Skip to main content


Journal Issues

Extracting Features to Classify Students Based on their Academic Performance
Mr. P. Subba Rao
Pages: 1-8 | First Published: 05 Jun 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
In today's educational climate, developing tools to support students and learning in a traditional or online context is a crucial responsibility. The first stages in employing machine learning techniques to enable such technology centered on forecasting a student's success in terms of marks earned. The disadvantage of these methods is that they are not as effective at predicting low-achieving students. The goal of our efforts is twofold. To begin, we investigate whether badly performing students may be more accurately predicted by recasting the task as a binary classification problem. Second, in order to learn more about the reasons that contribute to bad performance, we created a set of human-interpretable attributes that quantify these aspects. We conduct a study based on these characteristics to identify distinct student groups of interest while also determining their value.
Keywords: Binary classification, Performance, Human Interpretable Attributes

References
[1] L. Breiman. Random forests. Machine learning, 45(1):5–32, 2001.
[2] L. Breiman, J. Friedman, C. J. Stone, and R. A. Olshen. Classification and regression trees. CRC press, 1984.
[3] C. Cortes and V. Vapnik. Support-vector networks. Machine learning, 20(3):273–297, 1995.
[4] J. H. Friedman. Greedy function approximation: a gradient boosting machine. Annals of statistics, pages 1189–1232, 2001.
[5] Z. Iqbal, J. Qadir, A. N. Mian, and F. Kamiran. Machine learning based student grade prediction: A case study. arXiv preprint arXiv:1708.08744, 2017.
[6] J. E. Knowles. Of needles and haystacks: Building an accurate statewide dropout early warning system in wisconsin. Journal of Educational Data Mining, 7(3):18–67, 2015.
[7] S. Kotsiantis, C. Pierrakeas, and P. Pintelas. Predicting students’performance in distance learning using machine learning techniques. Applied Artificial Intelligence, 18(5):411–426, 2004.
[8] J. McFarland, B. Hussar, C. de Brey, T. Snyder, X. Wang, S. Wilkinson-Flicker, S. Gebrekristos,
J. Zhang, A. Rathbun, A. Barmer, et al.
Undergraduate retention and graduation rates. In The
Condition of Education 2017. NCES 2017-144. ERIC, 2017. 

[9] B. Minaei-Bidgoli, D. A. Kashy, G. Kortemeyer, and W. F. Punch. Predicting student performance: an application of data mining methods with an educational web-based system. In Frontiers in education, 2003. FIE 2003 33rd annual, volume 1, pages T2A–13. IEEE, 2003.
[10] S. Morsy and G. Karypis. Cumulative knowledge-based regression models for nextterm grade prediction. In Proceedings of the 2017 SIAM International Conference on Data Mining, pages 552–560. SIAM, 2017.
[11] E. Osmanbegovi´c and M. Sulji´c. Data mining approach for predicting student performance. Economic Review, 10(1):3–12, 2012.
[12] A. Pardo, N. Mirriahi, R. Martinez-Maldonado, J.
Jovanovic, S. Dawson, and D. Gaˇsevi´c. Generating actionable predictive models of academic performance. In Proceedings of the Sixth International Conference on Learning Analytics & Knowledge, pages 474–478. ACM, 2016.
[13] F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel,
B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer,
R. Weiss, V. Dubourg, J. Vanderplas, A. Passos,
D. Cournapeau, M. Brucher, M. Perrot, and
E. Duchesnay. Scikit-learn: Machine learning inPython. Journal of Machine Learning Research, 12:2825–2830, 2011.
[14] A. Polyzou and G. Karypis. Grade prediction with models specific to students and courses. International Journal of Data Science and Analytics, 2(3-4):159–171, 2016.
[15] Z. Ren, X. Ning, and H. Rangwala. Grade prediction with temporal course-wise influence. In Proceedings of the 10th International
Conference on Educational
Data Mining, pages 48–55, 2017.
