SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Data Mining IEEE 2014 Projects
Web : www.kasanpro.com Email : sales@kasanpro.com
List Link : http://kasanpro.com/projects-list/data-mining-ieee-2014-projects
Title :Mining Social Media Data for Understanding Student's Learning Experiences
Language : ASP.NET with VB
Project Link :
http://kasanpro.com/p/asp-net-with-vb/mining-social-media-data-understanding-students-learning-experiences
Abstract : Students' informal conversations on social media (e.g. Twitter, Facebook) shed light into their educational
experiences - opinions, feelings, and concerns about the learning process. Data from such uninstrumented
environment can provide valuable knowledge to inform student learning. Analyzing such data, however, can be
challenging. The complexity of student's experiences reflected from social media content requires human
interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we
developed a workflow to integrate both qualitative analysis and large - scale data mining techniques. We focus on
engineering student's Twitter posts to understand issues and problems in their educational experiences. We first
conducted a qualitative analysis on samples taken from about 25,000 tweets related to engagement, and sleep
deprivation. Based on these results, we implemented a multi - label classification algorithm to classify tweets
reflecting student's problems. We then used the algorithm to train a detector of student problems from about 35,000
tweets streamed at the geo - location of Purdue University. This work, for the first time, presents a methodology and
results that show how informal social media data can provide insights into students' experiences.
Title :Mining Social Media Data for Understanding Student's Learning Experiences
Language : ASP.NET with C#
Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/mining-social-media-data-understanding-students-learning-experien
Abstract : Students' informal conversations on social media (e.g. Twitter, Facebook) shed light into their educational
experiences - opinions, feelings, and concerns about the learning process. Data from such uninstrumented
environment can provide valuable knowledge to inform student learning. Analyzing such data, however, can be
challenging. The complexity of student's experiences reflected from social media content requires human
interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we
developed a workflow to integrate both qualitative analysis and large - scale data mining techniques. We focus on
engineering student's Twitter posts to understand issues and problems in their educational experiences. We first
conducted a qualitative analysis on samples taken from about 25,000 tweets related to engagement, and sleep
deprivation. Based on these results, we implemented a multi - label classification algorithm to classify tweets
reflecting student's problems. We then used the algorithm to train a detector of student problems from about 35,000
tweets streamed at the geo - location of Purdue University. This work, for the first time, presents a methodology and
results that show how informal social media data can provide insights into students' experiences.
Title :Mining Social Media Data for Understanding Student's Learning Experiences
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/mining-social-media-data-understanding-students-learning-experiences-implement
Abstract : Students' informal conversations on social media (e.g. Twitter, Facebook) shed light into their educational
experiences - opinions, feelings, and concerns about the learning process. Data from such uninstrumented
environment can provide valuable knowledge to inform student learning. Analyzing such data, however, can be
challenging. The complexity of student's experiences reflected from social media content requires human
interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we
developed a workflow to integrate both qualitative analysis and large - scale data mining techniques. We focus on
engineering student's Twitter posts to understand issues and problems in their educational experiences. We first
conducted a qualitative analysis on samples taken from about 25,000 tweets related to engagement, and sleep
deprivation. Based on these results, we implemented a multi - label classification algorithm to classify tweets
reflecting student's problems. We then used the algorithm to train a detector of student problems from about 35,000
tweets streamed at the geo - location of Purdue University. This work, for the first time, presents a methodology and
results that show how informal social media data can provide insights into students' experiences.
Title :Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks
Language : ASP.NET with VB
Project Link : http://kasanpro.com/p/asp-net-with-vb/viral-marketing-cost-effective-time-critical-campaigns-large-scale-social-n
Abstract : Online social networks (OSNs) have become one of the most effective channels for marketing and
advertising. Since users are often influenced by their friends, "wordof- mouth" exchanges, so-called viral marketing, in
social networks can be used to increase product adoption or widely spread content over the network. The common
perception of viral marketing about being cheap, easy, and massively effective makes it an ideal replacement of
traditional advertising. However, recent studies have revealed that the propagation often fades quickly within only few
hops from the sources, counteracting the assumption on the self-perpetuating of influence considered in literature.
With only limited influence propagation, is massively reaching customers via viral marketing still affordable? How to
economically spend more resources to increase the spreading speed? We investigate the cost-effective massive viral
marketing problem, taking into the consideration the limited influence propagation. Both analytical analysis based on
power-law network theory and numerical analysis demonstrate that the viral marketing might involve costly seeding.
To minimize the seeding cost, we provide mathematical programming to find optimal seeding for medium-size
networks and propose VirAds, an efficient algorithm, to tackle the problem on largescale networks. VirAds guarantees
a relative error bound of O(1) from the optimal solutions in power-law networks and outperforms the greedy heuristics
which realizes on the degree centrality. Moreover, we also show that, in general, approximating the optimal seeding
within a ratio better than O(log n) is unlikely possible.
Title :Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks
Language : ASP.NET with C#
Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/cost-effective-viral-marketing-time-critical-campaigns-large-scale-so
Abstract : Online social networks (OSNs) have become one of the most effective channels for marketing and
advertising. Since users are often influenced by their friends, "wordof- mouth" exchanges, so-called viral marketing, in
social networks can be used to increase product adoption or widely spread content over the network. The common
perception of viral marketing about being cheap, easy, and massively effective makes it an ideal replacement of
traditional advertising. However, recent studies have revealed that the propagation often fades quickly within only few
hops from the sources, counteracting the assumption on the self-perpetuating of influence considered in literature.
With only limited influence propagation, is massively reaching customers via viral marketing still affordable? How to
economically spend more resources to increase the spreading speed? We investigate the cost-effective massive viral
marketing problem, taking into the consideration the limited influence propagation. Both analytical analysis based on
power-law network theory and numerical analysis demonstrate that the viral marketing might involve costly seeding.
To minimize the seeding cost, we provide mathematical programming to find optimal seeding for medium-size
networks and propose VirAds, an efficient algorithm, to tackle the problem on largescale networks. VirAds guarantees
a relative error bound of O(1) from the optimal solutions in power-law networks and outperforms the greedy heuristics
which realizes on the degree centrality. Moreover, we also show that, in general, approximating the optimal seeding
within a ratio better than O(log n) is unlikely possible.
Data Mining IEEE 2014 Projects
Title :Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks
Language : C#
Project Link :
http://kasanpro.com/p/c-sharp/effective-viral-marketing-time-critical-campaigns-large-scale-social-networks
Abstract : Online social networks (OSNs) have become one of the most effective channels for marketing and
advertising. Since users are often influenced by their friends, "wordof- mouth" exchanges, so-called viral marketing, in
social networks can be used to increase product adoption or widely spread content over the network. The common
perception of viral marketing about being cheap, easy, and massively effective makes it an ideal replacement of
traditional advertising. However, recent studies have revealed that the propagation often fades quickly within only few
hops from the sources, counteracting the assumption on the self-perpetuating of influence considered in literature.
With only limited influence propagation, is massively reaching customers via viral marketing still affordable? How to
economically spend more resources to increase the spreading speed? We investigate the cost-effective massive viral
marketing problem, taking into the consideration the limited influence propagation. Both analytical analysis based on
power-law network theory and numerical analysis demonstrate that the viral marketing might involve costly seeding.
To minimize the seeding cost, we provide mathematical programming to find optimal seeding for medium-size
networks and propose VirAds, an efficient algorithm, to tackle the problem on largescale networks. VirAds guarantees
a relative error bound of O(1) from the optimal solutions in power-law networks and outperforms the greedy heuristics
which realizes on the degree centrality. Moreover, we also show that, in general, approximating the optimal seeding
within a ratio better than O(log n) is unlikely possible.
Title :An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/efficient-certificateless-encryption-secure-data-sharing-public-clouds
Abstract : We propose a mediated certificateless encryption scheme without pairing operations for securely sharing
sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key
escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However,
existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable
against partial decryption attacks. In order to address the performance and security issues, in this paper, we first
propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a
practical solution to the problem of sharing sensitive information in public clouds. The cloud is employed as a secure
storage as well as a key generation center. In our system, the data owner encrypts the sensitive data using the cloud
generated users' public keys based on its access control policies and uploads the encrypted data to the cloud. Upon
successful authorization, the cloud partially decrypts the encrypted data for the users. The users subsequently fully
decrypt the partially decrypted data using their private keys. The confidentiality of the content and the keys is
