SlideShare a Scribd company logo
1 of 5
Download to read offline
Short Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013

Structuring Ideation Map using Oriented Directed
Acyclic Graph with Privacy Preferences
S.Manju, M.Punithavalli
Sri Ramakrishna College of Arts & Science for Women / Computer Science, Coimbatore, India
Email: suman_hari_2007@yahoo.com
Sri Ramakrishna Engineering College / Computer Applications, Coimbatore, India
Email: mpunitha_srcw@yahoo.com
which integrates Flexible ideation map construction for
ideation rounds. In the existing system, tree like ideation map
was constructed in which the SILA(Semantic Ideation
Learning Agent) performed the associations with respect to
a given idea and then generated their creative ideas and it
was termed as Ideation Round. In this work, an efficient
Oriented Directed Acyclic Graph (ODAG) method is used
to construct the ideation map for diverse ideas and their
relationship and ontology is improved to include privacy
preferences [6]. This strategy provides privacy for all different
groups. FOAF (Friend of a Friend) vocabulary retrieves the
friends of a particular group. Access controller enables access
restrictions e.g. read and write. This System works with
intelligent agents based environment with privacy
preferences and mapping is done with different domains
areas. The agents are filtered and grouped according to their
knowledge domain.

Abstract- E-Brainstorming is a computerized version of sharing
ideas and it replaces verbal communication. The productivity
of ideas generated is viewed as the dominant measure of EBrainstorming. In Agent-based E-Brainstorming, Idea
Ontology was used to map user’s knowledge with idea names
and relationships between idea instances. In this paper
Oriented Directed Acyclic Graph (ODAG) method is used to
construct the ideation map for diverse ideas and their
relationship. Privacy Preference Ontology is integrated to
provide privacy preference for user’s data like access control,
condition, access space and restriction. Here the Idea
Knowledge Base is applied and it enfolds a collection of idea
instances of different domains to denote a client’s knowledge.
Index Terms—E-Brainstorming, Intelligent agents, Privacy
Preference Ontology (PPO), Oriented Directed Acyclic Graph
(ODAG).

I. INTRODUCTION
E-Brainstorming (EB) is a computerized format of sharing
ideas and it replaces verbal communication.[7] This technique
allows all the participants to contribute their ideas at same
time and it effectively eliminates Production Blocking [6] and
reduces Social Loafing. The productivity of ideas generated
has been viewed as the dominant measure of E-Brainstorming.
Briggs and Reining [2] provided a theoretical explanation in
Bounded Ideation Theory to clarify the relationship between
idea quantity and idea quality. They also recommended
guidance for the development of ideation techniques for
improving the quality [3] of ideas. A good idea was defined
as one that is feasible to implement and would attain the
goal.
Although brainstorming has become a popular group
technique, researchers have not found evidence of its
effectiveness for enhancing either quantity or quality of ideas
generated. Because of such problems as social loafing,
occurs when participants in a group feel unmotivated and
they think their contributions will not be valued. Evaluation
apprehension, occurs when individuals withhold their ideas
out of concern that others may not approve them. Production
blocking, occurs when something prevents a participant from
verbalizing their ideas as they occur e.g. forgetting an idea
while waiting for a turn to speak. Traditional brainstorming
does not increase the productivity of groups, it may still
provide benefits, such as boosting morale, enhancing work
enjoyment, and improving team work. This system aims at
incorporating a modified E-Brainstorming ideation model,
© 2013 ACEEE
DOI: 01.IJIT.3.4.1263

II. BRAINSTORMING TECHNIQUES- REVIEW
Brainstorming is a technique for generating a large number
of ideas for creative problem solving. The term brainstorming
was first used by [7]. The generation of new ideas, especially
high quality creative ideas, is important for a problem. It is a
popular method of group interaction in both educational and
business sectors. Brainstorming engenders synergy i.e., an
idea from one participant can trigger a new idea in another
participant. Brainstorming has been recognized as an effective
group decision supporting approach. Lin [4] developed
brainstorming based multifunctional system which supports
collaborating works on creative activity and decision making.
Most ideation research either implicitly or explicitly
assumes Osborn’s conjecture that if people generate more
ideas, then they will produce more good ideas. Osborn
reported evidence that people generate more good ideas in
the second half of a brainstorming session than during the
first half. Some studies have also reported that certain
ideation protocols can elevate both idea quantity and idea
quality. However, another work reported no relationship
between idea quality and idea quantity. That is, previous
ideation literatures were inconsistent in the arguments [10].
Briggs and Reining [2] provided a theoretical explanation
(Bounded Ideation Theory) to clarify the relationship between idea quantity and idea quality, and they recommended
guidance for the development of ideation techniques for improving the quality of ideas. A good idea was defined as one
22
Short Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013
that is feasible to implement and would attain the goal. The
Bounded Ideation Theory was a causal model of the ideation
function (the relationship between the cumulative number of
good ideas contributed during an ideation process and the
total number of ideas generated). Their causal model identified three essential boundaries of human ideation capability
(an understanding boundary, a cognitive boundary and an
endurance boundary) that influence the production of good
ideas.
The understanding boundary indicates that the
relationship between the number of good ideas and the total
number of ideas becomes a curvilinear function with a positive
but decreasing slope once an understanding of the task has
been achieved. The cognitive boundary signifies that because
of the lack of additional external stimuli to activate a new part
of the group memory, people tend to think inside the box,
causing subsequent contributions to increasingly become
similar to previous contributions, thus yielding fewer new
good ideas (that is, the declining ratio of good ideas to the
total ideas over time produces an ideation function with a
positive but decreasing slope).
The endurance boundary signifies that because an
individual’s mental and physical abilities diminish with effort
over time, ideation abilities will then decline as ideation
proceeds (that is if the ideation process were to continue for
a sufficiently long time, then participants might lose the ability
to generate good ideas which leads to falling ratio of good
ideas to the total ideas overtime and yields an ideation function
with a positive but decreasing slope).
Although current e-brainstorming overcomes the spatial
and distance limitation of conventional brainstorming with
the technique of electronic communication, all participants
must still be present at the brainstorming session at the same
time to proceed with the discussion. With these advancements
Soe- Tsyr Yuan and Yen-Chuan Chen [10] developed agent
based ideation architecture and inference mechanism. To make
an intelligent agent capable of generating ideas, the
preliminary work investigates three fundamental human’s
association capabilities (similarity, contiguity and contrast)
during idea generation, implements these capabilities in an
agent’s inference mechanism and unfolds the design of SILA,
which performs idea associations based on a devised
ontology-based representation of ideas. A SILA represents
an ideation participant that can learn to understand the task
and adopt external stimuli, free from limits in working memory
and from attention exhaustion. Considering the
aforementioned review of the brainstorming technique, this
system aims at incorporating a modified agents based EBrainstorming ideation model with an efficient Oriented
Directed Acyclic Graph (ODAG) method used to construct
the ideation map for diverse ideas and their relationship and
ontology is improved to include privacy preferences Manju.S;
Dr.M.Punithavalli (2012). This strategy provides privacy for
all different groups. FOAF (Friend of a Friend) vocabulary
retrieves the friends of a particular group. Access controller
enables access restrictions e.g. read and write. This System
works with intelligent agents based environment with privacy
© 2013 ACEEE
DOI: 01.IJIT.3.4.1263

