首页 > 最新文献

International Journal of Engineering and Computer Science最新文献

英文 中文
Personalized Suggestion For Music Based On Collaborative Filtering 基于协同过滤的个性化音乐建议
Pub Date : 2020-05-20 DOI: 10.18535/ijecs/v9i05.4487
A. Salunke, Ruchika Kukreja, Jayesh Kharche, Amit K. Nerurkar
With the advancement of technology there are millions of songs available on the internet and this creates problem for a person to choose from this vast pool of songs. So, there should be some middleman who must do this task on behalf of user and present most relevant songs that perfectly fits the user’s taste. This task is done by recommendation system. Music recommendation system predicts the user liking towards a particular song based on the listening history and profile. Most of the music recommendation system available today will give most recently played song or songs which have overall highest rating as suggestions to users but these suggestions are not personalized. The paper purposes how the recommendation systems can be used to give personalized suggestions to each and every user with the help of collaborative filtering which uses user similarity to give suggestions. The paper aims at implementing this idea and solving the cold start problem using content based filtering at the start.
随着科技的进步,互联网上有数百万首歌曲可供选择,这给人们从大量歌曲中进行选择带来了问题。所以,应该有一些中间人必须代表用户完成这项任务,并呈现最符合用户口味的相关歌曲。该任务由推荐系统完成。音乐推荐系统根据用户的收听历史和个人资料预测用户对特定歌曲的喜好。目前可用的大多数音乐推荐系统都会将最近播放的歌曲或总体评分最高的歌曲作为建议提供给用户,但这些建议并不是个性化的。本文的目的是研究如何利用用户相似度的协同过滤来为每一个用户提供个性化的推荐。本文旨在实现这一思想,并在启动时使用基于内容的过滤来解决冷启动问题。
{"title":"Personalized Suggestion For Music Based On Collaborative Filtering","authors":"A. Salunke, Ruchika Kukreja, Jayesh Kharche, Amit K. Nerurkar","doi":"10.18535/ijecs/v9i05.4487","DOIUrl":"https://doi.org/10.18535/ijecs/v9i05.4487","url":null,"abstract":"With the advancement of technology there are millions of songs available on the internet and this creates problem for a person to choose from this vast pool of songs. So, there should be some middleman who must do this task on behalf of user and present most relevant songs that perfectly fits the user’s taste. This task is done by recommendation system. Music recommendation system predicts the user liking towards a particular song based on the listening history and profile. Most of the music recommendation system available today will give most recently played song or songs which have overall highest rating as suggestions to users but these suggestions are not personalized. The paper purposes how the recommendation systems can be used to give personalized suggestions to each and every user with the help of collaborative filtering which uses user similarity to give suggestions. The paper aims at implementing this idea and solving the cold start problem using content based filtering at the start.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Legal Document Summarization Using Nlp and Ml Techniques 使用Nlp和Ml技术的法律文件摘要
Pub Date : 2020-05-20 DOI: 10.18535/ijecs/v9i05.4488
Rahul C Kore, Prachi Ray, P. Lade, Amit K. Nerurkar
Reading legal documents are tedious and sometimes it requires domain knowledge related to that document. It is hard to read the full legal document without missing the key important sentences. With increasing number of legal documents it would be convenient to get the essential information from the document without having to go through the whole document. The purpose of this study is to understand a large legal document within a short duration of time. Summarization gives flexibility and convenience to the reader. Using vector representation of words, text ranking algorithms, similarity techniques, this study gives a way to produce the highest ranked sentences. Summarization produces the result in such a way that it covers the most vital information of the document in a concise manner. The paper proposes how the different natural language processing concepts can be used to produce the desired result and give readers the relief from going through the whole complex document. This study definitively presents the steps that are required to achieve the aim and elaborates all the algorithms used at each and every step in the process.
