Support system for smartphone application development based on analysis of user reviews

Size: px
Start display at page:

Download "Support system for smartphone application development based on analysis of user reviews"

Transcription

1 1,a) 1 1 / Support system for smartphone application development based on analysis of user reviews Yuichi Sei 1,a) Yasuyuki Tahara 1 Akihiko Ohsuga 1 Abstract: A number of smartphone applications have been developed these days. However, it is difficult to develop smartphone applications without bugs because they are used in various platforms and environments. Moreover, requirements elicitation is also difficult because various persons may use the smartphone applications. In this paper, we propose an algorithm for eliciting requirements and detecting bugs early by analyzing user reviews posted in review site of smartphone applications. 1. Google Play Apple Store 100 [1] Graduate School of Information Systems, The University of Electro-Communications, Chofu, Tokyo , Japan a) sei@is.uec.ac.jp [14] 2 c 2014 Information Processing Society of Japan 1

2 / Google Play App Store 1 Google Play Google Play App Store Review tle User name 2.2 Fig. 1 Pos ng date (we can get the detailed me by the Android Market API) 1 Ra ng Sample of a review. Review content ID / / ID ID ID ID 4.2 ID 3. [13] [2] Seyff c 2014 Information Processing Society of Japan 2

3 [11,12] Jones [9] Fu Wiscom [6] Wiscom 1 Chen AR-Miner [4] AR- Miner Galvis Carreño [7] [5, 16] / User reviews Text data Time data Text data & Time data 2 Fig. 2 Topic modeling Anomaly detec on Trend analysis System overview. Requirements elicita on Fault detec on Displaying change of ra ng Latent Dirichlet Allocation (LDA) [3] LDA 3 Algorithm 1 Algorithm 1 Extracting representative reviews of each topic Input: R ID, topicnum Output: t i r i 1: map (Key: a pair of word and topic ID, Value: the probability that the word is categorized to the topic) getlda(r, topicnum) 2: Create array maxv alues with size topicnum 3: Craete array repreviews with size topicnum 4: for r R do 5: Create array temps with size topicnum 6: for w getw ords(r) do 7: for i = 1,..., topicnum do 8: temps[i] temps[i] + map.get((w, i)) 9: end for 10: end for 11: for i = 1,..., topicnum do 12: if temps[i]/ ln(length(r)) > maxv alues[i] then 13: maxv alues[i] temps[i]/ ln(length(r)) 14: repreviews[i] r 15: end if 16: end for 17: end for 18: return repreviews map (w, i), v (w, i) v c 2014 Information Processing Society of Japan 3

4 / X λ r P (r, λ) = λr r! e λ (1) λ T N T V = r=n T P (r, λt ) = 1 N T 1 r=0 (λt ) r e λt (2) r! sl V < sl (3) T 2 3 T T 2 t 0 t 1,..., t i,... T (t i t 0 ) + (t i t 0 )/2i V i i T 3 V 3 Algorithm 2 L.get(i) L i sl sl Algorithm 2 Anomaly detection Input: L λ sl Output: True False 1: minv 1 2: t 0 L.get(0) 3: for N t = 2,..., L do 4: t i L.get(N t 1) 5: T (t i t 0 ) + (t i t 0 )/(2(N t 1)) 6: V 1.0 7: for r = 0,..., N t 1 do 8: V V (λt ) r e λt /r! 9: end for 10: if V < sl then 11: return TRUE 12: end if 13: if V > minv then 14: return FALSE 15: else 16: minv V 17: end if 18: end for 19: return FALSE 4.3 Google Play App Store 5 ID ID d i R i 1 d i r.point r SP i = r R i max(r.point 3, 0) NP i = r R i min(r.point 3, 0) (4) SP i d i NP i d i c 2014 Information Processing Society of Japan 4

5 SP i NP i α α r r r Algorithm 3 getw ords(r) r Length(r) r Algorithm 3 Extracting a representative review Input: R ID Output: R ˆr 1: Create variable maxv alue initialized to 0 2: for r 1 R do 3: Create empty set S 4: for r 2 R do 5: if r 2 r 1 then 6: S S getw ords(r 2 ) 7: end if 8: end for 9: Create variable c initialized to 0 10: for w getw ords(r 1 ) do 11: if S contains w then 12: c c : end if 14: end for 15: if c/ ln(length(r 1 )) > maxv alue then 16: maxv alue c/ ln(length(r 1 )) 17: ˆr r 1 18: end if 19: end for Google Play android market api *1 Google Play Java *1 Mecab LDA Collapsed Gibbs Sampling [8] 5.2 / Google Play 50 17,588 1 Topic Top 5 words in each topic 5 Representative review Google Amazon Amazon 1/ / c 2014 Information Processing Society of Japan 5

6 Topic Top 5 words in each topic Representative review 1 : 2 : ( ) 3 : (^_^)v 4 : 5 PC : 6 : 7 : 8 : 9 ( ) O : ( ) 10 : 11 GOOGLE : Google 12 : 13 (**) : 14 : 15 : : 17 : 18 : 19 :? 20 : 1 Table 1 ( ) Result of extracted topics 9/10 9/11 9/12 9/13 9/14 (a) sl = /10 9/11 9/12 9/13 9/14 (b) sl = Fig. 3 Results of anomaly detection λ = 1/ sl (a) (b) sl = (b) 9/11 9/13 1 sl = 0.01 c 2014 Information Processing Society of Japan 6

