Social Networks: Service Selection and Recommendation

Size: px
Start display at page:

Download "Social Networks: Service Selection and Recommendation"

Transcription

1 Social Networks: Service Selection and Recommendation Jebrin Al-Sharawneh Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Information Systems) Faculty of Engineering and Information Technology University of Technology, Sydney September, 2012

2 Abstract The Service-Oriented Computing paradigm is widely acknowledged for its potential to revolutionize the world of computing through the utilization of Web services. It is expected that Web services will fully leverage the Semantic Web to outsource some of their functionalities to other Web services that provide value-added services, and by integrating the business logic of Web services in the form of business to business and business to consumer e-commerce applications. In the Service Web, Web services and Web-Based Social Networks are emerging in which a wide range of similar functionalities are expected to be offered by a vast number of Web services, and applications can search and compose services according to users needs in a seamless and an automatic fashion. Web services are expected to outsource some of their functionalities to other Web services. In such situations, some services may be new to the service market, and some may act maliciously in order to be selected. A key requirement is to provide mechanisms for quality selection and recommendation of relevant Web services with perceived risk considerations. Although the future of Web service selection and recommendation looks promising, there are challenging issues related to user knowledge and behavior, as well as issues related to recommendation approaches. This dissertation addresses the demanding issues in Web service selection and recommendation from theory and practice perspectives. These challenges include cold-start users, who represent more than 50% of the social network population, the capture of users preferences, risk mitigation in service selection, customers privacy and application scalability. This dissertation proposes a novel approach to automate social-based Web service selection and recommendation in a dynamic environment. It utilizes Web-Based Social Networks and the Follow the Leader strategy, for a Credibility-based framework that includes two credibility models: the user Credibility model which is used to qualify i

3 consumers as either leaders or followers based on their credibility, and the service Credibility model which is used to identify the best services that act as market leaders. Experimental evaluation results demonstrate that the social network service selection and recommendation approach utilizing the credibility-based framework and Follow the Leader strategy provides an efficient, effective and scalable provision of credible services, especially for cold-start users. The research results take a further step towards developing a social-based automated and dynamically adaptive Web service selection and recommendation system in the future. ii

4 Certificate of Authorship/Originality I certify that the work in this thesis has not previously been submitted for a degree nor has it been submitted as part of requirements for a degree except as fully acknowledged within the text. I also certify that the thesis has been written by me. Any help that I have received in my research work and the preparation of the thesis itself has been acknowledged. In addition, I certify that all information sources and literature used are indicated in the thesis. Jebrin Al-Sharawneh September, 2012 iii

5 To the souls of my parents who taught me to love learning iv

6 Acknowledgments Although I planned to complete this degree thirty five years ago, as the Italian proverb says The right time comes but once. I think this research project would not have been possible without the support of the following people: First and foremost, I would like to express my gratitude to my supervisor Professor Mary- Anne Williams for her wise advice, careful guidance, useful connections, constant support and enduring patience throughout my studies and while writing this dissertation. Mary- Anne s advice on the use of Follow the Leader strategy was the turning point of my research. Learning how to research and produce publications is much easier with a supervisor who has as much experience and enthusiasm as Mary-Anne. I would like also to thank my co-supervisor, Associate Professor David Goldbaum for giving me the opportunity to work with him on the simulations of Follow the Leader project and for his invaluable inputs on Follow the Leader strategy. I must also acknowledge the following people from the University of Technology (UTS): My fellow students in the Innovation and Enterprise Research Laboratory, through countless discussions, they have provided me with insightful suggestions and valuable feedbacks that have helped enhance my work, special thanks also go to Dr. Benjamin Johnston who provided me with valuable feedback that enhanced the final version of this dissertation. QCIS people for their support. Special thanks go to all people at UTS who provided me with the needed support. The many researchers, including Dr. Mohammad Momani, Jamal and all other friends, whose kind suggestions, feedback and advice were invaluable in my research. Last, but not the least, I would like to thank my family for the endless support they provided me throughout my life. Without their love, patience and encouragements I would not have finished this thesis. First, I would like to thank my wife and best friend, Intisar, for supporting me and keeping me happy throughout my life until we achieved our mission towards our sons and this degree. I would like to thank my sons and their partners: Samer and Hanna, Rami and Marium, Fadi and Rawan for their love and support. Special thanks go to my daughters Hanna, Susan and Rawan who provided me with a continuous proof reading throughout my doctoral stint. I would also like to thank all my brothers and my sister for their support. Special thanks go to my brothers and friends: Ahmad, Yousef and v

7 Abu-Suhail, for giving me perspective whenever I needed it and all the numerous friends who have been there for me in times of need and helped me stay during the long, hard and ultimately enriching time that I have spent as a graduate student. In conclusion, I recognize that this research would not have been possible without the financial assistance from the University of Technology through the Australian Postgraduate Awards (APA), Faculty of Engineering and Information Technology (FEIT), Centre of Quantum Computation and Intelligent Systems (QCIS), and Innovation and Enterprise Research Laboratory; I express my gratitude to these agencies. vi

8 Table of Contents 1. Introduction Research Background and Related Work Credibility-Based Social Service Selection and Recommendation Experimentation and Evaluation - Recommendation Experimentation and Evaluation - Service Selection Mitigating Risk in Social Service Selection Conclusion and Future Work Bibliography vii

