Fusing Blockchain and AI with the Metaverse: Unveiling the Future of Digital Transformation
Research Paper | Journal Paper
Vol.11 , Issue.9 , pp.1-10, Sep-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i9.110
Abstract
In the realm of technological advancement, the fusion of blockchain, artificial intelligence (AI), and the metaverse emerges as a transformative force. This research explores their intricate interplay, reshaping digital innovation. Blockchain`s decentralization aligns with AI`s intelligence, while the metaverse offers a platform for human interaction. This synergy amplifies the metaverse`s potential, impacting gaming, finance, and education. In gaming, blockchain ensures asset ownership, while AI enhances gameplay. In finance, blockchain redefines trust, and AI offers predictive insights. In education, blockchain secures credentials, and AI personalizes learning within an immersive metaverse. Challenges include interoperability between blockchain and AI networks, data privacy in the data-intensive metaverse, and ethical considerations regarding identity, property rights, and human-AI interactions. A collective commitment from industry pioneers, policymakers, and technology visionaries is crucial to unlock this fusion`s potential. In conclusion, this fusion invites a redefined human experience. Navigating with ethical considerations, innovation, and responsible stewardship, we step into an uncharted territory that transcends imagination, uniting reality and the virtual in the future`s canvas.
Key-Words / Index Term
Metaverse, blockchain, Artificial intelligence, Neural Network, Virtual Reality, Digital Transformation, Realm
References
[1] L. Lik-Hang, T. Braud, P. Zhou, L. Wang, D. Xu, Z. Lin, A. Kumar, C. Bermejo, and P. Hui, "All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda," IEEE Access, Vol.10, pp.1-37, 2022.
[2] J. D. N. Dionisio, W. G. B. III, and R. Gilbert, "3D virtual worlds and the metaverse: Current status and future possibilities," ACM Computing Surveys (CSUR), Vol.45, Issue.3, pp.1-38, 2013.
[3] W. LaDuke, "Traditional ecological knowledge and environmental futures," Colo. J. Int`l Envtl. L. & Pol`y, Vol.5, pp.127, 1994.
[4] M. Nadine, L. Alessandretti, F. Di Giacinto, M. Martino, L. M. Aiello, and A. Baronchelli, "Mapping the nft revolution: market trends, trade networks, and visual features," arXiv preprint arXiv:2106.00647, 2021.
[5] N. Lambert, "Beyond nfts: A possible future for digital art," ITNOW, Vol.63, Issue.3, pp.8-10, 2021.
[6] W. Y. B. Lim, Z. Xiong, D. Niyato, X. Cao, C. Miao, S. Sun, and Q. Yang, "Realizing the metaverse with edge intelligence: A match made in heaven," 2022.
[7] M. Xu, D. Niyato, J. Kang, Z. Xiong, C. Miao, and D. I. Kim, "Wireless edge-empowered metaverse: A learning-based incentive mechanism for virtual reality," arXiv preprint arXiv:2111.03776, 2021.
[8] W. C. Ng, W. Y. B. Lim, J. S. Ng, Z. Xiong, D. Niyato, and C. Miao, "Unified resource allocation framework for the edge intelligence-enabled metaverse," arXiv preprint arXiv:2110.14325, 2021.
[9] H. Du, D. Niyato, J. Kang, D. I. Kim, and C. Miao, "Optimal targeted advertising strategy for secure wireless edge metaverse," arXiv preprint arXiv:2111.00511, 2021.
Citation
Kushal Saraf, "Fusing Blockchain and AI with the Metaverse: Unveiling the Future of Digital Transformation," International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.1-10, 2023.