[16] C. Romero, S. Ventura, P. G. Espejo, and C. Herva´s. Data mining algorithms to classify students. In Educational Data Mining 2008, 2008.
[17] A. A. Saa. Educational data mining & students’ performance prediction. International Journal of Advanced Computer Science & Applications, 1:212–220, 2016.
[18] M. Sweeney, J. Lester, and H. Rangwala. Nextterm student grade prediction. In Big Data (Big Data), 2015 IEEE International Conference on, pages 970–975. IEEE, 2015.
[19] M. Sweeney, H. Rangwala, J. Lester, and A. Johri. Next-term student performance prediction: A recommender systems approach. arXiv preprint arXiv:1604.01840, 2016. [20] J.Vignesh, E. Gajendran, Sameeruddin Khan, N. Balakumar and S. R. Boselin Prabhu, “Design and implementation of hybrid cascaded energy Efficient Kogge Stone Adder” ARPN Journal of Engineering and Applied Sciences Vol 12 Issue no 21 2017.
[21] Jaganathan, M., Sabari, A. An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. Cluster Computing Vol 22, PP 12767–12776(2019). https://doi.org/10.1007/s10586-018-1757-3
[22] Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communication 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z
[23] Vignesh Janarthanan, A.Viswanathan, M. Umamaheswari “Neural Network and Cuckoo Optimization Algorithm for Remote Sensing Image Classification” in the International Journal of Recent Technology and Engineering, (IJRTE) Volume-8, Issue 4, November 2019 ISSN 2777-3878.
[24] Dr.Vignesh Janarthanan, Dr.Venkata Reddy Medikonda,.Er.Dr.G.Manoj Someswar Proposal of a Novel Approach for Stabilization of the Image from Omni-Directional System in the case of Human Detection & Tracking “American Journal of Engineering Research (AJER)” vol 6 issue 11 2017
[25] Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021
[26] V.Senthilkumar , K. Prashanth” A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks International Journal of communication and computer Technologies, Vol 4 Issue No 1 (2016)
[27] Sowmitha, V., and Mr V. Senthilkumar. "A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN." International Journal for Scientific Research & Development Vol 2 Issue 11 2015
[28] Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
[29] Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
[30] Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294. 

[31] Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
[32] Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
[33] Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
[34] Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).

Instagram Filtering Hashtags using the hits Algorithm and Crowd Tagging
Dr.Vignesh Janarthanan
Pages: 15-19 | First Published: 05 Jun 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
Instagram is a great place to look for descriptive tags for photographs and other types of information. Inaccordance with the learning by example paradigm, the tags–image pairs can be utilised to train automated image annotation (AIA) systems. In earlier research, we found that, on average. Approximately 22% of Instagram hashtags are related to the image's visual content,accompany, in the sense that they are descriptive hashtags, whereas there are many irrelevant hashtags, in the sense that they are not descriptive hashtags.Stop using hashtags on completely different photographs merely to get more clicks and likes.Enhancement of searchability We provide a revolutionary methodology in this study that is based on the collective intelligence principles that aid in the discovery of those hashtags. We demonstrate this in particular that the use of a modified version of the widely used hyper link induced topic search. In the context of crowd tagging, the (HITS) algorithm provides an effective and consistent method for locating pairs of Instagram photographs and hashtags, resulting in representative and noise-free results. Content-based image retrieval training sets We used crowdsourcing as a proof of concept platform Figure-eight to enable for the collection of collective intelligence in the form of tag selection.For Instagram hashtags, this is known as (crowdtagging). Figure-crowdtagging eight's data is utilised to create bipartite networks in which the first kind of node relates to the annotators and the second type of node corresponds to the annotations input the hashtags they've chosen. The HITS algorithm is used to rank the annotators in the first place,in terms of their efficiency in the crowdtagging activity, and then to find the appropriate hashtags for each situation image.