preserved with respect to the cloud, because the cloud cannot fully decrypt the information. We also propose an
extension to the above approach to improve the efficiency of encryption at the data owner. We implement our
mCL-PKE scheme and the overall cloud based system, and evaluate its security and performance. Our results show
that our schemes are efficient and practical.
Title :An Empirical Performance Evaluation of Relational Keyword Search Systems
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/empirical-performance-evaluation-relational-keyword-search-systems
Abstract : In the past decade, extending the keyword search paradigm to relational data has been an active area of
research within the database and information retrieval (IR) community. A large number of approaches have been
proposed and implemented, but despite numerous publications, there remains a severe lack of standardization for
system evaluations. This lack of standardization has resulted in contradictory results from different evaluations, and
the numerous discrepancies muddle what advantages are proffered by different approaches. In this paper, we present
a thorough empirical performance evaluation of relational keyword search systems. Our results indicate that many
existing search techniques do not provide acceptable performance for realistic retrieval tasks. In particular, memory
consumption precludes many search techniques from scaling beyond small datasets with tens of thousands of
vertices. We also explore the relationship between execution time and factors varied in previous evaluations; our
analysis indicates that these factors have relatively little impact on performance. In summary, our work confirms
previous claims regarding the unacceptable performance of these systems and underscores the need for
standardization--as exemplified by the IR community--when evaluating these retrieval systems.
http://kasanpro.com/ieee/final-year-project-center-dindigul-reviews
Title :Web Image Re-Ranking UsingQuery-Specific Semantic Signatures
Language : ASP.NET with C#
Project Link :
http://kasanpro.com/p/asp-net-with-c-sharp/web-image-re-ranking-usingquery-specific-semantic-signatures
Abstract : Image re-ranking, as an effective way to improve the results of web-based image search, has been
adopted by current commercial search engines. Given a query keyword, a pool of images are first retrieved by the
search engine based on textual information. By asking the user to select a query image from the pool, the remaining
images are re-ranked based on their visual similarities with the query image. A major challenge is that the similarities
of visual features do not well correlate with images' semantic meanings which interpret users' search intention. On the
other hand, learning a universal visual semantic space to characterize highly diverse images from the web is difficult
and inefficient. In this paper, we propose a novel image re-ranking framework, which automatically offline learns
different visual semantic spaces for different query keywords through keyword expansions. The visual features of
images are projected into their related visual semantic spaces to get semantic signatures. At the online stage, images
are re-ranked by comparing their semantic signatures obtained from the visual semantic space specified by the query
keyword. The new approach significantly improves both the accuracy and efficiency of image re-ranking. The original
visual features of thousands of dimensions can be projected to the semantic signatures as short as 25 dimensions.
Experimental results show that 20% ? 35% relative improvement has been achieved on re-ranking precisions
compared with the stateof- the-art methods.
Title :Demand Bidding Program and Its Application in Hotel Energy Management
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/demand-bidding-program-its-application-hotel-energy-management
Abstract : Demand bidding program (DBP) is recently adopted in practice by some energy operators. DBP is a
risk-free demand response program targeting large energy consumers. In this paper, we consider DBP with the
application in hotel energy management. For DBP, optimization problem is formulated with the objective of
maximizing expected reward, which is received when the the amount of energy saving satisfies the contract. For a
general distribution of energy consumption, we give a general condition for the optimal bid and outline an algorithm to
find the solution without numerical integration. Furthermore, for Gaussian distribution, we derive closed-form
expressions of the optimal bid and the corresponding expected reward. Regarding hotel energy, we characterize
loads in the hotel and introduce several energy consumption models that capture major energy use. With the
proposed models and DBP, simulation results show that DBP provides economics benefits to the hotel and
encourages load scheduling. Furthermore, when only mean and variance of energy consumption are known, the
validity of Gaussian approximation for computing optimal load and expected reward is also discussed.
Data Mining IEEE 2014 Projects
Title :Incremental Affinity Propagation Clustering Based on Message Passing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/incremental-affinity-propagation-clustering-based-message-passing
Abstract : Affinity Propagation (AP) clustering has been successfully used in a lot of clustering problems. However,
most of the applications deal with static data. This paper considers how to apply AP in incremental clustering
problems. Firstly, we point out the difficulties in Incremental Affinity Propagation (IAP) clustering, and then propose
two strategies to solve them. Correspondingly, two IAP clustering algorithms are proposed. They are IAP clustering
based on K-Medoids (IAPKM) and IAP clustering based on Nearest Neighbor Assignment (IAPNA). Five popular
labeled data sets, real world time series and a video are used to test the performance of IAPKM and IAPNA.
Traditional AP clustering is also implemented to provide benchmark performance. Experimental results show that
IAPKM and IAPNA can achieve comparable clustering performance with traditional AP clustering on all the data sets.
Meanwhile, the time cost is dramatically reduced in IAPKM and IAPNA. Both the effectiveness and the efficiency
make IAPKM and IAPNA able to be well used in incremental clustering tasks.
Title :Incremental Detection of Inconsistencies in Distributed Data
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/incremental-detection-inconsistencies-distributed-data
Abstract : This paper investigates incremental detection of errors in distributed data. Given a distributed database D,
a set of conditional functional dependencies (CFDs), the set V of violations of the CFDs in D, and updates D to D, it is
to find, with minimum data shipment, changes V to V in response to D. The need for the study is evident since real-life
data is often dirty, distributed and frequently updated. It is often prohibitively expensive to recompute the entire set of
violations when D is updated. We show that the incremental detection problem is NP-complete for database D that is
partitioned either vertically or horizontally, even when and D are fixed. Nevertheless, we show that it is bounded: there
exist algorithms to detect errors such that their computational cost and data shipment are both linear in the size of D
and V, independent of the size of the database D. We provide such incremental algorithms for vertically partitioned
data and horizontally partitioned data, and show that the algorithms are optimal. We further propose optimization
techniques for the incremental algorithm over vertical partitions to reduce data shipment. We verify experimentally,
using real-life data on Amazon Elastic Compute Cloud (EC2), that our algorithms substantially outperform their batch
counterparts.
Title :Keyword Query Routing
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/keyword-query-routing
Abstract : Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to
route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all
sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for
a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships
between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for
computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and
subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web
showed that valid plans (precision@1 of 0.92) that are highly relevant (mean reciprocal rank of 0.89) can be
computed in 1 second on average on a single PC. Further, we show routing greatly helps to improve the performance
of keyword search, without compromising its result quality.
Title :Personalized Recommendation Combining User Interest and Social Circle
Language : C#
Project Link : http://kasanpro.com/p/c-sharp/personalized-recommendation-combining-user-interest-social-circle
Abstract : With the advent and popularity of social network, more and more users like to share their experiences,
such as ratings, reviews, and blogs. The new factors of social network like interpersonal influence and interest based
on circles of friends bring opportunities and challenges for recommender system (RS) to solve the cold start and
sparsity problem of datasets. Some of the social factors have been used in RS, but have not been fully considered. In
this paper, three social factors, personal interest, interpersonal interest similarity, and interpersonal influence, fuse
into a unified personalized recommendation model based on probabilistic matrix factorization. The factor of personal
interest can make the RS recommend items to meet users' individualities, especially for experienced users. Moreover,
for cold start users, the interpersonal interest similarity and interpersonal influence can enhance the intrinsic link
among features in the latent space. We conduct a series of experiments on three rating datasets: Yelp, MovieLens,
and Douban Movie. Experimental results show the proposed approach outperforms the existing RS approaches.
Title :Ontology-based annotation and retrieval of services in the cloud
Language : Java
Project Link : http://kasanpro.com/p/java/ontology-based-annotation-retrieval-services-cloud
Abstract : Cloud computing is a technological paradigm that permits computing services to be offered over the
Internet. This new service model is closely related to previous well-known distributed computing initiatives such as
Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has
made it one of the most popular recent innovations. This has led to the availability of more and more cloud services,
as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud
services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the
process of discovering the cloud services that best match user needs. This fully-fledged system encompasses two
basic functions: the creation of a repository with the semantic description of cloud services and the search for services
that accomplish the required expectations. The cloud service's semantic repository is generated by means of an
automatic tool that first annotates the cloud service descriptions with semantic content and then creates a semantic
vector for each service. The comprehensive evaluation of the tool in the ICT domain has led to very promising results
that outperform state-of-the-art solutions in similarly broad domains.
Data Mining IEEE 2014 Projects