Efficient Resource Utilization with Auto Tagging Using Amazon`s Cloud Trail Services
Research Paper | Journal Paper
Vol.11 , Issue.9 , pp.11-16, Sep-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i9.1116
Abstract
In the realm of resource management, the practice of labeling, ledgering, and tagging has a rich historical legacy that has transcended time, demonstrating its enduring importance. These processes, which have been fundamental since ancient times, continue to wield immense significance in the contemporary context, particularly when applied to intangible assets, which are instrumental in organizational success. However, in the contemporary landscape characterized by digitalization and the proliferation of non-tangible assets, the task of effectively labeling and tagging resources has grown markedly intricate. This complexity is especially conspicuous when considering intangible resources, and it is accentuated within the domain of software infrastructure and application modules. In these domains, the sheer volume of resources in use has burgeoned to unprecedented levels, rendering manual tagging processes not only labor-intensive but also prone to errors and inconsistencies. Moreover, the scope of resource tagging has evolved beyond the rudimentary labeling of resource names, now encompassing a multitude of metadata attributes that impart comprehensive context and information. To tackle these formidable challenges, this paper presents a robust, enterprise-grade solution engineered to automate the resource tagging processes within the Amazon Web Services (AWS) ecosystem. At its core, this solution leverages the capabilities offered by Amazon`s CloudTrail services, harnessing them to mitigate the manual burden associated with resource tagging activities. The automated tagging paradigm, put forth in this work, holds significant promise for enhancing various facets of resource management within AWS. The primary objectives of this solution are multifaceted. Firstly, it endeavors to elevate the precision of resource identification, a crucial aspect for effective resource governance. Through automated tagging, resources are associated with specific teams or entities, enabling efficient identification and allocation of ownership. This, in turn, fosters a more streamlined approach to resource management within complex AWS environments. Secondly, the proposed solution enables granular cost analysis by forging a nexus between resource tags and cost metrics. This synergy between tags and cost data empowers organizations to pinpoint cost drivers and optimize resource utilization. It facilitates a nuanced understanding of the financial implications associated with various resources, fostering data-driven decision-making and cost control. Lastly, the solution paves the way for comprehensive insights into the resource landscape of specific teams or entities. By aggregating tagged resources, organizations can gain a holistic view of their resource inventory. This panoramic perspective facilitates efficient resource allocation, aids in identifying redundancies, and supports the development of resource optimization strategies tailored to the needs and objectives of distinct teams.
Key-Words / Index Term
Automated Tagging, CloudTrail, Resource Management, Amazon Web Services, Resource Identification, Cost Attribution, Resource Inventory.
References
[1]. J. Bhattacharya, J. Mistri, R. Biswas, D. Dalui, D. Singh, P. Rakshit, S. Bhattacharyya, "A Survey on Data Security and Challenges", International Journal of Computer Sciences and Engineering, Vol.8, Issue.1, pp.49-54, 2020.
[2]. Smith, J. (2019). Managing Intangible Assets in the Digital Age. Harvard Business Review, 2019.
[3]. Smith, J., Johnson, A., & Brown, L. (2019). Enhancing Multi-Cloud Cost Allocation through Resource Tagging. Journal of Cloud Computing: Advances, Systems and Applications, Vol.8, Issue.1, pp.17, 2019.
[4]. Smith, P., & Lee, S. (2020). Automated Resource Tagging in Cloud Environments Using Machine Learning. International Journal of Cloud Computing and Services Science, Vol.9, Issue.3, pp.214-226, 2020.
[5]. Brown, M., & Chen, Q. (2018). Resource Tagging for Cost Optimization in Cloud Environments. Journal of Cloud Economics, Vol.5, Issue.2, pp.78-92, 2018.
[6]. Johnson, R., Williams, E., & Martinez, M. (2021). Integrating Identity and Resource Tagging for Enhanced Resource Governance. Journal of Cloud Identity Management, Vol.15, Issue.4, pp.112-128, 2021.
[7]. Wang, J., Lee, S., Wang, W., & Chen, C. (2016). A survey of cloud resource management for service computing. Future Generation Computer Systems, Vol.56, pp.84-99, 2016.
[8]. Buyya, R., Broberg, J., & Goscinski, A. (2011). Cloud computing: principles and paradigms. John Wiley & Sons., 2011.
[9]. David Clinton; Ben Piper, "CloudTrail, CloudWatch, and AWS Config," in AWS Certified Solutions Architect Study Guide: Associate SAA-C02 Exam , Wiley, pp.183-210, 2021.
[10]. Abbas Kudrati; Chris Peiris; Binil Pillai, "AWS Cloud Threat Prevention Framework," in Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks , Wiley, pp.243-319, 2022.
[11]. Ewere Diagboya, Infrastructure Monitoring with Amazon CloudWatch: Effectively optimize resource allocation, detect anomalies, and set automated actions on AWS , Packt Publishing, 2021.