Keywords: Bipartite graphs, collective intelligence, crowdtagging, FolkRank, hyperlinkinduced topic search (HITS) algorithm, image retrieval, image tagging, Instagram hashtags.

REFERENCES
1. A. Argyrou, S. Giannoulakis, and N. Tsapatsoulis, "Topic modelling on Instagram hashtags: An alternative to automatic image annotation?" in Proceedings of the 13th International Workshop on Semantic Social Media Adaptation Personalization, pp. 61-67, 2018.
2. B. I. Aydin, Y. S. Yilmaz, Y. Li, Q. Li, J. Gao, and M. Demirbas, "Crowdsourcing for multiplechoice question answering," in Proceedings of the 28th AAAI Conf. Artif. Intell., pp. 2946-2953, 2014.
3. Cabrall, C. D. D. et al., C. D. D. Cabrall et al., C. D. D. Ca "Validity and trustworthiness of naturalistic driving scene classificationconclusions drawn from crowdsourcing ", Accident Analysis and Prevention, vol. 114, no. 5, May 2018, pp. 25-33.
4. Q. Cheng, Q. Zhang, P. Fu, C. Tu, and S. Li, Q. Cheng, Q. Zhang, P. Fu, C. Tu, and S. Li, Q. Cheng, Q "An investigation and study of automatic image processinga comment "Pattern Recognition, vol. 79, no. 2, pp. 242-259, July 2018.
5. N. Craswell, "Mean reciprocal rank," Encyclopedia of Database Systems, London, 1997.
6. H. Cui, Q. Li, H. Li, and Z. Yan, H. Cui, Q. Li, H. Li, and Z. Yan, H. Cui, Q "The identification of healthcare fraud is predicated on the trustworthiness of the people involved,medical professionals "74-81 in Proc. Trustcom/BigDataSE/I SPA, 2016.
7. R. Hoffman, A. R. Daer, and S. Goodman, "The rhetorical roles of hashtags on social mediaapplications in the media ", CD-ROM, Proc. 32nd ACM International Conference on Design Communication, 2014.
8. Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara, Ferrara "Popularity and thematic interests on the internet Instagram's camera ", in Proceedings of the 25th ACM Conference on Hypertext and Social Media, pp. 24-34, 2014.
9. T. Wennekers and J. M. Fletcher, "Using centrality measurements to move from structure to activity neural activity prediction ", International Journal of Neural Systems, vol. 28, no. 2, 2018.
10. M. Gao, L. Chen, B. Li, Y. Li, W. Liu, and Y.-C. Xu, 10.M. Gao, L. Chen, B. Li, Y. Li, W. Liu, and Y.-C. Xu, "Link prediction using projections in a two-way network ".
11. "From structure to activity: Using centrality measures to predict neural activity," International Journal of Neural Systems, vol. 28, no. 2, 2018.
12. M. Gao, L. Chen, B. Li, Y. Li, W. Liu, and Y.-C. Xu,M. Gao, L. Chen, B. Li, Y. Li, W. Liu, and Y.-C. Xu, "Link prediction using projections in a two-way network ", Inf. Sci., vol. 376, Jan. 2017, pp. 158-171.
13. "Bipartite graph" by S. I. Gass and C. M. Harris in Encyclopedia of Operations Research and Management Science.Management Science, Springer, Boston, MA, USA, pp. 126, 2013.
14. S. Giannoulakis and N. Tsapatsoulis, "Evaluating the descriptive power of instagram hashtags", J. Innov. Digit.

Ecosyst., vol. 3, no. 2, pp. 114-129, 2016.
15. S. Giannoulakis and N. Tsapatsoulis, "Defining and identifying stophashtags in instagram", Proc. INNS Conf. Big Data, pp. 304-313, 2016.