Más contenido relacionado

La actualidad más candente

Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learningijtsrd
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanvenkatramanJ4
 
Discovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionDiscovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionFinalyear Projects
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEEFINALYEARSTUDENTPROJECTS
 
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...caijjournal
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup ToolsTanya Ahmed
 
Organizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its ApplicationsOrganizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its ApplicationsSam Shah
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET Journal
 
A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...
A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...
A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...Meisam Hejazi Nia
 
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEMWARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEMijnlc
 
Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013Yueshen Xu
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social networkakash_mishra
 
Eswc2012 submission 68
Eswc2012 submission 68Eswc2012 submission 68
Eswc2012 submission 68STIinnsbruck
 
Eswc2013 audience short
Eswc2013 audience shortEswc2013 audience short
Eswc2013 audience shortClaudia Wagner
 

La actualidad más candente (19)

Fake News Detection using Machine Learning
Fake News Detection using Machine LearningFake News Detection using Machine Learning
Fake News Detection using Machine Learning
 
EDP2013
EDP2013EDP2013
EDP2013
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
 
Discovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detectionDiscovering emerging topics in social streams via link anomaly detection
Discovering emerging topics in social streams via link anomaly detection
 
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
IEEE 2014 JAVA DATA MINING PROJECTS Discovering emerging topics in social str...
 