[12]. M. Sewak and S. Singh, "Winning in the Era of Serverless Computing and Function as a Service," 2018 3rd International Conference for Convergence in Technology (I2CT), Pune, India, pp.1-5, 2018. doi: 10.1109/I2CT.2018.8529465.
[13]. J. Dantas, H. Khazaei and M. Litoiu, "Application Deployment Strategies for Reducing the Cold Start Delay of AWS Lambda," 2022 IEEE 15th International Conference on Cloud Computing (CLOUD), Barcelona, Spain, pp.1-10, 2022. doi: 10.1109/CLOUD55607.2022.00016.
[14]. Safeer Cm, Architecting Cloud-Native Serverless Solutions: Design, build, and operate serverless solutions on cloud and open source platforms , Packt Publishing, 2023.
[15]. H. Puripunpinyo and M. H. Samadzadeh, "Effect of optimizing Java deployment artifacts on AWS Lambda," 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), Atlanta, GA, USA, pp.438-443, 2017. doi: 10.1109/INFCOMW.2017.8116416.
[16]. S. Sarbavidya, "Protection of Digital Media using Digital Watermarking", International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.63-66, 2019.
Citation
Sai Teja Makani, "Efficient Resource Utilization with Auto Tagging Using Amazon`s Cloud Trail Services," International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.11-16, 2023.
A Comprehensive Review of Sentimental Analysis of Covid-19 Tweets
Review Paper | Journal Paper
Vol.11 , Issue.9 , pp.17-21, Sep-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i9.1721
Abstract
Positive, negative, and neutral tweets concerning COVID-19 have all lately increased in volume. The broad variety of themes covered by tweets encouraged investigators to use sentiment analysis to assess the public`s response to COVID-19. Conventional sentiment analysis algorithms can only assess polarity, categorizing tweets as positive, negative, or neutral. Logistic Regression sentiment analysis, BLSTM sentiment analysis, and LSTM sentiment analysis are all employed to identify the sentiment of tweets at this advanced phase of the intended research effort. While the offered research methodologies may be used across domains, they are particularly well-suited to detecting emotional expressions in social media situations. With the exception of the sentiment analysis approach, the pretreatment and subsequent operations will be the same despite the employment of three separate algorithms. Using the identical processing processes, the three recommended sentiment analysis algorithms will be compared. Furthermore, the proposed analysis has a broad range of practical applications since it gives a public opinion to government officials or even health officials and assists them in basing their judgments on that viewpoint.
Key-Words / Index Term
Positive, Negative, Covid-19, Tweets, Lockdown, LSTM, BLSTM.
References
[1] Bittermann A, Batzdorfer V, Müller SM, Steinmetz H., “Mining Twitter to detect hotspots in psychology”, Zeitschrift für Psychologie. 2021.
[2] https://en.wikipedia.org/wiki/Fuzzy_logic, Anonymous, retrieved 8th August, 2020.
[3] Abd-Alrazaq A, Alhuwail D, Househ M, Hamdi M, Shah Z, “Top Concerns of Tweeters During the COVID-19 Pandemic: Infoveillance Study”, J Med Internet Res 2020.
[4] Li, S., Wang, Y., Xue, J., Zhao, N., & Zhu, T., “The impact of COVID-19 epidemic declaration on psychological consequences: a study on active Weibo users”, International journal of environmental research and public health, Vol.17, Issue.6, 2020.
[5] Koyel Chakraborty, Surbhi Bhatia, Siddhartha Bhattacharyya, Jan Platos, Rajib Bag and Aboul Ella Hassanien, “Sentiment Analysis of COVID-19 tweets by Deep Learning Classifiers – a study to show how popularity is affecting accuracy in social media”, Elsevier Journal of Applied Soft Computing, Volume 97, Part A, December 2020.
[6] https://en.wikipedia.org/wiki/Naive_Bayes_classifier, Anonymous, retrieved 12th September, 2020.
[7] Abd-Alrazaq A, Alhuwail D, Househ M, Hamdi M, Shah Z., “Top concerns of tweeters during the COVID-19 pandemic: infoveillance study”, Journal of medical Internet research. 2020.
[8] Chakraborty K, Bhatia S, Bhattacharyya S, Platos J, Bag R, Hassanien AE, “Sentiment Analysis of COVID-19 tweets by Deep Learning Classifiers—A study to show how popularity is affecting accuracy in social media”, Applied Soft Computing, 97: 106754, 2020.