preferences and mapping is done with different domains
areas. The agents are filtered and grouped according to their
knowledge domain.
III. IDEATION MAP CONSTRUCTION
In the existing system, tree like ideation map was
constructed in which the SILA’s performed the associations
with respect to a given idea and then generated their creative
ideas and it was termed as Ideation Round. In the proposed
model, an efficient Oriented Directed Acyclic Graph (ODAG)
method is integrated to construct the ideation map for diverse
ideas and their relationship [1].
A graph can be directed or undirected (no direction). Here
an ideation map is constructed to improve both idea quantity
and quality. Assume that, the given vertex as problem solving
states or creative generated idea and arcs as the process of
problem solving steps i.e. G= (V,A) will be represented as
collection of vertices and the collection of directed arcs that
connects pairs of vertices with no path returning to the same
vertex. This is referred as acyclic graph.
The ODAG algorithm is based on two sets of data, the
first set represents the vertices in a one dimensional array
vertex (V) where each item in the array is annotated with the
creative idea label (CIL), Round number (Rno), number of
parents (Np), creative value (Cv) and Weight (W).The second
set represents the arcs in 2-D array (V,V) where each item is
annotated with the link 0 or 1 and the relationship is-a or partof. In each round, the creative ideas are generated (parent)
and it is allocated for generating creative idea instance in
vertex (V), and adjacency (V, V).
The vertex with the highest creativity value (CV) in the
previous round will be the initial states to the next rounds till
the last rounds. Fig. 1 shows the generation of ideation map
using ODAG structure i.e. process of all SILA requestor. Each
ideation round has an input idea, as the association result.
The initial idea is the input idea at round 1 and the creative
ideas generated by SILA requestor in round 1(C1, C2, C3) is
the input idea at round 2 etc. Hence, the ideation map can
progressively be constructed through many ideation rounds.
The process of “linking” among distributed knowledge has
an extreme importance in creative thinking and problem
solving. In this paper ideation map is constructed using
acyclic graph structure which elevates maximum quantity and

Fig.1. Ideation Map

23
Short Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013
preference to share an e-mail address with in friends group.

creative quality of ideas from each ideation round.

A. Privacy Preference Idea Ontology
Privacy Preference Ontology provides privacy preference
for user’s data like access control, condition, access space
and restriction. Here the Idea Knowledge Base is applied and
it enfolds a collection of idea instances of different domains
to denote a client’s knowledge. Privacy preference defines
some properties to define, (1) which statement or resource is
to be restricted. (2) Define conditions in order to create specific
privacy preferences [8]. (3) Some properties to define which
access privilege should be granted for accessing client’s data
base.
Using access control read and write authority is included
for accessing the knowledge base. For all authenticated user’s
read and write access control is included. Condition is applied
to resource, class, literals and property. Access space is
applied to all queries and restriction is applied to resources
and statements.

IV. IMPROVED ONTOLOGY WITH PRIVACY PREFERENCES
In Agent-based E-Brainstorming, idea ontology was used
to map user’s knowledge with idea names and relationships
between idea instances. It provided minimum privacy settings
such as granting privileges to all people belonging to one
social group to access their information. In this paper Privacy
Preference Ontology (PPO) [8] is used for participant to
create fine-grained creative ideas. PPO is light weight
vocabulary on top of the web access control (WAC) Ontology
aiming to provide access control privileges for specific data
like user’s personal information. Villata; Delaforge; Gandon
and Gyrard [9] described lightweight ontology which defines
fine-grained access control policies for RDF data [5]. FOAF
(Friend of a Friend) vocabulary is reused with agents to
share private data with similar groups or friends [6].
E-Brainstorming methods so far have lack of privacy when
sharing ideas across different organizations. An analysis of
Brainstorming was done to gain more Knowledge about
innovative idea generation. By introducing PPO, access
control privileges could be introduced to the users for
accessing data. WAC (Web Access Control) Vocabulary
defines the read and writes access control privileges. Privacy
preferences specify a protocol that enables the particular
database profiles to share their privacy policies with users.
The privacy policies are expressed in xml which can be easily
parsed by user agents. The descriptions expressed using
this protocol are text based and therefore do not contain any
semantics. This approach enables users to define what the
privacy preferences are about and hence facilitate other
systems to use such preferences. A vocabulary that describes
access control privileges is the Web Access Control (WAC)
vocabulary. This vocabulary enables owners to create access
control lists that specify access privileges to the users that
can access the data.
The WAC defines the read and write access control
privileges for reading (Or) updating data and control privilege
to grant access to modify the access control lists. Privacy
Preference Ontology is a lightweight vocabulary on top of
the web access control ontology aiming to provide users
with means to define fine grained privacy preferences for
restricting access specific data. Semantic web technologies
are used to enable privacy preferences. Open social networks
can contain user’s information using common vocabularies
such as FOAF to describe the data.
Imagine a social group network where users could able to
specify which information can be shared only to some
contacts or friends i.e. the person’s under social service. This
would make user’s feel more confident when publishing such
information without being concerned that it could be reused.
Such a system will let user’s full control like who can access
their personal information and who can access their published
data. The data owners can specify a set of attributes which
requestors must satisfy in order to be granted access to the
requested information. For example a user can set a privacy
© 2013 ACEEE
DOI: 01.IJIT.3.4.1263