阅读法律文件是乏味的,有时它需要与该文件相关的领域知识。阅读完整的法律文件而不遗漏关键的重要句子是很难的。随着法律文件数量的增加,从文件中获取重要信息将很方便,而不必通读整份文件。本研究的目的是在短时间内理解一份大型法律文件。摘要给读者提供了灵活性和方便性。本研究利用词的向量表示、文本排序算法、相似度技术,给出了一种生成排名最高的句子的方法。摘要生成的结果以一种简明的方式涵盖了文档中最重要的信息。本文提出了如何使用不同的自然语言处理概念来产生期望的结果,并使读者从浏览整个复杂的文档中解脱出来。本研究明确提出了实现目标所需的步骤,并详细阐述了该过程中每一步使用的所有算法。
{"title":"Legal Document Summarization Using Nlp and Ml Techniques","authors":"Rahul C Kore, Prachi Ray, P. Lade, Amit K. Nerurkar","doi":"10.18535/ijecs/v9i05.4488","DOIUrl":"https://doi.org/10.18535/ijecs/v9i05.4488","url":null,"abstract":"Reading legal documents are tedious and sometimes it requires domain knowledge related to that document. It is hard to read the full legal document without missing the key important sentences. With increasing number of legal documents it would be convenient to get the essential information from the document without having to go through the whole document. The purpose of this study is to understand a large legal document within a short duration of time. Summarization gives flexibility and convenience to the reader. Using vector representation of words, text ranking algorithms, similarity techniques, this study gives a way to produce the highest ranked sentences. Summarization produces the result in such a way that it covers the most vital information of the document in a concise manner. The paper proposes how the different natural language processing concepts can be used to produce the desired result and give readers the relief from going through the whole complex document. This study definitively presents the steps that are required to achieve the aim and elaborates all the algorithms used at each and every step in the process.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122431209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Blockchain In Depth 区块链深入研究
Pub Date : 2020-05-18 DOI: 10.18535/ijecs/v9i05.4482
Saransh Kotha, P. Patel
Blockchain is defined as a group of unsegregated blocks over a P2P network. It is also considered as a decentralised ledger which holds the records of any online event. It offers a secure platform for knowledge and value transfer even in an untrustworthy network. In digital transactions on blockchain, each transaction is verified by all the nodes within the network using consensus protocol. Through this paper we will give a comprehensive overview of how Blockchain technology works, its current and future applications and how it can change the digital events in future.
区块链被定义为P2P网络上的一组未隔离的块。它也被认为是一个分散的分类账,保存着任何在线事件的记录。即使在一个不可信的网络中,它也为知识和价值的转移提供了一个安全的平台。在区块链上的数字交易中,每笔交易都由网络内的所有节点使用共识协议进行验证。通过本文,我们将全面概述区块链技术的工作原理,其当前和未来的应用以及它如何改变未来的数字事件。
{"title":"Blockchain In Depth","authors":"Saransh Kotha, P. Patel","doi":"10.18535/ijecs/v9i05.4482","DOIUrl":"https://doi.org/10.18535/ijecs/v9i05.4482","url":null,"abstract":"Blockchain is defined as a group of unsegregated blocks over a P2P network. It is also considered as a decentralised ledger which holds the records of any online event. It offers a secure platform for knowledge and value transfer even in an untrustworthy network. In digital transactions on blockchain, each transaction is verified by all the nodes within the network using consensus protocol. Through this paper we will give a comprehensive overview of how Blockchain technology works, its current and future applications and how it can change the digital events in future.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122927403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TOTP Based Authentication Using QR Code For Gateway Entry System 基于TOTP的网关入口系统QR码认证
Pub Date : 2020-05-11 DOI: 10.18535/ijecs/v9i05.4481
Abhishek Arvind, Pradyumna Mahajan, Rishikesh Chalke
In today’s scenario, there are various ways the attackers can gain access to secure information and use it for their own benefit. In this paper, we aim to improve the gateway entry system by providing more security. This system involves the use of TOTP (Time-Based One-Time Password) with QR (Quick Response) code. A QR code is a 2D matrix barcode where a large amount of information can be stored in a compact manner. TOTP is a temporary password that is active for a short duration of time. For every 30 seconds, an OTP is generated. A QR code is generated which contains the TOTP. The QR code is scanned and the server checks the TOTP generated on the server-side. If this TOTP matches with the TOTP in the QR code then the user is allowed to enter. This method increases the security of the system and prevents unauthorized access.