[9] Barkur G, Vibha GBK, “Sentiment analysis of nationwide lockdown due to COVID 19 outbreak: Evidence from India”, Asian journal of psychiatry, 51:102089, 2020.
[10] Zhou J, Yang S, Xiao C, Chen F., “Examination of community sentiment dynamics due to COVID-19 pandemic: A case study from Australia”, arXiv preprint arXiv: 200612185. 2020.
[11] Organization WH, et al., “Coronavirus disease 2019 (COVID-19): situation report”, 72; 2020.
[12] GuixianXu ,Ziheng Yu , Haishen Yao, Fan Li, Yueting Meng, And Xu Wu., “Chinese Text Sentiment Analysis Based On Extended Sentiment Dictionary”, IEEE Access April 13, 2019.
[13] Farkhund Iqbal, Jahanzeb Maqbool Hashmi, Benjamin C. M. Fung, Rabia Batool, Asad Masood Khattak, Saiqa Aleem, And Patrick C. K. Hung, “A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction”, IEEE Access Vol.7 February 8, 2019.
[14] Tru?c?, M. M., “Efficiency of SVM classifier with Word2Vec and Doc2Vec models”, In Proceedings of the International Conference on Applied Statistics, Vol.1, Issue.1, pp.496-503, 2019.
[15] Sharma, R., Mondal, D., and Bhattacharyya, P., “A comparison among significance tests and other feature building methods for sentiment analysis: A first study”, In Gelbukh, A., editor, Computational Linguistics and Intelligent Text Processing, pp.3–19, 2019.
[16] Tyagi, Abhilasha & Sharma, Naresh., “Sentiment Analysis using Logistic Regression and Effective Word Score Heuristic”, International Journal of Engineering and Technology (UAE). 7. 20-23. 10.14419/ijet.v7i2.24.11991, 2018.
[17] Ying Fang, Hai Tan, And Jun Zhang, “Multi-Strategy Sentiment Analysis of Consumer Reviews Based on Semantic Fuzziness”, IEEE Access May 2, 2018.
[18] Lei Wang, JianweiNiu, And Shui Yu, “Sentidiff: Combining Textual Information and Sentiment Diffusion Patterns for Twitter Sentiment Analysis”, Journal of Latex Class Files, Vol.14, Issue.8, 2018.
[19] Ali Sadollah, “Introductory Chapter: Which Membership Function is Appropriate in Fuzzy System?”, Fuzzy Logic Based in Optimization Methods and Control Systems and Its Applications, Ali Sadollah, Intech Open, DOI: 10.5772/intechopen.79552.
[20] A. M. Shah, X. Yan, A. Qayyum, R. A. Naqvi, S. J. Shah, “Mining topic and sentiment dynamics in physician rating websites during the early wave of the COVID-19 pandemic: Machine learning approach”, Int. J. Med. Inform. 149, 2021.
Citation
Anjali Yadav, Chetan Agrawal, Pawan Meena, "A Comprehensive Review of Sentimental Analysis of Covid-19 Tweets," International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.17-21, 2023.
Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology
Research Paper | Journal Paper
Vol.11 , Issue.9 , pp.22-27, Sep-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i9.2227
Abstract
Privacy preservation practises intensify as data privacy infractions are an increasing source of worry. A lot of organisations gather a lot of data. Organisations occasionally utilise this data for a variety of activities. However, the data gathered may include sensitive or private information that has to be secured. If we disclose data for sharing purposes, privacy protection is a crucial problem. There are several methods for protecting privacy, but they are vulnerable to different kinds of assaults and data loss. In this research, we suggested a practical method for maintaining privacy via homomorphic encryption. Our method safeguards sensitive data with little information loss, improving data usefulness and guarding against many sorts of assault.
Key-Words / Index Term
Privacy preservation, linking sensitive data, Homomorphic Encryption, Blockchain
References
[1]. Clifton, C., Kantarcio?lu, M., Doan, A., Schadow, G., Vaidya, J., Elmagarmid, A. and Suciu, D., 2004, June. Privacy-preserving data integration and sharing. In Proceedings of the 9th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, pp.19-26, 2004.
[2]. Fang, W., Wen, X.Z., Zheng, Y. and Zhou, M., 2017. A survey of big data security and privacy preserving. IETE Technical Review, Vol.34, Issue.5, pp.544-560, 2017.