7 3(a) 9/12 5 sl 9/ /11 9/12 9/13 Amazon Cookpad 4 0 SP 0 NP α = 1 1 Amazon : Amazon (b) /8/25 : ( ) 0 11/2/26 11/9/14 12/4/1 12/10/18 13/5/6 13/11/22 14/6/10 14/12/ /1/8-20 : (a) Amazon 2013/2/5 : 0 11/9/14 12/4/1 12/10/18 13/5/6 13/11/22 14/6/10 14/12/ /2/ Number of posted reviews Fig Fig (b) Cookpad Results of evaluation change hour 5 Distribution of time of review posting. [15, 17] c 2014 Information Processing Society of Japan 7

8 Android OS Android-Device-Compatibility [10] OS 7. / Amazon Cookpad JSPS , , [9] Jones, S., Poulsen, A., Maiden, N. and Zachos, K.: User roles in asynchronous distributed collaborative idea generation, Proc. ACM Conference on Creativity and cognition (C&C), pp (2011). [10] mixi Inc: GitHub, mixi-inc/android-device-compatibility. [11] Seyff, N., Graf, F. and Maiden, N.: Using Mobile RE Tools to Give End-Users Their Own Voice, Proc. IEEE International Requirements Engineering Conference (RE), pp (2010). [12] Seyff, N., Maiden, N., Karlsen, K., Lockerbie, J., Grünbacher, P., Graf, F. and Ncube, C.: Exploring how to use scenarios to discover requirements, Requirements Engineering, Vol. 14, No. 2, pp (2009). [13] Sutcliffe, A. and Sawyer, P.: Requirements elicitation: Towards the unknown unknowns, Proc. IEEE International Requirements Engineering Conference (RE), pp (2013). [14] Vol. 53, No. 4, pp (2012). [15] Vol. 25, No. 1, pp (2010). [16] Android Vol. 111, No. 469, pp (2012). [17]. Vol. 6, No. 1, pp (2013). [1] AppTornado GmbH: Number of available android applications, number-of-android-apps. [2] Bano, M. and Zowghi, D.: A systematic review on the relationship between user involvement and system success, Information and Software Technology, p. In press (2014). [3] Blei, D. M., Ng, A. Y. and Jordan, M. I.: Latent dirichlet allocation, The Journal of Machine Learning Research, Vol. 3, pp (2003). [4] Chen, N., Lin, J., Hoi, S. C. H., Xiao, X. and Zhang, B.: AR-miner: mining informative reviews for developers from mobile app marketplace, Proc. ICSE, pp (2014). [5] Cinque, M.: Enabling on-line dependability assessment of Android smart phones, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W), IEEE, pp (2011). [6] Fu, B., Lin, J., Li, L., Faloutsos, C., Hong, J. and Sadeh, N.: Why people hate your app: making sense of user feedback in a mobile app store, Proc. ACM KDD, pp (2013). [7] Galvis Carreño, L. V. and Winbladh, K.: Analysis of user comments: an approach for software requirements evolution, Proc. ICSE, pp (2013). [8] Griffiths, T. L. and Steyvers, M.: Finding scientific topics., Proc. National Academy of Sciences of the United States of America, Vol. 101, No. Suppl 1, pp (2004). c 2014 Information Processing Society of Japan 8

jldadmm: A Java package for the LDA and DMM topic models

jldadmm: A Java package for the LDA and DMM topic models jldadmm: A Java package for the LDA and DMM topic models Dat Quoc Nguyen School of Computing and Information Systems The University of Melbourne, Australia dqnguyen@unimelb.edu.au Abstract: In this technical

More information

Partitioning Algorithms for Improving Efficiency of Topic Modeling Parallelization

Partitioning Algorithms for Improving Efficiency of Topic Modeling Parallelization Partitioning Algorithms for Improving Efficiency of Topic Modeling Parallelization Hung Nghiep Tran University of Information Technology VNU-HCMC Vietnam Email: nghiepth@uit.edu.vn Atsuhiro Takasu National

More information

Identification and Classification of Requirements from App User Reviews

Identification and Classification of Requirements from App User Reviews Identification and Classification of Requirements from App User Reviews Hui Yang State Key Lab of Software Engineering School of Computer, Wuhan University, China huiyang@whu.edu.cn Abstract Review function,

More information

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language

Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Ontology based Model and Procedure Creation for Topic Analysis in Chinese Language Dong Han and Kilian Stoffel Information Management Institute, University of Neuchâtel Pierre-à-Mazel 7, CH-2000 Neuchâtel,

More information

A Measurement Design for the Comparison of Expert Usability Evaluation and Mobile App User Reviews

A Measurement Design for the Comparison of Expert Usability Evaluation and Mobile App User Reviews A Measurement Design for the Comparison of Expert Usability Evaluation and Mobile App User Reviews Necmiye Genc-Nayebi and Alain Abran Department of Software Engineering and Information Technology, Ecole