9 Extended Table of Contents Abstract... i List of Figures... xiii List of Tables... xvi List of Abbreviations... xviii Introduction Motivations Scenario Scenario Problem Scope and Definition Scope Limitations and Assumptions Significance Research Methodology Publications Arising From This Thesis Dissertation Outline Research Background and Related Work Terminology and Definitions Web Service Selection Overview of Key Technologies Semantic Web Services Web-based Social Networks Recommender Systems and Collaborative Based Filtering Web Service Selection and Recommendation Challenges Cold-Start Users Issue Sparsity Issue viii

10 Privacy Issue Scalability Capturing Users Preferences and Ratings Top Authors addressing Challenges Related Works Web-based Social Network Analysis Web-Based Social Networks and Trust Trust-Based Collaborative Filtering (CF) Follow the Leader Finding Expert Leaders in a Social Network Clustering and Collaborative Filtering Social Based Service Selection Reputation Based Approaches Recommender Based Approaches Referral Based Approaches Recommendation Approaches against Challenges Chapter Summary Credibility-Based Social Service Selection and Recommendation Introduction TECBF: Trustworthiness Expertise Credibility-Based Framework UCrM: User Credibility Model Trustworthiness Component Expertise Component Computing User Credibility Credibility Dynamism Clustering Users Based on Credibility Using Leaders as Potential Top-N Recommenders WSCrM: Web Service Credibility Model Web Service Credibility from Trustworthiness Web Service Credibility from Expertise Component Computing Web Service Credibility Web Service Credibility Dynamism ix

11 Web Service Credibility Characteristics Web Service Credibility Model - Flexibility and Robustness SSSRM: Social-based Service Selection and Recommendation Model Evaluation Framework Chapter Summary Experimentation and Evaluation - Recommendation Introduction Experiments Setup Datasets Selection Dataset Pre-Processing Preparation Datasets Summary Items not appearing in Leaders Scope Analysis WBSN Visualization The EPINIONS Subset Social Network Analysis Studio (SNAS) Cyclic Trust in SNAS Recommendation Prediction Using EPINIONS Subsets Benchmark Recommendation Prediction Algorithms Recommendation Prediction Evaluation Measures The EPINIONS Subsets Prediction Results Further Experiments on Large Datasets Test Options on Large Datasets Definitions Benchmark: MAE Comparison between Credibility and Trust Prediction Coverage Prediction Response Time Prediction Confidence Based on Average Number of Predictors WBSN Leaders Clustering and Identification Evaluation Centrality Measures for Three Datasets Interest Similarity Leaders Credibility Threshold Analysis Flexibility, Scalability and Applications x

12 4.7. Results Summary Conclusions Experimentation and Evaluation - Service Selection Social Service Selection Approach Motivation and Contributions Social Service Selection Related Works Notations and Definitions User Query Model Predicting Missing Quality Values Web Service Credibility Bootstrapping Benchmark Service Selection Algorithms Utility-Based Selection Approach Trustworthiness Based Selection Approach Experimental Evaluation Agent-based Modeling and Simulation (ABMS) Overview Simulation Model Evaluation Metrics Experiments and Simulation Results Validity of Web Service Credibility Computational Model Social Service Selection with User Domain Knowledge (UDK) Considerations Benchmarking Credibility-Based Approach with Utility-Based Approach Benchmarking Credibility Based Approach with Trustworthiness Based Approach Results Summary Conclusions Mitigating Risk in Social Service Selection Introduction Motivation and Contributions Related Works Trust and Risk in Service Selection xi

13 Mitigating Risk in Social Service Selection Perceived Risk and Risk Attitude in Web Service Selection Perceived Performance Risk in Web Service Selection Risk Attitude and Perceived Risk Customer Risk Attitude and Behavior Model Perceived Risk from Risk Attitude Perspective Service Selection with Risk Attitude and Perceived Risk Experimental Evaluation Simulation Model Validity and Dynamism of Perceived Risk Computation Model Risk-Based Social Service Selection Results Summary Summary and Conclusions Conclusion and Future Work Contributions Primary Contribution Secondary Contributions Scalability, Flexibility and Robustness Applications and Possible Commercialization Future Research Directions Concluding Remarks Bibliography xii

14 List of Figures Figure 2.1. Referral Graph [223] Figure 3.1. TECBF: Trustworthiness Expertise Credibility-Based Framework Figure 3.2. User Credibility Model (UCrM) in WBSN Figure 3.3. Direct and Indirect Followers Trust Figure 3.4. Impact of Decay Factor (λ) on Credibility Figure 3.5. Web service Credibility Model (WSCrM) Figure 3.6. Social Service Selection Based on UDK and Service Credibility Algorithm Figure 3.7. TECBF Evaluation framework Figure 4.1. Social Network Analysis Studio (SNAS) Graphical User interface Figure 4.2. Follow the Leader Model for Social Network in Item Figure 4.3. Social Network Relations in Item Figure 4.4. MAE Average for all Predictions over all Subsets Figure 4.5. Credibility Algorithm vs. Trust Algorithm Prediction for all Datasets Figure 4.6. Trust Algorithm Prediction % Coverage for all Datasets Figure 4.7. Trust Algorithm Prediction Coverage per Test Option for all Datasets Figure 4.8. Credibility Algorithm prediction time as % of Trust Algorithm time Figure 4.9. Leaders vs. Followers In-Degree and Average Ratings for all Datasets xiii