[3]. Gosain, A. and Chugh, N., 2014. Privacy preservation in big data. International Journal of Computer Applications, Vol.100, Issue.17, 2014.
[4]. Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H.B., Patel, S., Ramage, D., Segal, A. and Seth, K., 2017, October. Practical secure aggregation for privacy-preserving machine learning. In proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp.1175-1191, 2017.
[5]. Liu, J., Li, X., Ye, L., Zhang, H., Du, X. and Guizani, M., 2018, December. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records. In 2018 IEEE Global Communications Conference (GLOBECOM), IEEE, pp.1-6, 2018.
[6]. Zhang, A. and Lin, X., 2018. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. Journal of medical systems, Vol.42, Issue.8, p.140, 2018.
[7]. Jin, H., Luo, Y., Li, P. and Mathew, J., 2019. A review of secure and privacy-preserving medical data sharing. IEEE Access, 7, pp.61656-61669, 2019.
[8]. Park, J. and Lim, H., 2022. Privacy-preserving federated learning using homomorphic encryption. Applied Sciences, Vol.12, Issue.2, p.734, 2022.
[9]. Mendes, R. and Vilela, J.P., 2017. Privacy-preserving data mining: methods, metrics, and applications. IEEE Access, 5, pp.10562-10582, 2017.
[10]. Mahanan, W., Chaovalitwongse, W.A. and Natwichai, J., 2021. Data privacy preservation algorithm with k-anonymity. World Wide Web, 24, pp.1551-1561, 2021.
[11]. Sharma, M., Chaudhary, A., Mathuria, M., Chaudhary, S. and Kumar, S., 2014, July. An efficient approach for privacy preserving in data mining. In 2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014), IEEE, pp.244-249, 2014.
[12]. Suneetha, V., Suresh, S. and Jhananie, V., 2020, March. A novel framework using apache spark for privacy preservation of healthcare big data. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), IEEE, pp.743-749, 2020.
[13]. Yadav, D., Shinde, A., Nair, A., Patil, Y. and Kanchan, S., 2020, May. Enhancing data security in cloud using blockchain. In 2020 4th International Conference on Intelligent Computing and Control Systems (ICICCS), IEEE, pp.753-757, 2020.
[14]. Aono, Y., Hayashi, T., Wang, L. and Moriai, S., 2017. Privacy-preserving deep learning via additively homomorphic encryption. IEEE transactions on information forensics and security, Vol.13, Issue.5, pp.1333-1345, 2017.
[15]. Ni, S., Xie, M. and Qian, Q., 2017. Clustering Based K-anonymity Algorithm for Privacy Preservation. Int. J. Netw. Secur., Vol.19, Issue.6, pp.1062-1071, 2017.
[16]. Mansour, H.O., Siraj, M.M., Ghaleb, F.A., Saeed, F., Alkhammash, E.H. and Maarof, M.A., 2021. Quasi-Identifier recognition algorithm for privacy preservation of cloud data based on risk reidentification. Wireless Communications and Mobile Computing, pp.1-13, 2021.
[17]. Chamikara, M.A.P., Bertok, P., Liu, D., Camtepe, S. and Khalil, I., 2020. Efficient privacy preservation of big data for accurate data mining. Information Sciences, 527, pp.420-443, 2020.
[18]. Shivashankar, M. and Mary, S.A., 2021. Privacy preservation of data using modified rider optimization algorithm: Optimal data sanitization and restoration model. Expert Systems, Vol.38, Issue.3, p.e12663, 2021.
[19]. Osia, S.A., Shamsabadi, A.S., Sajadmanesh, S., Taheri, A., Katevas, K., Rabiee, H.R., Lane, N.D. and Haddadi, H., 2020. A hybrid deep learning architecture for privacy-preserving mobile analytics. IEEE Internet of Things Journal, Vol.7, Issue.5, pp.4505-4518, 2020.
[20]. Lee, J.W., Kang, H., Lee, Y., Choi, W., Eom, J., Deryabin, M., Lee, E., Lee, J., Yoo, D., Kim, Y.S. and No, J.S., 2022. Privacy-preserving machine learning with fully homomorphic encryption for deep neural network. IEEE Access, 10, pp.30039-30054, 2022.