More information

Parallelism for LDA Yang Ruan, Changsi An

Parallelism for LDA Yang Ruan, Changsi An Parallelism for LDA Yang Ruan, Changsi An (yangruan@indiana.edu, anch@indiana.edu) 1. Overview As parallelism is very important for large scale of data, we want to use different technology to parallelize

More information

Shaocheng Wang, Guojun Wu

Shaocheng Wang, Guojun Wu Ubiquitous and Mobile Computing CS 528: Characterizing Smartphone Usage Patterns from Millions of Android Users Shaocheng Wang, Guojun Wu Computer Science Dept. Worcester Polytechnic Institute (WPI) Introduction

More information

Android. Studies on Risk Level Evaluation Schemes using APK Metadata

Android. Studies on Risk Level Evaluation Schemes using APK Metadata Computer Security Symposium 2015 21-23 October 2015 Android 184-8795 4-2-1 takeshi takahashi@nict.go.jp 102-0083 2-6-7 RK 4F Android Android Package (APK) APK ( ) APK Web APK area under curve APK Studies

More information

HUKB at NTCIR-12 IMine-2 task: Utilization of Query Analysis Results and Wikipedia Data for Subtopic Mining

HUKB at NTCIR-12 IMine-2 task: Utilization of Query Analysis Results and Wikipedia Data for Subtopic Mining HUKB at NTCIR-12 IMine-2 task: Utilization of Query Analysis Results and Wikipedia Data for Subtopic Mining Masaharu Yoshioka Graduate School of Information Science and Technology, Hokkaido University

More information

Spatial Latent Dirichlet Allocation

Spatial Latent Dirichlet Allocation Spatial Latent Dirichlet Allocation Xiaogang Wang and Eric Grimson Computer Science and Computer Science and Artificial Intelligence Lab Massachusetts Tnstitute of Technology, Cambridge, MA, 02139, USA

More information

All in One APP Development in Hotel Industry

All in One APP Development in Hotel Industry All in One APP All in One APP Development in Hotel Industry App App App App App 9 All in One App App ) All in One APP All in One App s App 164 5 App App All in One App AppKano 4 2016 Google 96% 84 82%

More information

Building Web Annotation Stickies based on Bidirectional Links

Building Web Annotation Stickies based on Bidirectional Links Building Web Annotation Stickies based on Bidirectional Links Hiroyuki Sano, Taiki Ito, Tadachika Ozono and Toramatsu Shintani Dept. of Computer Science and Engineering Graduate School of Engineering,

More information

UltraSoundLog: ID. UltraSoundLog: A Method for Embedding Location Information to Sound Log by Using Ultrasonic ID

UltraSoundLog: ID. UltraSoundLog: A Method for Embedding Location Information to Sound Log by Using Ultrasonic ID 情報処理学会インタラクション 2015 IPSJ Interaction 2015 15INT016 2015/3/7 UltraSoundLog: ID 1,a) 1,2,b) 1,c) ID 64.0% UltraSoundLog: A Method for Embedding Location Information to Sound Log by Using Ultrasonic ID Watanabe

More information

Mobile Web User Behavior Modeling

Mobile Web User Behavior Modeling Mobile Web User Behavior Modeling Bozhi Yuan 1,2,BinXu 1,2,ChaoWu 1,2, and Yuanchao Ma 1,2 1 Department of Computer Science and Technology, Tsinghua University, China 2 Tsinghua National Laboratory for

More information

Exploring archives with probabilistic models: Topic modelling for the European Commission Archives

Exploring archives with probabilistic models: Topic modelling for the European Commission Archives Exploring archives with probabilistic models: Topic modelling for the European Commission Archives Simon Hengchen, Mathias Coeckelbergs, Seth van Hooland, Ruben Verborgh & Thomas Steiner Université libre

More information

Feature LDA: a Supervised Topic Model for Automatic Detection of Web API Documentations from the Web

Feature LDA: a Supervised Topic Model for Automatic Detection of Web API Documentations from the Web Feature LDA: a Supervised Topic Model for Automatic Detection of Web API Documentations from the Web Chenghua Lin, Yulan He, Carlos Pedrinaci, and John Domingue Knowledge Media Institute, The Open University

More information

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust

Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust Accumulative Privacy Preserving Data Mining Using Gaussian Noise Data Perturbation at Multi Level Trust G.Mareeswari 1, V.Anusuya 2 ME, Department of CSE, PSR Engineering College, Sivakasi, Tamilnadu,

More information

Text Document Clustering Using DPM with Concept and Feature Analysis

Text Document Clustering Using DPM with Concept and Feature Analysis Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 10, October 2013,

More information

ARdoc: App Reviews Development Oriented Classifier

ARdoc: App Reviews Development Oriented Classifier Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2016 ARdoc: App Reviews Development Oriented Classifier Panichella, Sebastiano;

More information

Keywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts.

Keywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts. Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advanced Preferred

More information

A Novel Method of Optimizing Website Structure

A Novel Method of Optimizing Website Structure A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School

More information

VisoLink: A User-Centric Social Relationship Mining

VisoLink: A User-Centric Social Relationship Mining VisoLink: A User-Centric Social Relationship Mining Lisa Fan and Botang Li Department of Computer Science, University of Regina Regina, Saskatchewan S4S 0A2 Canada {fan, li269}@cs.uregina.ca Abstract.