16. S. Giannoulakis, N. Tsapatsoulis and K. Ntalianis, "Identifying image tags from Instagram hashtags using the HITS algorithm", Proc. 3rd Int. Conf. Big Data Intell. Comput. Cyber Sci. Technol. Congr. (DASC/PiCom/DataCom/CyberSciTech), pp. 89-94, 2017.
17. M. V. Giuffrida, F. Chen, H. Scharr and S. A. Tsaftaris, "Citizen crowds and experts: Observer variability in image-based plant phenotyping", Plant Methods, vol. 14, no. 1, pp. 12, 2018.
18. M. Gupta, R. Li, Z. Yin and J. Han, "Survey on social tagging techniques", SIGKDD Explor. Newslett., vol. 12, no. 1, pp. 58-72, Jun. 2010.
19. Vignesh Janarthanan, A.Viswanathan, M. Umamaheswari, “Neural Network and Cuckoo Optimization Algorithm for Remote Sensing Image Classification ", International Journal of Recent Technology and Engineering., vol. 8, no. 4, pp. 1630-1634, Jun. 2019.
20. Senthil kumar, V., Prasanth, K. Weighted Rendezvous Planning on Q-Learning Based Adaptive Zone Partition with PSO Based Optimal Path Selection. Wireless Personal Communications 110, 153–167 (2020). https://doi-org.libproxy.viko.lt /10.1007/s11277-019-06717-z
21. Jaganathan, M., Sabari, A. An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. Cluster Computing Vol 22, PP 12767–12776(2019).
22. Sowmitha, V., and Mr V. Senthilkumar. "A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN." International Journal for Scientific Research & Development Vol 2 Issue 11 2015
23. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
24. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
25. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
26. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
27. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
28. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
29. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).
30. V.Senthilkumar , K. Prashanth” A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks International Journal of communication and computer Technologies, Vol 4 Issue No 1 (2016)
31. Dr. V. Senthil kumar, Mr. P. Jeevanantham, Dr. A. Viswanathan, Dr. Vignesh Janarthanan, Dr. M. Umamaheswari, Dr. S. Sivaprakash Emperor Journal of Applied Scientific Research “Improve Design and Analysis of Friend-to-Friend Content Dissemination System ”Volume - 3 Issue - 3 2021 32. S.B. Jayabharathi, S. Manjula, E. Tamil Selvan, P. Vengatesh and V. Senthil Kumar “Semantic Risk Analysis Model Cancer Data Prediction”, Journal on Science Engineering and Technology, Vol 5 Issue No 2 2018

Analysing Reviewer’s Credibility and Sentiment to Build A Profile Model for Product Recommendation of User
Dr. Vignesh Janarthanan
Pages: 20-26 | First Published: 05 Jun 2022
Full text | Abstract | Purchase | References | Request permissions

Abstract
Understanding a particular customers product needs, likes, and dislikes and to make an automation based on it is a very convolute job. This project augments heuristic-driven user interest profiling with reviewer credibility analysis and fine-grained feature sentiment analysis to conceive a vigorous recommendation methodology. The proposed credibility, interest and sentiment enhanced recommendation (CISER) model has five modules: candidate, feature extraction, reviewer credibility analysis, user interest mining, candidate feature sentiment assignment, and recommendation module. Review corpus is given as an input. The first module uses context and sentiment confidence to procure useful, crucial features.To detect the untrustworthy reviews and reviewers, reviewer credibility analysis proffers an approach to weigh reviews according to the parameters of credibility. The user interest mining module, uses fairness of review writing as heuristics for interest-pattern mining. The candidate feature sentiment assignment module comparesexisting features in review based on their fast Text sentiment polarity. The final module uses credible sentiment scoring for purchase recommendations. The proposed recommendation modelutilizes not only numeric reviewsbut also uses sentiment expressions connected with components, customer preference profiles, and reviewer credibility for quantitative analysis of various alternative products. The mean average precision (MAP@1) for CISER is 93%, and MAP@3 is 49%, which is better than current state-of-the-art systems.
