Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Goar, Vishal
- Performance Evaluation of Multi Keyword Ranked Search Schema Called BDMRS-CM & EDMRS-BM in Cloud Computing
Abstract Views :184 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Science, Poornima University, Jaipur, IN
2 Department Computer Science, Poornima University, Jaipur, IN
3 Department of Computer Application, Govt. Engineering College, Bikaner, IN
1 Department of Computer Science, Poornima University, Jaipur, IN
2 Department Computer Science, Poornima University, Jaipur, IN
3 Department of Computer Application, Govt. Engineering College, Bikaner, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 24, No 1 (2017), Pagination: 42-51Abstract
Nowadays, Everything can be searched through the cloud space. Therefore, this article is also dealing with the cloud computing, where searching of information and preservation of privacy is key area of concern. Henceforth taking multi-keyword ranked search with dynamic updation as a dimension of information searching, have been selected it as a research area. Moreover the searching is restricted to single keyword only. Therefore, we have taken the concept of multi keyword ranked searching. One more thing is that efforts have not been made regarding dynamic updation (insertion and deletion etc. of documents) previously. To cover up the dynamic updation part the schemes BDMRS-CM (Basic Dynamic Multi-Keyword Ranked Search scheme in the Known Ciphertext Model) by using the secure kNN algorithm and the EDMRS-BM (Enhanced Dynamic Multi-Keyword Ranked Search scheme in the Known Background Model) were designed and their performance have been evaluated and analyzed.Keywords
Cloud Computing, Dynamic Updation, Multi-Keyword.References
- Narendra K. and Narsimhareddy Gkv. , “Dynamic Multi-Keyword Ranking Scheme on Encrypted Cloud Data”, International Journal of Innovative Technology and Research, Volume No.4, Issue No.4, June – July 2016.
- Gomathi M. and Seenivasan D., “Dynamic multi-keyword rank scheme using Top key over encrypted cloud data”, International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 04 | April-2016.
- Narayankar Ajaykumar, Rathod Gajanan, Londhe Sanket , Wankhade Ashish and Ansari M.A., “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2, February 2016.
- Neeshima P.P., Hegde Pavitra Shankar, P. Poojashree and Pallavi G.B, “A multi keyword ranked search technique with provision for dynamic update of encrypted documents in cloud”, International Journal of Computer Engineering and Applications, Volume X, Issue III, March 16.
- Karthick K.S. and Deepa P , “A Secure and Dynamic Multi-keyword Ranking Search On Encrypted Cloud Data using GDFS”, International Journal On Advanced Computer Theory And Engineering (IJACTE), Volume -5, Issue -2, 2016
- HARIKA HAMPI K. S., LAKSHMI K. and PREM KUMAR S., “A Secure and Dynamic Multi Keyword Ranked Search Scheme Over Encrypted Cloud Data”, International Journal of Innovative Technologies, Volume.04, Issue No.08, July-2016, Pages: 1406-1411
- Saravanan K.S.and Karthika S., “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 2016
- Metkari Siddheshwar S. and Sonkamble S.B., “Multi-keyword Ranked Search Over Encrypted Cloud Data Supporting Synonym Query”, International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016
- Jain Purva and Banubakode Abhijit, “A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data”, IOSR Journal of Computer Engineering (IOSR-JCE), PP 28-32, 2015
- Xia Zhihua, Wang Xinhui, Sun Xingming and Wang Qian , “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE Transactions On Parallel And Distributed Systems, Vol. 1, p.p.1-13, 2015
- Strizhov Mikhail, “Towards a Practical and Efficient Search over Encrypted Data in the Cloud”, IEEE International Conference on Cloud Engineering, Vol. 15, p.p. 496-498, 2015
- Chen Chi, Zhu Xiaojie, Shen Peisong, Hu J., Guo S., Tari Z.and Zomaya Albert Y. “An Efficient Privacy Preserving Ranked Keyword Search Method”, IEEE Transactions on Parallel and Distributed Systems, Vol. 1, p.p. 1-14,2015
- Design and Analysis of New Multi Keyword Ranked Search Schema Called SSEDU in Cloud Computing
Abstract Views :195 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, Poornima University, Jaipur, IN
2 Department of Computer Application, Govt. Engineering College, Bikaner, IN
1 Department of Computer Science, Poornima University, Jaipur, IN
2 Department of Computer Application, Govt. Engineering College, Bikaner, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 26 (2017), Pagination: 1-10Abstract
In these days, required information can be searched through the cloud. Henceforth, this paper deals with the cloud computing, where information seeking and privacy preservation are the main area of emphasis. Therefore, keeping multi-keyword ranked search with dynamic updation as an area of data searching (information seeking), have been chosen here as a research dimension. One more thing is that the in most of the cases searching is bounded to unit keyword only. Hence, we have chosen the other dimension of searching which is multi keyword ranking search. Moreover, efforts have not been made in the area of dynamic updation earlier. Here dynamic updation caters the addition and deletion of documents dynamically. For covering the dynamic updation part the scheme SSEDU (searchable symmetric encryption with dynamic updation) has been designed and deployed. In this paper we have presented the efforts made for the performance evaluation of the said SSEDU scheme.Keywords
Cloud Computing, Dynamic Updation, Multi-Keyword Ranked Search, SSEDU.References
- Narendra K. and Narsimhareddy Gkv. , “Dynamic Multi-Keyword Ranking Scheme on Encrypted Cloud Data”, International Journal of Innovative Technology and Research, Volume No.4, Issue No.4, June – July 2016.
