{"title":"Are tag clouds useful for navigation? A network-theoretic analysis","authors":"D. Helic, C. Trattner, M. Strohmaier, K. Andrews","doi":"10.1504/IJSCCPS.2011.043603","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2011.043603","url":null,"abstract":"It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in the increasing number of tagging systems offering tag clouds, which hints towards an implicit assumption that tag clouds support efficient navigation. In this paper, we test this assumption from a network-theoretic perspective, and show that in many cases, it does not hold. We first model navigation in tagging systems and then simulate the navigation process in such a graph. We analyse the navigability of three tagging datasets with regard to different user interface restrictions imposed by tag clouds. Our results confirm that tag clouds have efficient navigation properties in theory, but they also show that popular user interface decisions, such as ‘pagination’ significantly impair their navigability. Finally, we identify a number of avenues for further research and the design of novel tag cloud construction algorithms.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133113494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A hybrid framework for social tag recommendation using context driven social information","authors":"G. Deepak, Sheeba Priyadarshini","doi":"10.1504/IJSCCPS.2017.10005809","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005809","url":null,"abstract":"Tagging images uploaded on the web is important as tags serve as the primary entities for future retrieval of these images. The numbers of images uploaded to the web via social networking sites is increasing in the era of smart phone technology and the internet. These images need to be tagged correctly which would ease its future retrieval. With the emergence of the Web 3.0 which is a standard for semantic web, a semantic tag recommender is desirable. In this paper, a context aware social tagger is proposed which recommends high quality tags by using varied contexts of social information. A semantic collaborative filtering strategy is proposed to make the social tagger semantics compliant. The social tagger also encompasses an intelligent agent, driven by second order co-occurrence pointwise mutual information strategy to increase the relevance and quality of the recommended tags. The proposed social tagger yields an average accuracy of 84.04%.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure resource sharing in grid system without public key settings","authors":"M. Das","doi":"10.1504/ijsccps.2021.117939","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117939","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131322990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big data characteristics, challenges, architectures, analytics and applications: a review","authors":"Singh Vijendra","doi":"10.1504/IJSCCPS.2017.10005064","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005064","url":null,"abstract":"Big data has evolved as a most challenging area in scientific study and research. It has drawn much attention during the last few years. It influences our modern society, business, government, healthcare, research and almost every discipline. In this data-driven era, where data is continuously acquired from a verity of sources for different purposes, the ability to make timely decisions based on available data is a very critical task. The massive data size, variety, velocity, accuracy and high dimensionality presents new challenges to big data. This paper attempts to present some challenges of big data. In addition, a study on the conceptual design of big data architecture presented on specific big data applications. In this paper, we presented research work on big data analytics techniques in the areas of text, sentiment, video, social media and predictive analytics. A comparative analysis on selected big data applications has been presented in detail.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opinion mining for digital India scheme using fuzzy sets","authors":"P. Manoharan, L. Agilandeeswari, M. S. Praneeth","doi":"10.1504/IJSCCPS.2017.10005811","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005811","url":null,"abstract":"In this paper, we describe the development of opinion mining for digital India (OMDI) scheme using fuzzy sets. According to people's opinions and reviews, the sentiment classifier will classify the emotion and polarity levels of the review. In this modern world, majority of the people will provide their feedback or opinions on the product that has been increased. The opinion mining results will be useful for the users to make better decision. For the classification of sentiment Naive Bayes and fuzzy logic (intuitionistic fuzzy sets) is utilised. By using these algorithms, we defined the polarity levels of the opinions such as positive, negative and neutral. In general, the sentiment classification will be done by utilising NLP, machine learning, statistical approach and classification methods. By mining powerful reasoning potential of fuzzy logics, we have accredited the polarities to the people's reviews according to their usage. Fuzzy logic deals with the vagueness by accrediting the continuous membership values to opinion words according to their usage in substance.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rule based anonymisation against inference attack in social networks","authors":"Nidhi Desai, M. Das","doi":"10.1504/ijsccps.2021.117952","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117952","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware detection techniques and tools for Android","authors":"S. Rani, Dr. Kanwalvir Singh Dhindsa","doi":"10.1504/IJSCCPS.2017.10005813","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005813","url":null,"abstract":"Smartphone, with its powerful capabilities, has been wildly used in every area of our day-to-day life. The enormous kinds of applications installed in these smartphones like WhatsApp and Viber have changed the way people live and communicate. An estimate by Gartner indicates that 90% of the phones by the end of 2018 will be smartphones (MobileStorm, 2014). The most popular mobile operating system today in the industry is Android. However, with the prevalence of Android smartphone, malware authors have started to target it. Although mobile anti-malware solutions could be installed to scan malicious apps before they are made available for download, existing mobile anti-malware software relies exclusively upon a prior knowledge of malware samples in order to extract and deploy signatures for subsequent detection. Moreover, malware writers may update existing malware samples to dodge detection. Hence, this imprudent nature makes them inadequate in identifying new or mutated malware. This paper explores different techniques and tools available to analyse and detect Android malware. It also highlights the features and limitations of these techniques and tools.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel approach to text clustering using shift k-medoid","authors":"Mohit, A. Kumari, Meghna Sharma","doi":"10.1504/IJSCCPS.2019.100186","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100186","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}