More information

Software Metrics based on Coding Standards Violations

Software Metrics based on Coding Standards Violations Software Metrics based on Coding Standards Violations Yasunari Takai, Takashi Kobayashi and Kiyoshi Agusa Graduate School of Information Science, Nagoya University Aichi, 464-8601, Japan takai@agusa.i.is.nagoya-u.ac.jp,

More information

Harvesting Image Databases from The Web

Harvesting Image Databases from The Web Abstract Harvesting Image Databases from The Web Snehal M. Gaikwad G.H.Raisoni College of Engg. & Mgmt.,Pune,India *gaikwad.snehal99@gmail.com Snehal S. Pathare G.H.Raisoni College of Engg. & Mgmt.,Pune,India

More information

QoS Management of Web Services

QoS Management of Web Services QoS Management of Web Services Zibin Zheng (Ben) Supervisor: Prof. Michael R. Lyu Department of Computer Science & Engineering The Chinese University of Hong Kong Dec. 10, 2010 Outline Introduction Web

More information

Implementation on Real Time Public. Transportation Information Using GSM Query. Response System

Implementation on Real Time Public. Transportation Information Using GSM Query. Response System Contemporary Engineering Sciences, Vol. 7, 2014, no. 11, 509-514 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4446 Implementation on Real Time Public Transportation Information Using

More information

Design and Implementation of HTML5 based SVM for Integrating Runtime of Smart Devices and Web Environments

Design and Implementation of HTML5 based SVM for Integrating Runtime of Smart Devices and Web Environments Vol.8, No.3 (2014), pp.223-234 http://dx.doi.org/10.14257/ijsh.2014.8.3.21 Design and Implementation of HTML5 based SVM for Integrating Runtime of Smart Devices and Web Environments Yunsik Son 1, Seman

More information

Structure Mining for Intellectual Networks

Structure Mining for Intellectual Networks Structure Mining for Intellectual Networks Ryutaro Ichise 1, Hideaki Takeda 1, and Kosuke Ueyama 2 1 National Institute of Informatics, 2-1-2 Chiyoda-ku Tokyo 101-8430, Japan, {ichise,takeda}@nii.ac.jp

More information

A System for Identifying Voyage Package Using Different Recommendations Techniques

A System for Identifying Voyage Package Using Different Recommendations Techniques GLOBAL IMPACT FACTOR 0.238 DIIF 0.876 A System for Identifying Voyage Package Using Different Recommendations Techniques 1 Gajjela.Sandeep, 2 R. Chandrashekar 1 M.Tech (CS),Department of Computer Science

More information

Wearable Technology Orientation Using Big Data Analytics for Improving Quality of Human Life

Wearable Technology Orientation Using Big Data Analytics for Improving Quality of Human Life Wearable Technology Orientation Using Big Data Analytics for Improving Quality of Human Life Ch.Srilakshmi Asst Professor,Department of Information Technology R.M.D Engineering College, Kavaraipettai,

More information

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS

ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ASSESSING INVARIANT MINING TECHNIQUES FOR CLOUD-BASED UTILITY COMPUTING SYSTEMS ABSTRACT Likely system invariants model properties that hold in operating conditions of a computing system. Invariants may

More information

Using Geofencing for a Disaster Information System

Using Geofencing for a Disaster Information System Using Geofencing for a Disaster Information System Akira Suyama Graduate School of Engineering Tokyo Denki University Tokyo, Japan 16kmc16@ms.dendai.ac.jp Ushio Inoue Dept. of Information and Communication

More information

The App Sampling Problem for App Store Mining

The App Sampling Problem for App Store Mining The App Sampling Problem for App Store Mining William Martin, Mark Harman, Yue Jia, Federica Sarro, and Yuanyuan Zhang Department of Computer Science, University College London, London, United Kingdom

More information

Classifying Bug Reports to Bugs and Other Requests Using Topic Modeling

Classifying Bug Reports to Bugs and Other Requests Using Topic Modeling Classifying Bug Reports to Bugs and Other Requests Using Topic Modeling Natthakul Pingclasai Department of Computer Engineering Kasetsart University Bangkok, Thailand Email: b5310547207@ku.ac.th Hideaki

More information

An Empirical Comparison of Collaborative Filtering Approaches on Netflix Data

An Empirical Comparison of Collaborative Filtering Approaches on Netflix Data An Empirical Comparison of Collaborative Filtering Approaches on Netflix Data Nicola Barbieri, Massimo Guarascio, Ettore Ritacco ICAR-CNR Via Pietro Bucci 41/c, Rende, Italy {barbieri,guarascio,ritacco}@icar.cnr.it

More information

Efficient Mining Algorithms for Large-scale Graphs

Efficient Mining Algorithms for Large-scale Graphs Efficient Mining Algorithms for Large-scale Graphs Yasunari Kishimoto, Hiroaki Shiokawa, Yasuhiro Fujiwara, and Makoto Onizuka Abstract This article describes efficient graph mining algorithms designed