[21]. Makhdoom, I., Zhou, I., Abolhasan, M., Lipman, J. and Ni, W., 2020. PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security, 88, p.101653, 2020.
[22]. Park, J. and Lim, H., 2022. Privacy-preserving federated learning using homomorphic encryption. Applied Sciences, Vol.12, Issue.2, p.734, 2022.
[23]. Mahanan, W., Chaovalitwongse, W.A. and Natwichai, J., 2021. Data privacy preservation algorithm with k-anonymity. World Wide Web, 24, pp.1551-1561, 2021.
[24]. Suneetha, V., Suresh, S. and Jhananie, V., 2020, March. A novel framework using apache spark for privacy preservation of healthcare big data. In 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), IEEE, pp.743-749, 2020.
[25]. Cui, Z., Fei, X.U.E., Zhang, S., Cai, X., Cao, Y., Zhang, W. and Chen, J., 2020. A hybrid blockchain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing, Vol.13, Issue.2, pp.241-251, 2020.
[26]. Allouch, A., Cheikhrouhou, O., Koubâa, A., Toumi, K., Khalgui, M. and Nguyen Gia, T., 2021. Utm-chain: blockchain-based secure unmanned traffic management for internet of drones. Sensors, Vol.21, Issue.9, p.3049, 2021.
[27]. Hasan, H.R., Salah, K., Jayaraman, R., Arshad, J., Yaqoob, I., Omar, M. and Ellahham, S., 2020. Blockchain-based solution for COVID-19 digital medical passports and immunity certificates. Ieee Access, 8, pp.222093-222108, 2020.
[28]. Lin, C., He, D., Huang, X., Kumar, N. and Choo, K.K.R., 2020. BCPPA: A blockchain-based conditional privacy-preserving authentication protocol for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, Vol.22, Issue.12, pp.7408-7420, 2020.
[29]. Wan, J., Li, J., Imran, M. and Li, D., 2019. A blockchain-based solution for enhancing security and privacy in smart factory. IEEE Transactions on Industrial Informatics, Vol.15, Issue.6, pp.3652-3660, 2019.
[30]. Lin, C., He, D., Kumar, N., Huang, X., Vijayakumar, P. and Choo, K.K.R., 2019. HomeChain: A blockchain-based secure mutual authentication system for smart homes. IEEE Internet of Things Journal, Vol.7, Issue.2, pp.818-829, 2019.
[31]. Yazdinejad, A., Parizi, R.M., Dehghantanha, A., Zhang, Q. and Choo, K.K.R., 2020. An energy-efficient SDN controller architecture for IoT networks with blockchain-based security. IEEE Transactions on Services Computing, Vol.13, Issue.4, pp.625-638, 2020.
[32]. Shahnaz, A., Qamar, U. and Khalid, A., 2019. Using blockchain for electronic health records. IEEE access, 7, pp.147782-147795, 2019.
Citation
Ashwini Patil, Vijay Shelake, "Decentralized based Security Mechanism for Linking Sensitive Data using Blockchain Technology," International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.22-27, 2023.
A Collaborative Student Course Recommender System for Learning Analytics
Research Paper | Journal Paper
Vol.11 , Issue.9 , pp.28-34, Sep-2023
CrossRef-DOI: https://doi.org/10.26438/ijcse/v11i9.2834
Abstract
Assessment of learning outcomes among students at institutions of higher education is a fascinating issue with a wide range of possible applications for all parties including students, administrators, potential employers, etc. Even while education is becoming more widely available and popular, the high drop-out rates remain a challenging issue. Choosing the best courses for your area of specialization can be difficult and time-consuming. The majority of the current course selection algorithms do not consider courses that match student talents, the user`s future professional goals, or the user`s ideal job based on such objectives. The goal is to create a powerful learning analytics system that can effectively recommend courses to students based on their preferences and skills. The collaborative filtering recommender (CF) approach, which combines KNN and decision tree approaches, was used to match courses, abilities, requirements, and interests with recommended lists. The effect of user skills on the recommendation platform was investigated by altering a number of suggestion quality features. A collaborative filtering recommender system was developed by fusing KNN and DT to suggest specialized courses for college students. This improved the standard of the recommendation system. A recommender model was constructed with cosine similarity matrix of student course descriptions in order to include new descriptions that are being suggested to the overall descriptions. Term frequency inverse document frequency was used to convert the entire course description into a vectored representation of words.
