International Journal of Social Computing and Cyber-Physical Systems (5 papers in press)
Data Sharing Sensitivity, Relevance, and Social Traits in Social Information Retrieval
by Christoph Fuchs, Georg Groh
Abstract: The present paper evaluates a social information retrieval system where users can query each other for information. The approached user can reply to the query (``manual mode scenario'') based on her knowledge. In addition, a social product search scenario is evaluated, where original results are enriched with items bought or viewed by a social peer group defined in various ways (``social product search scenario''). Each scenario is tested with more than 120 participants. Our findings suggest that asking others reveals relevant results. Social closeness appears to correlate with the degree of overlap of viewed products in an online store, thus socially close contacts might be a good source for product recommendations, especially when considering homophily effects. The injection of socially motivated result items in result list for product queries did not prove to be useful. As expected, users share more private information using strong ties. In addition, a reactive sharing pattern (which does not rely on previously published material, but queries directly using a pull regime) increases the amount of available data for social information retrieval. The most prominent reasons for choosing a certain information provider include content knowledge, local knowledge, social closeness, and taste similarity. The majority of questions asked by information seekers covered recommendations in the area of media, travel, technology, and food and personal opinions on technology-related topics and travel.
Keywords: social information retrieval; social context;.
Big Data Analytics in Healthcare: Opportunities, Challenges and Techniques
by Vijendra Singh, Madhu Kumari
Abstract: Big data has evolved as a most challenging field of study and research area. It has drawn much attention during the last few years and influences our modern society including business, government, healthcare, and in research in almost every discipline. Big data has a huge potential to improve healthcare. A proper analysis of existing healthcare data fabricates most suitable predictive results and cut the cost and time of treatment. The collaboration of IT and healthcare industry has revolutionaries the healthcare management system. This paper attempts to merge the description of big data by integrating various concepts and definitions from the different researchers and academicians. This paper highlights the potential and corresponding challenges in healthcare data analysis. A summarization on different research trends within healthcare data analysis is presented.
Keywords: Big Data; data-driven era; potential; healthcare; predictive; healthcare management system; challenges; research.
Analysis of Lorenz-Chaos and Exclusive-OR Based Image Encryption Scheme
by Indu Saini, Phool Singh, Anil Kumar Yadav
Abstract: In this paper, analysis of Lorenz-chaos and exclusive-OR based image encryption scheme has been presented. The Lorenz system is used in shuffling the positions of image pixels in the spatial-domain and gray values of pixels are altered with exclusive-OR operation. The encryption scheme has been validated for grayscale images using MATLAB 7.14 and is sensitive to the encryption parameters of the Lorenz system. The experimental results establish that the key-space is large enough to resist brute-force attack, and demonstrate the schemes resistance to noise and occlusion attacks. Statistical and correlation analysis of adjacent pixels are also performed.
Keywords: Image encryption; Chaos; Lorenz system; exclusive-OR; occlusion and noise attack.
Chaos based novel cryptographic technique based on a new logistic map
by Asif A. Shah, Shabir A. Parah
Abstract: In todays information age a lot of data is being transferred over insecure channels like intranet and internet. This data needs to be secured against various attacks from an eavesdropper/intruder etc. Of late chaotic encryption has caught the attention of research community round the globe for securing data, due to excellent characteristics of chaos such as data mixing, sensitivity to initial conditions, and ergodicity. In this work we propose a novel Modular Logistic Map (MLM) and show that it has better properties like larger Lyapunov Exponent (LE), uniform invariant density, mixing and higher range of bifurcation parameter etc. compared to basic logistic map. We have further exploited these properties of MLM for designing a secure robust, strong & efficient text cryptosystem. It has been further shown that encryption and decryption time using proposed scheme is quite small and hence the proposed cryptosystem suitable for real time encryption applications.
Keywords: Chaotic encryption; Lyapunov Exponent; Bifurcation; Robustness.\r\n\r\n.
Implementation of an Efficient and Intelligent Indian Maritime Borderline Alert System using IoT
by Asha Jerlin, Anindya Kumar Das
Abstract: The sea border issues are crucial to nations where its hard to have a track of boarder for fishermens. Quite a few occurrences of Indian fishermen from Tamilnadu, have been facing problems near the historic maritime boundary. About 180000 fishing vessels of assorted forms are involved in fishing along the Indian-Sri Lankan maritime border. But fishing activities in that region has always been an agitating factor, ever since violence broke out in Sri Lanka about 3 decades ago. This problem however this can be solved only by an efficient and intelligent boundary alert system using IoT. Internet of Things has the technology to make it possible for monitoring the sea border levels to know the border location. The Intelligent Maritime Borderline Alter System or IMBAS incorporates the new methodology of IoT for saving the fishermens life as well as their sole assets in which their mode of income depends. The methodology includes tracking the position of the boat in real time using a differential GPS system and keeping the boat in safe waters, well inside the Indian Territory. The system will also notify the ground control as and when the boat approaches the maritime borderline. The main objective of the system is to help the fishermen navigate safely inside our maritime country border and also prevent them from crossing it at all costs.
Keywords: maritime borderline; India-Sri Lanka; GPS; border security; vessel monitoring; alert system; Tamil Nadu; fishing community; IoT.