Computer-aided technologies (CAx) mean the use of computer technology to aid in the design, analysis and manufacture various products. International Journal of Computer-Aided technologies (IJCAx) is an open access, peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Aided technologies such as CAD, CAM, CAIM,CAR, CARD, CASE etc. The journal focuses on all technical and practical aspects of Computer Aided technologies. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced CAx tools and establishing new collaborations in these areas. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in all Computer Aided technologies
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Â
Top 10 Download Article in Computer Aided Technologies: October 2021
1. Top 10 Download Article
in Computer Aided
Technologies:
October 2021
International Journal of Computer-Aided Technologies
(IJCAx)
ISSN : 2349 - 218X
https://airccse.org/journal/ijcax/index.html
2. TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE
GADGETS IN EDUCATION
Dr. Ajay Surana and Ms. Sushma Rani
Head of the Department (Associate Professor), Department of Education,
Banasthali University, Jaipur, Rajasthan, India
Senior Research Fellow (UGC-SRF), Department of Education,
Banasthali University, Jaipur, Rajasthan, India.
ABSTRACT
Today’s era is an era of modernization and globalization. Everything is happening at a very fast rate
whether it is politics, societal reforms, commercialization, transportation, or educational
innovations. In every few second, technology grows either in the form of arrival of the new
devices/gadgets with millions of apps and these latest technological objects may be in the form of
hardware/software devices. We are the educationists, teachers, students and stakeholders of present
Indian educational system. These gadgets/devices are partly being used by us or most of them are
still unaware of these innovative technologies due to the mass media or economical factor. So, there
is a need to improvise ourselves towards utilizing the future gadgets in order to explore the
educational uses, barriers and preparatory needs of these available devices for educational purposes.
This paper aims to study the opinion of the teacher-educators about the usage of future gadgets in
higher education. It will also contribute towards establishing the list of latest technological devices,
and how it can enhances the process of teaching learning system.
KEYWORDS
Futurology, Future Gadgets, Technological devices, Educational Technology.
For More Details : https://aircconline.com/ijcax/V2N4/2415ijcax01.pdf
Volume Link :https://airccse.org/journal/ijcax/vol2.html
3. REFERENCES
[1] A.G. Almekhlafi., & F.A. Almeqdadi. (2010). Teacher’s Perception of Technology Integration
in United Arab Emirates School Classrooms. Journal of Education Technology & Society, 13(1),
165- 175. Retrieved on August 02, 2014 from http://ifets.info/journals/13_1/16.pdf.
[2] Anisha, Gopalakrishnan. V. (2014). Influence of Multiple Intelligence and Self-Efficacy of the
Secondary Teacher education students on their Teaching Competency. Ph.D. Thesis, Manonmanjam
Sundaranar University. Retrieved August 02, 2014 from http://www. hdl.handle.net/10603/20363.
[3] Jagannath, K. Dange. (2013). Effectiveness of Computer- Assisted Instruction in the
development of Study Habits in relation to the Gender, Locality and Socio-Economic status of
Secondary School Students. International Journal of Education and Psychological Research
(IJEPR), 2(4), 75-86. Retrieved July 30, 2014 from http://www.ijepr.org.
[4] Jessica, CM. Li., & Joseph, Wu. (2013). Active learning for discovery and innovation in
criminology with Chineselearners. Journal of Innovations in Education and Teaching
international.Taylor and Francis Group. doi: 10.1080/14703297.2013.796720.
[5] K. Sibichan. K., & Annaraja, P. (2010). Teacher Trainee’s Computer Competency enhances their
technology use in Classroom Teaching. EDUTRACKS, 10(4), December 2010, New Delhi:
Neelkamal Publications, (pp. 33-37).
[6] Kavitha, M., & Arumugam, J. (2011). Scientiometric Analysis of Indian contribution to
Mathematical Research. Journal of Library & Information Communication Technology. 2011, 3(1-
2), 61-70.
[7] M. Muthumanickam., A. Ravichandran., & N. Elangovan. (2010). Quality Concerns in Teacher
Education: Use of ICT in Higher Education and Lecturer’s Competencies 285-292. New Delhi:
A.P.H. Publishing Corporation.
[8] Madhulika, S. Patel., &, Meenakshi, Khar. (2010). Addressing Teachers on the issues of new
textbooks in English language - An experience through Video Conference. Journal of Indian
Education (NCERT), 35(4), February, 2010. 94-105. Retrieved July 30, 2014 from
www.ncert.nic.in/publication/journals/pdf_files/jie/jie_feb_2010.pdf.
[9] Mark, Pegrum., Christine, Howitt., & Michelle, Stripe.(2013). Learning to take the Tablet : How
PreService teachers use iPads to facilitate their Learning. Australasian Journal of Educational
Technology, 29(4). 2013, 464-479. Retrieved August 09, 2014 from
http://www.ascilite.org.au/ajet/submission/index.php/AJET/article/download/.../604.