Key-Words / Index Term
Collaborator filtering, decision tree, KNN, machine learning, recommender system
References
[1] S. Ziweritin, SC. C. Ukegbu, T. A. Oyeniran, I. O. Ulu, "A Recommendation Engine to Estimate Housing Values in Real Estate Property Market," International Journal of Scientific Research in Research in Computer Science and Engineering(IJSRCS), Vol.9, Issue.1, pp.01-07, 2021.
[2]. Y, Koren, R, Bell, C, Volinsky, "Matrix Factorization Techniques for Recommender Systems," Computer Vol.42, Issue.8, pp.3-30, 2009.
[3]. P., Covington, A. Adams, E, Sargin, "Deep neural networks for youtube recommendations," In Proceedings of the 10th ACM Conference on Recommender Systems. ACM, pp.191–198, 2016
[4]. S, Zhang, L. Yao, A, Sun, Y, Tay, (2019) Deep learning based recommender system: A survey and new perspectives. ACM Computing Surveys (CSUR) Vol.52, Issue.1, pp.1–38, 2019.
[5]. Y, Zhang, F, Feng, X, He, T, Wei, C, Song, G, Ling, Y, Zhang, "Causal Intervention for Leveraging Popularity Bias in Recommendation," arXiv:2105.06067 [cs] [Preprint]., 2021
[6]. K. Patel, H. B. Patel, "A state-of-the-art survey on recommendation system and prospective extensions," Computers and Electronics in Agriculture, Vol.178, pp.10, 2020.
[7]. G. Aceto, V. Persico, A. Pescapé, " Industry 4.0 and health: internet of things," big data, and cloud computing for healthcare 4.0. J Ind Inf Integr 18(October 2019), pp.100-129, 2020.
[8]. A. Simeone, Y. Zeng, A. Caggiano,."Intelligent decision-making support system for* manufacturing solution recommendation in a cloud framework," The International Journal of Advanced Manufacturing Technology, Vol.112, pp.1035–1050, 2021.
[9]. H. Tan, J. Guo, Y. Li, "E-learning Recommendation System. In Computer Science and Software Engineering," 2008 International Conference on IEEE Hubie, Vol.5, pp.430–433, 2008
[10]. K. I. Ghauth, N. A. Abdullah, "Learning Materials Recommendation using Good Learners Ratings and Content-Based Filtering," Educational Technology Research and Development, Vol.8, Issue.6, pp.711–727, 2020.
[11]. X. Li, S. K. Chang, "A Personalized E-learning System Based on user Profile Constructed using Information Fusion, Proceeding of the 11th International Conference on Distributed Multimedia Systems, pp.109–114, 2005
[12]. S. Milano, M. Taddeo, L. Floridi, "Recommender systems and their ethical challenges," AI Soc. Vol.35, Issue.4, pp.957–967, 2020
[13]. R. R. Pedersen, "Datafication and the push for ubiquitous listening in music streaming," MedieKultur: Journal of media and communication research, Vol.36, Issue.69, pp.71-89, 2020
[14]. L. Porcaro, C. Castillo, E. Gómez, "Diversity by Design in Music Recommender Systems," Transactions of the International Society for Music Information Retrieval, Vol.4, Issue.1, pp.114-126, 2021
[15]. D. Sánchez-Moreno, V. López Batista, M. D. M. Vicente, A. L. Sánchez-Lázaro, M. N. Moreno-García, "Exploiting the User Social Context to Address Neighborhood Bias in Collaborative Filtering Music Recommender Systems’, Information, Vol.11, Issue.9, pp.439,2020
[16]. Q. Villermet, J. Poiroux, M. Moussallam, T. Louail, C. Roth, "Follow the guides: disentangling human and algorithmic curation in online music consumption,’ in Fifteenth ACM Conference on Recommender Systems. RecSys ‘21: Fifteenth ACM Conference on Recommender Systems, Amsterdam Netherlands: ACM, pp.380-389, 2021.
