been proposed as a new way to solve social problems with the cooperation of various stakeholders to overcome limitations of administrative agency-led policy development and implementations. Case studies on the co-creation-model-based policy development are necessary because co-creation models require new procedures different from the existing policy development. The aim of this study is to design a knowledge storage that can access and utilize previous cases of co-creation models in developing and implementing policies to solve social problems and promote regional innovations. For this purpose, this study reviews the basic requirements of the knowledge storage and designs a logical and physical model of the co-creation-based knowledge storage. This study contributes to academic researches that can lead to subsequent studies on co-creation models and platforms.","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"14 1","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79183917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-31DOI: 10.14257/ijdta.2017.10.10.03
Shakti Kundu, M. Garg
Agents are the software entities that are having ability to extract information on behalf of user to provide correctness within the term. Agents are significant because they permit various software components the ability to exchange and use information in web content retrieval. To communicate and progress the request, Agents need a general Agent Communication Language (ACL). With JSP and WEBMINTEL architecture, it becomes easier to implement Agents. This paper highlights the Web Mining Intelligent Agents (WEBMINTEL) System, role of Agent Communication Language and approaches used for performing Web Mining with JSP.
代理是能够代表用户提取信息以在期限内提供正确性的软件实体。代理很重要,因为它们允许各种软件组件在web内容检索中交换和使用信息。为了通信和处理请求,Agent需要一个通用的Agent Communication Language (ACL)。使用JSP和WEBMINTEL体系结构,实现代理变得更加容易。本文重点介绍了Web挖掘智能代理(WEBMINTEL)系统、代理通信语言的作用以及使用JSP进行Web挖掘的方法。
{"title":"Role of Agent Communication Language in WEBMINTEL System","authors":"Shakti Kundu, M. Garg","doi":"10.14257/ijdta.2017.10.10.03","DOIUrl":"https://doi.org/10.14257/ijdta.2017.10.10.03","url":null,"abstract":"Agents are the software entities that are having ability to extract information on behalf of user to provide correctness within the term. Agents are significant because they permit various software components the ability to exchange and use information in web content retrieval. To communicate and progress the request, Agents need a general Agent Communication Language (ACL). With JSP and WEBMINTEL architecture, it becomes easier to implement Agents. This paper highlights the Web Mining Intelligent Agents (WEBMINTEL) System, role of Agent Communication Language and approaches used for performing Web Mining with JSP.","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"10 1","pages":"35-44"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86193930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-10-31DOI: 10.14257/ijdta.2017.10.10.04
Sung-Hun Kim, J. Choi, K. Joo
{"title":"Development of Real-time On-line Sign Language Application based on Speech Recognition","authors":"Sung-Hun Kim, J. Choi, K. Joo","doi":"10.14257/ijdta.2017.10.10.04","DOIUrl":"https://doi.org/10.14257/ijdta.2017.10.10.04","url":null,"abstract":"","PeriodicalId":13926,"journal":{"name":"International journal of database theory and application","volume":"11 1","pages":"55-64"},"PeriodicalIF":0.0,"publicationDate":"2017-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74371345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}