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
A RELIABLE ARTIFICIAL INTELLIGENCE MODEL FOR FALSE NEWS DETECTION MADE BY PUB...
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
 
Usability Review of Mashup Tools
Usability Review of Mashup ToolsUsability Review of Mashup Tools
Usability Review of Mashup Tools
 
Organizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its ApplicationsOrganizational Overlap on Social Networks and its Applications
Organizational Overlap on Social Networks and its Applications
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
IRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine LeariningIRJET- Fake Message Deduction using Machine Learining
IRJET- Fake Message Deduction using Machine Learining
 
Internet Pilot Paper2
Internet Pilot Paper2Internet Pilot Paper2
Internet Pilot Paper2
 
A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...
A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...
A Decision Support System for Inbound Marketers: An Empirical Use of Latent D...
 
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEMWARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
WARRANTS GENERATIONS USING A LANGUAGE MODEL AND A MULTI-AGENT SYSTEM
 
Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013
 
Data mining in social network
Data mining in social networkData mining in social network
Data mining in social network
 
Eswc14demo
Eswc14demoEswc14demo
Eswc14demo
 
Eswc2012 submission 68
Eswc2012 submission 68Eswc2012 submission 68
Eswc2012 submission 68
 
Eswc2013 audience short
Eswc2013 audience shortEswc2013 audience short
Eswc2013 audience short
 

Destacado

Data Mining Ieee Papers Trichy
Data Mining Ieee Papers TrichyData Mining Ieee Papers Trichy
Data Mining Ieee Papers Trichykrish madhi
 
Presentation data mining(1)
Presentation data mining(1)Presentation data mining(1)
Presentation data mining(1)cegonsoft1999
 
Cloud computing 2015 ieee papers Data mining ieee project titles
Cloud computing  2015 ieee papers  Data mining ieee project titlesCloud computing  2015 ieee papers  Data mining ieee project titles
Cloud computing 2015 ieee papers Data mining ieee project titlesDoClick Solutions
 
Project center in trichy @ieee 2016 17 titles for java and dotnet
Project center in trichy @ieee 2016 17 titles for java and dotnetProject center in trichy @ieee 2016 17 titles for java and dotnet
Project center in trichy @ieee 2016 17 titles for java and dotnetElakkiya Triplen
 
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACHMINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACHNexgen Technology
 
Mining Electronic Health Records for Insights
Mining Electronic Health Records for InsightsMining Electronic Health Records for Insights
Mining Electronic Health Records for InsightsOntotext
 
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAFinal year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAprojectsepark
 
Data mining on social networks for students learning experiences
Data mining on social networks for students learning experiences Data mining on social networks for students learning experiences
Data mining on social networks for students learning experiences Biplab Debnath
 
Introduction for skills seminar on Search and Data Mining, Master of European...
Introduction for skills seminar on Search and Data Mining, Master of European...Introduction for skills seminar on Search and Data Mining, Master of European...
Introduction for skills seminar on Search and Data Mining, Master of European...Gerben Zaagsma
 
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdSMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdHealthcare consultant
 
Smart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftSmart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftCustom Soft
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar reportmayurik19
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social mediarangesharp
 
DIY basic Facebook data mining
DIY basic Facebook data miningDIY basic Facebook data mining
DIY basic Facebook data miningSTEM/MARK
 
Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Destacado (20)

Data Mining Ieee Papers Trichy
Data Mining Ieee Papers TrichyData Mining Ieee Papers Trichy
Data Mining Ieee Papers Trichy
 
Presentation data mining(1)
Presentation data mining(1)Presentation data mining(1)
Presentation data mining(1)
 
Cloud computing 2015 ieee papers Data mining ieee project titles
Cloud computing  2015 ieee papers  Data mining ieee project titlesCloud computing  2015 ieee papers  Data mining ieee project titles
Cloud computing 2015 ieee papers Data mining ieee project titles
 
Project center in trichy @ieee 2016 17 titles for java and dotnet
Project center in trichy @ieee 2016 17 titles for java and dotnetProject center in trichy @ieee 2016 17 titles for java and dotnet
Project center in trichy @ieee 2016 17 titles for java and dotnet
 
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACHMINING HEALTH EXAMINATION RECORDS  A GRAPH-BASED APPROACH
MINING HEALTH EXAMINATION RECORDS A GRAPH-BASED APPROACH
 
Mining Electronic Health Records for Insights
Mining Electronic Health Records for InsightsMining Electronic Health Records for Insights
Mining Electronic Health Records for Insights
 
PPT FOR BIG
PPT FOR BIGPPT FOR BIG
PPT FOR BIG
 
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCAFinal year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
Final year IEEE,NON IEEE projects for 2013-14 for BCA,BTECH,Diploma,Mtech,MCA
 
Data mining on social networks for students learning experiences
Data mining on social networks for students learning experiences Data mining on social networks for students learning experiences
Data mining on social networks for students learning experiences
 
Data mining
Data miningData mining
Data mining
 
Text categorization
Text categorizationText categorization
Text categorization
 
Introduction for skills seminar on Search and Data Mining, Master of European...
Introduction for skills seminar on Search and Data Mining, Master of European...Introduction for skills seminar on Search and Data Mining, Master of European...
Introduction for skills seminar on Search and Data Mining, Master of European...
 