在今天的场景中,攻击者可以通过各种方式获得对安全信息的访问权,并将其用于自己的利益。在本文中,我们旨在通过提供更多的安全性来改进网关入口系统。该系统涉及使用TOTP(基于时间的一次性密码)和QR(快速响应)代码。QR码是一种二维矩阵条形码,可以以紧凑的方式存储大量信息。TOTP是一个临时密码,在短时间内是有效的。每30秒生成一个OTP。生成一个QR码,其中包含TOTP。扫描二维码,服务器检查在服务器端生成的TOTP。如果此TOTP与QR码中的TOTP匹配,则允许用户进入。这种方式可以提高系统的安全性,防止非法访问。
{"title":"TOTP Based Authentication Using QR Code For Gateway Entry System","authors":"Abhishek Arvind, Pradyumna Mahajan, Rishikesh Chalke","doi":"10.18535/ijecs/v9i05.4481","DOIUrl":"https://doi.org/10.18535/ijecs/v9i05.4481","url":null,"abstract":"In today’s scenario, there are various ways the attackers can gain access to secure information and use it for their own benefit. In this paper, we aim to improve the gateway entry system by providing more security. This system involves the use of TOTP (Time-Based One-Time Password) with QR (Quick Response) code. A QR code is a 2D matrix barcode where a large amount of information can be stored in a compact manner. TOTP is a temporary password that is active for a short duration of time. For every 30 seconds, an OTP is generated. A QR code is generated which contains the TOTP. The QR code is scanned and the server checks the TOTP generated on the server-side. If this TOTP matches with the TOTP in the QR code then the user is allowed to enter. This method increases the security of the system and prevents unauthorized access.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114751625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Penetration Testing on Metasploitable 2 基于Metasploitable的渗透测试
Pub Date : 2020-05-10 DOI: 10.18535/ijecs/v9i05.4476
Mandeep Singh, Sunny Kumar, Tushant Garg, N. Pandey
Abstract— In this paper, we will discuss how to perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we decide to use, as using some other system to do the same it would be considered as hacking and could have awful results. The primary purpose of this research is to tell about the various tools used when someone trying to find possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find possible vulnerabilities that need to be fixed to protect and make the system better. Different areas like firewalls, network protocols, and other basic security is-sues will be explored in this research.While there are many other different ways to do penetration testing, but we decide to use Metasploit be-cause of its broad uses and simplicity. We will have the option of either using the command line within Metasploit or by using the community version of the product, which is mostly automated. Both alternatives will be explored in this paper. If anyone going through all of the steps given in this paper should be able to try and exploit any vulnerable system.
在本文中,我们将讨论如何使用Metasploit在metasploit2上执行渗透测试。Metasploitable 2是我们决定使用的一个易受攻击的系统,因为使用其他系统做同样的事情会被认为是黑客攻击,可能会产生可怕的结果。这项研究的主要目的是告诉人们在试图找到系统中可能的漏洞时使用的各种工具。通过使用Metasploit系统来测试系统,我们可以发现可能需要修复的漏洞,以保护和改进系统。本研究将探讨防火墙、网络协议和其他基本安全问题等不同领域。虽然有许多其他不同的方法来进行渗透测试,但我们决定使用Metasploit,因为它用途广泛且简单。我们可以选择使用Metasploit中的命令行,也可以选择使用该产品的社区版本,后者大部分是自动化的。这两种选择都将在本文中进行探讨。如果任何人通过本文给出的所有步骤,应该能够尝试和利用任何易受攻击的系统。
{"title":"Penetration Testing on Metasploitable 2","authors":"Mandeep Singh, Sunny Kumar, Tushant Garg, N. Pandey","doi":"10.18535/ijecs/v9i05.4476","DOIUrl":"https://doi.org/10.18535/ijecs/v9i05.4476","url":null,"abstract":"Abstract— In this paper, we will discuss how to perform a penetration test on Metasploitable 2 using Metasploit. Metasploitable 2 is a vulnerable system that we decide to use, as using some other system to do the same it would be considered as hacking and could have awful results. The primary purpose of this research is to tell about the various tools used when someone trying to find possible vulnerabilities in a system. By using the Metasploit system to test a system, we can find possible vulnerabilities that need to be fixed to protect and make the system better. Different areas like firewalls, network protocols, and other basic security is-sues will be explored in this research.While there are many other different ways to do penetration testing, but we decide to use Metasploit be-cause of its broad uses and simplicity. We will have the option of either using the command line within Metasploit or by using the community version of the product, which is mostly automated. Both alternatives will be explored in this paper. If anyone going through all of the steps given in this paper should be able to try and exploit any vulnerable system.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Interoperability of Cloud Using Single API 使用单一API的云的互操作性
Pub Date : 2020-04-16 DOI: 10.18535/ijecs/v9i04.4468
P. H. Kumar, J. Sudharshana, M. SunilKannah
In the cloud computing model, users access services according to their requirements. Most of the people use cloud since it has low cost, high speed computing, backup and restore, mobility and unlimited flexible storage capacity. Cloud resources are hosted in large datacentres operated by companies such as Amazon, Apple, Google and Microsoft. During cloud application deployment, an application is managed over a single service. Such an approach has several short comings. One side-effect of the lack of interoperability among cloud providers is vendor lock in, which means lack of ability to migrate application components from one cloud provider to another cloud provider. If a user finds some required platforms in new service provider but the user cannot leave the current provider as the resources are present with them. This is known as vendor lock in. To solve this issue in achieving interoperability several efforts are underway. Our project is that a user who creates a unique channel that can be used to gain the services provided by different providers. So that the user can use another vendor’s service which is not present in present vendor’s cloud. That is user can use multiple clouds having different resources using a single API without depending on their own APIs.  