[10] Marina, Kandroudi., & Tharrenos, Bratitsis.(2014). Exploring the Educational Perspectives of
XBOX Kinect Based Video Games. (pp.219-227). Paper presented at Sixth Eureopean Conference
on Games-Based learning, University college Cork and Waterford institute of
Technology,Ireland.Retrieved July 23, 2014 from http://www.kinecteducation.com.
4. [11] R. Sourecha., & A. Selvan. (2013). Efficacy of Smart Board in Teaching Disaster Management
at High School Level. EDUTRACKS, 13(2), October 2013, (pp. 38-40).
[12] Saima, Rasul., Qadir, Bukhsh., & Muzamilla, Akram. (2010). Opinion of Teachers and Students
about Futurology of Higher Education in Pakistan. International Journal for Cross-Disciplinary
Subjects in Education (IJCDSE) 1(4). 255-259. Retrieved March 15, 2014 from
http://www.infonomic-society.org.
[13] W. Kotrlik, Joe ., & H. Redmann, Donna. (2009). Technology Adoption for Use in Instruction
by Secondary Technology Education Teachers. Journal of Technology Education, 21(1), 2009. 44-
59. Louisiana State University, Baton Rouge. (ERIC Document Reproduction Service No.
EJ914276). Retrieved August 01, 2014 from ERIC database.
[14] Xiangyu, W., E.D. Love, Peter., Robert, K., Jeong, Kim, Mi. & Rex, Davis. Peter. (2012).
Integration of E-Learning 2.0 with WEB 2.0. Journal of Information Technology in Construction.(IT
CON). 17, 387-396. Retrieved July 25, 2014, from http://www.itcon.org/2012/26.
5. RESEARCH ISSUES IN WEB MINING
Dr.S. Vijiyarani1
and Ms. E. Suganya2
1
Assistant professor, Department of Computer science, School of Computer Science and
Engineering, Bharathiar University, Coimbatore
2
M.Phil Research Scholar, Department of Computer science, School of Computer
science and Engineering, Bharathiar University, Coimbatore
ABSTRACT
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data mining
techniques are used for extracting information from the web servers. The web data includes web pages, web
links, objects on the web and web logs. Web mining is used to understand the customer behaviour, evaluate
a particular website based on the information which is stored in web log files. Web mining is evaluated by
using data mining techniques, namely classification, clustering, and association rules. It has some beneficial
areas or applications such as Electronic commerce, E-learning, Egovernment, E policies, E-democracy,
Electronic business, security, crime investigation and digital library. Retrieving the required web page from
the web efficiently and effectively becomes a challenging task because web is made up of unstructured data,
which delivers the large amount of information and increase the complexity of dealing information from
different web service providers. The collection of information becomes very hard to find, extract, filter or
evaluate the relevant information for the users. In this paper, we have studied the basic concepts of web
mining, classification, processes and issues. In addition to this, this paper also analyzed the web mining
research challenges.
KEYWORDS
Web Mining, Classification, Application, Tools, Algorithms, Research Issues.
For More Details : https://airccse.org/journal/ijcax/papers/2315ijcax05.pdf
Volume Link : https://airccse.org/journal/ijcax/vol2.html
6. REFERENCES
[1] Joy Shalom Sona, Prof. Asha Ambhaikar” A Reconciling Website System to Enhance Efficiency with
Web Mining Techniques” International Journal Of Scientific & Engineering Research Volume 3, Issue 2,
February-2012 1 ISSN 2229-5518
[2] Aparna Ranade, Abhijit R. Joshi, Ph. D,” Techniques for Understanding User Usage Behavior on the
Internet” International Journal of Computer Applications (0975 – 8887) Volume 92 – No.7, April 2014
[3] Karan Bhalla & Deepak Prasad,” Data Preparation and Pattern Discovery For Web Usage Mining”
[4] Amit Pratap Singh1, Dr. R. C. Jain 2,” A Survey on Different Phases of Web Usage Mining for Anomaly
User Behavior Investigation” International Journal of Emerging Trends & Technology in Computer Science
(IJETTCS)Volume 3, Issue 3, May – June 2014 ISSN 2278-6856
[5] R. Lokeshkumar1, R. Sindhuja2, Dr. P. Sengottuvelan, “A Survey on Pre-processing of Web Log File in
Web Usage Mining to Improve the Quality of Data” International Journal of Emerging Technology and
Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 8, August 2014
[6] Mitali Srivastava, Rakhi Garg, P. K. Mishra,” Preprocessing Techniques in Web Usage Mining: A
Survey” International Journal of Computer Applications (0975 – 8887) Volume 97– No.18, July 2014
[7] http://www.slideshare.net/akhanna3/discovering-knowledge-using-web-structure-mining-27488978
[8] Ashish Kumar Garg, Mohammad Amir, Jarrar Ahmed, Man Singh, Sham Bansa,” Implementation of a