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan PhdSMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
SMART HEALTH PREDICTION USING DATA MINING by Dr.Mahboob Khan Phd
 
Smart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoftSmart health prediction using data mining by customsoft
Smart health prediction using data mining by customsoft
 
Data mining seminar report
Data mining seminar reportData mining seminar report
Data mining seminar report
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
Data mining for social media
Data mining for social mediaData mining for social media
Data mining for social media
 
DIY basic Facebook data mining
DIY basic Facebook data miningDIY basic Facebook data mining
DIY basic Facebook data mining
 
Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar a Data Mining IEEE 2014 Projects

IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsVijay Karan
 
IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsVijay Karan
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsVijay Karan
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsVijay Karan
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53IRJET Journal
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGIRJET Journal
 
Dr Thomas Langenberg, Credentials in Social Network Analysis & Technologies
Dr Thomas Langenberg, Credentials in Social Network Analysis & TechnologiesDr Thomas Langenberg, Credentials in Social Network Analysis & Technologies
Dr Thomas Langenberg, Credentials in Social Network Analysis & TechnologiesThomas Langenberg
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# ProjectsVijay Karan
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...IRJET Journal
 
M phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projectsM phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projectsVijay Karan
 
M.Phil Computer Science Data Mining Projects
M.Phil Computer Science Data Mining ProjectsM.Phil Computer Science Data Mining Projects
M.Phil Computer Science Data Mining ProjectsVijay Karan
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SIRJET Journal
 
Combating propaganda texts using transfer learning
Combating propaganda texts using transfer learningCombating propaganda texts using transfer learning
Combating propaganda texts using transfer learningIAESIJAI
 
Behavioural Modelling Outcomes prediction using Casual Factors
Behavioural Modelling Outcomes prediction using Casual  FactorsBehavioural Modelling Outcomes prediction using Casual  Factors
Behavioural Modelling Outcomes prediction using Casual FactorsIJMER
 
M.E Computer Science Data Mining Projects
M.E Computer Science Data Mining ProjectsM.E Computer Science Data Mining Projects
M.E Computer Science Data Mining ProjectsVijay Karan
 

Similar a Data Mining IEEE 2014 Projects (20)

IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB Projects
 
IEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB ProjectsIEEE 2014 ASP.NET with VB Projects
IEEE 2014 ASP.NET with VB Projects
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# Projects
 
IEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# ProjectsIEEE 2014 ASP.NET with C# Projects
IEEE 2014 ASP.NET with C# Projects
 
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
Irjet v4 i73A Survey on Student’s Academic Experiences using Social Media Data53
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNINGBINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
BINARY TEXT CLASSIFICATION OF CYBER HARASSMENT USING DEEP LEARNING
 
Dr Thomas Langenberg, Credentials in Social Network Analysis & Technologies
Dr Thomas Langenberg, Credentials in Social Network Analysis & TechnologiesDr Thomas Langenberg, Credentials in Social Network Analysis & Technologies
Dr Thomas Langenberg, Credentials in Social Network Analysis & Technologies
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
IEEE 2014 C# Projects
IEEE 2014 C# ProjectsIEEE 2014 C# Projects
IEEE 2014 C# Projects
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...A study of cyberbullying detection using Deep Learning and Machine Learning T...
A study of cyberbullying detection using Deep Learning and Machine Learning T...
 
M phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projectsM phil-computer-science-data-mining-projects
M phil-computer-science-data-mining-projects
 
M.Phil Computer Science Data Mining Projects
M.Phil Computer Science Data Mining ProjectsM.Phil Computer Science Data Mining Projects
M.Phil Computer Science Data Mining Projects
 
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’SDiscovering Influential User by Coupling Multiplex Heterogeneous OSN’S
Discovering Influential User by Coupling Multiplex Heterogeneous OSN’S
 
Combating propaganda texts using transfer learning
Combating propaganda texts using transfer learningCombating propaganda texts using transfer learning
Combating propaganda texts using transfer learning
 
Behavioural Modelling Outcomes prediction using Casual Factors
Behavioural Modelling Outcomes prediction using Casual  FactorsBehavioural Modelling Outcomes prediction using Casual  Factors
Behavioural Modelling Outcomes prediction using Casual Factors
 
M.E Computer Science Data Mining Projects
M.E Computer Science Data Mining ProjectsM.E Computer Science Data Mining Projects
M.E Computer Science Data Mining Projects
 

Más de Vijay Karan

IEEE 2014 Java Projects
IEEE 2014 Java ProjectsIEEE 2014 Java Projects
IEEE 2014 Java ProjectsVijay Karan
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java ProjectsVijay Karan
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsVijay Karan
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsVijay Karan
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsVijay Karan
 
IEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsIEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsVijay Karan
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# ProjectsVijay Karan
 
M.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsM.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsVijay Karan
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsVijay Karan
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsVijay Karan
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsVijay Karan
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsVijay Karan
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsVijay Karan
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsVijay Karan
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsVijay Karan
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsVijay Karan
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsVijay Karan
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsVijay Karan
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsVijay Karan
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsVijay Karan
 

Más de Vijay Karan (20)

IEEE 2014 Java Projects
IEEE 2014 Java ProjectsIEEE 2014 Java Projects
IEEE 2014 Java Projects
 
IEEE 2015 Java Projects
IEEE 2015 Java ProjectsIEEE 2015 Java Projects
IEEE 2015 Java Projects
 
IEEE 2014 NS2 Projects
IEEE 2014 NS2 ProjectsIEEE 2014 NS2 Projects
IEEE 2014 NS2 Projects
 
IEEE 2015 NS2 Projects
IEEE 2015 NS2 ProjectsIEEE 2015 NS2 Projects
IEEE 2015 NS2 Projects
 
IEEE 2014 Matlab Projects
IEEE 2014 Matlab ProjectsIEEE 2014 Matlab Projects
IEEE 2014 Matlab Projects
 
IEEE 2015 Matlab Projects
IEEE 2015 Matlab ProjectsIEEE 2015 Matlab Projects
IEEE 2015 Matlab Projects
 
IEEE 2015 C# Projects
IEEE 2015 C# ProjectsIEEE 2015 C# Projects
IEEE 2015 C# Projects
 
M.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging ProjectsM.E Computer Science Medical Imaging Projects
M.E Computer Science Medical Imaging Projects
 
M.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing ProjectsM.Phil Computer Science Server Computing Projects
M.Phil Computer Science Server Computing Projects
 
M.E Computer Science Server Computing Projects
M.E Computer Science Server Computing ProjectsM.E Computer Science Server Computing Projects
M.E Computer Science Server Computing Projects
 
M.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing ProjectsM.Phil Computer Science Remote Sensing Projects
M.Phil Computer Science Remote Sensing Projects
 
M.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing ProjectsM.E Computer Science Remote Sensing Projects
M.E Computer Science Remote Sensing Projects
 