15 Figure Interest Similarity and Friends K12 Acting as Leaders - Ratio for all Datasets Figure 5.1. SNA Simulation Tool User Interface Figure 5.2. Impact of Trustworthiness and Expertise on WS Credibility for WS (S04) Figure 5.3. Malicious Web service behavior (Facebook Privacy Scenario) Figure 5.4. Social service selection Flowchart Algorithm Figure 5.5. Social Service Selection based on customer UDK and service credibility Follow the Leader Model Figure 5.6. Top-5 services credibility at last round Figure 5.7. S24 versus S12 during simulation session Figure 5.8. Social Service Selection with Credibility and UDK Follow the Leader Figure 5.9. Average number of candidate services returned from 99 services match: based on user preferences number (Utility-Based) Figure Number of candidate services versus varied user pref. number and QoS attributes (Utility-Based) Figure Top-M Candidates: Credibility-based versus Utilitybased Figure 6.1. User risk attitude and behavior Model Figure 6.2. Perceived risk variation with different risk attitudes Figure 6.3. Risk-based social service selection: Algorithm Figure 6.4. SNA Simulation Tool User Interface Figure 6.5. Expected utility based credibility vs. perceived risk for different risk attitudes RA = (1, 0.5, 0) Figure 6.6. Dynamism of expected utility and Perceived Risk for different Risk Attitudes, RA = (1, 0) from (WS=S05) xiv

16 Figure 6.7. Customers select Web service randomly Follow the leader Figure 6.8. Social Service Selection based on customer risk attitude and service credibility Follow the Leader Model xv

17 List of Tables Table 2.1: Recommendation approaches that address at least three challenges Table 2.2: Challenges addressed in recommendation approaches Table 3.1: User Credibility computation example Table 4.1: Datasets summary Table 4.2: Items not appearing in leaders scope analysis Table 4.3: Experimental results of prediction algorithms: cold-start Table 4.4: Experimental results of prediction algorithms: experienced users.. 96 Table 4.5: Detailed MAE comparison for all datasets: Credibility Algorithm vs. Trust Algorithm prediction for all test options Table 4.6: Credibility Algorithm vs. Trust Algorithm prediction for all datasets Table 4.7: Credibility average raters vs. Trust average raters Table 4.8: Leaders vs. followers centrality degree and average ratings for all datasets Table 4.9: Leaders vs. followers in-degree and average ratings for all datasets Table 4.10: EPINIONS dataset: Target user Interest Similarity measure with (leaders and friends) communities Table 4.11: All datasets: Target user Interest Similarity measure with (leaders and friends) communities Table 4.12: Credibility threshold analysis for EPINIONS dataset Table 5.1: List of home loan services Table 5.2: Top-5 services credibility at last round xvi

18 Table 5.3: R-Precision for credibility-based and utility-based models Table 5.4: User query QoS attributes template Table 6.1: Top-5 home loan services perceived risk as viewed from different users xvii

19 List of Abbreviations ABMS Agent-based Modeling and Simulation B2B Business-to-Business B2C Business-to-Consumer BPEL4WS Business Process Execution Language for Web Services CF Collaborative Filtering HITS Hyperlink-Induced Topic Search IOPE Input, Output, Post-conditions and Effects MAE Mean Absolute Error OWL Web Ontology Language P2P Peer to Peer QoS Quality of Service QoWS Quality of Web Service RDF Resource Description Framework RS Recommender System SLA Service Level Agreement SNA Social Network Analysis SNAS Social Network Analysis Studio SOA Service Oriented Architecture SOAP Simple Object Access Protocol SOC Service Oriented Computing SSSRM Social-based Service Selection and Recommendation Model SWS Semantic Web Services TECBF Trustworthiness Expertise Credibility-Based Framework UCrM User Credibility Model UDDI Universal Description, Discovery and Integration UDK User Domain Knowledge URI Uniform Resource Identifier xviii

20 W3C WBSN WS WSCrM WSDL WS-Policy XML World Wide Web Consortium Web-based Social Network Web Service Web Service Credibility Model Web Service Description Language Web Services Policy Framework Extensible Markup Language xix

Enhanced Web Log Based Recommendation by Personalized Retrieval

Enhanced Web Log Based Recommendation by Personalized Retrieval Enhanced Web Log Based Recommendation by Personalized Retrieval Xueping Peng FACULTY OF ENGINEERING AND INFORMATION TECHNOLOGY UNIVERSITY OF TECHNOLOGY, SYDNEY A thesis submitted for the degree of Doctor

More information

INTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study...

INTRODUCTION Background of the Problem Statement of the Problem Objectives of the Study Significance of the Study... vii TABLE OF CONTENTS CHAPTER TITLE PAGE DECLARATION... ii DEDICATION... iii ACKNOWLEDGEMENTS... iv ABSTRACT... v ABSTRAK... vi TABLE OF CONTENTS... vii LIST OF TABLES... xii LIST OF FIGURES... xiii LIST

More information

Content distribution networks over shared infrastructure : a paradigm for future content network deployment

Content distribution networks over shared infrastructure : a paradigm for future content network deployment University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 Content distribution networks over shared infrastructure :

More information

An Ontological Framework for Contextualising Information in Hypermedia Systems.

An Ontological Framework for Contextualising Information in Hypermedia Systems. An Ontological Framework for Contextualising Information in Hypermedia Systems. by Andrew James Bucknell Thesis submitted for the degree of Doctor of Philosophy University of Technology, Sydney 2008 CERTIFICATE

More information

TOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications

TOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications DOCTORAL DISSERTATION TOMRAS: A Task Oriented Mobile Remote Access System for Desktop Applications Khaled Khankan kkhankan@it. uts. edu. au Supervised by: Prof. Robert Steele robert.steele@usyd.edu.au

More information

ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY

ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY ALGORITHMIC ASPECTS OF DOMINATION AND ITS VARIATIONS ARTI PANDEY DEPARTMENT OF MATHEMATICS INDIAN INSTITUTE OF TECHNOLOGY DELHI JUNE 2016 c Indian Institute of Technology Delhi (IITD), New Delhi, 2016.