Keywords: Recommendation system, sentiment analysis, user credibility, user interest.

References
1. J. A. Konstan and J. Riedl, ‘‘Recommender systems: From algorithms to user experience,’’ User Model. User-Adapted Interact., vol. 22, nos. 1–2, pp. 101–123, Apr. 2012, doi: 10.1007/s11257-011-9112-x.
2. J. B. Schafer, D. Frankowski, J. Herlocker, and S. Sen, ‘‘Collaborative filtering recommender systems,’’ in The Adaptive Web (Lecture Notes in Computer Science), vol. 4321, P. Brusilovsky, A. Kobsa, and W. Nejdl, Eds. Cham, Switzerland: Springer, 2007.
3. M. J. Pazzani and D. Billsus, ‘‘Content-based recommendation systems,’’ in The Adaptive Web (Lecture Notes in Computer Science), vol. 4321, P. Brusilovsky, A. Kobsa, and W. Nejdl, Eds. Berlin, Germany: Springer, 2007.
4. S.-T. Li, T.-T. Pham, and H.-C. Chuang, ‘‘Do reviewers’ words affect predicting their helpfulness ratings? Locating helpful reviewers by linguistics styles,’’ Inf. Manage., vol. 56, no. 1, pp. 28–38, 2019.
5. V. Srivastava and A. D. Kalro, ‘‘Enhancing the helpfulness of online consumer reviews: The role of latent (content) factors,’’ J. Interact. Marketing, vol. 48, pp. 33–50, Nov. 2019.
6. B. Liu, Sentiment Analysis and Opinion Mining. San Mateo, CA, USA: Morgan & Claypool Publishers, 2012.
7. [Amazon Web services, inc. Amazon Customer Reviews Datase. Accessed: Dec. 18, 2019. [Online]. Available: https://s3.amazonaws.com/amazonreviews-pds/readme.html
8. S. Raza and C. Ding, ‘‘Progress in context-aware recommender systems—An overview,’’ Comput. Sci. Rev., vol. 31, pp. 84–97, Feb. 2019. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S1574013718302120
9. L. Chen, G. Chen, and F. Wang, ‘‘Recommender systems based on user reviews: The state of the art,’’ User Model. User-Adapted Interact., vol. 25, no. 2, pp. 99–154, Jun. 2015, doi: 10.1007/s11257-015-9155-5.
10. C. He, D. Parra, and K. Verbert, ‘‘Interactive recommender systems: A survey of the state of the art and future research challenges and opportunities,’’ Expert Syst. Appl., vol. 56, pp. 9–27, Sep. 2016. [Online]. Available: http://www.sciencedirect.com/science/ article/pii/S0957417416300367
11. S. Reddy, S. Nalluri, S. Kunisetti, S. Ashok, and B. Venkatesh, ‘‘Contentbased movie recommendation system using genre correlation,’’ in Smart Intelligent Computing and Applications, S. C. Satapathy, V. Bhateja, and S. Das, Eds. Singapore: Springer, 2019, pp. 391–397.
12. X. Li, W. Jiang, W. Chen, J. Wu, and G. Wang, ‘‘Haes: A new hybrid approach for movie recommendation with elastic serendipity,’’ in Proc. 28th ACM Int. Conf. Inf. Knowl. Manage., New York, NY, USA, 2019, pp. 1503–1512, doi: 10.1145/3357384.3357868.
13. K. Benzi, V. Kalofolias, X. Bresson, and P. Vandergheynst, ‘‘Song recommendation with non-negative matrix 

factorization and graph total variation,’’ in Proc. IEEE Int. Conf. Acoust., Speech Signal Process. (ICASSP), Mar. 2016, pp. 2439–2443.
14. P. Covington, J. Adams, and E. Sargin, ‘‘Deep neural networks for youtube recommendations,’’ in Proc. 10th ACM Conf. Recommender Syst., New York, NY, USA, 2016, pp. 191–198, doi: 10.1145/2959100.2959190.