在云计算模型中,用户根据自己的需求访问业务。大多数人使用云,因为它具有低成本,高速计算,备份和恢复,移动性和无限的灵活存储容量。云资源托管在亚马逊、苹果、谷歌和微软等公司运营的大型数据中心中。在云应用程序部署期间,应用程序通过单个服务进行管理。这种方法有几个缺点。云提供商之间缺乏互操作性的一个副作用是供应商锁定,这意味着缺乏将应用程序组件从一个云提供商迁移到另一个云提供商的能力。如果用户在新的服务提供商中找到了一些所需的平台,但由于资源存在,用户无法离开当前的提供商。这就是所谓的供应商锁定。为了在实现互操作性的过程中解决这个问题,一些工作正在进行中。我们的项目是用户创建一个唯一的通道,该通道可用于获得由不同提供商提供的服务。这样用户就可以使用其他供应商的服务,而这些服务并不存在于当前供应商的云中。也就是说,用户可以使用单个API使用具有不同资源的多个云,而不依赖于他们自己的API。
{"title":"Interoperability of Cloud Using Single API","authors":"P. H. Kumar, J. Sudharshana, M. SunilKannah","doi":"10.18535/ijecs/v9i04.4468","DOIUrl":"https://doi.org/10.18535/ijecs/v9i04.4468","url":null,"abstract":"In the cloud computing model, users access services according to their requirements. Most of the people use cloud since it has low cost, high speed computing, backup and restore, mobility and unlimited flexible storage capacity. Cloud resources are hosted in large datacentres operated by companies such as Amazon, Apple, Google and Microsoft. During cloud application deployment, an application is managed over a single service. Such an approach has several short comings. One side-effect of the lack of interoperability among cloud providers is vendor lock in, which means lack of ability to migrate application components from one cloud provider to another cloud provider. If a user finds some required platforms in new service provider but the user cannot leave the current provider as the resources are present with them. This is known as vendor lock in. \u0000To solve this issue in achieving interoperability several efforts are underway. Our project is that a user who creates a unique channel that can be used to gain the services provided by different providers. So that the user can use another vendor’s service which is not present in present vendor’s cloud. That is user can use multiple clouds having different resources using a single API without depending on their own APIs. \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115877218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric, Fingervein, Machine L Implementation of a Security System, Using Captured Fingervein, Applying the Concepts of Machine Learning 生物识别,手指静脉,机器L安全系统的实现,使用捕获的手指静脉,应用机器学习的概念
Pub Date : 2020-04-14 DOI: 10.18535/ijecs/v9i04.4470
O. O. Elohor, Akinbohun Folake, Thompson Aderonke, Korede Bashir
This work explores the field of biometric finger vein recognition – which is the identification of individuals using the unique vein patterns under their finger skins. This work also includes the implementation of an Android fingerprint biometric system using the Android Near InfraRed (NIR) module, which exists to show the similarities and differences between the two (fingervein and fingerprint) prevalent biometric features. This work thus confirms that finger vein recognition shows great promise as an accurate solution to modern society’s problem of automated personal authentication
这项工作探索了生物识别手指静脉识别领域-这是利用个人手指皮肤下独特的静脉模式来识别个人。本工作还包括使用Android近红外(NIR)模块实现Android指纹生物识别系统,该模块的存在是为了显示两种(指静脉和指纹)流行的生物识别特征之间的异同。因此,这项工作证实了手指静脉识别作为现代社会自动个人身份验证问题的准确解决方案显示出巨大的希望
{"title":"Biometric, Fingervein, Machine L Implementation of a Security System, Using Captured Fingervein, Applying the Concepts of Machine Learning","authors":"O. O. Elohor, Akinbohun Folake, Thompson Aderonke, Korede Bashir","doi":"10.18535/ijecs/v9i04.4470","DOIUrl":"https://doi.org/10.18535/ijecs/v9i04.4470","url":null,"abstract":"This work explores the field of biometric finger vein recognition – which is the identification of individuals using the unique vein patterns under their finger skins. This work also includes the implementation of an Android fingerprint biometric system using the Android Near InfraRed (NIR) module, which exists to show the similarities and differences between the two (fingervein and fingerprint) prevalent biometric features. This work thus confirms that finger vein recognition shows great promise as an accurate solution to modern society’s problem of automated personal authentication","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130590698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Centrality Measures for Potential Drug Targets: Review 中心性测度在潜在药物靶点中的应用综述