Search Engine” International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[9] C.Gomathi, M. Moorthi,” Web Access Pattern Algorithms in Education Domain” Computer and
information science journal vol. 1, No.4, November 2008
[10] Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik, “Research Challenges in
Web Data Mining”, International Journal of Computer Science and Telecommunications Volume 3, Issue 7,
July 2012
[11] Jaideep Srivastava, “Web Mining: Accomplishments & Future Directions”, University of Minnesota
USA, srivasta@cs.umn.edu, http://www.cs.umn.edu/faculty/srivasta.html
[12] http://www.slideshare.net/AmirFahmideh/web-mining-structure-mining
[13] http://www.slideshare.net/Tommy96/web-mining-tutorial
[14] http://www.faadooengineers.com/threads/2177-PPT-Link-Mining
[15] Deepti Kapila, Prof. Charanjit Singh, “Survey on Page Ranking Algorithms for Digital Libraries”,
International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue
6, June 2014 ISSN: 2277 128X
7. [16] Alberto Sillitti, Marco Scotto, Giancarlo Succi, Tullio Vernazza,” News Miner: a Tool for Information
Retrieval”
[17] Sandhya, Mala chaturvedi, “a survey on web mining algorithms”, The International Journal Of
Engineering And Science (IIJES) Volume 2 Issue 3
[18] Ananthi.J,” A Survey Web Content Mining Methods and Applications for Information Extraction from
Online Shopping Sites”, International Journal of Computer Science and Information Technologies, Vol. 5
(3), 2014
[19] S.Balan, “A Study of Various Techniques of Web Content Mining Research Issues and Tools”,
International journal of innovative research and studies ISSN 2319-9725
[20] D.Jayalatchumy, Dr. P.Thambidurai, “Web Mining Research Issues and Future Directions – A Survey”,
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278- 8727Volume 14,
Issue 3
[21] Naga Lakshmi, Raja Sekhara Rao , Sai Satyanarayana Reddy, “An Overview of Preprocessing on Web
Log Data for Web Usage Analysis”, International Journal of Innovative Technology and Exploring
Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4
[21] Mamta M. Hegde, Prof. M.V.Phatak, “Developing an approach for hyperlink analysis with noise
reduction using Web Structure Mining”, International Journal of Advanced Research in Computer
Engineering & Technology Volume 1, Issue 3, May2012
[23] Mr. Dushyant B.Rathod, Dr.Samrat Khanna, “A Review on Emerging Trends of Web Mining and its
Applications” ISSN: 2321-9939
8. INTEGRATED INERTER DESIGN AND APPLICATION TO OPTIMAL
VEHICLE SUSPENSION SYSTEM
Thanh-Tung Tran1
, Chiaki Hori1
and Hiroshi Hasegawa2
1Graduate of Systems Engineering and Science, Shibaura Institute of Technology, Japan
2College of Systems Engineering and Science, Shibaura Institute of Technology, Japan
ABSTRACT
The formula cars need high tire grip on racing challenge by reducing rolling displacement at corner or double
change lands. In this case study, the paper clarifies some issues related to suspension system with inerter to
reduce displacement and rolling angle under impact from road disturbance on Formula SAE Car. We propose
some new designs, which have an advance for suspension system by improving dynamics. We optimize
design of model based on the minimization of cost functions for roll dynamics, by reducing the displacement
transfer and the energy consumed by the inerter. Base on a passive suspension model that we carried out
quarter-car and half-car model for different parameters which show the benefit of the inerter. The important
advantage of the proposed solution is its integration a new mechanism, the inerter, this system can increase
advance in development and have effects on the vehicle dynamics in stability vehicle.
KEYWORDS
Inerter, Suspension System, Optimal, Formula SAE, Rolling.
For More Details :https://airccse.org/journal/ijcax/papers/1314ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol1.html
REFERENCES
9. [1] Bosch, 2011. The book, Automotive Handbook, SAE International.
[2] Marcello Chiaberge, 2011. The book, New Trends and Developments in Automotive System Engineering,
First published.
[3] Bohdan T. Kulakowski, John F. Gardner, J. Lowen Shearer, 2007. Cambridge University Press 2007,
Dynamic Modeling and Control of Engineering Systems, Third edition.
[4] Malcolm C. Smith, 2003. Plenary Lecture, The Inerter Concept and Its Application, Department of
Engineering, University of Cambridge, U.K.
[5] Michael Z.Q. Chen, Christos Papageorgiou, Frank Scheibe, Fu-Cheng Wang, and Malcolm C. Smith,
2009. IEEE Circuits and Systems Magazine, The Missing Mechanical Circuit Element.
[6] Malcolm C. Smith, 2002. IEEE Transactions on Automatic Control, Vol.47, No.10, Synthesis of
Mechanical Networks: The Inerter.