- Gomathi M. and Seenivasan D., “Dynamic multi-keyword rank scheme using Top key over encrypted cloud data”, International Research Journal of Engineering and Technology (IRJET), Volume: 03 Issue: 04 | April-2016.
- Narayankar Ajaykumar, Rathod Gajanan, Londhe Sanket , Wankhade Ashish and Ansari M.A., “Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data”, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2, February 2016.
- Neeshima P.P., Hegde Pavitra Shankar, P. Poojashree and Pallavi G.B, “A multi keyword ranked search technique with provision for dynamic update of encrypted documents in cloud”, International Journal of Computer Engineering and Applications, Volume X, Issue III, March 16.
- Karthick K.S. and Deepa P , “A Secure and Dynamic Multi-keyword Ranking Search On Encrypted Cloud Data using GDFS”, International Journal on Advanced Computer Theory and Engineering (IJACTE), Volume -5, Issue -2, 2016
- HARIKA HAMPI K. S., LAKSHMI K. and PREM KUMAR S., “A Secure and Dynamic Multi Keyword Ranked Search Scheme Over Encrypted Cloud Data”, International Journal of Innovative Technologies, Volume.04, Issue No.08, July-2016, Pages: 1406-1411
- Saravanan K.S.and Karthika S., “A Secure and Dynamic Multi-keyword Ranked Search Scheme over Encrypted Cloud Data”, International Journal of Advanced Research in Computer and Communication Engineering Vol. 5, Issue 2, February 2016
- Metkari Siddheshwar S. and Sonkamble S.B., “Multi-keyword Ranked Search Over Encrypted Cloud Data Supporting Synonym Query”, International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016
- Jain Purva and Banubakode Abhijit, “A Review Paper on Multi keyword Ranked Search on Encrypted Cloud Data”, IOSR Journal of Computer Engineering (IOSR-JCE), PP 28-32, 2015
- Xia Zhihua, Wang Xinhua, Sun Xingming and Wang Qian , “A Secure and Dynamic Multikeyword Ranked Search Scheme over Encrypted Cloud Data”, IEEE Transactions on Parallel and Distributed Systems, Vol. 1, p.p.1-13, 2015
- Strizhov Mikhail, “Towards a Practical and Efficient Search over Encrypted Data in the Cloud”, IEEE International Conference on Cloud Engineering, Vol. 15, p.p. 496-498, 2015
- Chen Chi, Zhu Xiaojie, Shen Peisong, Hu J., Guo S., Tari Z.and Zomaya Albert Y. “An Efficient Privacy Preserving Ranked Keyword Search Method”, IEEE Transactions on Parallel and Distributed Systems, Vol. 1, p.p. 1-14,2015
- Chen Chi, Zhu Xiaojie, Shen Peisong, Hu J., Guo S., Tari Z and Zomaya Albert Y. “An Efficient Privacy Preserving Ranked Keyword Search Method”, IEEE Transactions on Parallel and Distributed Systems, Vol. 1, p.p. 1-14, 2015
- Cash D., Jarecki S., Julta C., Krawczyk H., Rosu M. –C. and Steiner M. “Dynamic Searchable encryption in very large databases: Data structures and implementation”, in Proc of NDSS, vol. 14, 2014
- Wang B., Yu S., Lou W. and Hou Y.T. “Privacy preserving multi-keyword fuzzy search over encrypted data in the cloud”, in IEEE INFOCOM, 2014.