More information

A reputation system for BitTorrent peer-to-peer filesharing

A reputation system for BitTorrent peer-to-peer filesharing University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2006 A reputation system for BitTorrent peer-to-peer filesharing

More information

A Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana

A Frequent Max Substring Technique for. Thai Text Indexing. School of Information Technology. Todsanai Chumwatana School of Information Technology A Frequent Max Substring Technique for Thai Text Indexing Todsanai Chumwatana This thesis is presented for the Degree of Doctor of Philosophy of Murdoch University May

More information

A Developer s Guide to the Semantic Web

A Developer s Guide to the Semantic Web A Developer s Guide to the Semantic Web von Liyang Yu 1. Auflage Springer 2011 Verlag C.H. Beck im Internet: www.beck.de ISBN 978 3 642 15969 5 schnell und portofrei erhältlich bei beck-shop.de DIE FACHBUCHHANDLUNG

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGENO. LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION

TABLE OF CONTENTS CHAPTER NO. TITLE PAGENO. LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION vi TABLE OF CONTENTS ABSTRACT LIST OF TABLES LIST OF FIGURES LIST OF ABRIVATION iii xii xiii xiv 1 INTRODUCTION 1 1.1 WEB MINING 2 1.1.1 Association Rules 2 1.1.2 Association Rule Mining 3 1.1.3 Clustering

More information

Efficient Index Maintenance for Text Databases

Efficient Index Maintenance for Text Databases Efficient Index Maintenance for Text Databases A thesis submitted for the degree of Doctor of Philosophy Nicholas Lester B.E. (Hons.), B.Sc, School of Computer Science and Information Technology, Science,

More information

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data

The Discovery and Retrieval of Temporal Rules in Interval Sequence Data The Discovery and Retrieval of Temporal Rules in Interval Sequence Data by Edi Winarko, B.Sc., M.Sc. School of Informatics and Engineering, Faculty of Science and Engineering March 19, 2007 A thesis presented

More information

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES

AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES AUTOMATED STUDENT S ATTENDANCE ENTERING SYSTEM BY ELIMINATING FORGE SIGNATURES K. P. M. L. P. Weerasinghe 149235H Faculty of Information Technology University of Moratuwa June 2017 AUTOMATED STUDENT S

More information

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology

Tree Rule Firewall. A Thesis Submitted for the Degree of. Doctor of Philosophy. Thawatchai Chomsiri. Faculty of Engineering and Information Technology Tree Rule Firewall A Thesis Submitted for the Degree of Doctor of Philosophy By Thawatchai Chomsiri in Faculty of Engineering and Information Technology UNIVERSITY OF TECHNOLOGY, SYDNEY 17 th November

More information

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi

TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES LIST OF FIGURES LIST OF SYMBOLS AND ABBREVIATIONS xxi ix TABLE OF CONTENTS CHAPTER NO. TITLE PAGE NO. ABSTRACT 5 LIST OF TABLES xv LIST OF FIGURES xviii LIST OF SYMBOLS AND ABBREVIATIONS xxi 1 INTRODUCTION 1 1.1 INTRODUCTION 1 1.2 WEB CACHING 2 1.2.1 Classification

More information

A ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS CH.SASI DHAR RAO

A ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS CH.SASI DHAR RAO A ROLE MANAGEMENT MODEL FOR USER AUTHORIZATION QUERIES IN ROLE BASED ACCESS CONTROL SYSTEMS A THESIS Submitted by CH.SASI DHAR RAO in partial fulfillment for the award of the degree of MASTER OF PHILOSOPHY

More information

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research

Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Supporting Quality of Service for Internet Applications A thesis presented for the degree of Master of Science Research Department of Computer Systems Faculty of Information Technology University of Technology,

More information

Knowledge libraries and information space

Knowledge libraries and information space University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Knowledge libraries and information space Eric Rayner University

More information

Privacy Preserving Data Sharing in Data Mining Environment

Privacy Preserving Data Sharing in Data Mining Environment Privacy Preserving Data Sharing in Data Mining Environment PH.D DISSERTATION BY SUN, XIAOXUN A DISSERTATION SUBMITTED TO THE UNIVERSITY OF SOUTHERN QUEENSLAND IN FULLFILLMENT OF THE REQUIREMENTS FOR THE

More information

Child Prime Label Approaches to Evaluate XML Structured Queries

Child Prime Label Approaches to Evaluate XML Structured Queries Child Prime Label Approaches to Evaluate XML Structured Queries Shtwai Abdullah Alsubai Department of Computer Science the University of Sheffield This thesis is submitted for the degree of Doctor of Philosophy

More information

Summary of Contents LIST OF FIGURES LIST OF TABLES

Summary of Contents LIST OF FIGURES LIST OF TABLES Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter

More information

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT

GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT GEO BASED ROUTING FOR BORDER GATEWAY PROTOCOL IN ISP MULTI-HOMING ENVIRONMENT Duleep Thilakarathne (118473A) Degree of Master of Science Department of Electronic and Telecommunication Engineering University

More information

Particle Swarm Optimization Methods for Pattern. Recognition and Image Processing

Particle Swarm Optimization Methods for Pattern. Recognition and Image Processing Particle Swarm Optimization Methods for Pattern Recognition and Image Processing by Mahamed G. H. Omran Submitted in partial fulfillment of the requirements for the degree Philosophiae Doctor in the Faculty