B. Privacy Preferences
In social network, Web ID protocol can be used to
authenticate a user and it provides a secure connection to a
user’s personal information stored in a FOAF profile. In Fig.2
shows idea ontology to grant privileges to user’s belonging
to one social group and provide access control restrictions
for user’s personal data.

Fig. 2 Idea Ontology

When a user authenticates using Web ID and to visit
another user’s profile, the privacy preferences could be
checked to determine which information can be accessed.
This vocabulary has ability to restrict access to, a particular
statement, to a group of statements and to a resource, either
as a subject or an object of a particular statement. Access is
restricted according to patterns which users must satisfy, for
instance having a particular interest or being a member of a
group.
The fig.3 (a) illustrates that wherever in the user’s profile
there is a statement that contains a property foaf: company
Documents then all statements containing this property are
restricted.
24
Short Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013

Fig.3 (a) example 1 Privacy Preferences

The fig.3 (b) illustrates privacy preference to statement
with read access control and restricted write control for user’s
address details. Thus the privacy preference with access
control privileges will be granted and a space to define which
attributes a requestor must satisfy in order to access the
resources.

Fig.4 Neural Network Training

Fig.3 (b) example 2 Privacy Preferences

V. RESULT & DISCUSSION

for diverse ideas and their relationship. Furthermore, ideation
map constructed using acyclic graph structure elevates
maximum quantity and creative quality of ideas from each
ideation round.

VI. CONCLUSION & FUTURE WORK
The maximum quantity of ideas is increased using Neural
This paper aims at incorporating a modified ENetwork based agents in E-Brainstorming.
Brainstorming ideation model, which integrates Flexible
For.eg. In a sample Indian company’s data set Neural
ideation map construction for ideation rounds. In the existing
Network is trained to achieve the maximum iterations and
system, tree like ideation map was constructed in which the
results. In Fig.4 Neural Network is trained with tan-sigmoid
SILA(Semantic Ideation Learning Agent) performed the
transfer functions in both the hidden layer and output layer.
associations with respect to a given idea and then generated
For a sample approximately 20 neurons were used in one
their creative ideas and it was termed as Ideation Round. In
hidden layer. The network has two output neurons, because
this work, an efficient Oriented Directed Acyclic Graph
of categories associated with input vector. When an input
(ODAG) method is used to construct the ideation map for
vector of the appropriate category is applied to the network,
diverse ideas and their relationship. This also presents the
the corresponding neuron should produce 1 and the other
effective method of E-Brainstorming with security for the
neurons should produce output as 0.
users’ data. The Agents are linked with social web ontology
A Default scaled conjugate gradient algorithm is used for
for ensuring privacy preferences. The new Agent-Based PPO
training. The application randomly divides the input vectors
Model is derived by integrating FOAF Ontology. The access
and target vectors into three sets. 60% for training, 20% for
control mechanisms are carried out and a FOAF Ontology is
validating the network and remaining 20% is used as
reused here to restrict access to the controlled group of users.
completely independent test of network generalization.
The existing methods do not follow any criteria for secure
The Proposed work advances the existing agent based Etransformation of user’s personal information.
Brainstorming by increasing the scope of ideation ontologies
Future work will incorporate new association techniques,
by including privacy preferences. This strategy provides
Modified Neural network based agents and implementing
privacy for all different groups. FOAF (Friend of a Friend)
this model with device based environment e.g. smart phones.
retrieves the friends of a particular group and agent with
similar domain. Access controller enables access restrictions
REFERENCES
e.g. read and write. This system also reduces the complexity
[1] Ali.I. Eldesoky, Asmaa M.EL.Said, Hesham A.Arafat, A Novel
of idea mapping by using Oriented Directed Acyclic Graph
25
© 2013 ACEEE
DOI: 01.IJIT.3.4.1263
Short Paper
ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013

[2]

[3]
[4]

[5]

Ideation Casual map with a new evaluation for idea quality,
IEEE Transactions on Knowledge and DataEngineering. Vol.1
pp 20-32,2009
Briggs R.O and Reining B.A, “Bounded Ideation Theory: A
New Model of the Relationship between idea quantity and
idea quality during ideation,”Proc. 40th annual hawaai ‘Int.Conf.
System sciences. (IIICSS), 2007
Geoffrey.J Rawlinson, “Creative Thinking and Brainstorming”,
Halsted Press, 1981.
Lin.H.T, “A Multifunctional System for supporting
collaborating works and decision making”, J.of Information
Technology, 2008.
Lorea Lorenzo, Osane Lizarralde, Igor Santos and Alexandre
passant, Structuring E-Brainstorming to better support
innovation processes, www.aaai.org, Association of Artificial
Intelligence,2011

© 2013 ACEEE
DOI: 01.IJIT.3.4.1263

[6] Manju.S, Dr.M.Punithavalli, E-Brainstorming technique to
minimize production blocking in creative
ideas,
Proceedings of the National Conference on Emerging Trends
in Computing Technology, NCETCT, pp.no:206, 2010
[7] Osborn A.F., “Applied Imagination: Principles and Procedures
of Creative Problem-Solving,” Creative Education Foundation,
third revised, 1993
[8] Sacco.O and Passant.A ,A Privacy Preference Ontology for
linked data, LDOW,2011
[9] Villata S, Delaforge N, Gandon F and Gyrard A, An access
control model for linked data, In Proc of the 7th Int. Workshop
on Semantic Web & Web Semantics (SWWS), LNCS 7046, PP
454-463, 2011
[10] Yuan & Chen, Semantic Ideation Learning for Agent-based EBrainstorming, IEEE Transactions on Knowledge and Data
Engineering Vol.20 No.2, pp:261-274, 2008.

