{"title":"An Evolutionary Feature Clustering Approach for Anomaly Detection Using Improved Fuzzy Membership Function: Feature Clustering Approach for Anomaly Detection","authors":"G. R. Kumar, G. Narsimha, N. Mangathayaru","doi":"10.4018/IJITWE.2019100102","DOIUrl":"https://doi.org/10.4018/IJITWE.2019100102","url":null,"abstract":"Traditionally, IDS have been developed by applying machine learning techniques and followed single learning mechanisms or multiple learning mechanisms. Dimensionality is an important concern which affects classification accuracies and eventually the classifier performance. Feature selection approaches are widely studied and applied in research literature. In this work, a new fuzzy membership function to detect anomalies and intrusions and a method for dimensionality reduction is proposed. CANN could not address R2L and U2R attacks and have completely failed by showing these attack accuracies almost zero. Following CANN, the CLAPP approach has shown better classifier accuracies when compared to classifiers kNN, and SVM. This research aims at improving the accuracy achieved by CLAPP, CANN, and kNN. Experimental results show accuracies obtained using proposed approach is better when compared to other existing approaches. In particular, the detection of U2R and R2L attacks to user accuracies are recorded to be very much promising.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130340349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Based QoS Prediction and Rank Aggregation of Web Services","authors":"V. Mareeswari, E. Sathiyamoorthy","doi":"10.4018/IJITWE.2019100105","DOIUrl":"https://doi.org/10.4018/IJITWE.2019100105","url":null,"abstract":"Everyday activities are equipped with smart intellectual possessions in the modern Internet domain for which a wide range of web services are deployed in business, health-care systems, and environmental solutions. Entire services are accessed through web applications or hand-held computing devices. The recommender system is more prevalent in commercial applications. This research predicts the preference of consumers and lists the recommended services in order of ranking for consumers to choose services in a short time span. This proposed approach aims to offer the exact prediction of missing QoS (quality of service) value of web services at a specified time slice. The uncertainty of QoS value has been predicted using the cloud model theory. The focus is to give the global ranking using the aggregated ranking of the consumer's ranking list, which has been obtained through the Kemeny optimal aggregation algorithm. In this work, multidimensional QoS data of web services have experimented and given an accurate prediction and ranking in the web environment.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131497045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Segun Aina, S. Okegbile, A. Oluwaranti, Oghenerukome Brenda Okoro, Tayo Obasanya
{"title":"Toward a More Robust Home Automated System: Introducing a Voice Activation Technique via Pubnub","authors":"Segun Aina, S. Okegbile, A. Oluwaranti, Oghenerukome Brenda Okoro, Tayo Obasanya","doi":"10.4018/IJITWE.2019070105","DOIUrl":"https://doi.org/10.4018/IJITWE.2019070105","url":null,"abstract":"The work reported in this article developed a home automated system using voice activation. This is with a view to providing users complete control over electrical appliances using simple easy to remember voice commands on an Android mobile device. This work was implemented using the Atmega 328 microcontroller, Relays and a Wi-Fi shield. The human voice is first converted to text using a Natural language processing tool from the Android based application. Thereafter, the text is sent over the internet via the PubNub to the microcontroller. The Atmega 328 microcontroller was programmed on an Arduino using C programming language and the Android based application was developed using Android Software Development Kit. Results obtained from the testing show that the implemented system achieves the mean scores of 8, 7.6, and 7.2 for ease of use, learnability and effectiveness respectively justifying the fact that the system is capable of controlling appliances by changing their state (ON/OFF) from remote a location with a response time within the reasonable limit.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132229907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Customized Quality Model for Software Quality Assurance in Agile Environment","authors":"Parita Jain, Arun Sharma, Laxmi Ahuja","doi":"10.4018/IJITWE.2019070104","DOIUrl":"https://doi.org/10.4018/IJITWE.2019070104","url":null,"abstract":"The agile approach grew dramatically over traditional approaches. The methodology focuses more on rapid development, quick evaluation, quantifiable progress and continuous delivery satisfying the customer desire. In view of this, there is a need for measurement of the agile development process. In this respect, the present research work investigates the inter-relationships and inter-dependencies between the identified quality factors (QF), thereby outlining which of these QF have high driving power and dependence power, working indirectly towards the success of agile development process. This paper proposes a new agile quality model, utilizing an interpretive structural modeling (ISM) approach and the identified factors are classifies using Matriced' Impacts Croise's Multiplication Applique´e a UN Classement (MICMAC) approach. The research findings can significantly impact agile development process by understanding how these QF related to each other and how they can be adopted.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121765135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Event Detection in Twitter Through Feature Analysis","authors":"Dharini Ramachandran, P. Ramasubramanian","doi":"10.4018/IJITWE.2019070101","DOIUrl":"https://doi.org/10.4018/IJITWE.2019070101","url":null,"abstract":"The Digital era has the benefits in unearthing a large amount of imperative material. One such digital document is social media data, which when processed can give rise to information which can be helpful to our society. One of the many things that we can unearth from social media is events. Twitter is a very popular microblog that encompasses fruitful and rich information on real world events and popular topics. Event detection in view of situational awareness for crisis response is an important need of the current world. The identification of tweets comprising information that may assist in help and rescue operation is crucial. Most pertinent features for this process of identification are studied and the inferences are given in this article. The efficiency and practicality of the features are discussed here. This article also presents the results of experimentation carried out to assess the most relevant combination of features for improved performance in event detection from Twitter.