[7] Takanori Uemura, 2009. Master Thesis in Shibaura Institute of Technology, Proposed suspension system
that aims to achieve both ride comfort and maneuverability.
[8] Jyuro Izumi, ESPEC Technology Report No. 6, Combined environmental testing for equipment used on
automobiles - Overview and test approach.
10. DESIGN OF GENERATIVE MODEL FOR THE
LANGUAGE OF TRADITIONAL SUAKIN USING
PARAMETRIC SHAPE GRAMMAR
Olakanbi Bolaji AbdulRaheem1
and Osama Abdulwahab Rayis1
Design and Innovation Center, Africa City of Technology, Khartoum, Sudan
ABSTRACT
This paper aims at presenting a parametric shape grammar of traditional Suakin houses (Red Sea state,
Sudan). This work systematically attempts to generate appropriate plans arrangement that allows required
functional relationships between spaces to be satisfied. The topological and geometrical properties of old
Suakin houses were analyzed. These properties were originated and incorporated into the traditional
Suakin buildings for the past ten centuries. The shape rules, dimensional, geometric and topological
patterns of houses in the corpus are used as the generative model for the language of traditional suakin
style This paper concludes with a discussion of the creative and generative value of the parametric shape
grammars. Moreover, it facilitates the understanding of the formal composition of Suakin old style and
the revival of a contemporary Suakin building style.
KEYWORDS
Generative model, Parametric shape grammar, Suakin.
For More Details : https://aircconline.com/ijcax/V3N3/3316ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol3.html
11. REFERENCES
[1] Stiny, G., Pictorial and formal aspects of shape and shape grammars. Vol. 13. 1975:
Springer.
[2] Stiny, G., Kindergarten grammars: designing with Froebel's building gifts. Environment
and Planning B, 1980. 7(4): p. 409-462.
[3] Stiny, G., The algebras of design. Research in Engineering Design, 1991. 2(3): p. 171-
181.
[4] Stiny, G. and W.J. Mitchell, The palladian grammar. Environment and Planning B,
1978. 5(1): p. 5-18.
[5] Flemming, U., The secret of the Casa Giuliani Frigerio. Environment and Planning B,
1981. 8(1).
[6] Koning, H. and J. Eizenberg, The language of the prairie: Frank Lloyd Wright's prairie
houses. Environment and Planning B, 1981. 8(3): p. 295-323.
[7] Laham, W.I., Lebanese House Shape Grammar. 1987.
[8] Hanson, N.L.R. and A.D. Radford, Living on the edge: a grammar for some country
houses by Glenn Murcutt. Architecture Australia, 1986. 75(5): p. 66-73.
[9] Buelinckx, H., Wren's language of City church designs: a formal generative
classification. Environment and Planning B, 1993. 20: p. 645-645.
[10] Knight, T. Applications in architectural design, and education and practice. in
NSF/MIT Workshop on Shape Computation. 1999.
[11] Downing, F. and U. Flemming, The bungalows of buffalo. 1981: Department of
Architecture, Carnegie-Mellon University.
[12] Flemming, U., More than the sum of parts: the grammar of Queen Anne houses.
Environment and Planning B: Planning and Design, 1987. 14(3): p. 323-350.
[13] Chiou, S.C. and R. Krishnamurti, Example Taiwanese traditional houses. Environment
and Planning B, 1996. 23: p. 191-216.
[14] Chiou, S.C. and R. Krishnamurti, The grammatical basis of Chinese traditional
architecture. Language of Design, 1995. 3: p. 5-31.
[15] Aksoy, M., G. Saglamer, and I. Turkey, A SHAPE-GRAMMAR FOR COURTYARD
HOUSES. Advanced Technologies: Architecture, Planning, Civil Engineering, 1993:
p. 251.
[16] Li, A.I., kang. 2001. A shape grammar for teaching the architectural style of the
Yingzao fashi, Ph. D. dissertation, Department of Architecture, Massachusetts Institute
of Technology, Cambridge, Mass.
12. [17] Li, A.I., A shape grammar for teaching the architectural style of the Yingzao fashi.
2001,Massachusetts Institute of Technology.
[18] Mayall, K. and G.B. Hall, Landscape grammar 1: spatial grammar theory and
landscape planning. Environment and Planning B, 2005. 32(6): p. 895.
[19] Duarte, J., J. Rocha, and G. Ducla-Soares, A patio-house shape grammar for the
Medina of Marrakech. publications in Proceedings of ECAADE, 2006. 6.
[20] Duarte, J.P., Customizing mass housing: a discursive grammar for Siza's Malagueira
houses. 2001, Massachusetts Institute of Technology.
[21] Eilouti, B.H. and A.M.I. Al-Jokhadar, A computer-aided rule-based mamluk madrasa
plan generator, in Nexus Network Journal. 2007, Springer. p. 31-57.