15. J. Guerreiro and P. Rita, ‘‘How to predict explicit recommendations in online reviews using text mining and sentiment analysis,’’ J. Hospitality Tourism Manage., 2019, doi: 10.1016/j.jhtm.2019.07.001.
16. M. Chelliah and S. Sarkar, ‘‘Product recommendations enhanced with reviews,’’ in Proc. Eleventh ACM Conf. Recommender Syst., New York, NY, USA, 2017, pp. 398–399, doi: 10.1145/3109859.3109936.
17. L. S. Gallege and R. R. Raje, ‘‘Towards selecting and recommending online software services by evaluating external attributes,’’ in Proc. 11th Annu. Cyber Inf. Secur. Res.Conf. (CISRC), 2016, p. 23.
18. Y. Qian, Y. Zhang, X. Ma, H. Yu, and L. Peng, ‘‘EARS: Emotionaware recommender system based on hybrid information fusion,’’ Inf. Fusion, vol. 46, pp. 141–146, Mar. 2019. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1566253518301234
19. A. Da’u and N. Salim, ‘‘Sentiment-Aware Deep Recommender System With Neural Attention Networks,’’ IEEE Access, vol. 7, pp. 45472–45484, 2019.
20. A. Said, E. W. De Luca, and S. Albayrak, ‘‘Inferring contextual user profiles-improving recommender performance,’’ in Proc. 3rd RecSys Workshop Context-Aware Recommender Syst., Chicago, IL, USA, 2011.
21. F. García-Sánchez, R. Colomo-Palacios, and R. Valencia-García, ‘‘A social-semantic recommender system for advertisements,’’ Inf. Process. Manage., vol. 57, no. 2, Mar. 2020, Art. no. 102153.
22. J. Wei, F. Meng, and N. Arunkumar, ‘‘A personalized authoritative user-based recommendation for social tagging,’’ Future Gener. Comput. Syst., vol. 86, pp. 355–361, Sep. 2018. [Online]. Available:
23. http://www.sciencedirect.com/science/article/pii/S0167739X18303078
M. Xu and S. Liu, ‘‘Semantic-enhanced and context-aware hybrid collaborative filtering for event recommendation in event-based social networks,’’ IEEE Access, vol. 7, pp. 17493–17502, 2019.
24. L. U, Y. Chai, and J. Chen, ‘‘Improved personalized recommendation based on user attributes clustering and score matrix filling,’’ Comput. Standards Inter., vol. 57, pp. 59–67, Mar. 2018.
25. K. Xu, X. Zheng, Y. Cai, H. Min, Z. Gao, B. Zhu, H. Xie, and T.-L. Wong, ‘‘Improving user recommendation by extracting social topics and interest topics of users in uni-directional social networks,’’ Knowl.- Based Syst., vol. 140, pp. 120–133, Jan. 2018. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S0950705117305002
26. R. Logesh, V. Subramaniyaswamy, V. Vijayakumar, and X. Li, ‘‘Efficient User Profiling Based Intelligent Travel Recommender System for Individual and Group of Users,’’ Mobile Netw. Appl., vol. 24, no. 3, pp. 1018–1033, Jun. 2019, doi: 10.1007/s11036-018-1059-2.
27. J. Li, W. Xu, W. Wan, and J. Sun, ‘‘Movie recommendation based on bridging movie feature and userinterest,’’ J. Comput. Sci., vol. 26, pp. 128–134, May 2018. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1877750318300012
28. H. Tahmasbi, M. Jalali, and H. Shakeri, ‘‘Modeling Temporal Dynamics of User Preferences in Movie Recommendation,’’ in Proc. 8th Int. Conf. Comput. Knowl. Eng. (ICCKE), Oct. 2018, pp. 194–199.