[17]. T. Tofalvy, ,J. Koltai, "Splendid Isolation”: The reproduction of music industry inequalities in Spotify’s recommendation system," New Media & Society [Preprint]. pp.1-20, 2021,
[18]. Z. Chen, " Intelligent Courses Recommendation System of Collaborative Filtering Algorithm Based on Kmeans Clustering under Spark Platform ," Advances in Social Science, Education and Humanities Research, Vol.664, pp.2041-2045, 2021
[19]. M. Volkovs, W. Y. Yu, "Effective Latent Models for Binary Feedback in Recommender Systems," In Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, Vol.4, pp.313–322, 2015
[20]. Z. Khoja, S. Shetty, “Hybrid recommender system for college courses,” in 2017 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV: IEEE; pp.1167–1171, 2017
[21]. S. Dwivedi, V. K. Roshni, "Recommender system for big data in education," in 2017 5th National Conference on E-Learning & E-Learning Technologies (ELELTECH), Hyderabad: IEEE, pp.1–4, 2017
[22]. D. K. Bokde S. Girase, D. Mukhopadhyay, "An Approach to a University Recommendation by Multi-criteria Collaborative Filtering and Dimensionality Reduction Techniques," in 2015 IEEE International Symposium on Nanoelectronic and Information Systems (Indore: IEEE), pp.231–236, 2015.
[23]. M. H. Hsu, "A Personalized English Learning Recommender System for ESL Students," Expert Syst. Appl. Vol.34, pp.683–688, 2008.
[24]. K. K. Jena, S. K. Bhoi, ST. K. Malik, K. S. Sahoo, N. Z., Jhanjhi, S. Bhatia, F. Amsaad, "E-Learning Course Recommender System Using Collaborative Filtering Models," Vol.12, Issue.1, pp.1-21, 2023
[25]. P. Covington, A. Adams, E. Sargin, "Deep neural networks for youtube recommendations," In Proceedings of the 10th ACM Conference on Recommender Systems. ACM, pp.191–198, 2016.
26]. J. Marshall, H. Greenberg, P. A. Machun, "How would they choose? Online Student Preferences for Advance Course Information," Open Learning: The Journal of Open, Distance and e-Learning, Vol.27, Issue.3, pp.249–263, 2012.
[27]. C. Pei-Chann, L. Cheng-Hui, C. Meng-Hui, ."A hybrid Course Recommendation System by Integrating Collaborative Filtering and Artificial Immune Systems. Algorithms,"Algorithms, Vol.9, Issue.3, pp.47, 2016
[28]. R. H. Singh, S. Maurya, T. Tripathi, T. Narula, G. Srivastav, “Movie Recommendation System using Cosine Similarity and KNN,” International Journal of Engineering and Advanced Technology (IJEAT), Vol.9 Issue.5, pp.556-559, 2020.
[29]. S. Jagtap, S. Borate, “Tourist Destination Recommendation System using Cosine Similarity,” International Research Journal of Engineering and Technology (IRJET), Vol.09, Issue.10, pp.106-110, 2019.
[30]. P. D. Nurfadilaa, A. P. Wibawaa, I. A. E. Zaeni, A. Nafalski, “Journal Classification Using Cosine Similarity Method on Title and Abstract with Frequency-Based Stopword Removal,” International Journal Of Artificial Intelegence Research, Vol.3, Issue.3, pp.28-37, 2019-
[31]. F. Fkih, “Similarity measures for Collaborative Filtering-based Recommender Systems: Review and experimental comparison,” Journal of King Saud University – Computer and Information Sciences, Vol.34, Issue.9, pp. 7645-7669, 2022
[32]. A. Agarwal, S. kumar, "Resume recommendation system using cosine similarity," International Research Journal of Modernization in Engineering Technology and Science, Vol.04, Issue.4, pp.158-162, 2022.
[33]. V. L. Spandana, J. R. Abhinav, P. N. Sampath, M. M. Ahamed, “Course recommendation system using content based filtering and cosine similarity,” Journal of Emerging Technologies and Innovative Research (JETIR), Vol.10, Issue.3, pp.210-218, 2023.
[34]. L. R. Roopesh, B. Tulasi, “A Survey of Travel Recommender System,” International Journal of Computer Sciences and Engineering(IJCSE), Vol.7, Issue.3, pp.356-362, 2019.
Citation
Nonye Emmanuel Maidoh, "A Collaborative Student Course Recommender System for Learning Analytics," International Journal of Computer Sciences and Engineering, Vol.11, Issue.9, pp.28-34, 2023.