[22] Said, S. and M.R. Embi, A Parametric Shape Grammar of the Traditional Malay Long-
Roof Type Houses. International Journal of Architectural Computing, 2008. 6(2): p.
121-144.
[23] George, S., Shape: Talking about Seeing and Doing. 2006, MA: MIT Press,
Cambridge,MA.
[24] Wittgenstein, L., Remarks on the Foundation of Mathematics. MIT Press,
Cambridge,Massachusetts, 1991.
[25] Stiny, G. and J. Gips, Shape grammars and the generative specification of painting and
sculpture. Information processing, 1972. 71(1460-1465).
[26] Qezar Musa AlZein, T.M.N., et al., eds. Suakin: Studies in history, civilization and
international interactions Khartoum corporation for Press and Publication. Vol. 1.
2013.
[27] Dirar, M.S., History Of Suakin and the Red Sea (in Arabic). Vol. 1. 1981, Khartoum:
AI Dar AI Sudania. 277.
[28] Salim, A.R., Suakin: On Reviving an Ancient Red Sea Port City. Traditional Dwellings
and Settlements Review, 1997: p. 63-74.
[29] MALLINSON, A.a.E., SUAKIN PATTERN BOOK: A DESIGN AND
CONSTRUCTION CODE FOR SUAKIN ISLAND. The SUAKIN PATTERN
BOOK. Vol. 1. 2007: MALLINSON A&E, 16 ELVASTON PLACE LONDON, SW7
[30] Salim, A., secrets of Suakin. Vol. 1. 2015, Omdroum, Sudan: Abdel-karim Mirghani
cultural centre. 323.
[31] C aD daE, G.C., A shape grammar: the language of traditional Turkish houses.
Environment and Planing B: Planning and Design, 1996. 23(5): p. 443-464.
13. [32] Colakoglu, B., Design by grammar: an interpretation and generation of vernacular
hayat houses in contemporary context. Environment and Planning B: Planning and
Design, 2005. 32(1): p. 141-149.
[33] Duarte, J.P., A discursive grammar for customizing mass housing: the case of Siza's
houses at Malagueira. Automation in Construction, 2005. 14(2): p. 265-275.
[34] HOSNY, S.S., SHAPE GRAMMARS: STYLE GENERATORS IN COMPUTER-
AIDED ARCHITECTURAL DESIGN future university, department of architecture,
Egypt, 2012.
[35] Knight, T.W., Languages of designs: from known to new. Environment and Planning
B, 1981. 8(2): p. 213-238.
[36] Mitchell, W.J., A computational view of design creativity. Modeling creativity and
knowledge-based creative design, 1993: p. 25-42.
14. ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
Ganaraj K
PG Scholar, Computer Science Department,
Bearys Institute of technology and Engineering
Mangalore, Karnataka, India
ABSTRACT
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting
application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed
evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure
of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
KEYWORDS
Electronic voting, e-mail Network.
For More Details : https://aircconline.com/ijcax/V4N2/4217ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol4.html
15. REFERENCES
[1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based
System, IJARCSSE,vol.3,Issue 11,2013
[2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34.
[3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”,
Christos Bouras, Nikolaos Katris, Vassilis Triantafillou.
[4] “E-voting on Android System” paper (International Journal of Emerging Technology and
Advanced Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors-
Prof. N. J. Kulkarni, Prof. S. S. Mujgond, February 2012.
[5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie
Faith Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001. [6] “Voting – What
is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report, July 2001. [7] Java
Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402-
9
16. DATA MINING APPLICATION IN ADVERTISEMENT
MANAGEMENT OF HIGHER EDUCATIONAL INSTITUTES
Priyanka Saini
M.Tech(CS) Student, Banasthali University Rajasthan
Sweta Rai
M.Tech(CS) Student, Banasthali University Tonk,Rajasthan
Ajit Kuamr Jain
Assistant Professor, Computer Science Department Banasthali University
Tonk,Rajasthan
ABSTRACT
In recent years, Indian higher educational institute’s competition grows rapidly for attracting students to
get enrollment in their institutes. To attract students educational institutes select a best advertisement
method. There are different advertisements available in the market but a selection of them is very difficult
for institutes. This paper is helpful for institutes to select a best advertisement medium using some data
mining methods.
KEYWORDS
Data Mining, KDD, Data Mining in Education, Association Rule Mining, Apriori Algorithm .
For More Details : https://airccse.org/journal/ijcax/papers/1114ijcax05.pdf
Volume Link : https://airccse.org/journal/ijcax/vol1.html
17. REFERENCES
[1] Han, J., Kamber, M.: Data Mining: Concepts and Techniques,Morgan Kaufmann Publishers
USA,(2000).
[2] A.Y.K. Chan, K.O. Chow, and K.S. Cheung“,Online Course Refinement through Association
Rule Mining”Journal of Educational Technology Systems Volume 36, Number 4 / 2007-2008,
pp 433 – 44, 2008.