More information

Liangjie Hong*, Dawei Yin*, Jian Guo, Brian D. Davison*

Liangjie Hong*, Dawei Yin*, Jian Guo, Brian D. Davison* Tracking Trends: Incorporating Term Volume into Temporal Topic Models Liangjie Hong*, Dawei Yin*, Jian Guo, Brian D. Davison* Dept. of Computer Science and Engineering, Lehigh University, Bethlehem, PA,

More information

ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA

ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA ANDROID BASED WS SECURITY AND MVC BASED UI REPRESENTATION OF DATA Jitendra Ingale, Parikshit mahalle SKNCOE pune,maharashtra,india Email: jits.ingale@gmail.com ABSTRACT: Google s Android is open source;

More information

Mining User - Aware Rare Sequential Topic Pattern in Document Streams

Mining User - Aware Rare Sequential Topic Pattern in Document Streams Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,

More information

Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets

Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets 2016 IEEE 16th International Conference on Data Mining Workshops Inferring Variable Labels Considering Co-occurrence of Variable Labels in Data Jackets Teruaki Hayashi Department of Systems Innovation

More information

A Study on a Development Environment for Software Traceability Management

A Study on a Development Environment for Software Traceability Management 1,a) 1,b) 1,c) TERAS A Study on a Development Environment for Software Traceability Management NORITOSHI ATSUMI 1,a) TAKASHI KOBAYASHI 1,b) HIROAKI TAKADA 1,c) Abstract: Software traceability management

More information

An Implementation of Vehicle Management System on the Cloud Computing Platform Hua Yi Lin 1, Meng-Yen Hsieh 2, Yu-Bin Chiu 1 and Jiann-Gwo Doong 1 1 Department of Information Management, China University

More information

Signup for Multi-Factor Authentication

Signup for Multi-Factor Authentication What is Multi-Factor Authentication? Multi-Factor Authentication (MFA) helps safeguard access to data and applications while maintaining simplicity for users. It provides additional security by requiring

More information

Validation of Web Alteration Detection using Link Change State in Web Page

Validation of Web Alteration Detection using Link Change State in Web Page Web 182-8585 1 5-1 m-shouta@uec.ac.jp,zetaka@computer.org Web Web URL Web Alexa Top 100 Web Validation of Web Alteration Detection using Link Change State in Web Page Shouta Mochizuki Tetsuji Takada The

More information

Community Mining Tool using Bibliography Data

Community Mining Tool using Bibliography Data Community Mining Tool using Bibliography Data Ryutaro Ichise, Hideaki Takeda National Institute of Informatics 2-1-2 Hitotsubashi Chiyoda-ku Tokyo, 101-8430, Japan {ichise,takeda}@nii.ac.jp Kosuke Ueyama

More information

Survey on Recommendation of Personalized Travel Sequence

Survey on Recommendation of Personalized Travel Sequence Survey on Recommendation of Personalized Travel Sequence Mayuri D. Aswale 1, Dr. S. C. Dharmadhikari 2 ME Student, Department of Information Technology, PICT, Pune, India 1 Head of Department, Department

More information

GETTING STARTED WITH STUDENT LEARNING SPACE Instructions for Students

GETTING STARTED WITH STUDENT LEARNING SPACE Instructions for Students ANNEX A GETTING STARTED WITH STUDENT LEARNING SPACE Instructions for Students SYSTEM REQUIREMENTS 1. The Student Learning Space (SLS) is accessible through the internet browsers on either Windows PC, Mac,

More information

Using Topic Models in Content-Based News Recommender Systems

Using Topic Models in Content-Based News Recommender Systems Using Topic Models in Content-Based News Recommender Systems Tapio Luostarinen 1, Oskar Kohonen 2 (1) Comtra Oy, Savonlinna, Finland (2) Aalto University School of Science Department of Information and

More information

Ranking models in Information Retrieval: A Survey

Ranking models in Information Retrieval: A Survey Ranking models in Information Retrieval: A Survey R.Suganya Devi Research Scholar Department of Computer Science and Engineering College of Engineering, Guindy, Chennai, Tamilnadu, India Dr D Manjula Professor

More information

UC San Diego Mobile App: The Next Generation

UC San Diego Mobile App: The Next Generation UC San Diego Mobile App: The Next Generation Submitter: Alex Wu, UC San Diego, Information Technology Services, Web Technology Services Manager, a6wu@ucsd.edu Team Members: Brett Pollak, UC San Diego,

More information

Implementation and Experiments of Frequent GPS Trajectory Pattern Mining Algorithms

Implementation and Experiments of Frequent GPS Trajectory Pattern Mining Algorithms DEIM Forum 213 A5-3 Implementation and Experiments of Frequent GPS Trajectory Pattern Abstract Mining Algorithms Xiaoliang GENG, Hiroki ARIMURA, and Takeaki UNO Graduate School of Information Science and

More information

Multimodal Medical Image Retrieval based on Latent Topic Modeling

Multimodal Medical Image Retrieval based on Latent Topic Modeling Multimodal Medical Image Retrieval based on Latent Topic Modeling Mandikal Vikram 15it217.vikram@nitk.edu.in Suhas BS 15it110.suhas@nitk.edu.in Aditya Anantharaman 15it201.aditya.a@nitk.edu.in Sowmya Kamath