26

More Related Content

What's hot

Learning Theories & ICT 260913
Learning Theories & ICT 260913Learning Theories & ICT 260913
Learning Theories & ICT 260913
Hazel Aye
 
Divya_MS
Divya_MSDivya_MS
Divya_MS
Divya K
 
Creative idea exploration within the structure of a
Creative idea exploration within the structure of aCreative idea exploration within the structure of a
Creative idea exploration within the structure of a
豊儒 駱
 
CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...
CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...
CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...
Chicago eLearning & Technology Showcase
 

What's hot (16)

Learning Theories & ICT 260913
Learning Theories & ICT 260913Learning Theories & ICT 260913
Learning Theories & ICT 260913
 
Sentiment Analysis and Classification of Tweets using Data Mining
Sentiment Analysis and Classification of Tweets using Data MiningSentiment Analysis and Classification of Tweets using Data Mining
Sentiment Analysis and Classification of Tweets using Data Mining
 
Ai unit-1
Ai unit-1Ai unit-1
Ai unit-1
 
Divya_MS
Divya_MSDivya_MS
Divya_MS
 
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
Design of an Ameliorated Methodology for the Abstraction of Usable Components...Design of an Ameliorated Methodology for the Abstraction of Usable Components...
Design of an Ameliorated Methodology for the Abstraction of Usable Components...
 
Creative idea exploration within the structure of a
Creative idea exploration within the structure of aCreative idea exploration within the structure of a
Creative idea exploration within the structure of a
 
Rhetorical Analysis iPad_sample
Rhetorical Analysis iPad_sampleRhetorical Analysis iPad_sample
Rhetorical Analysis iPad_sample
 
Gestalt
GestaltGestalt
Gestalt
 
Models 2021
Models 2021Models 2021
Models 2021
 
CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...
CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...
CETS 2012, Jeff Merrell & Keeley Sorokti, slides for Social Technology & Lear...
 
Soft computing
Soft computing Soft computing
Soft computing
 
Human Computation Must Be Reproducible
Human Computation Must Be ReproducibleHuman Computation Must Be Reproducible
Human Computation Must Be Reproducible
 
Ai lecture 01(unit03)
Ai lecture  01(unit03)Ai lecture  01(unit03)
Ai lecture 01(unit03)
 
Ai lecture 01(unit03)
Ai lecture  01(unit03)Ai lecture  01(unit03)
Ai lecture 01(unit03)
 
Assignment
AssignmentAssignment
Assignment
 
Anayseværktøj skærmer unge fra arbejdsløshed
Anayseværktøj skærmer unge fra arbejdsløshedAnayseværktøj skærmer unge fra arbejdsløshed
Anayseværktøj skærmer unge fra arbejdsløshed
 

Viewers also liked

Exploring the Solution Space of Sorting by Reversals: A New Approach
Exploring the Solution Space of Sorting by Reversals: A New ApproachExploring the Solution Space of Sorting by Reversals: A New Approach
Exploring the Solution Space of Sorting by Reversals: A New Approach
IDES Editor
 
actividad integradora.Maria Fernanda Escalante Fuentes.#18.
actividad integradora.Maria Fernanda Escalante Fuentes.#18.actividad integradora.Maria Fernanda Escalante Fuentes.#18.
actividad integradora.Maria Fernanda Escalante Fuentes.#18.
Fer Escalante
 
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...
IDES Editor
 

Viewers also liked (8)

Exploring the Solution Space of Sorting by Reversals: A New Approach
Exploring the Solution Space of Sorting by Reversals: A New ApproachExploring the Solution Space of Sorting by Reversals: A New Approach
Exploring the Solution Space of Sorting by Reversals: A New Approach
 
VFT Application for Asynchronous Power Transfer
VFT Application for Asynchronous Power TransferVFT Application for Asynchronous Power Transfer
VFT Application for Asynchronous Power Transfer
 
Simulating Performance Impacts of Bus Priority Measures
Simulating Performance Impacts of Bus Priority Measures Simulating Performance Impacts of Bus Priority Measures
Simulating Performance Impacts of Bus Priority Measures
 
actividad integradora.Maria Fernanda Escalante Fuentes.#18.
actividad integradora.Maria Fernanda Escalante Fuentes.#18.actividad integradora.Maria Fernanda Escalante Fuentes.#18.
actividad integradora.Maria Fernanda Escalante Fuentes.#18.
 
Development of Product Configurator for a Pressure Booster System
Development of Product Configurator for a Pressure Booster SystemDevelopment of Product Configurator for a Pressure Booster System
Development of Product Configurator for a Pressure Booster System
 
Circular Waves in Thermoelastic Plates Bordered with Viscous Liquid
Circular Waves in Thermoelastic Plates Bordered with Viscous Liquid Circular Waves in Thermoelastic Plates Bordered with Viscous Liquid
Circular Waves in Thermoelastic Plates Bordered with Viscous Liquid
 
Performance Analysis of Continuous Flow Intersection in Mixed Traffic Condition
Performance Analysis of Continuous Flow Intersection in Mixed Traffic Condition Performance Analysis of Continuous Flow Intersection in Mixed Traffic Condition
Performance Analysis of Continuous Flow Intersection in Mixed Traffic Condition
 
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...
Comparative Study of Morphological, Correlation, Hybrid and DCSFPSS based Mor...
 