[3] Romero, C., and Ventura S.(2013), “ Data Mining in Education”. WIREs Data Mining and
Know.Dis.,Vol.3,pp.12-27.
[4] Heikki,Mannila, .Data mining: machine learning, statistics, and databases., IEEE, 1996.
[5] Klosgen, W. & Zytkow,J. (2002), Handbook of data mining and knowledge discovery ,
Oxford University Press, New York.
[6] International Educational Data Mining Society www.educationaldatamining.org.
[7] C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005”.Expert
Systems with Applications 33 (2007) 135-146.
[8] S.Pal., “Mining Educational Data to Reduce Dropout Rates of Engineering Students”, I.J.
Information Engineering and Electronic Business (IJIEEB), Vol. 4, No. 2, 2012, pp. 1-7.
[9] C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005”, expert
system with applications 33 (2007) 135-146.
[10] S. K. Yadav, B.K. Bharadwaj and S. Pal, “Data Mining Applications: A comparative study
for Predicting Student’s Performance”, International Journal of Innovative Technology and
CreativeEngineering (IJITCE), Vol. 1, No. 12, pp. 13-19, 2011.
[11] U. K. Pandey and S. Pal, “A Data Mining view on Class Room Teaching Language”, IJCSI,
Vol 8 issue 2 Maerch 2011 pg 277-282, ISSN 1694-0814.
[12] B.K. Bharadwaj and S. Pal. “Mining Educational Data to Analyze Students’ Performance”,
International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6,
pp. 63-69, 2011.
[13] Q. A. AI-Radaideh, E. W. AI-Shawakfa, and M. I.AI-Najjar,“Mining student data using
decision trees”,International Arab Conference on Information Technology (ACIT’2006),
Yarmouk University, Jordan, 2006.
[14]K.Shanmuga Priya and A.V.Senthil Kumar,” Improving the Student’s Performance Using
Educational Data Mining”, Int. J. Advanced Networking and Applications Volume: 04 Issue: 04
Pages:1680-1685 (2013) ISSN : 0975-0290.
18. [15] Bhise R.B, Thorat S.S, Supekar A.K, “Importance of Data Mining in Higher Education
System”, IOSR(Journal Of Humanities And Social Science),Volume 6, Issue 6 ,PP 18-21, (Jan.
- Feb.2013).
[16] Abeer Badr El Din Ahmed and Ibrahim Sayed Elaraby, “Data Mining: A prediction for
Student's Performance Using Classification Method”, World Journal of Computer Application
and Technology 2(2): 43-47, 2014.
19. NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
Hossein Sahlani
Department of Information, Amin University, Tehran, Iran
ABSTRACT
Semantic annotation of images is an important research topic on both image understanding database or
web image search. Image annotation is a technique to choosing appropriate labels for images with
extracting effective and hidden feature in pictures. In the feature extraction step of proposed method, we
present a model, which combined effective features of visual topics (global features over an image) and
regional contexts (relationship between the regions in Image and each other regions images) toautomatic
image annotation.In the annotation step of proposed method, we create a new ontology (base on WordNet
ontology) for the semantic relationships between tags in the classification and improving semantic gap
exist in the automatic image annotation.Experiments result on the 5k Corel dataset show the proposed
method of image annotation in addition to reducing the complexity of the classification, increased
accuracy compared to the another methods.
KEYWORDS
Automatic Image Annotation, Ontology, Statistical Models, Regional Contexts, Visual Topics.
For More Details : https://aircconline.com/ijcax/V3N4/3416ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol3.html
20. REFERENCES
[1] Einarsson S. H, (2004), "Data structures for intermediate search results in the Eff2 image
retrieval system," ReykjavĂk University, technical report.
[2] A. Tousch, S. Herbin, J. Audlibert, (2012) “Semantic Hierarchies for Image Annotation: A
Survey,” Elsevier Ltd., Pattern Recognition, vl.40, pp. 333-345.
[3] Long F, Zhang H and Dagan Feng D, (2003), "Fundamentals of content-based image retrieval,
in Multimedia Information Retrieval and Management Technological Fundamentals and
Applications," Springer-Verlag, pp. 1-26.
[4] D. Zhang, Md.M. Islam, G. Lu, (2011) “A review on automatic image annotation techniques,”
Elsevier Ltd., Pattern Recognition, vol. 45.
[5] Li X, Chen S, Shyu M and Furht B, (2002), "An Effective Content-Based Visual Image
Retrieval System," in 26th IEEE Computer Society International Computer Software and
Applications Conference (COMPSAC), Oxford, pp. 914- 919.
[6] Rui Y., Huang Th. S. and Chang Sh., (1999), "Image Retrieval: Current Techniques,
Promising Directions, and Open Issues," Journal of Visual Communication and Image
Representation, vol. 10, pp. 39–62.
