Oct'19

Welcome to the IUP Journal of Computer Sciences

Focus

The definition of �expert-level analysis� is wherein the subtasks have been made available for automatic processing. Hence, expert-level analysis becomes more and more demanding until it covers all science and philosophy.

The role of Machine Learning (ML) and Artificial Intelligence (AI) in NLP (Natural Language Processing) and text analytics is to improve, accelerate and automate the NLP process, so that the human beings understand the meaning of the text documents. The underlying Natural Language features and text analytics give semi-structured and unstructured text the decision data and insights.

In real-time scenario, most of the NLP features and processes are cascaded with ML algorithms in the AI solution space and most of the APIs are deployed in the public cloud computing platform, whose function cost is low and which leads to some security issues in the cloud computing era with respect to AI/NLP/ML.

In the first paper, �Processing the Textual Information Using Open Natural Language Processing�, the author, A Muthusamy, has discussed how NLP, the application of computational technique and components of AI, helps to analyze and synthesize standard English language; it also draws from many disciplines like computer science and computational linguistics to process and analyze a large amount of natural language data. The main aim of this paper is to overcome the limitations in N-gram approach and to use open NLP tool kit for processing the text in an efficient manner. The second paper, �Meta-Analysis Review of Efficient Mechanisms for Resource, Energy, and Data Management in Fog Computing�, by Sorush Niknamian, classifies the management strategies into three main categories: resource, energy and data management. In addition, it defines the new challenges in each of these categories. Finally, the differences between the reviewed strategies are investigated in terms of scalability, reliability, time and query attributes.

The third paper, �Portfolio Asset Identification Using Graph Algorithms on a Quantum Annealer�, by Angad Kalra, Faisal Qureshi and Michael Tisi, has dual objectives: to explore how commercially available quantum hardware and algorithms can solve real-world problems in finance; and to compare quantum solutions to their classical counterparts. Specifically, the D-Wave quantum annealing computer (D-Wave 2000Q) is used to address the problem of asset correlation identification for financial portfolio management. The paper explores how graph algorithms can be implemented on the D-Wave 2000Q machine to cluster asset correlations in order to identify various financial portfolios. Numerical experiments are conducted using four quantum/classical algorithm pairs on four real-world financial time series datasets spanning 10 years. The quantum solution is as good as (and sometimes better than) the classical one. However, the quantum solution fails to scale beyond certain levels of data dimensionality. The last paper, �Cloud-Based Security Solutions� by Sourav Mukherjee, shows how cloud computing unlocks the doors to multiple and infinite venues which include upscaling and downscaling the resources in no time and pay as you go model (i.e., pay based on the usage). Even with the potential advantages attained from cloud computing, the security of the booming technology is under question, which may impact cloud adoption. Based on the several attacks and vulnerabilities in recent times, a more intense debate about cloud security research has started to find out the probable ways to avoid such attacks.

- B Seetharamulu
Consulting Editor

Article   Price (₹)
Processing the Textual Information Using Open Natural Language Processing
100
Meta-Analysis Review of Efficient Mechanisms for Resource, Energy, and Data Management in Fog Computing
100
Portfolio Asset Identification Using Graph Algorithms on a Quantum Annealer
100
Cloud-Based Security Solutions
100
Contents : (Oct'19)

Processing the Textual Information Using Open Natural Language Processing
A Muthusamy

Natural Language Processing (NLP) is the application of computational technique and component of AI which helps in the analysis and synthesis of Standard English Language. It draws from many disciplines like computer science and computational linguistics to process and analyze a large amount of natural language data to identify the phrases in language that refer to specific types of entities and relations in the text. The problem identified in N-gram approach is: balance weight is placed between in-frequent and frequent grams. It is efficient only for a small amount of textual data. Thus, it is difficult to discover the named entities available in the corpus. The main aim of this paper is to overcome the limitations available in N-gram approach and find desired pieces of entities by using Open NLP tool kit. It helps to store the information in XML format that provides an easy way of querying and processing. Hence, the information extracted from the web is in an unstructured form. This approach is a promising way for processing the text in an efficient manner. To enhance the effectiveness of text mining, the researcher focused on the task of the NLP to discover knowledge from many unstructured text documents that leads to the largest available source of knowledge. The experiments and results of this paper, with accuracy of 0.95, prove that the confidence level is better than that of the N-grams approach.


© 2019 IUP. All Rights Reserved.

Article Price : Rs.100

Meta-Analysis Review of Efficient Mechanisms for Resource, Energy, and Data Management in Fog Computing
Sorush Niknamian

Fog computing is an architecture that uses collaborative end-user edge devices to carry out storage, transmission, configuration, and module functions. In this computing environment, management issue is the process of managing, monitoring and optimizing the correlated components for improving the performance, availability, security and any fundamental operational requirement. The management strategies have a great impact on fog computing, but as far as we know, there is not a comprehensive and systematic study in this field. Hence, this paper classifies the management strategies into three main categories, namely, resource, energy and data management. In addition, it defines the new challenges in each of these categories. Finally, the differences between the reviewed strategies are investigated in terms of scalability, reliability, time and query attributes, along with providing the main directions for future research.


© 2019 IUP. All Rights Reserved.

Article Price : Rs.100

Portfolio Asset Identification Using Graph Algorithms on a Quantum Annealer
Angad Kalra, Faisal Qureshi and Michael Tisi

The dual objectives of this paper are to explore how commercially available quantum hardware and algorithms can solve real-world problems in finance, and then compare quantum solutions to their classical counterparts. Specifically, the D-Wave quantum annealing computer (D-Wave 2000Q) is used to address the problem of asset correlation identification for financial portfolio management. Graphical models offer a natural framework to represent asset correlations. Graphs also naturally map the quantum annealing hardware architecture developed by the D-Wave. The paper explores how graph algorithms can be implemented on the D-Wave 2000Q machine to cluster asset correlations in order to identify various financial portfolios. Numerical experiments are conducted using four quantum/classical algorithm pairs on four real-world financial time series datasets spanning 10 years. For the specific algorithms and datasets selected, the quantum solution is competitive with (and sometimes better than) the classical one. However, quantum fails to scale beyond certain levels of data dimensionality. The study focuses on comparison of solution quality not speedup, and the results suggest specific high-potential directions for future research.


© 2019 IUP. All Rights Reserved.

Article Price : Rs.100

Cloud-Based Security Solutions
Sourav Mukherjee

Cloud computing is an entirely new archetype that envisions a nontraditional computing model for organizations to espouse information technology without incurring any upfront investment and with nominal Total Cost of Ownership (TCO). Cloud computing is the new wave of technology and the favorite buzzword which the corporate world utters every now and then. It unlocks the doors to multiple, infinite venues which include upscaling and downscaling the resources in no time and pay-as-you-go model (that says pay to them based upon the usage). Even with the potential advantages attained from cloud computing, the security of the booming technology is under question which may impact cloud adoption. Based on several attacks and vulnerabilities that took place in recent times and posted by several cloud providers, more intense Cloud Security research has started to grow to find out probable ways to defend against such attacks. There must be appropriate technical enforcement and verifiable accountability with appropriate security policies and measurements and compliance-driven audits to generate a sense of urgency to control the cloud security.


© 2019 IUP. All Rights Reserved.

Article Price : Rs.100