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129708719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Feature Optimization in Sentiment Analysis by Term Co-occurrence Fitness Evolution (TCFE)","authors":"S. S. Sonawane, S. Kolhe","doi":"10.4018/IJITWE.2019070102","DOIUrl":"https://doi.org/10.4018/IJITWE.2019070102","url":null,"abstract":"The opinion of a target audience is a major objective for the assessing state of efficacy pertaining to reviews, business decisions surveys, and such factors that require decision making. Feature selection turns out to be a critical task for developing robust and high levels of classification while decreasing training time. Models are required for stating the scope for depicting optimal feature selection for escalating feature selection strategies to escalate maximal accuracy in opinion mining. Considering the scope for improvement, an n-gram feature selection approach is proposed where optimal features based on term co-occurrence fitness is proposed in this article. Genetic algorithms focus on determining the evolution and solution to attain deterministic and maximal accuracy having a minimal level of computational process for reflecting on the sentiment scope for sentiment. Evaluations reflect that the proposed solution is capable, which outperforms the separate filter-oriented feature selection models of sentiment classification.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129772571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Archana Kero, Abhirup Khanna, Devendra Kumar, A. Agarwal
{"title":"An Adaptive Approach Towards Computation Offloading for Mobile Cloud Computing","authors":"Archana Kero, Abhirup Khanna, Devendra Kumar, A. Agarwal","doi":"10.4018/IJITWE.2019040104","DOIUrl":"https://doi.org/10.4018/IJITWE.2019040104","url":null,"abstract":"The widespread acceptability of mobile devices in present times have caused their applications to be increasingly rich in terms of the functionalities they provide to the end users. Such applications might be very prevalent among users but the execution results in dissipating many of the device end resources. Mobile cloud computing (MCC) has a solution to this problem by offloading certain parts of the application to cloud. At the first place, one might find computation offloading quite promising in terms of saving device end resources but eventually may result in being the other way around if performed in a static manner. Frequent changes in device end resources and computing environment variables may lead to a reduction in the efficiency of offloading techniques and even cause a drop in the quality of service for applications involving the use of real-time information. In order to overcome this problem, the authors propose an adaptive computation offloading framework for data stream applications wherein applications are partitioned dynamically followed by being offloaded depending upon the device end parameters, network conditions, and cloud resources. The article also talks about the proposed algorithm that depicts the workflow of the offloading model. The proposed model is simulated using the CloudSim simulator. In the end, the authors illustrate the working of the proposed system along with the simulated results.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132729331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Scalable Signature Based Subspace Clustering Approach for Big Data","authors":"T. Gayathri, D. Bhaskari","doi":"10.4018/IJITWE.2019040103","DOIUrl":"https://doi.org/10.4018/IJITWE.2019040103","url":null,"abstract":"“Big data” as the name suggests is a collection of large and complicated data sets which are usually hard to process with on-hand data management tools or other conventional processing applications. A scalable signature based subspace clustering approach is presented in this article that would avoid identification of redundant clusters. Various distance measures are utilized to perform experiments that validate the performance of the proposed algorithm. Also, for the same purpose of validation, the synthetic data sets that are chosen have different dimensions, and their size will be distributed when opened with Weka. The F1 quality measure and the runtime of these synthetic data sets are computed. The performance of the proposed algorithm is compared with other existing clustering algorithms such as CLIQUE.INSCY and SUNCLU.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116841672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Attribute-Based Assured Deletion Scheme in Cloud Computing","authors":"Fangfang Shan, Hui Li, Fenghua Li, Yunchuan Guo, Jinbo Xiong","doi":"10.4018/IJITWE.2019040105","DOIUrl":"https://doi.org/10.4018/IJITWE.2019040105","url":null,"abstract":"With the rapid development of cloud computing, it has been increasingly attractive for individuals and groups to store and share data via cloud storage. Once stored in the third-party cloud storage service providers, the privacy and integrity of outsourced data should be attached with more attention as a challenging task. This article presents the attribute-based assured deletion scheme (AADS) which aims to protect and assuredly delete outsourced data in cloud computing. It encrypts outsourced data files with standard cryptographic techniques to guarantee the privacy and integrity, and assuredly deletes data upon revocations of attributes. AADS could be applied to solve important security problems by supporting fine-grained attribute-based policies and their combinations. According to the comparison and analysis, AADS provides efficient data encryption and flexible attribute-based assured deletion for cloud-stored data with an acceptable concession in performance cost.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132669083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable l-Diversity: An Extension to Scalable k-Anonymity for Privacy Preserving Big Data Publishing","authors":"U. P. Rao, Brijesh B. Mehta, Nikhil Kumar","doi":"10.4018/IJITWE.2019040102","DOIUrl":"https://doi.org/10.4018/IJITWE.2019040102","url":null,"abstract":"Privacy preserving data publishing is one of the most demanding research areas in the recent few years. There are more than billions of devices capable to collect the data from various sources. To preserve the privacy while publishing data, algorithms for equivalence class generation and scalable anonymization with k-anonymity and l-diversity using MapReduce programming paradigm are proposed in this article. Equivalence class generation algorithms divide the datasets into equivalence classes for Scalable k-Anonymity (SKA) and Scalable l-Diversity (SLD) separately. These equivalence classes are finally fed to the anonymization algorithm that calculates the Gross Cost Penalty (GCP) for the complete dataset. The value of GCP gives information loss in input dataset after anonymization.","PeriodicalId":222340,"journal":{"name":"Int. J. Inf. Technol. Web Eng.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134378508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}