Int. J. Soc. Comput. Cyber Phys. Syst.最新文献

筛选
英文 中文
Are tag clouds useful for navigation? A network-theoretic analysis 标签云对导航有用吗?网络理论分析
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 2011-11-11 DOI: 10.1504/IJSCCPS.2011.043603
D. Helic, C. Trattner, M. Strohmaier, K. Andrews
{"title":"Are tag clouds useful for navigation? A network-theoretic analysis","authors":"D. Helic, C. Trattner, M. Strohmaier, K. Andrews","doi":"10.1504/IJSCCPS.2011.043603","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2011.043603","url":null,"abstract":"It is a widely held belief among designers of social tagging systems that tag clouds represent a useful tool for navigation. This is evident in the increasing number of tagging systems offering tag clouds, which hints towards an implicit assumption that tag clouds support efficient navigation. In this paper, we test this assumption from a network-theoretic perspective, and show that in many cases, it does not hold. We first model navigation in tagging systems and then simulate the navigation process in such a graph. We analyse the navigability of three tagging datasets with regard to different user interface restrictions imposed by tag clouds. Our results confirm that tag clouds have efficient navigation properties in theory, but they also show that popular user interface decisions, such as ‘pagination’ significantly impair their navigability. Finally, we identify a number of avenues for further research and the design of novel tag cloud construction algorithms.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133113494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A hybrid framework for social tag recommendation using context driven social information 使用上下文驱动的社会信息的社会标签推荐的混合框架
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJSCCPS.2017.10005809
G. Deepak, Sheeba Priyadarshini
{"title":"A hybrid framework for social tag recommendation using context driven social information","authors":"G. Deepak, Sheeba Priyadarshini","doi":"10.1504/IJSCCPS.2017.10005809","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005809","url":null,"abstract":"Tagging images uploaded on the web is important as tags serve as the primary entities for future retrieval of these images. The numbers of images uploaded to the web via social networking sites is increasing in the era of smart phone technology and the internet. These images need to be tagged correctly which would ease its future retrieval. With the emergence of the Web 3.0 which is a standard for semantic web, a semantic tag recommender is desirable. In this paper, a context aware social tagger is proposed which recommends high quality tags by using varied contexts of social information. A semantic collaborative filtering strategy is proposed to make the social tagger semantics compliant. The social tagger also encompasses an intelligent agent, driven by second order co-occurrence pointwise mutual information strategy to increase the relevance and quality of the recommended tags. The proposed social tagger yields an average accuracy of 84.04%.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Secure resource sharing in grid system without public key settings 网格系统中无需公钥设置的安全资源共享
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/ijsccps.2021.117939
M. Das
{"title":"Secure resource sharing in grid system without public key settings","authors":"M. Das","doi":"10.1504/ijsccps.2021.117939","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117939","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"24 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131322990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big data characteristics, challenges, architectures, analytics and applications: a review 大数据特征、挑战、架构、分析和应用综述
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJSCCPS.2017.10005064
Singh Vijendra
{"title":"Big data characteristics, challenges, architectures, analytics and applications: a review","authors":"Singh Vijendra","doi":"10.1504/IJSCCPS.2017.10005064","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005064","url":null,"abstract":"Big data has evolved as a most challenging area in scientific study and research. It has drawn much attention during the last few years. It influences our modern society, business, government, healthcare, research and almost every discipline. In this data-driven era, where data is continuously acquired from a verity of sources for different purposes, the ability to make timely decisions based on available data is a very critical task. The massive data size, variety, velocity, accuracy and high dimensionality presents new challenges to big data. This paper attempts to present some challenges of big data. In addition, a study on the conceptual design of big data architecture presented on specific big data applications. In this paper, we presented research work on big data analytics techniques in the areas of text, sentiment, video, social media and predictive analytics. A comparative analysis on selected big data applications has been presented in detail.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116747682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion mining for digital India scheme using fuzzy sets 基于模糊集的数字印度方案意见挖掘