Similar to Structuring Ideation Map using Oriented Directed Acyclic Graph with Privacy Preferences

Chapter 3 - HCI Human Factors Cognition Perception.pptx
Chapter 3 - HCI Human Factors Cognition  Perception.pptxChapter 3 - HCI Human Factors Cognition  Perception.pptx
Chapter 3 - HCI Human Factors Cognition Perception.pptx
NjeruDaniel1
 
KMD 1001 Design Brief and Ontology Task
KMD 1001 Design Brief and Ontology TaskKMD 1001 Design Brief and Ontology Task
KMD 1001 Design Brief and Ontology Task
Stian Håklev
 
MINDSTORMING: UPA 2011 full presentation
MINDSTORMING: UPA 2011 full presentationMINDSTORMING: UPA 2011 full presentation
MINDSTORMING: UPA 2011 full presentation
Dante Murphy
 
Embed Design Thinking in Co-Design for Rapid Innovation of Design Solutions
Embed Design Thinking in Co-Design for Rapid Innovation of Design SolutionsEmbed Design Thinking in Co-Design for Rapid Innovation of Design Solutions
Embed Design Thinking in Co-Design for Rapid Innovation of Design Solutions
Heath Keighran
 

Similar to Structuring Ideation Map using Oriented Directed Acyclic Graph with Privacy Preferences (20)

A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
 
11
1111
11
 
Importance Of Road Mapping For Students
Importance Of Road Mapping For StudentsImportance Of Road Mapping For Students
Importance Of Road Mapping For Students
 
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
A DEVELOPMENT FRAMEWORK FOR A CONVERSATIONAL AGENT TO EXPLORE MACHINE LEARNIN...
 
Understanding and Supporting Intersubjective Meaning Making in Socio-Technica...
Understanding and Supporting Intersubjective Meaning Making in Socio-Technica...Understanding and Supporting Intersubjective Meaning Making in Socio-Technica...
Understanding and Supporting Intersubjective Meaning Making in Socio-Technica...
 
Chapter 3 - HCI Human Factors Cognition Perception.pptx
Chapter 3 - HCI Human Factors Cognition  Perception.pptxChapter 3 - HCI Human Factors Cognition  Perception.pptx
Chapter 3 - HCI Human Factors Cognition Perception.pptx
 
KMD 1001 Design Brief and Ontology Task
KMD 1001 Design Brief and Ontology TaskKMD 1001 Design Brief and Ontology Task
KMD 1001 Design Brief and Ontology Task
 
EFFECT OF SOCIABILITY AND CURIOSITY OF SENIOR DEVELOPERS IN BUILDING AGILE SC...
EFFECT OF SOCIABILITY AND CURIOSITY OF SENIOR DEVELOPERS IN BUILDING AGILE SC...EFFECT OF SOCIABILITY AND CURIOSITY OF SENIOR DEVELOPERS IN BUILDING AGILE SC...
EFFECT OF SOCIABILITY AND CURIOSITY OF SENIOR DEVELOPERS IN BUILDING AGILE SC...
 
Effect of Sociability and Curiosity of Senior Developers in Building Agile Sc...
Effect of Sociability and Curiosity of Senior Developers in Building Agile Sc...Effect of Sociability and Curiosity of Senior Developers in Building Agile Sc...
Effect of Sociability and Curiosity of Senior Developers in Building Agile Sc...
 
A fuzzy logic based on sentiment
A fuzzy logic based on sentimentA fuzzy logic based on sentiment
A fuzzy logic based on sentiment
 
MINDSTORMING: UPA 2011 full presentation
MINDSTORMING: UPA 2011 full presentationMINDSTORMING: UPA 2011 full presentation
MINDSTORMING: UPA 2011 full presentation
 
Gamification not Zombification: Poster
Gamification not Zombification: Poster Gamification not Zombification: Poster
Gamification not Zombification: Poster
 
The 3 Dimensions of Design: A Model to scale the Human-Centered Problem-Solvi...
The 3 Dimensions of Design: A Model to scale the Human-Centered Problem-Solvi...The 3 Dimensions of Design: A Model to scale the Human-Centered Problem-Solvi...
The 3 Dimensions of Design: A Model to scale the Human-Centered Problem-Solvi...
 
Embed Design Thinking in Co-Design for Rapid Innovation of Design Solutions
Embed Design Thinking in Co-Design for Rapid Innovation of Design SolutionsEmbed Design Thinking in Co-Design for Rapid Innovation of Design Solutions
Embed Design Thinking in Co-Design for Rapid Innovation of Design Solutions
 
On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...On data-driven systems analyzing, supporting and enhancing users’ interaction...
On data-driven systems analyzing, supporting and enhancing users’ interaction...
 
visual sorting
visual sortingvisual sorting
visual sorting
 
TS1-3: Yang Yu from Japan Advanced Institute of Science and Technology & Dali...
TS1-3: Yang Yu from Japan Advanced Institute of Science and Technology & Dali...TS1-3: Yang Yu from Japan Advanced Institute of Science and Technology & Dali...
TS1-3: Yang Yu from Japan Advanced Institute of Science and Technology & Dali...
 
Cognitive modeling
Cognitive modelingCognitive modeling
Cognitive modeling
 
SDD Symposium - Bringing Design to Dialogic Design
SDD Symposium - Bringing Design to Dialogic Design SDD Symposium - Bringing Design to Dialogic Design
SDD Symposium - Bringing Design to Dialogic Design
 
Gamify Your Team Design Thinking : Experimental Study on a Co-Evolution Theor...
Gamify Your Team Design Thinking : Experimental Study on a Co-Evolution Theor...Gamify Your Team Design Thinking : Experimental Study on a Co-Evolution Theor...
Gamify Your Team Design Thinking : Experimental Study on a Co-Evolution Theor...
 