More information

JSEA: A Program Comprehension Tool Adopting LDA-based Topic Modeling

JSEA: A Program Comprehension Tool Adopting LDA-based Topic Modeling JSEA: A Program Comprehension Tool Adopting LDA-based Topic Modeling Tianxia Wang School of Software Engineering Tongji University China Yan Liu School of Software Engineering Tongji University China Abstract

More information

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps

User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps User Control Mechanisms for Privacy Protection Should Go Hand in Hand with Privacy-Consequence Information: The Case of Smartphone Apps Position Paper Gökhan Bal, Kai Rannenberg Goethe University Frankfurt

More information

ISSN Vol.04,Issue.11, August-2016, Pages:

ISSN Vol.04,Issue.11, August-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.11, August-2016, Pages:1957-1962 Design-Based Matter for Paper Representation in Data Filtering ATIYA ANJUM 1, K SHILPA 2 1 PG Scholar, Dept of CS, Shadan Women

More information

Event Detection using Archived Smart House Sensor Data obtained using Symbolic Aggregate Approximation

Event Detection using Archived Smart House Sensor Data obtained using Symbolic Aggregate Approximation Event Detection using Archived Smart House Sensor Data obtained using Symbolic Aggregate Approximation Ayaka ONISHI 1, and Chiemi WATANABE 2 1,2 Graduate School of Humanities and Sciences, Ochanomizu University,

More information

A Topic Modeling Based Solution for Confirming Software Documentation Quality

A Topic Modeling Based Solution for Confirming Software Documentation Quality A Topic Modeling Based Solution for Confirming Software Documentation Quality Nouh Alhindawi 1 Faculty of Sciences and Information Technology, JADARA UNIVERSITY Obaida M. Al-Hazaimeh 2 Department of Information

More information

How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects?

How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects? How Often and What StackOverflow Posts Do Developers Reference in Their GitHub Projects? Saraj Singh Manes School of Computer Science Carleton University Ottawa, Canada sarajmanes@cmail.carleton.ca Olga

More information

Application for e-tourism: Intelligent Mobile Tourist Guide

Application for e-tourism: Intelligent Mobile Tourist Guide 4th International Congress on Advanced Applied Informatics July 14, 2015, Okayama Convention Center, Okayama, Japan Application for e-tourism: Intelligent Mobile Tourist Guide Alexander Smirnov, Alexey

More information

Development of a mobile application for manual traffic counts

Development of a mobile application for manual traffic counts Development of a mobile application for manual traffic counts Mohammad Ghanim 1,* and Khalid Khawaja 2 1 Department of Civil and Architectural Engineering, Qatar University, Doha, Qatar 2 Office of Academic

More information

Dependence Graph Considerering Resource for Automatic Sample Program Generation

Dependence Graph Considerering Resource for Automatic Sample Program Generation 1 2 2 2 ( ) Google Android Dependence Graph Considerering Resource for Automatic Sample Program Generation Yoshimasa Fujiura, 1 Hirotaka Ohkubo, 1 Hideto Kasuya 1 and Shinichiro Yamamoto 1 This paper propose

More information

Anthony Ho. Ian Brown

Anthony Ho. Ian Brown Anthony Ho Ian Brown Practical Uses of Video Intro Video Resources (commercial) Video Resources (making your own) Video for MOOCs Video@PolyU a summary Practical Uses of Video 2014 a pivotal year for elearning

More information

Knowledge-based Word Sense Disambiguation using Topic Models Devendra Singh Chaplot

Knowledge-based Word Sense Disambiguation using Topic Models Devendra Singh Chaplot Knowledge-based Word Sense Disambiguation using Topic Models Devendra Singh Chaplot Ruslan Salakhutdinov Word Sense Disambiguation Word sense disambiguation (WSD) is defined as the problem of computationally

More information

Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps

Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps Proceedings of the Twenty-Second International FLAIRS Conference (2009) Document Clustering and Visualization with Latent Dirichlet Allocation and Self-Organizing Maps Jeremy R. Millar and Gilbert L. Peterson

More information

GreenICN Overview GreenICN: Architecture and Applications of Green Information Centric Networking

GreenICN Overview GreenICN: Architecture and Applications of Green Information Centric Networking GreenICN Overview GreenICN: Architecture and Applications of Green Information Centric Networking Mayutan Arumaithurai University of Goettingen Research Activities and Future of EU/US/JP ICN projects Workshop

More information

Fraud Detection of Mobile Apps

Fraud Detection of Mobile Apps Fraud Detection of Mobile Apps Urmila Aware*, Prof. Amruta Deshmuk** *(Student, Dept of Computer Engineering, Flora Institute Of Technology Pune, Maharashtra, India **( Assistant Professor, Dept of Computer

More information

An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool

An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool An Evaluation of a Use Case Driven Requirements Analysis Using Web UI Prototype Generation Tool SHINPEI OGATA Function Control System, Graduate School of Engineering Shibaura Institute of Technology 307

More information

Clustering using Topic Models

Clustering using Topic Models Clustering using Topic Models Compiled by Sujatha Das, Cornelia Caragea Credits for slides: Blei, Allan, Arms, Manning, Rai, Lund, Noble, Page. Clustering Partition unlabeled examples into disjoint subsets