More information

SCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS

SCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS SCALABLE IN-MEMORY DATA MANAGEMENT MODEL FOR ENTERPRISE APPLICATIONS Anupama Piyumali Pathirage (138223D) Degree of Master of Science Department of Computer Science and Engineering University of Moratuwa

More information

Numerical analysis and comparison of distorted fingermarks from the same source. Bruce Comber

Numerical analysis and comparison of distorted fingermarks from the same source. Bruce Comber Numerical analysis and comparison of distorted fingermarks from the same source Bruce Comber This thesis is submitted pursuant to a Master of Information Science (Research) at the University of Canberra

More information

Except as otherwise permitted under the Copyright, Designs and Patents Act 1988, this thesis may only be produced, stored or transmitted in any form

Except as otherwise permitted under the Copyright, Designs and Patents Act 1988, this thesis may only be produced, stored or transmitted in any form Except as otherwise permitted under the Copyright, Designs and Patents Act 1988, this thesis may only be produced, stored or transmitted in any form or by any means with the prior permission in writing

More information

Business Intelligence Roadmap HDT923 Three Days

Business Intelligence Roadmap HDT923 Three Days Three Days Prerequisites Students should have experience with any relational database management system as well as experience with data warehouses and star schemas. It would be helpful if students are

More information

CHAPTER 7. Observations, Conclusions and Future Directions Observations 7.2. Limitations of the Model 7.3. Conclusions 7.4.

CHAPTER 7. Observations, Conclusions and Future Directions Observations 7.2. Limitations of the Model 7.3. Conclusions 7.4. CHAPTER 7 Observations, Conclusions and Future Directions 7.1. Observations 7.2. Limitations of the Model 7.3. Conclusions 7.4. Future work Domain-specific Ontology for Student s Information in Academic

More information

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

More information

STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY

STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY STUDY ON MATURITY OF BUSINESS CONTINUITY MANAGEMENT AND ICT RELIANCE IN SRI LANKA MASTER OF BUSINESS ADMINISTRATION IN INFORMATION TECHNOLOGY LIBRARY UNIVERSITY OF MORATUWA, SRI LANKA MORATUWA K.C. Usgoda

More information

An agent-based peer-to-peer grid computing architecture

An agent-based peer-to-peer grid computing architecture University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2005 An agent-based peer-to-peer grid computing architecture Jia

More information

Payload-based Anomaly Detection in HTTP Traffic

Payload-based Anomaly Detection in HTTP Traffic Payload-based Anomaly Detection in HTTP Traffic A Thesis submitted for the degree of Doctor of Philosophy By Aruna Jamdagni In Faculty of Engineering and information Technology School of Computing and

More information

Credibility-based Trust Management and Discovery of Cloud Services

Credibility-based Trust Management and Discovery of Cloud Services Credibility-based Trust Management and Discovery of Cloud Services A dissertation submitted in fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Talal Hashem Noor

More information

Real Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System

Real Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System Real Time Multi-Sensor Data Acquisition and Processing for a Road Mapping System by Xiang Luo A thesis submitted for the degree of Master of Engineering (Research) Faculty of Engineering and Information

More information

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and

Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and Copyright is owned by the Author of the thesis. Permission is given for a copy to be downloaded by an individual for the purpose of research and private study only. The thesis may not be reproduced elsewhere

More information

STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA

STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA 'LIBRARY SlIJVfcRSlTY Of MORATUWA. SRI IAMIU UORATUWA jlhl»o»{!9cko t l STUDY ON THE USE OF PUBLIC DATA CENTERS FOR IT INFRASTRUCTURE OUTSOURCING IN SRI LANKA THE CASE OFSUNTEL LTD By G.A.A.D. KARAUNARATNE

More information

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY

ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY ADAPTIVE VIDEO STREAMING FOR BANDWIDTH VARIATION WITH OPTIMUM QUALITY Joseph Michael Wijayantha Medagama (08/8015) Thesis Submitted in Partial Fulfillment of the Requirements for the Degree Master of Science

More information

EXTRACTING GENERIC TEXT INFORMATION FROM IMAGES

EXTRACTING GENERIC TEXT INFORMATION FROM IMAGES EXTRACTING GENERIC TEXT INFORMATION FROM IMAGES A Thesis Submitted for the Degree of Doctor of Philosophy By Chao Zeng in School of Computing and Communications UNIVERSITY OF TECHNOLOGY, SYDNEY AUSTRALIA

More information

Dedication. To the departed souls of my parents & father-in-law.

Dedication. To the departed souls of my parents & father-in-law. Abstract In this thesis work, a contribution to the field of Formal Verification is presented innovating a semantic-based approach for the verification of concurrent and distributed programs by applying

More information

BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA. Major Computer Science Sarjana Komputer Thesis Semester [Even] year 2007

BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA. Major Computer Science Sarjana Komputer Thesis Semester [Even] year 2007 BINUS INTERNATIONAL UNIVERSITAS BINA NUSANTARA Major Computer Science Sarjana Komputer Thesis Semester [Even] year 2007 AN INTEGRATED MOBILE WEB SOLUTION FOR GAYA HIDUP SEHAT (GHS) TABLOID: THE IMPLEMENTATION

More information

Automatic annotation of digital photos

Automatic annotation of digital photos University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2007 Automatic annotation of digital photos Wenbin Shao University

More information

CITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page.