More from IDES Editor

Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 

Structuring Ideation Map using Oriented Directed Acyclic Graph with Privacy Preferences

  • 1. Short Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013 Structuring Ideation Map using Oriented Directed Acyclic Graph with Privacy Preferences S.Manju, M.Punithavalli Sri Ramakrishna College of Arts & Science for Women / Computer Science, Coimbatore, India Email: suman_hari_2007@yahoo.com Sri Ramakrishna Engineering College / Computer Applications, Coimbatore, India Email: mpunitha_srcw@yahoo.com which integrates Flexible ideation map construction for ideation rounds. In the existing system, tree like ideation map was constructed in which the SILA(Semantic Ideation Learning Agent) performed the associations with respect to a given idea and then generated their creative ideas and it was termed as Ideation Round. In this work, an efficient Oriented Directed Acyclic Graph (ODAG) method is used to construct the ideation map for diverse ideas and their relationship and ontology is improved to include privacy preferences [6]. This strategy provides privacy for all different groups. FOAF (Friend of a Friend) vocabulary retrieves the friends of a particular group. Access controller enables access restrictions e.g. read and write. This System works with intelligent agents based environment with privacy preferences and mapping is done with different domains areas. The agents are filtered and grouped according to their knowledge domain. Abstract- E-Brainstorming is a computerized version of sharing ideas and it replaces verbal communication. The productivity of ideas generated is viewed as the dominant measure of EBrainstorming. In Agent-based E-Brainstorming, Idea Ontology was used to map user’s knowledge with idea names and relationships between idea instances. In this paper Oriented Directed Acyclic Graph (ODAG) method is used to construct the ideation map for diverse ideas and their relationship. Privacy Preference Ontology is integrated to provide privacy preference for user’s data like access control, condition, access space and restriction. Here the Idea Knowledge Base is applied and it enfolds a collection of idea instances of different domains to denote a client’s knowledge. Index Terms—E-Brainstorming, Intelligent agents, Privacy Preference Ontology (PPO), Oriented Directed Acyclic Graph (ODAG). I. INTRODUCTION E-Brainstorming (EB) is a computerized format of sharing ideas and it replaces verbal communication.[7] This technique allows all the participants to contribute their ideas at same time and it effectively eliminates Production Blocking [6] and reduces Social Loafing. The productivity of ideas generated has been viewed as the dominant measure of E-Brainstorming. Briggs and Reining [2] provided a theoretical explanation in Bounded Ideation Theory to clarify the relationship between idea quantity and idea quality. They also recommended guidance for the development of ideation techniques for improving the quality [3] of ideas. A good idea was defined as one that is feasible to implement and would attain the goal. Although brainstorming has become a popular group technique, researchers have not found evidence of its effectiveness for enhancing either quantity or quality of ideas generated. Because of such problems as social loafing, occurs when participants in a group feel unmotivated and they think their contributions will not be valued. Evaluation apprehension, occurs when individuals withhold their ideas out of concern that others may not approve them. Production blocking, occurs when something prevents a participant from verbalizing their ideas as they occur e.g. forgetting an idea while waiting for a turn to speak. Traditional brainstorming does not increase the productivity of groups, it may still provide benefits, such as boosting morale, enhancing work enjoyment, and improving team work. This system aims at incorporating a modified E-Brainstorming ideation model, © 2013 ACEEE DOI: 01.IJIT.3.4.1263 II. BRAINSTORMING TECHNIQUES- REVIEW Brainstorming is a technique for generating a large number of ideas for creative problem solving. The term brainstorming was first used by [7]. The generation of new ideas, especially high quality creative ideas, is important for a problem. It is a popular method of group interaction in both educational and business sectors. Brainstorming engenders synergy i.e., an idea from one participant can trigger a new idea in another participant. Brainstorming has been recognized as an effective group decision supporting approach. Lin [4] developed brainstorming based multifunctional system which supports collaborating works on creative activity and decision making. Most ideation research either implicitly or explicitly assumes Osborn’s conjecture that if people generate more ideas, then they will produce more good ideas. Osborn reported evidence that people generate more good ideas in the second half of a brainstorming session than during the first half. Some studies have also reported that certain ideation protocols can elevate both idea quantity and idea quality. However, another work reported no relationship between idea quality and idea quantity. That is, previous ideation literatures were inconsistent in the arguments [10]. Briggs and Reining [2] provided a theoretical explanation (Bounded Ideation Theory) to clarify the relationship between idea quantity and idea quality, and they recommended guidance for the development of ideation techniques for improving the quality of ideas. A good idea was defined as one 22
  • 2. Short Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013 that is feasible to implement and would attain the goal. The Bounded Ideation Theory was a causal model of the ideation function (the relationship between the cumulative number of good ideas contributed during an ideation process and the total number of ideas generated). Their causal model identified three essential boundaries of human ideation capability (an understanding boundary, a cognitive boundary and an endurance boundary) that influence the production of good ideas. The understanding boundary indicates that the relationship between the number of good ideas and the total number of ideas becomes a curvilinear function with a positive but decreasing slope once an understanding of the task has been achieved. The cognitive boundary signifies that because of the lack of additional external stimuli to activate a new part of the group memory, people tend to think inside the box, causing subsequent contributions to increasingly become similar to previous contributions, thus yielding fewer new good ideas (that is, the declining ratio of good ideas to the total ideas over time produces an ideation function with a positive but decreasing slope). The endurance boundary signifies that because an individual’s mental and physical abilities diminish with effort over time, ideation abilities will then decline as ideation proceeds (that is if the ideation process were to continue for a sufficiently long time, then participants might lose the ability to generate good ideas which leads to falling ratio of good ideas to the total ideas overtime and yields an ideation