More information

Association Rules Mining using BOINC based Enterprise Desktop Grid

Association Rules Mining using BOINC based Enterprise Desktop Grid Association Rules Mining using BOINC based Enterprise Desktop Grid Evgeny Ivashko and Alexander Golovin Institute of Applied Mathematical Research, Karelian Research Centre of Russian Academy of Sciences,

More information

Overview. Data-mining. Commercial & Scientific Applications. Ongoing Research Activities. From Research to Technology Transfer

Overview. Data-mining. Commercial & Scientific Applications. Ongoing Research Activities. From Research to Technology Transfer Data Mining George Karypis Department of Computer Science Digital Technology Center University of Minnesota, Minneapolis, USA. http://www.cs.umn.edu/~karypis karypis@cs.umn.edu Overview Data-mining What

More information

Design and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus

Design and Implementation of unified Identity Authentication System Based on LDAP in Digital Campus Advanced Materials Research Online: 2014-04-09 ISSN: 1662-8985, Vols. 912-914, pp 1213-1217 doi:10.4028/www.scientific.net/amr.912-914.1213 2014 Trans Tech Publications, Switzerland Design and Implementation

More information

arxiv: v1 [cs.ir] 31 Jul 2017

arxiv: v1 [cs.ir] 31 Jul 2017 Familia: An Open-Source Toolkit for Industrial Topic Modeling Di Jiang, Zeyu Chen, Rongzhong Lian, Siqi Bao, Chen Li Baidu, Inc., China {iangdi,chenzeyu,lianrongzhong,baosiqi,lichen06}@baidu.com ariv:1707.09823v1

More information

Voice Control. Setting with Google and Amazon

Voice Control. Setting with Google and Amazon Voice Control Setting with Google and Amazon Table Contents 1. How to setup Google Assistant and Amazon Alexa.... 2 A. Register Gateway for use with Google and Amazon Voice Control... 3 2. Google Assistant

More information

A Comparative Study of Data Mining Process Models (KDD, CRISP-DM and SEMMA)

A Comparative Study of Data Mining Process Models (KDD, CRISP-DM and SEMMA) International Journal of Innovation and Scientific Research ISSN 2351-8014 Vol. 12 No. 1 Nov. 2014, pp. 217-222 2014 Innovative Space of Scientific Research Journals http://www.ijisr.issr-journals.org/

More information

Implementation of a High-Performance Distributed Web Crawler and Big Data Applications with Husky

Implementation of a High-Performance Distributed Web Crawler and Big Data Applications with Husky Implementation of a High-Performance Distributed Web Crawler and Big Data Applications with Husky The Chinese University of Hong Kong Abstract Husky is a distributed computing system, achieving outstanding

More information

Topic-Level Random Walk through Probabilistic Model

Topic-Level Random Walk through Probabilistic Model Topic-Level Random Walk through Probabilistic Model Zi Yang, Jie Tang, Jing Zhang, Juanzi Li, and Bo Gao Department of Computer Science & Technology, Tsinghua University, China Abstract. In this paper,

More information

How to setup Google Assistant and Amazon Alexa. Make sure your Gateway has Firmware version 1.81 or higher.

How to setup Google Assistant and Amazon Alexa. Make sure your Gateway has Firmware version 1.81 or higher. How to setup Google Assistant and Amazon Alexa. Make sure your Gateway has Firmware version 1.81 or higher. First the Gateway that will be used needs to be binded. To do this in the APP go to (1) Settings

More information

Empirical Study on Impact of Developer Collaboration on Source Code

Empirical Study on Impact of Developer Collaboration on Source Code Empirical Study on Impact of Developer Collaboration on Source Code Akshay Chopra University of Waterloo Waterloo, Ontario a22chopr@uwaterloo.ca Parul Verma University of Waterloo Waterloo, Ontario p7verma@uwaterloo.ca

More information

International Conference on Advanced Information and Communication Technology for Education (ICAICTE 2014)

International Conference on Advanced Information and Communication Technology for Education (ICAICTE 2014) International Conference on Advanced Information and Communication Technology for Education (ICAICTE 2014) An Implementation of Vehicle Management System on the Cloud Computing Platform Hua Yi Lin1, Meng-Yen

More information

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India

Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Web Page Classification using FP Growth Algorithm Akansha Garg,Computer Science Department Swami Vivekanad Subharti University,Meerut, India Abstract - The primary goal of the web site is to provide the

More information

An Introduction to GIS for developers

An Introduction to GIS for developers An Introduction to GIS for developers Part 4: GIS Sharing Canserina Kurnia & Tom Shippee Agenda Web GIS ArcGIS Online Cloud-based ArcGIS Server ArcGIS Server on-premises ArcGIS a complete platform discover,

More information

A Tool to Edit and Verify IoT System Architecture Model

A Tool to Edit and Verify IoT System Architecture Model A Tool to Edit and Verify IoT System Architecture Model Shinpei Ogata, Hiroyuki Nakagawa, Yoshitaka Aoki, Kazuki Kobayashi, Yuko Fukushima Shinshu University, Nagano, Japan Email: ogata@cs.shinshu-u.ac.jp,

