SlideShare a Scribd company logo
1 of 26
Download to read offline
Top 10 Download Article
in Computer Aided
Technologies:
October 2021
International Journal of Computer-Aided Technologies
(IJCAx)
ISSN : 2349 - 218X
https://airccse.org/journal/ijcax/index.html
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE
GADGETS IN EDUCATION
Dr. Ajay Surana and Ms. Sushma Rani
Head of the Department (Associate Professor), Department of Education,
Banasthali University, Jaipur, Rajasthan, India
Senior Research Fellow (UGC-SRF), Department of Education,
Banasthali University, Jaipur, Rajasthan, India.
ABSTRACT
Today’s era is an era of modernization and globalization. Everything is happening at a very fast rate
whether it is politics, societal reforms, commercialization, transportation, or educational
innovations. In every few second, technology grows either in the form of arrival of the new
devices/gadgets with millions of apps and these latest technological objects may be in the form of
hardware/software devices. We are the educationists, teachers, students and stakeholders of present
Indian educational system. These gadgets/devices are partly being used by us or most of them are
still unaware of these innovative technologies due to the mass media or economical factor. So, there
is a need to improvise ourselves towards utilizing the future gadgets in order to explore the
educational uses, barriers and preparatory needs of these available devices for educational purposes.
This paper aims to study the opinion of the teacher-educators about the usage of future gadgets in
higher education. It will also contribute towards establishing the list of latest technological devices,
and how it can enhances the process of teaching learning system.
KEYWORDS
Futurology, Future Gadgets, Technological devices, Educational Technology.
For More Details : https://aircconline.com/ijcax/V2N4/2415ijcax01.pdf
Volume Link :https://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1] A.G. Almekhlafi., & F.A. Almeqdadi. (2010). Teacher’s Perception of Technology Integration
in United Arab Emirates School Classrooms. Journal of Education Technology & Society, 13(1),
165- 175. Retrieved on August 02, 2014 from http://ifets.info/journals/13_1/16.pdf.
[2] Anisha, Gopalakrishnan. V. (2014). Influence of Multiple Intelligence and Self-Efficacy of the
Secondary Teacher education students on their Teaching Competency. Ph.D. Thesis, Manonmanjam
Sundaranar University. Retrieved August 02, 2014 from http://www. hdl.handle.net/10603/20363.
[3] Jagannath, K. Dange. (2013). Effectiveness of Computer- Assisted Instruction in the
development of Study Habits in relation to the Gender, Locality and Socio-Economic status of
Secondary School Students. International Journal of Education and Psychological Research
(IJEPR), 2(4), 75-86. Retrieved July 30, 2014 from http://www.ijepr.org.
[4] Jessica, CM. Li., & Joseph, Wu. (2013). Active learning for discovery and innovation in
criminology with Chineselearners. Journal of Innovations in Education and Teaching
international.Taylor and Francis Group. doi: 10.1080/14703297.2013.796720.
[5] K. Sibichan. K., & Annaraja, P. (2010). Teacher Trainee’s Computer Competency enhances their
technology use in Classroom Teaching. EDUTRACKS, 10(4), December 2010, New Delhi:
Neelkamal Publications, (pp. 33-37).
[6] Kavitha, M., & Arumugam, J. (2011). Scientiometric Analysis of Indian contribution to
Mathematical Research. Journal of Library & Information Communication Technology. 2011, 3(1-
2), 61-70.
[7] M. Muthumanickam., A. Ravichandran., & N. Elangovan. (2010). Quality Concerns in Teacher
Education: Use of ICT in Higher Education and Lecturer’s Competencies 285-292. New Delhi:
A.P.H. Publishing Corporation.
[8] Madhulika, S. Patel., &, Meenakshi, Khar. (2010). Addressing Teachers on the issues of new
textbooks in English language - An experience through Video Conference. Journal of Indian
Education (NCERT), 35(4), February, 2010. 94-105. Retrieved July 30, 2014 from
www.ncert.nic.in/publication/journals/pdf_files/jie/jie_feb_2010.pdf.
[9] Mark, Pegrum., Christine, Howitt., & Michelle, Stripe.(2013). Learning to take the Tablet : How
PreService teachers use iPads to facilitate their Learning. Australasian Journal of Educational
Technology, 29(4). 2013, 464-479. Retrieved August 09, 2014 from
http://www.ascilite.org.au/ajet/submission/index.php/AJET/article/download/.../604.
[10] Marina, Kandroudi., & Tharrenos, Bratitsis.(2014). Exploring the Educational Perspectives of
XBOX Kinect Based Video Games. (pp.219-227). Paper presented at Sixth Eureopean Conference
on Games-Based learning, University college Cork and Waterford institute of
Technology,Ireland.Retrieved July 23, 2014 from http://www.kinecteducation.com.