[8] S. J. Hwang, K. Grauman, and F. Sha. (2014), Semantic kernel forests from multiple
taxonomies. Neural Information Processing Systems.
[9] S. J. Hwang, K. Grauman, and F. Sha. (2014),“Analogy-preserving semantic embedding for
visual object categorization”. International Conference on Machine Learning, pages 639–647.
[10] Mohammad Mehdi Farhangi, Mohsen Soryani, Mahmood Fathy, (2012): Improvement the
Bag of Words Image Representation Using Spatial Information. ACITY (2): 681-690.
[11] Guang-Hai Liu, Lei Zhang, Ying-Kun Hou, Zuo-Yong Li, Jing-Yu Yang, (2010) “Image
retrieval based on multi-texton histogram”, Pattern Recognition Journals of science direct,
Volume 43, Issue 7, July, Pages 2380–2389.
[12] HengameDeljooi, Ahmad R. Eskandari, (2014) “A Novel Semantic Statistical Model for
Automatic Image Annotation Using the Relationship between the Regions Based on Multi-
Criteria Decision Making”, International Journal of Electrical and Computer Engineering
(IJECE), Vol. 4, No. 1, Feburary, pp. 37~51.
[13] HengameDeljooi, SomayyeJafaraliJassbi,(2015) “A Multi Criteria Decision Making Based
Approach for Semantic Image Annotation”, International Journal of Computer-Aided
Technologies (IJCAx) Vol.2, No.1.
21. DECISION TREE ALGORITHM IMPLEMENTATIONUSING EDUCATIONAL DATA
Priyanka Saini1
,Sweta Rai2
and Ajit Kumar Jain3
1,2
M.Tech Student, Banasthali University, Tonk, Rajasthan
3
Assistant Professor , Department of Computer Science, Banasthali University
ABSTRACT
There is different decision tree based algorithms in data mining tools. These algorithms are used for
classification of data objects and used for decision making purpose. This study determines the decision
tree based ID3 algorithm and its implementation with student data example.
KEYWORDS
Decision tree, ID3 algorithm, Entropy and Information Gain.
For More Details : https://airccse.org/journal/ijcax/papers/1114ijcax04.pdf
Volume Link :https://airccse.org/journal/ijcax/vol1.html
22. REFERENCES
[1] Quinlan, J.R. 1986, Induction of Decision trees, Machine Learning.
[2] Anand Bahety,’ Extension and Evaluation of ID3 – Decision Tree Algorithm’. University of Maryland,
College Park.
[3] Mary Slocum,‟,Decision making using ID3,RIVIER ACADEMIC JOURNAL, VOLUME 8,
NUMBER 2, FALL 2012.
[4] Kumar Ashok, Taneja H C, Chitkara Ashok K and Kumar Vikas,’ Classification of Census Using
Information Theoretic Measure Based ID3 Algorithm’ . Int. Journal of Math. Analysis, Vol. 6,
2012, no. 51, 2511 – 2518.
[5] Sonika Tiwari and Prof. Roopali Soni,’ Horizontal partitioning ID3 algorithm A new approach of
detecting network anomalies using decision tree’, International Journal of Engineering Research &
Technology (IJERT)Vol. 1 Issue 7, eptember – 2012.
23. COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS
IN MOBILE AD HOC NETWORKS
Mohamed Elboukhari1
, Mostafa Azizi1 and Abdelmalek Azizi2,3
1
Department of Applied Engineering, ESTO, Oujda, Morocco
2
Departement Mathematics & Computer Science, FSO, Oujda, Morocco
3
Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without
any pre-determined infrastructure and fixed organization of available links. Each node in MANET
operates as a router, forwarding information packets for other mobile nodes. There are many routing
protocols that possess different performance levels in different scenarios. The main task is to evaluate the
existing routing protocols and finding by comparing them the best one. In this article we compare AODV,
DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the
best operational conditions for each MANETs protocol. We study these five MANETs routing protocols
by different simulations in NS-2 simulator. We describe that pause time parameter affect their
performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-
End Delay, Normalized Routing Load and Average Throughput.
KEYWORDS
Mobile Ad Hoc Network (MANET), Performance Parameters, AODV, DSR, DSDV, OLSR, DYMO.
For More Details : https://airccse.org/journal/ijcax/papers/2215ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol2.html
24. REFERENCES
[1] Rahman A, Islam S, Talevski A. 2009. Performance measurement of various routing
protocols in ad-hoc network”. In: Proceedings of the international multiconference of engineers
and computer scientists, vol. 1. Hong Kong: IMECS.
[2] Tyagi SS, Chauhan RK. 2010. Performance analysis of proactive and reactive routing
protocols for ad hoc networks. Int J Comput Appl 2010;1(14).
[3] Basagni S, Conti M, Giordano S, Stojmenovic I. 2004. Mobile ad hoc networking. A John
wiley and sons, Inc., Publication.