function with a positive but decreasing slope). Although current e-brainstorming overcomes the spatial and distance limitation of conventional brainstorming with the technique of electronic communication, all participants must still be present at the brainstorming session at the same time to proceed with the discussion. With these advancements Soe- Tsyr Yuan and Yen-Chuan Chen [10] developed agent based ideation architecture and inference mechanism. To make an intelligent agent capable of generating ideas, the preliminary work investigates three fundamental human’s association capabilities (similarity, contiguity and contrast) during idea generation, implements these capabilities in an agent’s inference mechanism and unfolds the design of SILA, which performs idea associations based on a devised ontology-based representation of ideas. A SILA represents an ideation participant that can learn to understand the task and adopt external stimuli, free from limits in working memory and from attention exhaustion. Considering the aforementioned review of the brainstorming technique, this system aims at incorporating a modified agents based EBrainstorming ideation model with an efficient Oriented Directed Acyclic Graph (ODAG) method used to construct the ideation map for diverse ideas and their relationship and ontology is improved to include privacy preferences Manju.S; Dr.M.Punithavalli (2012). This strategy provides privacy for all different groups. FOAF (Friend of a Friend) vocabulary retrieves the friends of a particular group. Access controller enables access restrictions e.g. read and write. This System works with intelligent agents based environment with privacy © 2013 ACEEE DOI: 01.IJIT.3.4.1263 preferences and mapping is done with different domains areas. The agents are filtered and grouped according to their knowledge domain. III. IDEATION MAP CONSTRUCTION In the existing system, tree like ideation map was constructed in which the SILA’s performed the associations with respect to a given idea and then generated their creative ideas and it was termed as Ideation Round. In the proposed model, an efficient Oriented Directed Acyclic Graph (ODAG) method is integrated to construct the ideation map for diverse ideas and their relationship [1]. A graph can be directed or undirected (no direction). Here an ideation map is constructed to improve both idea quantity and quality. Assume that, the given vertex as problem solving states or creative generated idea and arcs as the process of problem solving steps i.e. G= (V,A) will be represented as collection of vertices and the collection of directed arcs that connects pairs of vertices with no path returning to the same vertex. This is referred as acyclic graph. The ODAG algorithm is based on two sets of data, the first set represents the vertices in a one dimensional array vertex (V) where each item in the array is annotated with the creative idea label (CIL), Round number (Rno), number of parents (Np), creative value (Cv) and Weight (W).The second set represents the arcs in 2-D array (V,V) where each item is annotated with the link 0 or 1 and the relationship is-a or partof. In each round, the creative ideas are generated (parent) and it is allocated for generating creative idea instance in vertex (V), and adjacency (V, V). The vertex with the highest creativity value (CV) in the previous round will be the initial states to the next rounds till the last rounds. Fig. 1 shows the generation of ideation map using ODAG structure i.e. process of all SILA requestor. Each ideation round has an input idea, as the association result. The initial idea is the input idea at round 1 and the creative ideas generated by SILA requestor in round 1(C1, C2, C3) is the input idea at round 2 etc. Hence, the ideation map can progressively be constructed through many ideation rounds. The process of “linking” among distributed knowledge has an extreme importance in creative thinking and problem solving. In this paper ideation map is constructed using acyclic graph structure which elevates maximum quantity and Fig.1. Ideation Map 23
  • 3. Short Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013 preference to share an e-mail address with in friends group. creative quality of ideas from each ideation round. A. Privacy Preference Idea Ontology Privacy Preference Ontology provides privacy preference for user’s data like access control, condition, access space and restriction. Here the Idea Knowledge Base is applied and it enfolds a collection of idea instances of different domains to denote a client’s knowledge. Privacy preference defines some properties to define, (1) which statement or resource is to be restricted. (2) Define conditions in order to create specific privacy preferences [8]. (3) Some properties to define which access privilege should be granted for accessing client’s data base. Using access control read and write authority is included for accessing the knowledge base. For all authenticated user’s read and write access control is included. Condition is applied to resource, class, literals and property. Access space is applied to all queries and restriction is applied to resources and statements. IV. IMPROVED ONTOLOGY WITH PRIVACY PREFERENCES In Agent-based E-Brainstorming, idea ontology was used to map user’s knowledge with idea names and relationships between idea instances. It provided minimum privacy settings such as granting privileges to all people belonging to one social group to access their information. In this paper Privacy Preference Ontology (PPO) [8] is used for participant to create fine-grained creative ideas. PPO is light weight vocabulary on top of the web access control (WAC) Ontology aiming to provide access control privileges for specific data like user’s personal information. Villata; Delaforge; Gandon and Gyrard [9] described lightweight ontology which defines fine-grained access control policies for RDF data [5]. FOAF (Friend of a Friend) vocabulary is reused with agents to share private data with similar groups or friends [6]. E-Brainstorming methods so far have lack of privacy when sharing ideas across different organizations. An analysis of Brainstorming was done to gain more Knowledge about innovative idea generation. By introducing PPO, access control privileges could be introduced to the users for accessing data. WAC (Web Access Control) Vocabulary defines the read and writes access control privileges. Privacy preferences specify a protocol that enables the particular database profiles to share their privacy policies with users. The privacy policies are expressed in xml which can be easily parsed by user agents. The descriptions expressed using this protocol are text based and therefore do not contain any semantics. This approach enables users to define what the privacy preferences are about and hence facilitate other systems to use such preferences. A vocabulary that describes access control privileges is the Web Access Control (WAC) vocabulary. This vocabulary enables owners to create access control lists that specify access privileges to the users that can access the data. The WAC defines the read and write access control privileges for reading (Or) updating data and control