Pub Date : 2020-04-08 DOI: 10.18535/ijecs/v9i04.4465
A. C. Sekhar, Ch. Ambedkar
Protein-Protein Interactions (PPI) have important role in drug binding with the Proteins called drug targets. For identifying the potential drug targets there are different techniques. In this paper we are presenting application of Centrality Measures for identifying the drug targets. Centrality measure indicates importance of node in the graph or network. Protein-Protein Interactions for proteins which are involved in a particular disease are identified and centrality measures will be calculated based on the graph built suing the PPI interactions. Further the nodes which are playing crucial role will be identified using the various centrality measures and these drug targets can be used for drug discovery of a particular disease through insilico docking studies.
蛋白-蛋白相互作用(PPI)在药物与靶标蛋白的结合中起着重要作用。为了确定潜在的药物靶点,有不同的技术。本文介绍了中心性测度在药物靶点识别中的应用。中心性度量表示图或网络中节点的重要性。确定与特定疾病有关的蛋白质的蛋白质-蛋白质相互作用,并根据使用PPI相互作用建立的图表计算中心性度量。此外,将使用各种中心性措施确定起关键作用的节点,这些药物靶点可通过计算机对接研究用于特定疾病的药物发现。
{"title":"Application of Centrality Measures for Potential Drug Targets: Review","authors":"A. C. Sekhar, Ch. Ambedkar","doi":"10.18535/ijecs/v9i04.4465","DOIUrl":"https://doi.org/10.18535/ijecs/v9i04.4465","url":null,"abstract":"Protein-Protein Interactions (PPI) have important role in drug binding with the Proteins called drug targets. For identifying the potential drug targets there are different techniques. In this paper we are presenting application of Centrality Measures for identifying the drug targets. Centrality measure indicates importance of node in the graph or network. Protein-Protein Interactions for proteins which are involved in a particular disease are identified and centrality measures will be calculated based on the graph built suing the PPI interactions. Further the nodes which are playing crucial role will be identified using the various centrality measures and these drug targets can be used for drug discovery of a particular disease through insilico docking studies.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133673153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GPS Based City Wise Integration System for City Vendors 基于GPS的城市供应商智慧集成系统
Pub Date : 2020-03-31 DOI: 10.18535/ijecs/v9i04.4457
Vaidehi Shrivastava, H. Dhakad, Samarth Bajaj, Viplove Divyasheesh
This research paper focuses on creating a platform for street vendors which will improve their availability to users by displaying their real-time location nearby user’s locality along with their respective services. This doesn’t require any expensive hardware allowing users to get notified when a hawker providing services of user’s interest pass through her street. Small-scaled business people like hawkers have a large impact on a country's economy because of their large population in developing countries like India. Due to minimal exposure to technology, they use classic business methods which struggle to uphold their position against tough competition from large organizations. These hawkers can be uplifted by providing a platform which will be based on advanced business strategies developed on the basis of those which are introduced by modern economists and business ideologists. This platform will be as useful for static vendors as it is for dynamic vendors not limiting to a single service but to all street vendors present despite the service they provide. Hence, users won’t have to look for vendors floating in the streets as their location will be visible on the map in the application.