More information

The Curated Web: A Recommendation Challenge. Saaya, Zurina; Rafter, Rachael; Schaal, Markus; Smyth, Barry. RecSys 13, Hong Kong, China

The Curated Web: A Recommendation Challenge. Saaya, Zurina; Rafter, Rachael; Schaal, Markus; Smyth, Barry. RecSys 13, Hong Kong, China Provided by the author(s) and University College Dublin Library in accordance with publisher policies. Please cite the published version when available. Title The Curated Web: A Recommendation Challenge

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

Channel Allocation for Social Networking Features on Publish/Subscribe-based Mobile Application

Channel Allocation for Social Networking Features on Publish/Subscribe-based Mobile Application Allocation for Social Networking Features on Publish/Subscribe-based Mobile Application Alfian Ramadhan, Achmad Imam Kistijantoro Laboratory of Distributed System School of Electrical Engineering and Informatics,

More information

Applications of admixture models

Applications of admixture models Applications of admixture models CM226: Machine Learning for Bioinformatics. Fall 2016 Sriram Sankararaman Acknowledgments: Fei Sha, Ameet Talwalkar, Alkes Price Applications of admixture models 1 / 27

More information

Professional development for hydrographers. David Loosley, Chief Executive, IMarEST Charlotte Lord, Communications Director, IMarEST

Professional development for hydrographers. David Loosley, Chief Executive, IMarEST Charlotte Lord, Communications Director, IMarEST Professional development for hydrographers David Loosley, Chief Executive, IMarEST Charlotte Lord, Communications Director, IMarEST Quick intro to the IMarEST The Institute of Marine Engineering, Science

More information

RailCloud: A Reliable PaaS Cloud for Railway Applications

RailCloud: A Reliable PaaS Cloud for Railway Applications Platzhalter für Bild, Bild auf Titelfolie hinter das Logo einsetzen RailCloud: A Reliable PaaS Cloud for Railway Applications Bijun Li, Rüdiger Kapitza TU Braunschweig 06.10.2016 This work is supported

More information

#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks

#mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks 1 #mytweet via Instagram: Exploring User Behaviour Across Multiple Social Networks Bang Hui Lim, Dongyuan Lu Tao Chen, Min-yen Kan Web Information Retrieval / Natural Language Processing Group 1. http://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

More information

Configuring Topic Models for Software Engineering Tasks in TraceLab

Configuring Topic Models for Software Engineering Tasks in TraceLab Configuring Topic Models for Software Engineering Tasks in TraceLab Bogdan Dit Annibale Panichella Evan Moritz Rocco Oliveto Massimiliano Di Penta Denys Poshyvanyk Andrea De Lucia TEFSE 13 San Francisco,

More information

Bug or Not? Bug Report Classification using N-Gram IDF

Bug or Not? Bug Report Classification using N-Gram IDF Bug or Not? Bug Report Classification using N-Gram IDF Pannavat Terdchanakul 1, Hideaki Hata 1, Passakorn Phannachitta 2, and Kenichi Matsumoto 1 1 Graduate School of Information Science, Nara Institute

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Subset Labeled LDA: A Topic Model for Extreme Multi-Label Classification

Subset Labeled LDA: A Topic Model for Extreme Multi-Label Classification Subset Labeled LDA: A Topic Model for Extreme Multi-Label Classification Yannis Papanikolaou and Grigorios Tsoumakas School of Informatics, Aristotle University of Thessaloniki, Greece ypapanik, greg@csd.auth.gr

More information

A Supervised Method for Multi-keyword Web Crawling on Web Forums

A Supervised Method for Multi-keyword Web Crawling on Web Forums Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,

More information

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma

Mobile Middleware Course. Mobile Platforms and Middleware. Sasu Tarkoma Mobile Middleware Course Mobile Platforms and Middleware Sasu Tarkoma Role of Software and Algorithms Software has an increasingly important role in mobile devices Increase in device capabilities Interaction

More information

Configuring Topic Models for Software Engineering Tasks in TraceLab

Configuring Topic Models for Software Engineering Tasks in TraceLab Configuring Topic Models for Software Engineering Tasks in TraceLab Bogdan Dit 1, Annibale Panichella 2, Evan Moritz 1, Rocco Oliveto 3, Massimiliano Di Penta 4, Denys Poshyvanyk 1, Andrea De Lucia 2 1

More information

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics

A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics A Comparison of Text-Categorization Methods applied to N-Gram Frequency Statistics Helmut Berger and Dieter Merkl 2 Faculty of Information Technology, University of Technology, Sydney, NSW, Australia hberger@it.uts.edu.au

More information

A Visualization of Research Papers Based on the Topics and Citation Network

A Visualization of Research Papers Based on the Topics and Citation Network A Visualization of Research Papers Based on the Topics and Citation Network Rina Nakazawa, Takayuki Itoh, Takafumi Saito Ochanomizu University, Tokyo University of Agriculture Technology {leena@itolab.is.ocha.ac.jp,

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

How to start with Intelligent VOICE

How to start with Intelligent VOICE How to start with Intelligent VOICE Contents 1. Precondition: Smartphone compatibility... 2 2. Multimedia unit setup: select the Smartphone OS... 3 3. Bluetooth pairing setting... 4 4. Activate Smart Access

More information