Volume 6 Issue 2- February 2016
Page | Title | Full Text |
---|---|---|
78-81 | A Survey On Efficient Service Recommendation
On Large Data Clusters Anumol Johnson,Divya R Abstract
Recommendation system is an information filtering technique, which provides users with information, which he/she may be interested in. It helps in addressing the information overload problem by retrieving the information desired by the user based on his or similar users' preferences and interests. Service recommender systems proves to be a valuable tool for providing appropriate recommendations to users. Most of existing service recommender systems present the same ratings and rankings of services to different users without considering diverse users preferences, and therefore fails to meet users personalized requirements. A Keyword-Aware Service Recommendation method, named KASR has been prposed to address the above challenges. It aims at presenting a personalized service recommendation list and recommending the most appropriate services to the users effectively. Specifically, keywords are used to indicate users preferences, and a user-based Collaborative Filtering algorithm is adopted to generate appropriate recommendations. To improve its scalability and efficiency in big data environment, KASR is implemented on Hadoop, a widely-adopted distributed computing platform using the MapReduce parallel processing paradigm. Keywords- Recommendation System, Hadoop, MapReduce, Filtering Algorithms |
Full Text PDF |
82-88 | Empirical Evaluation of Metrics to Assess
Software Product Line Feature Model Usability Geetika Vyas and Dr.Amita Sharma Abstract
Software product line represents systems having conceptual similarity. All the systems in the product line have commonalities and variability. Feature models are often used to represent this intrinsic commonality and variability. They have a tree-like structure. A feature model which is low in quality will have negative effect over all the products belonging to the product line. Thus, early indicators in the form of metrics are required to assess quality of feature models. Assessments of quality attributes will help in avoiding the consequences of inferior quality and faulty design at the later stages of production. Quality attributes are of two types: first type of attributes is internal which can be measured through product related features like length, complexity, efficiency etc. Second are external attributes which can be assessed once the product is fully functional like usability, reliability, maintainability etc. Usability is an external attribute which focuses on easy and efficient product usage. In reference to feature models usability is an essential quality to be possessed. In this paper, we intend to validate an existing structural metrics for software product line feature models. In our research, we try to examine whether the available metrics are fair indicators of the three main sub characteristics of usability viz. learnability, understandability and communicativeness. We try to analysis whether these existing metrics for feature models have a correlation with feature model usability. For this we have employed statistical correlation techniques. Results obtained from the empirical validation shows that the metrics are correlated to the subjective perception regarding the usability of the feature models.
|
Full Text PDF |
89-94 | Advanced Railway Safety Monitoring System
based on Wireless Sensor Networks Velmurugan .K , Rajesh.T Abstract
Railways comprise a large infrastructure and are an important mode of transportation in many countries. Railways are the lifelines of a country. The railways have become a new means of transportation owing to their capacity, speed, and reliability, being closely associated with passenger and goods transportation; they have high risk associated with them in terms of human lives and cost of assets . The poor maintenance of the railways can lead to accidents. New technologies for railways and better safety measures are introduced time to time but still accidents do occur. Thus, a proper strategy is required for maintenance and inspection of tracks. General Terms-Rail Crack Detector System, Railway Safety System, Wireless Sensor Network, Monitoring System etc. Keywords-crack detection, rail track inspection, sensor node etc
|
Full Text PDF |
95-97 | A Survey on Different Techniques for Assured File
Deletion in Cloud Sure Mamatha, V.Lakshma Reddy, A.Amruthavalli Abstract
Cloud computing has been one of the most prominent buzzwords of the IT industry due to its revolutionary model of computing as utility. Cloud computing promises increased flexibility scalability and reliability with promising decreased operational and maintenance costs as every organization is accumulating tons and tons of data, it is quite difficult for the organizations to manage that huge amount of data, So instead of self-maintaining the data the organizations can outsource their data to the cloud storage and can reduce the data management overhead. Cloud storage offers an abstraction of infinite storage space for clients to outsource their data and access it in a pay-as-you-use manner. While we are outsourcing the data to the cloud storage services, managed by third parties, several security concerns will arise in terms of privacy and integrity of the data .The traditional and cloud storage are becoming highly reliable in recovering the data from a disaster/ failure. For them to be reliable the cloud service providers are creating multiple redundant copies of the data and they were spread through the cloud for reliability and availability, without the knowledge of the data owner. One specific issue is as that many number of copies of the data is created, it is hard to delete all those copies, the cloud service may forget to remove all the copies / intentionally may not delete. Some of the copies of data upon request of deleting the data by the data owner. So to ensure the privacy and integrity of data outsourced to the cloud storage, we must design a practically implementable and readily deployable application which ensures security of the outsourced data and provides the data owner the assurance that the data was in a safe state, and all the copies of the data were deleted .this paper discusses several mechanisms available to ensure the assured file deletion. First we discuss the advantages and disadvantages of various mechanisms, and then we propose a practically implementable, readily deployable mechanism which works on top of the existing cloud architecture with minimal management overhead. Key words: cloud storage, policy based file assured deletion, time based deletion
|
Full Text PDF |
- Home
- Author Instruction
- Editorial Board
- Call for Paper
- Current volume
- Archives
- Indexing
- FAQ
- Publication Fees
- Contact
- Citation Index 0.47
Email: ijcsetonline@gmail.com / editor@ijcset.net