M.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication ProjectsM.Phil Computer Science Wireless Communication Projects
M.Phil Computer Science Wireless Communication Projects
 
M.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication ProjectsM.E Computer Science Wireless Communication Projects
M.E Computer Science Wireless Communication Projects
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System Projects
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 
M.Phil Computer Science Networking Projects
M.Phil Computer Science Networking ProjectsM.Phil Computer Science Networking Projects
M.Phil Computer Science Networking Projects
 
M.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System ProjectsM.Phil Computer Science Biometric System Projects
M.Phil Computer Science Biometric System Projects
 
M.E Computer Science Biometric System Projects
M.E Computer Science Biometric System ProjectsM.E Computer Science Biometric System Projects
M.E Computer Science Biometric System Projects
 
M.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing ProjectsM.Phil Computer Science Secure Computing Projects
M.Phil Computer Science Secure Computing Projects
 

Último

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 

Último (20)

ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 

Data Mining IEEE 2014 Projects

  • 1. Data Mining IEEE 2014 Projects Web : www.kasanpro.com Email : sales@kasanpro.com List Link : http://kasanpro.com/projects-list/data-mining-ieee-2014-projects Title :Mining Social Media Data for Understanding Student's Learning Experiences Language : ASP.NET with VB Project Link : http://kasanpro.com/p/asp-net-with-vb/mining-social-media-data-understanding-students-learning-experiences Abstract : Students' informal conversations on social media (e.g. Twitter, Facebook) shed light into their educational experiences - opinions, feelings, and concerns about the learning process. Data from such uninstrumented environment can provide valuable knowledge to inform student learning. Analyzing such data, however, can be challenging. The complexity of student's experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we developed a workflow to integrate both qualitative analysis and large - scale data mining techniques. We focus on engineering student's Twitter posts to understand issues and problems in their educational experiences. We first conducted a qualitative analysis on samples taken from about 25,000 tweets related to engagement, and sleep deprivation. Based on these results, we implemented a multi - label classification algorithm to classify tweets reflecting student's problems. We then used the algorithm to train a detector of student problems from about 35,000 tweets streamed at the geo - location of Purdue University. This work, for the first time, presents a methodology and results that show how informal social media data can provide insights into students' experiences. Title :Mining Social Media Data for Understanding Student's Learning Experiences Language : ASP.NET with C# Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/mining-social-media-data-understanding-students-learning-experien Abstract : Students' informal conversations on social media (e.g. Twitter, Facebook) shed light into their educational experiences - opinions, feelings, and concerns about the learning process. Data from such uninstrumented environment can provide valuable knowledge to inform student learning. Analyzing such data, however, can be challenging. The complexity of student's experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we developed a workflow to integrate both qualitative analysis and large - scale data mining techniques. We focus on engineering student's Twitter posts to understand issues and problems in their educational experiences. We first conducted a qualitative analysis on samples taken from about 25,000 tweets related to engagement, and sleep deprivation. Based on these results, we implemented a multi - label classification algorithm to classify tweets reflecting student's problems. We then used the algorithm to train a detector of student problems from about 35,000 tweets streamed at the geo - location of Purdue University. This work, for the first time, presents a methodology and results that show how informal social media data can provide insights into students' experiences. Title :Mining Social Media Data for Understanding Student's Learning Experiences Language : C# Project Link : http://kasanpro.com/p/c-sharp/mining-social-media-data-understanding-students-learning-experiences-implement Abstract : Students' informal conversations on social media (e.g. Twitter, Facebook) shed light into their educational experiences - opinions, feelings, and concerns about the learning process. Data from such uninstrumented environment can provide valuable knowledge to inform student learning. Analyzing such data, however, can be challenging. The complexity of student's experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we developed a workflow to integrate both qualitative analysis and large - scale data mining techniques. We focus on engineering student's Twitter posts to understand issues and problems in their educational experiences. We first conducted a qualitative analysis on samples taken from about 25,000 tweets related to engagement, and sleep deprivation. Based on these results, we implemented a multi - label classification algorithm to classify tweets
  • 2. reflecting student's problems. We then used the algorithm to train a detector of student problems from about 35,000 tweets streamed at the geo - location of Purdue University. This work, for the first time, presents a methodology and results that show how informal social media data can provide insights into students' experiences. Title :Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks Language : ASP.NET with VB Project Link : http://kasanpro.com/p/asp-net-with-vb/viral-marketing-cost-effective-time-critical-campaigns-large-scale-social-n Abstract : Online social networks (OSNs) have become one of the most effective channels for marketing and advertising. Since users are often influenced by their friends, "wordof- mouth" exchanges, so-called viral marketing, in social networks can be used to increase product adoption or widely spread content over the network. The common perception of viral marketing about being cheap, easy, and massively effective makes it an ideal replacement of traditional advertising. However, recent studies have revealed that the propagation often fades quickly within only few hops from the sources, counteracting the assumption on the self-perpetuating of influence considered in literature. With only limited influence propagation, is massively reaching customers via viral marketing still affordable? How to economically spend more resources to increase the spreading speed? We investigate the cost-effective massive viral marketing problem, taking into the consideration the limited influence propagation. Both analytical analysis based on power-law network theory and numerical analysis demonstrate that the viral marketing might involve costly seeding. To minimize the seeding cost, we provide mathematical programming to find optimal seeding for medium-size networks and propose VirAds, an efficient algorithm, to tackle the problem on largescale networks. VirAds guarantees a relative error bound of O(1) from the optimal solutions in power-law networks and outperforms the greedy heuristics which realizes on the degree centrality. Moreover, we also show that, in general, approximating the optimal seeding within a ratio better than O(log n) is unlikely possible. Title :Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks Language : ASP.NET with C# Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/cost-effective-viral-marketing-time-critical-campaigns-large-scale-so Abstract : Online social networks (OSNs) have become one of the most effective channels for marketing and advertising. Since users are often influenced by their