- Zhao Ruihui, Li Hongwei, Yang Yi and Liang Yu, “Privacy-preserving Personalized Search over Encrypted Cloud Data Supporting Multi-keyword Ranking”, Sixth International Conference on Wireless Communications and Signal Processing (WCSP), Vol. 14, p.p. 1-6,2014
- Ren Yanzhi, Chen Yingying, Yang Jie, Xie Bin, “Privacy-preserving Ranked MultiKeyword Search Leveraging Polynomial Function in Cloud Computing”, Vol. 15,p.p. 594-600, 2014
- Sun Wenhai, Wang Bing, Cao Ning, Li Ming, Lou Wenjing, Hou Y. Thomas, Fellow and Hui Li, “Verifiable Privacy Preserving Multi Keyword Text Search in the Cloud Supporting Similarity Based Ranking”, IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 11, p.p. 3025-3035, November 2014
- Ajai Ajni.K. and Rajesh R.S., “Hierarchical Multi-keyword Ranked Search for Secured Document Retrieval in Public Clouds”, International Conference on Communication and Network Technologies (ICCNT), Vol. 14, p.p. 33-37, 2014
- Zhang Wei, Xiao Sheng, Lin Yaping, Zhou Ting and Zhou Siwang, “Secure Ranked MultiKeyword Search for Multiple Data Owners in Cloud Computing”, 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Vol. 14, p.p. 276-286, 2014
- Wang Qinqin, Zhu Yanqin and Luo Xizhao,” Multi-user Searchable Encryption with FineGrained Access Control without Key Sharing”, 3rd International Conference on Advanced Computer Science Applications and Technologies, Vol. 15,p.p.145-150,2014
- Cao Ning , Wang Cong, Li Ming, Ren Kui and Lou Wenjing, “Privacy - Preserving Multi Keyword Ranked Search over Encrypted Cloud Data”, IEEE Transactions On Parallel And Distributed Systems, Vol. 25, No. 1, p.p. 222-333, January 2014.
- Intensified Multidimensional Style for User Belief Mining from Social Media
Abstract Views :130 |
PDF Views:0
Authors
Affiliations
1 J.R.N. Rajasthan Vidyapeeth, Udaipur, IN
2 Govt. Engineering College, Bikaner, IN
3 VC, J.R.N. Rajasthan Vidyapeeth, Udaipur, IN
1 J.R.N. Rajasthan Vidyapeeth, Udaipur, IN
2 Govt. Engineering College, Bikaner, IN
3 VC, J.R.N. Rajasthan Vidyapeeth, Udaipur, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 26 (2017), Pagination: 244-251Abstract
Big data analytics is used to examine large sets of data which may contain diversity of different types of data, it can be used to decrypt cryptic symbiology, correlating previously not known variables, finding the trends in the market, checking preferences of customers and finding out data about various businesses and institutions. The re-sult can be used to conduct informative market strategizing, checking out chances to generate higher income, to pro-vide effective consumer-oriented services, to improve effectiveness of operations and to provide competition-edge over competitors and other institutional profits. The main aim of Big data Analysis is to aid in better and informative decision making for the firms by taking advantage of capable data-scientists, genius model makers as well as other trained scientists to verify chunks of information that may be unused by the traditional programs. It may include ana-lyzing special log and internet based information, internet network data and social-analysis of reports. It can also be used to analyze network records, caller details and other information gathered and operated by IOT devices. It can be used to bind with big data and unstructured data as well as partially structured data.Keywords
Big Data Analytics, Emotions Mining, Social Media Analytics, User Belief Mining.References
- Awrahman, B., & Alatas, B. (2017). Sentiment Analysis and Opinion Mining within Social Networks using Kons-tanz Information Miner. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1), 15-22.
- Hürlimann, M., Davis, B., Cortis, K., Freitas, A., Handschuh, S., & Fernández, S. (2016, September). A Twitter Sentiment Gold Standard for the Brexit Referendum. In Proceedings of the 12th International Conference on Se-mantic Systems (pp. 193-196). ACM.
- Kotwal, A., Fulari, P., Jadhav, D., & Kad, R. (2016). Improvement in Sentiment Analysis of Twitter Data Using Hadoop. Imperial Journal of Interdisciplinary Research, 2(7).
- Cambria, E., Fu, J., Bisio, F., & Poria, S. (2015, January). AffectiveSpace 2: Enabling Affective Intuition for Con-cept-Level Sentiment Analysis. In AAAI (pp. 508-514).
- Martínez-Cámara, E., Martín-Valdivia, M. T., Urena-López, L. A., & Montejo-Ráez, A. R. (2014). Sentiment anal-ysis in Twitter. Natural Language Engineering, 20(01), 1-28.
- Abdul-Mageed, M., Diab, M., & Kübler, S. (2014). SAMAR: Subjectivity and sentiment analysis for Arabic social media. Computer Speech & Language, 28(1), 20-37.