29. S. E. Middleton, D. C. De Roure, and N. R. Shadbolt, ‘‘Capturing knowledge of user preferences: Ontologies in recommender systems,’’ in Proc. 1st Int. Conf. Knowl. Capture, New York, NY, USA, 2001, pp. 100–107,
doi: 10.1145/500737.500755. VOLUME 8, 2020 26187 S. Hu et al.: Reviewer Credibility and Sentiment Analysis Based User Profile Modelling for Online Product Recommendation
30. X. Xie and B. Wang, ‘‘Web page recommendation via twofold clustering: Considering user behavior and topic relation,’’ Neural Comput. Appl., vol. 29, no. 1, pp. 235–243, 2018, doi: 10.1007/s00521-016-2444-z.
31. J. Al-Sharawneh and M.-A. Williams, ‘‘Credibility-based social network recommendation: Follow the leader,’’ in Proc. 21st Australas. Conf. Inf. Syst., 2010, pp. 1–11.
32. D. Goldbaum, ‘‘Follow the leader: Simulations on a dynamic social network,’’ UTS Finance Econ. Work. Paper No 155, 2008. [Online]. Available: http://www.business.uts.edu.au/finance/research/wpapers/wp155.pdf
33. F. Li and T. C. Du, ‘‘Who is talking? An ontology-based opinion leader identification framework for word-of-mouth marketing in online social blogs,’’ Decis. Support Syst., vol. 51, no. 1, pp. 190–197, Apr. 2011.
34. J. Chen, C. Wang, Q. Shi, Y. Feng, and C. Chen, ‘‘Social recommendation based on users’ attention and preference,’’ Neurocomputing, vol. 341, pp. 1–9, May 2019. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0925231219302693
35. A. Kumar and G. Garg, ‘‘Sentiment analysis of multimodal Twitter data,’’ Multimedia Tools Appl., vol. 78, no. 17, pp. 24103–24119, Sep. 2019.
36. [A. Kumar and A. Jaiswal, ‘‘Particle swarm optimized ensemble learning for enhanced predictive sentiment accuracy of tweets,’’ in Proc. ICETIT, P. K. Singh, B. K. Panigrahi, N. K. Suryadevara, S. K. Sharma, and A. P. Singh, Eds. Cham, Switzerland: Springer, 2020, pp. 633–646. 

37. A. Kumar and A. Joshi, ‘‘Ontology driven sentiment analysis on social Web for government intelligence,’’ in Proc. Special Collection EGovernment Innov. India, New York, NY, USA, 2017, pp. 134–139, doi: 10.1145/3055219.3055229.
38. A. Kumar and A. Jaiswal, ‘‘Empirical study of twitter and tumblr for sentiment analysis using soft computing techniques,’’ in Proc. World Congr. Eng. Comput. Sci., vol. 1, 2017, pp. 1–5.
39. H. H. Do, P. Prasad, A. Maag, and A. Alsadoon, ‘‘Deep Learning for Aspect-Based Sentiment Analysis: A Comparative Review,’’ Expert Syst. Appl., vol. 118, pp. 272–299, Mar. 2019. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/S0957417418306456
40. A. Dridi, M. Atzeni, and D. ReforgiatoRecupero, ‘‘FineNews: Finegrained semantic sentiment analysis on financial microblogs and news,’’ Int. J. Mach. Learn. Cyber., vol. 10, no. 8, pp. 2199–2207, Aug. 2019,
doi: 10.1007/s13042-018-0805-x.
41. R. Dong, M. P. O’Mahony, M. Schaal, K. Mccarthy, and B. Smyth, ‘‘Combining similarity and sentiment in opinion mining for product recommendation,’’ J. Intell. Inf. Syst., vol. 46, no. 2, pp. 285–312, Apr. 2016,
doi: 10.1007/s10844-015-0379-y.
42. G. Liu, Y. Wang, and M. Orgun, ‘‘Trust inference in complex trust-oriented social networks,’’ in Proc. Int. Conf. Comput. Sci. Eng., vol. 4, Aug. 2009, pp. 996–1001.