friends, "wordof- mouth" exchanges, so-called viral marketing, in social networks can be used to increase product adoption or widely spread content over the network. The common perception of viral marketing about being cheap, easy, and massively effective makes it an ideal replacement of traditional advertising. However, recent studies have revealed that the propagation often fades quickly within only few hops from the sources, counteracting the assumption on the self-perpetuating of influence considered in literature. With only limited influence propagation, is massively reaching customers via viral marketing still affordable? How to economically spend more resources to increase the spreading speed? We investigate the cost-effective massive viral marketing problem, taking into the consideration the limited influence propagation. Both analytical analysis based on power-law network theory and numerical analysis demonstrate that the viral marketing might involve costly seeding. To minimize the seeding cost, we provide mathematical programming to find optimal seeding for medium-size networks and propose VirAds, an efficient algorithm, to tackle the problem on largescale networks. VirAds guarantees a relative error bound of O(1) from the optimal solutions in power-law networks and outperforms the greedy heuristics which realizes on the degree centrality. Moreover, we also show that, in general, approximating the optimal seeding within a ratio better than O(log n) is unlikely possible. Data Mining IEEE 2014 Projects Title :Cost-effective Viral Marketing for Time-critical Campaigns in Large-scale Social Networks Language : C# Project Link : http://kasanpro.com/p/c-sharp/effective-viral-marketing-time-critical-campaigns-large-scale-social-networks Abstract : Online social networks (OSNs) have become one of the most effective channels for marketing and advertising. Since users are often influenced by their friends, "wordof- mouth" exchanges, so-called viral marketing, in social networks can be used to increase product adoption or widely spread content over the network. The common perception of viral marketing about being cheap, easy, and massively effective makes it an ideal replacement of traditional advertising. However, recent studies have revealed that the propagation often fades quickly within only few hops from the sources, counteracting the assumption on the self-perpetuating of influence considered in literature. With only limited influence propagation, is massively reaching customers via viral marketing still affordable? How to economically spend more resources to increase the spreading speed? We investigate the cost-effective massive viral marketing problem, taking into the consideration the limited influence propagation. Both analytical analysis based on power-law network theory and numerical analysis demonstrate that the viral marketing might involve costly seeding.
  • 3. To minimize the seeding cost, we provide mathematical programming to find optimal seeding for medium-size networks and propose VirAds, an efficient algorithm, to tackle the problem on largescale networks. VirAds guarantees a relative error bound of O(1) from the optimal solutions in power-law networks and outperforms the greedy heuristics which realizes on the degree centrality. Moreover, we also show that, in general, approximating the optimal seeding within a ratio better than O(log n) is unlikely possible. Title :An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds Language : C# Project Link : http://kasanpro.com/p/c-sharp/efficient-certificateless-encryption-secure-data-sharing-public-clouds Abstract : We propose a mediated certificateless encryption scheme without pairing operations for securely sharing sensitive information in public clouds. Mediated certificateless public key encryption (mCL-PKE) solves the key escrow problem in identity based encryption and certificate revocation problem in public key cryptography. However, existing mCL-PKE schemes are either inefficient because of the use of expensive pairing operations or vulnerable against partial decryption attacks. In order to address the performance and security issues, in this paper, we first propose a mCL-PKE scheme without using pairing operations. We apply our mCL-PKE scheme to construct a practical solution to the problem of sharing sensitive information in public clouds. The cloud is employed as a secure storage as well as a key generation center. In our system, the data owner encrypts the sensitive data using the cloud generated users' public keys based on its access control policies and uploads the encrypted data to the cloud. Upon successful authorization, the cloud partially decrypts the encrypted data for the users. The users subsequently fully decrypt the partially decrypted data using their private keys. The confidentiality of the content and the keys is preserved with respect to the cloud, because the cloud cannot fully decrypt the information. We also propose an extension to the above approach to improve the efficiency of encryption at the data owner. We implement our mCL-PKE scheme and the overall cloud based system, and evaluate its security and performance. Our results show that our schemes are efficient and practical. Title :An Empirical Performance Evaluation of Relational Keyword Search Systems Language : C# Project Link : http://kasanpro.com/p/c-sharp/empirical-performance-evaluation-relational-keyword-search-systems Abstract : In the past decade, extending the keyword search paradigm to relational data has been an active area of research within the database and information retrieval (IR) community. A large number of approaches have been proposed and implemented, but despite numerous publications, there remains a severe lack of standardization for system evaluations. This lack of standardization has resulted in contradictory results from different evaluations, and the numerous discrepancies muddle what advantages are proffered by different approaches. In this paper, we present a thorough empirical performance evaluation of relational keyword search systems. Our results indicate that many existing search techniques do not provide acceptable performance for realistic retrieval tasks. In particular, memory consumption precludes many search techniques from scaling beyond small datasets with tens of thousands of vertices. We also explore the relationship between execution time and factors varied in previous evaluations; our analysis indicates that these factors have relatively little impact on performance. In summary, our work confirms previous claims regarding the unacceptable performance of these systems and underscores the need for standardization--as exemplified by the IR community--when evaluating these retrieval systems. http://kasanpro.com/ieee/final-year-project-center-dindigul-reviews Title :Web Image Re-Ranking UsingQuery-Specific Semantic Signatures Language : ASP.NET with C# Project Link : http://kasanpro.com/p/asp-net-with-c-sharp/web-image-re-ranking-usingquery-specific-semantic-signatures Abstract : Image re-ranking, as an effective way to improve the results of web-based image search, has been adopted by current commercial search engines. Given a query keyword, a pool of images are first retrieved by the search engine based on textual information. By asking the user to select a query image from the pool, the remaining images are re-ranked based on their visual similarities with the query image. A major challenge is that the similarities of visual features do not well correlate with images' semantic meanings which interpret users' search intention. On the other hand, learning a universal visual semantic space to characterize highly diverse images from the web is difficult and inefficient. In this paper, we propose a novel image re-ranking framework, which automatically offline learns different visual semantic spaces for different query keywords through keyword expansions. The visual features of images are projected into their related visual semantic spaces to get semantic signatures. At the online stage, images are re-ranked by comparing their semantic signatures obtained from the visual semantic space specified by the query
