Jaiteg Singh

Learn More
Cloud Computing is a set of IT Services that are provided to a customer over a network and these services are delivered by third party provider who owns the infrastructure and reduce the burden at user's end. Nowadays researchers devoted their work access control method to enhance the security on Cloud. RBAC is attractive access model because the number of(More)
The evolution of web has changed the way of interaction with the user. Web 2.0 encouraged more contribution from the user of varying level of mapping experience and is called Crowd Sourcing. Open Street Map is also the outcome of Crowd Sourcing. It is collecting huge data with help of general public, researchers have started analysing the data rather than(More)
Master data is critical for any business organization. Big organizations like Oracle, Infosys, IBM, Google, Facebook and TCS started working on Master Data Management (MDM) in early 20's. Multinational corporations spend millions of dollars for Managing their Master Data, so as to ensure quality of service and customer retention as well. Unlike big(More)
Research in sentiment analysis, as defined, goes for classifying obstinate writings as per the extremity of the sentiment communicated. On the other hand, contingent upon the final utilization of the sentiment analysis errand, order of opinion is carried out at diverse levels. Case in point, when a user is keen on figuring out opinions individuals gave(More)
Sentiment analysis is the study of classifying human's sentiments, evaluations, attitudes, opinions about some topic, expressed in form of text or speech. In order to improve the customer satisfaction, many e-commerce sites provides the provision to write reviews about products. Instead of manually reading and evaluating numerous reviews, an automated(More)
Nowadays, client likes to take suggestions before spending on a new product. For this they go to online item review Web page for perusing other's encounters and saying for that item. A real issue which was disregarded so far is the investigation of review spammers. However, numerous scientists gave their productive commitment in this field of exploration(More)
Today, Online audits give profitable data about items and administrations to buyers. On the other hand, spammers are joining the group attempting to deceive pursuers by composing fake surveys. Past endeavors for spammer identification utilized reviewers' behaviors, text similarity, linguistics features and rating patterns. Those studies have the capacity(More)
Web page ranking algorithms are used to score the universal resource locators or simply online links of the Web applications. The corporate world strives to develop the Web applications in such a way so that it can be visible on the top results in the major search engines and search directories. A number of Web page ranking algorithms are developed with(More)
Opinion these days is considered vital to attract probable customers; hence e-commerce websites are facilitating the existing customers to share their experiences about the products they have used. The dawn of e-commerce business has resulted into some firms, which post reviews that are carefully designed to influence the opinion of prospective customers.(More)
ARM (Association Rule Mining), one of the most frequently used technique in the domain of data mining and machine learning. Using association rule mining or rule learning extracts the hidden patterns in terms of the association between entities of the training data set. This technique is applied on number of data sets by different researchers and(More)