CITY UNIVERSITY OF NEW YORK. Creating a New Project in IRBNet. i. After logging in, click Create New Project on left side of the page. CITY UNIVERSITY OF NEW YORK Creating a New Project in IRBNet i. After logging in, click Create New Project on left side of the page. ii. Enter the title of the project, the principle investigator s (PI)

More information

Student retention in distance education using on-line communication.

Student retention in distance education using on-line communication. Doctor of Philosophy (Education) Student retention in distance education using on-line communication. Kylie Twyford AAPI BBus BEd (Hons) 2007 Certificate of Originality I certify that the work in this

More information

European Risk Management Certification. Candidate Information Guide

European Risk Management Certification. Candidate Information Guide European Risk Management Certification Candidate Information Guide Presentation of FERMA Certification 3 Benefits 4 Eligibility criteria 5 Application and fees Examination details Syllabus: FERMA rimap

More information

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of

ACKNOWLEDGEMENT. my PhD Supervisor Dr. Vidhyacharan Bhaskar, Professor, Department of iv ACKNOWLEDGEMENT It is my pleasant duty to thank a large number of people for the various forms of help, encouragement and support that they have provided during the time I have been working on this

More information

Automated Planning for Open Network Architectures

Automated Planning for Open Network Architectures UNIVERSITY OF CALIFORNIA Los Angeles Automated Planning for Open Network Architectures A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Computer

More information

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0

ASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Systems. IS Ph.D. Program. Page 0 ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Systems Informatiio on Systems PhD Program IS Ph.D. Program Page 0 Assiut University Faculty of Computers & Informationn

More information

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW

BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME TOMORROW S LEADER, TODAY. SEE WHAT S NEXT, NOW BECOME AN ISACA MEMBER TODAY. Nearing its 50th year, ISACA is a global association helping individuals and enterprises achieve the positive potential

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a Certified Digital Marketing Master 2 YEARS PART-TIME STUDY ONLINE www.springhouse.com 610-321-3500 info@springhouse.com Validated by the Industry Advisory Council. Including

More information

Packet-Loss Prediction Model Based on Historical Symbolic Time-Series Forecasting

Packet-Loss Prediction Model Based on Historical Symbolic Time-Series Forecasting Packet-Loss Prediction Model Based on Historical Symbolic Time-Series Forecasting by Hooman Homayounfard A dissertation submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy

More information

Energy-efficient Routing and Secure Communication in Wireless Sensor Networks

Energy-efficient Routing and Secure Communication in Wireless Sensor Networks Energy-efficient Routing and Secure Communication in Wireless Sensor Networks A Thesis Submitted for the Degree of Doctor of Philosophy By Mian Ahmad Jan in Faculty of Engineering and Information Technology

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the

More information

Illumination invariant face detection

Illumination invariant face detection University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Illumination invariant face detection Alister Cordiner University

More information

A Reliability-Aware Framework for Service-Based Software Development

A Reliability-Aware Framework for Service-Based Software Development A Reliability-Aware Framework for Service-Based Software Development by Ian Andrusiak A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Masters of Applied Science in Electrical

More information

MITIGATING CACHE ASSOCIATIVITY AND COHERENCE SCALABILITY CONSTRAINTS FOR MANY-CORE CHIP MULTIPROCESSORS

MITIGATING CACHE ASSOCIATIVITY AND COHERENCE SCALABILITY CONSTRAINTS FOR MANY-CORE CHIP MULTIPROCESSORS MITIGATING CACHE ASSOCIATIVITY AND COHERENCE SCALABILITY CONSTRAINTS FOR MANY-CORE CHIP MULTIPROCESSORS Thesis By Malik Al-Manasia In Partial Fulfilment of the Requirements for the Degree of Doctor of

More information

A GENERIC FRAMEWORK FOR DISTRIBUTED COMPUTATION

A GENERIC FRAMEWORK FOR DISTRIBUTED COMPUTATION A GENERIC FRAMEWORK FOR DISTRIBUTED COMPUTATION By Shailesh Kelkar A Thesis Submitted to the Graduate Faculty of Rensselaer Polytechnic Institute in Partial Fulfillment of the Requirements for the Degree

More information

CITY UNIVERSITY OF NEW YORK. i. Visit:

CITY UNIVERSITY OF NEW YORK. i. Visit: CITY UNIVERSITY OF NEW YORK I. ACCESSING IRB NET (New Registration) i. Visit: https://www.irbnet.org/release/index.html ii. New users: Click on New Registration in the top right corner iii. Fill-out the

More information

QoS-based semantic web service selection

QoS-based semantic web service selection Ryerson University Digital Commons @ Ryerson Theses and dissertations 1-1-2010 QoS-based semantic web service selection Yijun Chen Ryerson University Follow this and additional works at: http://digitalcommons.ryerson.ca/dissertations

More information

NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING

NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING NOVEL TECHNIQUES AND ARCHITECTURES FOR ADAPTIVE BEAMFORMING By THUA VAN HO, B.A.Sc, M.A.Sc A Thesis Submitted to the School of Graduate Studies in Partial Fulfillment of the Requirements for the Degree

More information

The Automatic Design of Batch Processing Systems

The Automatic Design of Batch Processing Systems The Automatic Design of Batch Processing Systems by Barry Dwyer, M.A., D.A.E., Grad.Dip. A thesis submitted for the degree of Doctor of Philosophy in the Department of Computer Science University of Adelaide

More information

Enabling Component-Based Model Transformations with QVT. Li Dan

Enabling Component-Based Model Transformations with QVT. Li Dan Enabling Component-Based Model Transformations with QVT by Li Dan Doctor of Philosophy in Software Engineering 2013 Faculty of Science and Technology University of Macau Enabling Component-Based Model