privilege to grant access to modify the access control lists. Privacy Preference Ontology is a lightweight vocabulary on top of the web access control ontology aiming to provide users with means to define fine grained privacy preferences for restricting access specific data. Semantic web technologies are used to enable privacy preferences. Open social networks can contain user’s information using common vocabularies such as FOAF to describe the data. Imagine a social group network where users could able to specify which information can be shared only to some contacts or friends i.e. the person’s under social service. This would make user’s feel more confident when publishing such information without being concerned that it could be reused. Such a system will let user’s full control like who can access their personal information and who can access their published data. The data owners can specify a set of attributes which requestors must satisfy in order to be granted access to the requested information. For example a user can set a privacy © 2013 ACEEE DOI: 01.IJIT.3.4.1263 B. Privacy Preferences In social network, Web ID protocol can be used to authenticate a user and it provides a secure connection to a user’s personal information stored in a FOAF profile. In Fig.2 shows idea ontology to grant privileges to user’s belonging to one social group and provide access control restrictions for user’s personal data. Fig. 2 Idea Ontology When a user authenticates using Web ID and to visit another user’s profile, the privacy preferences could be checked to determine which information can be accessed. This vocabulary has ability to restrict access to, a particular statement, to a group of statements and to a resource, either as a subject or an object of a particular statement. Access is restricted according to patterns which users must satisfy, for instance having a particular interest or being a member of a group. The fig.3 (a) illustrates that wherever in the user’s profile there is a statement that contains a property foaf: company Documents then all statements containing this property are restricted. 24
  • 4. Short Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013 Fig.3 (a) example 1 Privacy Preferences The fig.3 (b) illustrates privacy preference to statement with read access control and restricted write control for user’s address details. Thus the privacy preference with access control privileges will be granted and a space to define which attributes a requestor must satisfy in order to access the resources. Fig.4 Neural Network Training Fig.3 (b) example 2 Privacy Preferences V. RESULT & DISCUSSION for diverse ideas and their relationship. Furthermore, ideation map constructed using acyclic graph structure elevates maximum quantity and creative quality of ideas from each ideation round. VI. CONCLUSION & FUTURE WORK The maximum quantity of ideas is increased using Neural This paper aims at incorporating a modified ENetwork based agents in E-Brainstorming. Brainstorming ideation model, which integrates Flexible For.eg. In a sample Indian company’s data set Neural ideation map construction for ideation rounds. In the existing Network is trained to achieve the maximum iterations and system, tree like ideation map was constructed in which the results. In Fig.4 Neural Network is trained with tan-sigmoid SILA(Semantic Ideation Learning Agent) performed the transfer functions in both the hidden layer and output layer. associations with respect to a given idea and then generated For a sample approximately 20 neurons were used in one their creative ideas and it was termed as Ideation Round. In hidden layer. The network has two output neurons, because this work, an efficient Oriented Directed Acyclic Graph of categories associated with input vector. When an input (ODAG) method is used to construct the ideation map for vector of the appropriate category is applied to the network, diverse ideas and their relationship. This also presents the the corresponding neuron should produce 1 and the other effective method of E-Brainstorming with security for the neurons should produce output as 0. users’ data. The Agents are linked with social web ontology A Default scaled conjugate gradient algorithm is used for for ensuring privacy preferences. The new Agent-Based PPO training. The application randomly divides the input vectors Model is derived by integrating FOAF Ontology. The access and target vectors into three sets. 60% for training, 20% for control mechanisms are carried out and a FOAF Ontology is validating the network and remaining 20% is used as reused here to restrict access to the controlled group of users. completely independent test of network generalization. The existing methods do not follow any criteria for secure The Proposed work advances the existing agent based Etransformation of user’s personal information. Brainstorming by increasing the scope of ideation ontologies Future work will incorporate new association techniques, by including privacy preferences. This strategy provides Modified Neural network based agents and implementing privacy for all different groups. FOAF (Friend of a Friend) this model with device based environment e.g. smart phones. retrieves the friends of a particular group and agent with similar domain. Access controller enables access restrictions REFERENCES e.g. read and write. This system also reduces the complexity [1] Ali.I. Eldesoky, Asmaa M.EL.Said, Hesham A.Arafat, A Novel of idea mapping by using Oriented Directed Acyclic Graph 25 © 2013 ACEEE DOI: 01.IJIT.3.4.1263
  • 5. Short Paper ACEEE Int. J. on Information Technology , Vol. 3, No. 4, Dec 2013 [2] [3] [4] [5] Ideation Casual map with a new evaluation for idea quality, IEEE Transactions on Knowledge and DataEngineering. Vol.1 pp 20-32,2009 Briggs R.O and Reining B.A, “Bounded Ideation Theory: A New Model of the Relationship between idea quantity and idea quality during ideation,”Proc. 40th annual hawaai ‘Int.Conf. System sciences. (IIICSS), 2007 Geoffrey.J Rawlinson, “Creative Thinking and Brainstorming”, Halsted Press, 1981. Lin.H.T, “A Multifunctional System for supporting collaborating works and decision making”, J.of Information Technology, 2008. Lorea Lorenzo, Osane Lizarralde, Igor Santos and Alexandre passant, Structuring E-Brainstorming to better support innovation processes, www.aaai.org, Association of Artificial Intelligence,2011 © 2013 ACEEE DOI: 01.IJIT.3.4.1263 [6] Manju.S, Dr.M.Punithavalli, E-Brainstorming technique to minimize production blocking in creative ideas, Proceedings of the National Conference on Emerging Trends in Computing Technology, NCETCT, pp.no:206, 2010 [7] Osborn A.F., “Applied Imagination: Principles and Procedures of Creative Problem-Solving,” Creative Education Foundation, third revised, 1993 [8] Sacco.O and Passant.A ,A Privacy Preference Ontology for linked data, LDOW,2011 [9] Villata S, Delaforge N, Gandon F and Gyrard A, An access control model for linked data, In Proc of the 7th Int. Workshop on Semantic Web & Web Semantics (SWWS), LNCS 7046, PP 454-463, 2011 [10] Yuan & Chen, Semantic Ideation Learning for Agent-based EBrainstorming, IEEE Transactions on Knowledge and Data Engineering Vol.20 No.2, pp:261-274, 2008. 26