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJSCCPS.2017.10005811
P. Manoharan, L. Agilandeeswari, M. S. Praneeth
{"title":"Opinion mining for digital India scheme using fuzzy sets","authors":"P. Manoharan, L. Agilandeeswari, M. S. Praneeth","doi":"10.1504/IJSCCPS.2017.10005811","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005811","url":null,"abstract":"In this paper, we describe the development of opinion mining for digital India (OMDI) scheme using fuzzy sets. According to people's opinions and reviews, the sentiment classifier will classify the emotion and polarity levels of the review. In this modern world, majority of the people will provide their feedback or opinions on the product that has been increased. The opinion mining results will be useful for the users to make better decision. For the classification of sentiment Naive Bayes and fuzzy logic (intuitionistic fuzzy sets) is utilised. By using these algorithms, we defined the polarity levels of the opinions such as positive, negative and neutral. In general, the sentiment classification will be done by utilising NLP, machine learning, statistical approach and classification methods. By mining powerful reasoning potential of fuzzy logics, we have accredited the polarities to the people's reviews according to their usage. Fuzzy logic deals with the vagueness by accrediting the continuous membership values to opinion words according to their usage in substance.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"181 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132274451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rule based anonymisation against inference attack in social networks 社交网络中基于规则的匿名对抗推理攻击
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/ijsccps.2021.117952
Nidhi Desai, M. Das
{"title":"Rule based anonymisation against inference attack in social networks","authors":"Nidhi Desai, M. Das","doi":"10.1504/ijsccps.2021.117952","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117952","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed blockchains for collaborative product designs in smart cities 智能城市协同产品设计的分布式区块链
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/ijsccps.2021.117977
S. Benedict
{"title":"Distributed blockchains for collaborative product designs in smart cities","authors":"S. Benedict","doi":"10.1504/ijsccps.2021.117977","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117977","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120958809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware detection techniques and tools for Android Android恶意软件检测技术和工具
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJSCCPS.2017.10005813
S. Rani, Dr. Kanwalvir Singh Dhindsa
{"title":"Malware detection techniques and tools for Android","authors":"S. Rani, Dr. Kanwalvir Singh Dhindsa","doi":"10.1504/IJSCCPS.2017.10005813","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2017.10005813","url":null,"abstract":"Smartphone, with its powerful capabilities, has been wildly used in every area of our day-to-day life. The enormous kinds of applications installed in these smartphones like WhatsApp and Viber have changed the way people live and communicate. An estimate by Gartner indicates that 90% of the phones by the end of 2018 will be smartphones (MobileStorm, 2014). The most popular mobile operating system today in the industry is Android. However, with the prevalence of Android smartphone, malware authors have started to target it. Although mobile anti-malware solutions could be installed to scan malicious apps before they are made available for download, existing mobile anti-malware software relies exclusively upon a prior knowledge of malware samples in order to extract and deploy signatures for subsequent detection. Moreover, malware writers may update existing malware samples to dodge detection. Hence, this imprudent nature makes them inadequate in identifying new or mutated malware. This paper explores different techniques and tools available to analyse and detect Android malware. It also highlights the features and limitations of these techniques and tools.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126486603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to text clustering using shift k-medoid 一种新的文本聚类方法
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/IJSCCPS.2019.100186
Mohit, A. Kumari, Meghna Sharma
{"title":"A novel approach to text clustering using shift k-medoid","authors":"Mohit, A. Kumari, Meghna Sharma","doi":"10.1504/IJSCCPS.2019.100186","DOIUrl":"https://doi.org/10.1504/IJSCCPS.2019.100186","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116115271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
iCOPS: insider attack detection in distributed file systems iCOPS:分布式文件系统内部攻击检测
Int. J. Soc. Comput. Cyber Phys. Syst. Pub Date : 1900-01-01 DOI: 10.1504/ijsccps.2021.117972
Riddhi Solani, M. Das
{"title":"iCOPS: insider attack detection in distributed file systems","authors":"Riddhi Solani, M. Das","doi":"10.1504/ijsccps.2021.117972","DOIUrl":"https://doi.org/10.1504/ijsccps.2021.117972","url":null,"abstract":"","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130314049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信