More information

PROGRAMME SPECIFICATION

PROGRAMME SPECIFICATION PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

: Semantic Web (2013 Fall)

: Semantic Web (2013 Fall) 03-60-569: Web (2013 Fall) University of Windsor September 4, 2013 Table of contents 1 2 3 4 5 Definition of the Web The World Wide Web is a system of interlinked hypertext documents accessed via the Internet

More information

Installing SharePoint Server 2007

Installing SharePoint Server 2007 Installing Microsoft Office SharePoint Server 2007 1. Login to the computer with Domain Admin Account 2. Install Microsoft Windows Server 2003 Enterprise or Standard 3. Install Windows Server 2003 Service

More information

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne

The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing. R. Paul, W. T. Tsai, Jay Bayne The Impact of SOA Policy-Based Computing on C2 Interoperation and Computing R. Paul, W. T. Tsai, Jay Bayne 1 Table of Content Introduction Service-Oriented Computing Acceptance of SOA within DOD Policy-based

More information

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",

More information

Contributions to pairing-based cryptography

Contributions to pairing-based cryptography University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2010 Contributions to pairing-based cryptography Tsz Hon Yuen University

More information

Universiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development

Universiti Teknologi MARA. An Analysis on The Uses of Data Modeling in Database Application Development CAJ (yo&ao 3 ĕr^?^ Universiti Teknologi MARA An Analysis on The Uses of Data Modeling in Database Application Development Hafiza Binti Ahmad Thesis submitted in fulfillment of the requirements for Bachelor

More information

INTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK

INTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK INTELLIGENT NON-DESTRUCTIVE CLASSIFICATION OF JOSAPINE PINEAPPLE MATURITY USING ARTIFICIAL NEURAL NETWORK NAZRIYAH BINTI HAJI CHE ZAN @ CHE ZAIN MASTER OF ENGINEERING (ELECTRONICS) UNIVERSITI MALAYSIA

More information

All LJMU programmes are delivered and assessed in English

All LJMU programmes are delivered and assessed in English PROGRAMME SPECIFICATION Master of Science in Computer Forensics Awarding institution Teaching institution JACS Code Programme Duration Language of Programme Subject benchmark statement Programme accredited

More information

Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved

Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur. IJRASET: All Rights are Reserved Study & Enhancement of Fly spray Bug Tracking Tool Komal Patiyal 1, Sanjay 2 1,2 Computer Science & Engineering, Himachal Pradesh Technical University,Hamirpur Abstract: As software projects become increasingly

More information

ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS

ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS ACCELERATED COMPLEX EVENT PROCESSING WITH GRAPHICS PROCESSING UNITS Prabodha Srimal Rodrigo Registration No. : 138230V Degree of Master of Science Department of Computer Science & Engineering University

More information

"Charting the Course... MOC B Updating Your SQL Server Skills to Microsoft SQL Server 2014 Course Summary

Charting the Course... MOC B Updating Your SQL Server Skills to Microsoft SQL Server 2014 Course Summary Course Summary Description This five-day instructor-led course teaches students how to use the enhancements and new features that have been added to SQL Server and the Microsoft data platform since the

More information

UNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY

UNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY UNIVERSITI TEKNOLOGI MARA A PROCEDURAL FRAMEWORK FOR EXTENSION OF TIME (EOT) CLAIM SETTLEMENT IN THE MALAYSIAN CONSTRUCTION INDUSTRY NORAZIAN MOHAMAD YUSUWAN Thesis submitted in fulfilment of the requirement

More information

AN INTEGRATED MOBILE CONTENT RECOMMENDATION SYSTEM. Worapat Paireekreng. B.B.A. Thammasat University, Thailand

AN INTEGRATED MOBILE CONTENT RECOMMENDATION SYSTEM. Worapat Paireekreng. B.B.A. Thammasat University, Thailand AN INTEGRATED MOBILE CONTENT RECOMMENDATION SYSTEM Worapat Paireekreng B.B.A. Thammasat University, Thailand M.S. (Hons) National Institute of Development Administration, Thailand This thesis is presented

More information

INFORMATION ACCESS VIA VOICE. dissertation is my own or was done in collaboration with my advisory committee. Yapin Zhong

INFORMATION ACCESS VIA VOICE. dissertation is my own or was done in collaboration with my advisory committee. Yapin Zhong INFORMATION ACCESS VIA VOICE Except where reference is made to the work of others, the work described in this dissertation is my own or was done in collaboration with my advisory committee. Yapin Zhong

More information

Location Based Selling Platform for Mobile Buyers

Location Based Selling Platform for Mobile Buyers Location Based Selling Platform for Mobile Buyers M. M. Buddhika Mawella 149219M Faculty of Information Technology University of Moratuwa April 2017 Location Based Selling Platform for Mobile Buyers M.