- Cambria, E., Schuller, B., Liu, B., Wang, H., & Havasi, C. (2013). Knowledge-based approaches to concept-level sentiment analysis. IEEE Intelligent Systems, 28(2), 12-14.
- Shahheidari, S., Dong, H., & Daud, M. N. R. B. (2013, July). Twitter sentiment mining: A multi domain analysis. In Complex, Intelligent, and Software Intensive Systems (CISIS), 2013 Seventh International Conference on (pp. 144-149). IEEE.
- Saif, H., He, Y., & Alani, H. (2012, November). Semantic sentiment analysis of twitter. In International Semantic Web Conference (pp. 508-524). Springer Berlin Heidelberg.
- Leong, C. K., Lee, Y. H., & Mak, W. K. (2012). Mining sentiments in SMS texts for teaching evaluation. Expert Systems with Applications, 39(3), 2584-2589.
- Tan, C., Lee, L., Tang, J., Jiang, L., Zhou, M., & Li, P. (2011, August). User-level sentiment analysis incorporating social networks. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1397-1405). ACM.
- Asur, S., & Huberman, B. A. (2010, August). Predicting the future with social media. In Web Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on (Vol. 1, pp. 492-499). IEEE.
- Bifet, A., & Frank, E. (2010, October). Sentiment knowledge discovery in twitter streaming data. In International Conference on Discovery Science (pp. 1-15). Springer Berlin Heidelberg.
- Bollen, J., Mao, H., & Pepe, A. (2011). Modeling public mood and emotion: Twitter sentiment and socio-economic phenomena. ICWSM, 11, 450-453.
- Awrahman, B., & Alatas, B. (2017). Sentiment Analysis and Opinion Mining within Social Networks using Kons-tanz Information Miner. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 9(1), 15-22.
- Zhao, J., & Gui, X. (2017). Comparison Research on Text Pre-processing Methods on Twitter Sentiment Analy-sis. IEEE
- A Method for Software Metrics Assessment to Heighten the Quality of Source Code
Abstract Views :179 |
PDF Views:0
Authors
Affiliations
1 JRN Rajasthan Vidyapeeth, Udaipur, IN
2 Govt. Engineering College Bikaner, IN
1 JRN Rajasthan Vidyapeeth, Udaipur, IN
2 Govt. Engineering College Bikaner, IN
Source
Research Cell: An International Journal of Engineering Sciences, Vol 26 (2017), Pagination: 252-259Abstract
The Source Code quality and understandability entirely depends on the comments specified at appropriate locations. The current paradigms do not propose any metric or methodology that is useful for checking the source comments quality. The proposed model and empirical parser based implementation emphasize the efficient and meaningful usage of code comments in the source code regardless of the language or script. In this research work, the empirical and pragmatic evaluation of the source understandability and the escalation is done using survey based analytics. The source code comments and understanding factors are taken into the consideration so that the reusability of the source code can be increased. The key parameters for evaluation of source code include cohesion, coupling and the type of source code. The type of source code is having the flavor of procedural or object oriented paradigm so that any type of source code with its inherent feature points can be analyzed and predicted.Keywords
Source Code Understanding, Software Metrics, Software Quality, Software Reusability.References
- T. Tenny "Program Readability: Procedures Versus Comments " IEEE Trans. Softw. Eng. vol. 14 no. 9 1988.
- S. N. Woodfield H. E. Dunsmore and V. Y. Shen "The effect of modularization and comments on pro-gram comprehension " ser. ICSE '81 1981.
- S. C. B. de Souza N. Anquetil and K. M. de Oliveira "A Study of the Documentation Essential to Soft-ware Maintenance " ser. SIGDOC '05 2005.
- C. S. Hartzman and C. F. Austin "Maintenance productivity: Observations based on an experience in a large system environment " ser. CASCON '93 1993.
- B. P. Lientz "Issues in Software Maintenance " ACM Computing Surveys vol. 15 no. 3 1983.
- M. J. B. García and J. C. G. Alvarez "Maintainability as a Key Factor in Maintenance Productivity: A Case Study " ser. ICSM '96 1996.
- P. Oman and J. Hagemeister "Metrics for Assessing a Software System's Maintainability " ser. ICSM '92 1992.
- I. S. Microsystems Code Conventions for the Java Programming Language 1997. [Online]. Available: http://www.oracle.com/ technetwork/java/codeconv- 138413.html
- N. Khamis R. Witte and J. Rilling "Automatic Quality Assessment of Source Code Comments: the Java-docMiner " ser. NLDB '10 2010.
- M.-A. Storey J. Ryall R. I. Bull D. Myers and J. Singer "TODO or To Bug: Exploring How Task Anno-tations Play a Role in the Work Practices of Software Developers " ser. ICSE '08 2008.