  • 4. keyword. The new approach significantly improves both the accuracy and efficiency of image re-ranking. The original visual features of thousands of dimensions can be projected to the semantic signatures as short as 25 dimensions. Experimental results show that 20% ? 35% relative improvement has been achieved on re-ranking precisions compared with the stateof- the-art methods. Title :Demand Bidding Program and Its Application in Hotel Energy Management Language : C# Project Link : http://kasanpro.com/p/c-sharp/demand-bidding-program-its-application-hotel-energy-management Abstract : Demand bidding program (DBP) is recently adopted in practice by some energy operators. DBP is a risk-free demand response program targeting large energy consumers. In this paper, we consider DBP with the application in hotel energy management. For DBP, optimization problem is formulated with the objective of maximizing expected reward, which is received when the the amount of energy saving satisfies the contract. For a general distribution of energy consumption, we give a general condition for the optimal bid and outline an algorithm to find the solution without numerical integration. Furthermore, for Gaussian distribution, we derive closed-form expressions of the optimal bid and the corresponding expected reward. Regarding hotel energy, we characterize loads in the hotel and introduce several energy consumption models that capture major energy use. With the proposed models and DBP, simulation results show that DBP provides economics benefits to the hotel and encourages load scheduling. Furthermore, when only mean and variance of energy consumption are known, the validity of Gaussian approximation for computing optimal load and expected reward is also discussed. Data Mining IEEE 2014 Projects Title :Incremental Affinity Propagation Clustering Based on Message Passing Language : C# Project Link : http://kasanpro.com/p/c-sharp/incremental-affinity-propagation-clustering-based-message-passing Abstract : Affinity Propagation (AP) clustering has been successfully used in a lot of clustering problems. However, most of the applications deal with static data. This paper considers how to apply AP in incremental clustering problems. Firstly, we point out the difficulties in Incremental Affinity Propagation (IAP) clustering, and then propose two strategies to solve them. Correspondingly, two IAP clustering algorithms are proposed. They are IAP clustering based on K-Medoids (IAPKM) and IAP clustering based on Nearest Neighbor Assignment (IAPNA). Five popular labeled data sets, real world time series and a video are used to test the performance of IAPKM and IAPNA. Traditional AP clustering is also implemented to provide benchmark performance. Experimental results show that IAPKM and IAPNA can achieve comparable clustering performance with traditional AP clustering on all the data sets. Meanwhile, the time cost is dramatically reduced in IAPKM and IAPNA. Both the effectiveness and the efficiency make IAPKM and IAPNA able to be well used in incremental clustering tasks. Title :Incremental Detection of Inconsistencies in Distributed Data Language : C# Project Link : http://kasanpro.com/p/c-sharp/incremental-detection-inconsistencies-distributed-data Abstract : This paper investigates incremental detection of errors in distributed data. Given a distributed database D, a set of conditional functional dependencies (CFDs), the set V of violations of the CFDs in D, and updates D to D, it is to find, with minimum data shipment, changes V to V in response to D. The need for the study is evident since real-life data is often dirty, distributed and frequently updated. It is often prohibitively expensive to recompute the entire set of violations when D is updated. We show that the incremental detection problem is NP-complete for database D that is partitioned either vertically or horizontally, even when and D are fixed. Nevertheless, we show that it is bounded: there exist algorithms to detect errors such that their computational cost and data shipment are both linear in the size of D and V, independent of the size of the database D. We provide such incremental algorithms for vertically partitioned data and horizontally partitioned data, and show that the algorithms are optimal. We further propose optimization techniques for the incremental algorithm over vertical partitions to reduce data shipment. We verify experimentally, using real-life data on Amazon Elastic Compute Cloud (EC2), that our algorithms substantially outperform their batch counterparts. Title :Keyword Query Routing Language : C# Project Link : http://kasanpro.com/p/c-sharp/keyword-query-routing
  • 5. Abstract : Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords only to relevant sources to reduce the high cost of processing keyword search queries over all sources. We propose a novel method for computing top-k routing plans based on their potentials to contain results for a given keyword query. We employ a keyword-element relationship summary that compactly represents relationships between keywords and the data elements mentioning them. A multilevel scoring mechanism is proposed for computing the relevance of routing plans based on scores at the level of keywords, data elements, element sets, and subgraphs that connect these elements. Experiments carried out using 150 publicly available sources on the web showed that valid plans (precision@1 of 0.92) that are highly relevant (mean reciprocal rank of 0.89) can be computed in 1 second on average on a single PC. Further, we show routing greatly helps to improve the performance of keyword search, without compromising its result quality. Title :Personalized Recommendation Combining User Interest and Social Circle Language : C# Project Link : http://kasanpro.com/p/c-sharp/personalized-recommendation-combining-user-interest-social-circle Abstract : With the advent and popularity of social network, more and more users like to share their experiences, such as ratings, reviews, and blogs. The new factors of social network like interpersonal influence and interest based on circles of friends bring opportunities and challenges for recommender system (RS) to solve the cold start and sparsity problem of datasets. Some of the social factors have been used in RS, but have not been fully considered. In this paper, three social factors, personal interest, interpersonal interest similarity, and interpersonal influence, fuse into a unified personalized recommendation model based on probabilistic matrix factorization. The factor of personal interest can make the RS recommend items to meet users' individualities, especially for experienced users. Moreover, for cold start users, the interpersonal interest similarity and interpersonal influence can enhance the intrinsic link among features in the latent space. We conduct a series of experiments on three rating datasets: Yelp, MovieLens, and Douban Movie. Experimental results show the proposed approach outperforms the existing RS approaches. Title :Ontology-based annotation and retrieval of services in the cloud Language : Java Project Link : http://kasanpro.com/p/java/ontology-based-annotation-retrieval-services-cloud Abstract : Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of discovering the cloud services that best match user needs. This fully-fledged system encompasses two basic functions: the creation of a repository with the semantic description of cloud services and the search for services that accomplish the required expectations. The cloud service's semantic repository is generated by means of an automatic tool that first annotates the cloud service descriptions with semantic content and then creates a semantic vector for each service. The comprehensive evaluation of the tool in the ICT domain has led to very promising results that outperform state-of-the-art solutions in similarly broad domains. Data Mining IEEE 2014 Projects