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY. (An NBA Accredited Programme) ACADEMIC YEAR / EVEN SEMESTER

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY. (An NBA Accredited Programme) ACADEMIC YEAR / EVEN SEMESTER KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY (An NBA Accredited Programme) ACADEMIC YEAR 2012-2013 / EVEN SEMESTER YEAR / SEM : IV / VIII BATCH: 2009-2013 (2008 Regulation) SUB CODE

More information

Service Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction

Service Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction Service Level Agreement for Microsoft Azure operated by 21Vianet Last updated: November 2017 1. Introduction This Service Level Agreement for Azure (this SLA ) is made by 21Vianet in connection with, and

More information

COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements

COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY. Thesis by. Peter Anthony Leong. In Partial Fulfillment of the Requirements COMPUTATIONAL CHALLENGES IN HIGH-RESOLUTION CRYO-ELECTRON MICROSCOPY Thesis by Peter Anthony Leong In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute

More information

CITP Mentoring Program Guidelines

CITP Mentoring Program Guidelines CITP Mentoring Program Guidelines 1 AICPA CITP Mentoring Program Guidelines 2017 American Institute of CPAs. All rights reserved. DISCLAIMER: The contents of this publication do not necessarily reflect

More information

BINUS UNIVERSITY INTERNATIONAL BINUS UNIVERSITY

BINUS UNIVERSITY INTERNATIONAL BINUS UNIVERSITY BINUS UNIVERSITY INTERNATIONAL BINUS UNIVERSITY Major Information Systems Sarjana Komputer Thesis Semester EVEN year 2008 INVENTORY MANAGEMENT AND ORDERING SYSTEM FOR MIDDLE-UP RESTAURANT INVENTORY CONTROL

More information

"Charting the Course... MOC C: Developing SQL Databases. Course Summary

Charting the Course... MOC C: Developing SQL Databases. Course Summary Course Summary Description This five-day instructor-led course provides students with the knowledge and skills to develop a Microsoft SQL database. The course focuses on teaching individuals how to use

More information

Advanced Migration of Schema and Data across Multiple Databases

Advanced Migration of Schema and Data across Multiple Databases Advanced Migration of Schema and Data across Multiple Databases D.M.W.E. Dissanayake 139163B Faculty of Information Technology University of Moratuwa May 2017 Advanced Migration of Schema and Data across

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

Secure communication over mobile ad-hoc network

Secure communication over mobile ad-hoc network University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Secure communication over mobile ad-hoc network Zhenfei Zhang

More information

DISTRIBUTED LOCAL TRUST PROPAGATION MODEL AND ITS CLOUD- BASED IMPLEMENTATION

DISTRIBUTED LOCAL TRUST PROPAGATION MODEL AND ITS CLOUD- BASED IMPLEMENTATION DISTRIBUTED LOCAL TRUST PROPAGATION MODEL AND ITS CLOUD- BASED IMPLEMENTATION A thesis submitted in partial fulfillment of the requirements for the degree of Master of Science By DHARAN KUMAR REDDY ALTHURU

More information

Diversity Optimization and Parameterized Analysis of Heuristic Search Methods for Combinatorial Optimization Problems

Diversity Optimization and Parameterized Analysis of Heuristic Search Methods for Combinatorial Optimization Problems THE UNIVERSITY OF ADELAIDE DOCTORAL THESIS Diversity Optimization and Parameterized Analysis of Heuristic Search Methods for Combinatorial Optimization Problems Author: Wanru Gao Principle Supervisor:

More information

A Framework for Knowledge Derivation Incorporating Trust and Quality of Data

A Framework for Knowledge Derivation Incorporating Trust and Quality of Data A Framework for Knowledge Derivation Incorporating Trust and Quality of Data By c 2013 Martin Kuehnhausen Submitted to the graduate degree program in Electrical Engineering and Computer Science and the

More information

MSc Digital Marketing

MSc Digital Marketing MSc Digital Marketing Become a 2 YEARS PART-TIME Digital Marketing Master STUDY ONLINE www.imarcomms.com Validated by the Industry Advisory Council. Including members from Content MSc Digital Marketing

More information

"Charting the Course... SharePoint 2007 Hands-On Labs Course Summary

Charting the Course... SharePoint 2007 Hands-On Labs Course Summary Course Summary Description This series of 33 hands-on labs allows students to explore the new features of Microsoft SharePoint Server, Microsoft Windows, Microsoft Office, including Microsoft Office Groove,

More information

The Concept of Evolutionary Computing for Robust Surgical Endoscope Tracking and Navigation

The Concept of Evolutionary Computing for Robust Surgical Endoscope Tracking and Navigation The Concept of Evolutionary Computing for Robust Surgical Endoscope Tracking and Navigation Ying Wan School of Computing and Communications University of Technology, Sydney This dissertation is submitted

More information

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online.

a PennState A leader in online learning since 1998 Programs in Enterprise Architecture ~ World Campus A world of possibilities. Online. A leader in online learning since 1998 To learn more about programs in Enterprise Architecture, visit: worldcampus.psu.edu/psueabt Programs in Enterprise Architecture a PennState ~ World Campus A world

More information

Semantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95

Semantic Web. Semantic Web Services. Morteza Amini. Sharif University of Technology Fall 94-95 ه عا ی Semantic Web Semantic Web Services Morteza Amini Sharif University of Technology Fall 94-95 Outline Semantic Web Services Basics Challenges in Web Services Semantics in Web Services Web Service

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Suite and the OCEG Capability Model Mapping the OCEG Capability Model to the BPS Suite s product capability. BPS Contents Introduction... 2 GRC activities... 2 BPS and the Capability Model for GRC...

More information

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.

Initial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020. PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University

More information

University of Wollongong. Research Online

University of Wollongong. Research Online University of Wollongong Research Online University of Wollongong Thesis Collection 1954-2016 University of Wollongong Thesis Collections 2009 Complete interoperability in healthcare : technical, semantic

More information

Resource Allocation Strategies for Multiple Job Classes

Resource Allocation Strategies for Multiple Job Classes Resource Allocation Strategies for Multiple Job Classes by Ye Hu A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Computer

More information