本文的研究重点是为街头小贩创建一个平台,通过在用户所在位置附近显示他们的实时位置以及他们各自的服务,提高他们对用户的可用性。这并不需要任何昂贵的硬件,当提供用户感兴趣的服务的小贩经过她的街道时,用户就可以得到通知。像小贩这样的小规模商人对一个国家的经济有很大的影响,因为他们在印度这样的发展中国家人口众多。由于很少接触技术,他们使用传统的商业方法来努力维护自己的地位,以应对来自大型组织的激烈竞争。这些小贩可以通过提供一个平台来提升自己,这个平台将基于现代经济学家和商业思想家介绍的先进商业战略而发展起来。这个平台对静态摊贩和动态摊贩同样有用,不局限于单一的服务,而是对所有街头摊贩都有用,不管他们提供什么服务。因此,用户将不必寻找漂浮在街道上的供应商,因为他们的位置将在应用程序的地图上可见。
{"title":"GPS Based City Wise Integration System for City Vendors","authors":"Vaidehi Shrivastava, H. Dhakad, Samarth Bajaj, Viplove Divyasheesh","doi":"10.18535/ijecs/v9i04.4457","DOIUrl":"https://doi.org/10.18535/ijecs/v9i04.4457","url":null,"abstract":"This research paper focuses on creating a platform for street vendors which will improve their availability to users by displaying their real-time location nearby user’s locality along with their respective services. This doesn’t require any expensive hardware allowing users to get notified when a hawker providing services of user’s interest pass through her street. \u0000Small-scaled business people like hawkers have a large impact on a country's economy because of their large population in developing countries like India. Due to minimal exposure to technology, they use classic business methods which struggle to uphold their position against tough competition from large organizations. These hawkers can be uplifted by providing a platform which will be based on advanced business strategies developed on the basis of those which are introduced by modern economists and business ideologists. \u0000This platform will be as useful for static vendors as it is for dynamic vendors not limiting to a single service but to all street vendors present despite the service they provide. Hence, users won’t have to look for vendors floating in the streets as their location will be visible on the map in the application.","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"434 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Note on Detection of Communities in Social Networks 关于社会网络中社区检测的说明
Pub Date : 2020-03-19 DOI: 10.18535/ijecs/v9i03.4452
P. Sridevi
 The modern Science of Social Networks has brought significant advances to our understanding of the Structure, dynamics and evolution of the Network. One of the important features of graphs representing the Social Networks is community structure. The communities can be considered as fairly independent components of the social graph that helps identify groups of users with similar interests, locations, friends, or occupations. The community structure is closely tied to triangles and their count forms the basis of community detection algorithms. The present work takes into consideration, a triangle instead of the edge as the basic indicator of a strong relation in the social graph. A simple triangle counting algorithm is then used to evaluate different metrics that are employed to detect strong communities. The methodology is applied to Zachary Social network and discussed. The results bring out the usefulness of counting triangles in a network to detect strong communities in a Social Network.  
现代社会网络科学为我们对网络结构、动态和演化的理解带来了重大进展。表示社交网络的图形的一个重要特征是社区结构。这些社区可以看作是社交图谱中相当独立的组成部分,可以帮助识别具有相似兴趣、位置、朋友或职业的用户群体。社区结构与三角形密切相关,它们的计数构成了社区检测算法的基础。本研究考虑用三角形代替边缘作为社会图谱中强关系的基本指标。然后使用一个简单的三角形计数算法来评估用于检测强大社区的不同指标。将该方法应用于Zachary社交网络并进行了讨论。研究结果表明,对网络中的三角形进行计数对于检测社交网络中的强社区是有用的。
{"title":"A Note on Detection of Communities in Social Networks","authors":"P. Sridevi","doi":"10.18535/ijecs/v9i03.4452","DOIUrl":"https://doi.org/10.18535/ijecs/v9i03.4452","url":null,"abstract":" The modern Science of Social Networks has brought significant advances to our understanding of the Structure, dynamics and evolution of the Network. One of the important features of graphs representing the Social Networks is community structure. The communities can be considered as fairly independent components of the social graph that helps identify groups of users with similar interests, locations, friends, or occupations. The community structure is closely tied to triangles and their count forms the basis of community detection algorithms. The present work takes into consideration, a triangle instead of the edge as the basic indicator of a strong relation in the social graph. A simple triangle counting algorithm is then used to evaluate different metrics that are employed to detect strong communities. The methodology is applied to Zachary Social network and discussed. The results bring out the usefulness of counting triangles in a network to detect strong communities in a Social Network. \u0000 ","PeriodicalId":231371,"journal":{"name":"International Journal of Engineering and Computer Science","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130257517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Engineering and Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1