An Enhanced Method To Predict Share Market Stock Information For Customer Queries
An Enhanced Method To Predict Share Market Stock Information For Customer Queries
An Enhanced Method To Predict Share Market Stock Information For Customer Queries
Queries
Abstract
The main theme of this problem to provide forecasting stock return is an important
financial subject that has attracted researchers attention for many years. It involves an
assumption that fundamental information publicly available in the past has some predictive
relationships to the future stock returns.
This study tries to help the investors in the stock market to decide the better timing for buying
or selling stocks based on the knowledge extracted from the historical prices of such stocks.
The decision taken will be based on decision tree classifier which is one of the data mining
techniques. To build the proposed model, the CQM (Customer Query Management )
methodology is used over real historical data of three major companies listed in Stock
Exchange (SE).
Outlier detection can usually be considered as a pre-processing step for locating, in a data set,
those objects that do not conform to well-defined notions of expected behavior. It is very
important in data mining for discovering novel or rare events, anomalies, vicious actions,
exceptional phenomena, etc. We are investigating outlier detection for categorical data sets.
This problem is especially challenging because of the difficulty of defining a meaningful
similarity measure for categorical data.
In this project, we propose a formal definition of outliers and an optimization model of
outlier detection, via a new concept of holo entropy that takes both entropy and total
correlation into consideration. Based on this model, we define a function for the outlier factor
of an object which is solely determined by the object itself and can be updated efficiently.
We propose two practical 1-parameter outlier detection methods, named ITB-SS and ITB-SP,
which require no user-defined parameters for deciding whether an object is an outlier. Users
need only provide the number of outliers they want to detect.
Privacy is one of the major concerns when publishing or sharing social network data for
social science research and business analysis. Recently, researchers have developed privacy
models similar to k-anonymity to prevent node reidentification through structure information.
However, even when these privacy models are enforced, an attacker may still be able to infer
one's private information if a group of nodes largely share the same sensitive labels (i.e.,
attributes).
In other words, the label-node relationship is not well protected by pure structure
anonymization methods. Furthermore, existing approaches, which rely on edge editing or
node clustering, may significantly alter key graph properties. In this project, we define a kdegree-l-diversity anonymity model that considers the protection of structural information as
well as sensitive labels of individuals.
We further propose a novel anonymization methodology based on adding noise nodes. We
develop a new algorithm by adding noise nodes into the original graph with the consideration
of introducing the least distortion to graph properties. Most importantly, we provide a
rigorous analysis of the theoretical bounds on the number of noise nodes added and their
impacts on an important graph property.
With the wide deployment of public cloud computing infrastructures, using clouds to
host data query services has become an appealing solution for the advantages on scalability
and cost-saving. However, some data might be sensitive that the data owner does not want to
move to the cloud unless the data confidentiality and query privacy are guaranteed. On the
other hand, a secured query service should still provide efficient query processing and
significantly reduce the in-house workload to fully realize the benefits of cloud computing.
We propose the random space perturbation (RASP) data perturbation method to provide
secure and efficient range query and kNN query services for protected data in the cloud. The
RASP data perturbation method combines order preserving encryption, dimensionality
expansion, random noise injection, and random projection, to provide strong resilience to
attacks on the perturbed data and queries. It also preserves multidimensional ranges, which
allows existing indexing techniques to be applied to speedup range query processing. The
kNN-R algorithm is designed to work with the RASP range query algorithm to process the
kNN queries. We have carefully analyzed the attacks on data and queries under a precisely
defined threat model and realistic security assumptions.
Expressive, Efficient, and Revocable Data Access Control for Multi-Authority Cloud
Storage
Abstract
Data access control is an effective way to ensure the data security in the cloud. Due to data
outsourcing and untrusted cloud servers, the data access control becomes a challenging issue
in cloud storage systems. Cipher text-Policy Attribute-based Encryption (CP-ABE) is
regarded as one of the most suitable technologies for data access control in cloud storage,
because it gives data owners more direct control on access policies. However, it is difficult to
directly apply existing CP-ABE schemes to data access control for cloud storage systems
because of the attribute revocation problem.
In this project, we design an expressive, efficient and revocable data access control scheme
for multi-authority cloud storage systems, where there are multiple authorities co-exist and
each authority is able to issue attributes independently.
Specifically, we propose a revocable multi-authority CP-ABE scheme, and apply it as the
underlying techniques to design the data access control scheme. Our attribute revocation
method can efficiently achieve both forward security and backward security
With the rapid development of web, most of the customers express their opinions on various
kinds of entities, such as products and services on web. These reviews provide useful
information to customers for reference.
These reviews are also valuable for merchants to get the feedback from customers and
improve the qualities of their products or services. However, the contents are stored in mostly
either unstructured or semi-structured format.
This application trying to improve mining approach to mine product features, opinions from
Web opinion sources for informal text. The extracted feature-opinion pairs and sentence-level
review source documents are modeled using a graph structure. Hyper link-Induced Topic
Search (HITS) algorithm is applied for each feature opinion pair with respect to the
underlying corpus.