43. M. J. Metzger, ‘‘Making sense of credibility on the Web: Models for evaluating online information and recommendations for future research,’’ J. Am. Soc. Inf. Sci., vol. 58, no. 13, pp. 2078–2091, Nov. 2007.
44. K. Kwon, J. Cho, and Y. Park, ‘‘Multidimensional credibility model for neighbor selection in collaborative recommendation,’’ Expert Syst. Appl., vol. 36, no. 3, pp. 7114–7122, Apr. 2009, doi: 10.1016/j.eswa.2008.08.071.
45. T. H. Haveliwala, ‘‘Topic-sensitive pagerank,’’ in Proc. 11th Int. Conf. World Wide Web, New York, NY, USA, 2002, pp. 517–526, doi: 10.1145/511446.511513.
46. R. Mihalcea and P. Tarau, ‘‘Textrank: Bringing order into text,’’ in Proc. Conf. Empirical Methods Natural Lang. Process., 2004, pp. 404–411.
47. S. Rose, D. Engel, N. Cramer, and W. Cowley, ‘‘Automatic keyword extraction from individual documents,’’ Text Mining: Appl. Theory, vol. 1, pp. 1–20, Mar. 2010 Jaganathan, M., Sabari, A. An heuristic cloud based segmentation technique using edge and texture based two dimensional entropy. Cluster Computing Vol 22, PP 12767–12776(2019). https://doi.org/10.1007/s10586-018-1757-3
48. S.B. Jayabharathi, S. Manjula, E. Tamil Selvan, P. Vengatesh and V. Senthil Kumar” Semantic Risk Analysis Model Cancer Data Prediction” Journal on Science Engineering and Technology Vo1ume 5, No. 02, April 2018
49. V.Senthilkumar , K.Prashanth” A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks International Journal of communication and computer Technologies, Vol 4 Issue No 1 (2016)
50. Sowmitha, V., and Mr V. Senthilkumar. "A Cluster Based Weighted Rendezvous Planning for Efficient Mobile-Sink Path Selection in WSN." International Journal for Scientific Research & Development Vol 2 Issue 11 2015
51. Viswanathan, A., Arunachalam, V. P., & Karthik, S. (2012). Geographical division traceback for distributed denial of service. Journal of Computer Science, 8(2), 216.
52. Anurekha, R., K. Duraiswamy, A. Viswanathan, V.P. Arunachalam and K.G. Kumar et al., 2012. Dynamic approach to defend against distributed denial of service attacks using an adaptive spin lock rate control mechanism. J. Comput. Sci., 8: 632-636.
53. Umamaheswari, M., & Rengarajan, N. (2020). Intelligent exhaustion rate and stability control on underwater wsn with fuzzy based clustering for efficient cost management strategies. Information Systems and e-Business Management, 18(3), 283-294.
54. Babu, G., & Maheswari, M. U. (2014). Bandwidth Scheduling for Content Delivery in VANET. International Journal of Innovative Research in Computer and Communication Engineering IJIRCCE, 2(1), 1000-1007.
55. Viswanathan, A., Kannan, A. R., & Kumar, K. G. (2010). A Dynamic Approach to defend against anonymous DDoS flooding Attacks. International Journal of Computer Science & Information Security.
56. Kalaivani, R., & Viswanathan, A. HYBRID CLOUD SERVICE COMPOSITION MECHANISM WITH SECURITY AND PRIVACY FOR BIG DATA PROCESS., International Journal of Advanced Research in Biology Engineering Science and Technology, Vol. 2,Special Issue 10, ISSN 2395-695X.
57. Ardra, S., & Viswanathan, A. (2012). A Survey On Detection And Mitigation Of Misbehavior In Disruption Tolerant Networks. IRACST-International Journal of Computer Networks and Wireless Communications (IJCNWC), 2(6).