[4] AkshaiAggarwal,SavitaGandhi,NirbhayChaubey. 2011. Performance Analysis of AODV,
DSDV and DSR in MANETs. IJDPS, Vol.2, No.6.
[5] P. Manickam T. Guru Baskar , M.Girija, Dr.D.Manimegala. 2011. Performance Comparisons
of Routing Protocols in Mobile Ad- Hoc Networks. International Journal of Wireless & Mobile
Networks (IJWMN), pp. 98-106.
[6] Sabina Barakovic, Suad Kasapovic, and Jasmina Barakovic. 2010. Comparison of MANET
Routing Protocols in Different Traffic and Mobility Models”, Telfor Journal, Vol. 2, No. 1.
[7] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare. 2008. Simulation Based Comparative
Performance Analysis of Adhoc Routing Protocols. Proceedings of TENCON 2008.
[8] Chenna Reddy, P.; ChandraSekhar Reddy, P. 2006. Performance Analysis of Adhoc Network
Routing Protocols. ISAUHC '06, International Symposium on Ad Hoc andUbiquitous
Computing, vol., no., pp.186-187, 20-23 Dec.
[9] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar. 2011. Comparative Study of Adhoc
Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork. Indian Journal of
Computer Science and Engineering Vol. 1 No. 4 364-371.
[10] Ginni Tonk, Indu Kashyap, S.S. Tyagi. 2012. Performance Comparison of Ad-Hoc Network
Routing Protocols using NS-2. International Journal of Innovative Technology and Exploring
Engineering (IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1.
[11] Li Layuan, Li Chunlin, Yaun Peiyan. 2007. Performance evaluation and simulation of
routing protocols in ad hocnetworks. Computer Communications 30 (2007) 1890- 1898.
[12] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni.2011. QoS Parameter Analysis
on AODV and DSDV Protocols in a Wireless Network. International Journal of Communication
Network and Security, Volume-1, Issue-1.
25. [13] Deepak Kumar, Ashutosh Srivastava, S C Gupta. 2012. Performance Comparison of DSDV
and AODV Routing Protocols in MANETS. International Journal of Electronics Communication
and Computer Technology (IJECCT) Volume 2 Issue 3.
[14] Jun-Zhao Sun.2001. Mobile Ad Hoc Networking: An Essential Technology for Pervasive
Computing. Proceedings of International conference on info-tech and info-net, Vol-3, pp. 316-
321.
[15] C.E. Perkins and E.M. Royer.1999. Ad-hoc On-Demand Distance Vector Routing”,
Proceeding of 2nd IEEE Workshop. Mobile Computing System Applications, pp:90-100.
[16] Perkins, E. Belding-Royer, and S. Das. 2003. Ad hoc On-Demand Distance Vector (AODV)
Routing. “draft-ietf-manet-aodv-13.txt.
[17] S. A. Ade1& P.A.Tijare. 2010. Performance Comparison of AODV, DSDV, OLSR and
DSR Routing Protocols in Mobile Ad Hoc Networks. International Journal of Information
Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548.
[18] J. Broch, D. Jhonson, and D. Maltz.2007. The dynamic source routing protocol for mobile
adhoc networks for IPv4” IETF RFC 4728.
[19] I. Chakeres and C. Perkins.2012. Dynamic MANET On-Demand (DYMO) Routing. IETF
Internet-Draft, draft-ietf-manet-dymo-23.
[20] Charles E. Perkins and Pravin Bhagwat. 1994. Highly dynamic destination-sequenced
distancevector routing (DSDV) for mobile computers. Technical report, IBM Research and
University of Maryland, USA.
[21] T. Clausen and P. Jacquet.2003. Optimized link State Routing protocol (OLSR). RFC-3626,
IETF Networking Group.
[22] Aleksandr Huhtonen.2004. Comparing AODV and OLSR routing protocols. Helsinki
University of Technology, Telecommunication software and multimedia laboratory.
[23] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas . 2009 .MANET
Routing Protocols vs. Mobility Models: Performance Analysis and Comparison. Proceedings of
the 9th
WSEAS International Conference on Applied Informatics and Communications (AIC
'09).
[24] BonnMotion: A mobility scenario generation and analysis tool. 2014. Available at
http://sys.cs.uos.de/bonnmotion/
[25] NS -2, the ns Manual. 2014. Available at http: //www. isi.edu/nsnam/ns/doc.
[26] Francisco J. Ros. 2014. Software development available at
http://masimum.inf.um.es/fjrm/development/
26. [27] Robins A.D. 2010. “GAWK: an effective AWK programming”, 3rd ed.
[28] MATLAB: The language of Technical Computing. 2014.Available at
http://www.mathworks.com/
[29] S.Corson and J.Macker. 1999. Routing Protocol Performance Issues and Evaluation
considerations. RFC2501, IETF Network Working Group.
[30] The NS-3 reference manual. 2014. Available at http://www.nsnam.org/