A Survey of Automatic Query Expansion in Information Retrieval Abstract-The relative ineffectiveness of information retrieval systems is largely caused by the inaccuracy with which a query formed by a few keywords models the actual user information need. One well known method to overcome this limitation is automatic query expansion (AQE), whereby the user?s original query…
A survey of Big Data in social media using data mining techniques Abstract? World?s largest community Facebook?s ?Like? button pressed 2.7 billion times every day across the web revealing what people care about, such an impact of social media that internet user average almost spends 2.5 hours daily on liking, chatting, poking, tweeting on social…
A Survey of Key Management for Secure Group Communication Abstract? Group communication can benefit from IP multicast to achieve scalable exchange of messages. However, there is a challenge of effectively controlling access to the transmitted data. IP multicast by itself does not provide any mechanisms for preventing nongroup members to have access to the group…
A Survey of Proxy Re-Encryption for Secure Data Sharing in Cloud Computing Abstract?Never before have data sharing been more convenient with the rapid development and wide adoption of cloud computing. However, how to ensure the cloud user?s data security is becoming the main obstacles that hinder cloud computing from extensive adoption. Proxy re-encryption serves as…
A Survey of Task Allocation and Load Balancing in Distributed Systems Abstract?In past decades, significant attention has been devoted to the task allocation and load balancing in distributed systems. Although there have been some related surveys about this subject, each of which only made a very preliminary review on the state of art of one…
A Survey of Vision-Based Traffic Monitoring of Road Intersections Abstract? Visual surveillance of dynamic objects, particularly vehicles on the road, has been, over the past decade, an active research topic in computer vision and intelligent transportation systems communities. In the context of traffic monitoring, important advances have been achieved in environment modeling, vehicle detection, tracking,…
A Survey on Ciphertext-Policy Attribute-based Encryption (CP-ABE) Approaches to Data Security on Mobile Devices and its Application to IoT Abstract-The growth in Cloud Computing and the ubiquity of Mobile devices to access Cloud services has generated a new paradigm, Mobile Cloud Computing (MCC). While the benefits of storing and accessing data in the Cloud are…
A Survey on Trajectory Data Mining: Techniques and Applications Abstract? Rapid advance of location acquisition technologies boosts the generation of trajectory data, which track the traces of moving objects. A trajectory is typically represented by a sequence of timestamped geographical locations. A wide spectrum of applications can benet from the trajectory data mining. Bringing unprecedented…
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis Abstract?A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggressive means, denial-of-service (DoS) attacks cause…
A System for Timely and Controlled Information Sharing in Emergency Situations Abstract? During natural disasters or emergency situations, an essential requirement for an effective emergency management is the information sharing.< Final Year Projects > In this paper, we present an access control model to enforce controlled information sharing in emergency situations. An in-depth analysis of…
A Systematic Review on Educational Data Mining Abstract? Presently educational institutions compile and store huge volumes of data such as student enrolment and attendance records, as well as their examination results. Mining such data yields stimulating information that serves its handlers well. Rapid growth in educational data points to the fact that distilling massive amounts…
A T o p – r Feature Selection Algorithm for Microarray Gene Expression Data Abstract?Feature selection from microarray data has become an ever evolving area of research. Numerous techniques have widely been applied for extraction of genes which are expressed differentially in microarray data. Some of these comprise of studies related to fold-change approach, <...