[11] R. Sourecha., & A. Selvan. (2013). Efficacy of Smart Board in Teaching Disaster Management
at High School Level. EDUTRACKS, 13(2), October 2013, (pp. 38-40).
[12] Saima, Rasul., Qadir, Bukhsh., & Muzamilla, Akram. (2010). Opinion of Teachers and Students
about Futurology of Higher Education in Pakistan. International Journal for Cross-Disciplinary
Subjects in Education (IJCDSE) 1(4). 255-259. Retrieved March 15, 2014 from
http://www.infonomic-society.org.
[13] W. Kotrlik, Joe ., & H. Redmann, Donna. (2009). Technology Adoption for Use in Instruction
by Secondary Technology Education Teachers. Journal of Technology Education, 21(1), 2009. 44-
59. Louisiana State University, Baton Rouge. (ERIC Document Reproduction Service No.
EJ914276). Retrieved August 01, 2014 from ERIC database.
[14] Xiangyu, W., E.D. Love, Peter., Robert, K., Jeong, Kim, Mi. & Rex, Davis. Peter. (2012).
Integration of E-Learning 2.0 with WEB 2.0. Journal of Information Technology in Construction.(IT
CON). 17, 387-396. Retrieved July 25, 2014, from http://www.itcon.org/2012/26.
RESEARCH ISSUES IN WEB MINING
Dr.S. Vijiyarani1
and Ms. E. Suganya2
1
Assistant professor, Department of Computer science, School of Computer Science and
Engineering, Bharathiar University, Coimbatore
2
M.Phil Research Scholar, Department of Computer science, School of Computer
science and Engineering, Bharathiar University, Coimbatore
ABSTRACT
Web is a collection of inter-related files on one or more web servers while web mining means extracting
valuable information from web databases. Web mining is one of the data mining domains where data mining
techniques are used for extracting information from the web servers. The web data includes web pages, web
links, objects on the web and web logs. Web mining is used to understand the customer behaviour, evaluate
a particular website based on the information which is stored in web log files. Web mining is evaluated by
using data mining techniques, namely classification, clustering, and association rules. It has some beneficial
areas or applications such as Electronic commerce, E-learning, Egovernment, E policies, E-democracy,
Electronic business, security, crime investigation and digital library. Retrieving the required web page from
the web efficiently and effectively becomes a challenging task because web is made up of unstructured data,
which delivers the large amount of information and increase the complexity of dealing information from
different web service providers. The collection of information becomes very hard to find, extract, filter or
evaluate the relevant information for the users. In this paper, we have studied the basic concepts of web
mining, classification, processes and issues. In addition to this, this paper also analyzed the web mining
research challenges.
KEYWORDS
Web Mining, Classification, Application, Tools, Algorithms, Research Issues.
For More Details : https://airccse.org/journal/ijcax/papers/2315ijcax05.pdf
Volume Link : https://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1] Joy Shalom Sona, Prof. Asha Ambhaikar” A Reconciling Website System to Enhance Efficiency with
Web Mining Techniques” International Journal Of Scientific & Engineering Research Volume 3, Issue 2,
February-2012 1 ISSN 2229-5518
[2] Aparna Ranade, Abhijit R. Joshi, Ph. D,” Techniques for Understanding User Usage Behavior on the
Internet” International Journal of Computer Applications (0975 – 8887) Volume 92 – No.7, April 2014
[3] Karan Bhalla & Deepak Prasad,” Data Preparation and Pattern Discovery For Web Usage Mining”
[4] Amit Pratap Singh1, Dr. R. C. Jain 2,” A Survey on Different Phases of Web Usage Mining for Anomaly
User Behavior Investigation” International Journal of Emerging Trends & Technology in Computer Science
(IJETTCS)Volume 3, Issue 3, May – June 2014 ISSN 2278-6856
[5] R. Lokeshkumar1, R. Sindhuja2, Dr. P. Sengottuvelan, “A Survey on Pre-processing of Web Log File in
Web Usage Mining to Improve the Quality of Data” International Journal of Emerging Technology and
Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 8, August 2014
[6] Mitali Srivastava, Rakhi Garg, P. K. Mishra,” Preprocessing Techniques in Web Usage Mining: A
Survey” International Journal of Computer Applications (0975 – 8887) Volume 97– No.18, July 2014
[7] http://www.slideshare.net/akhanna3/discovering-knowledge-using-web-structure-mining-27488978
[8] Ashish Kumar Garg, Mohammad Amir, Jarrar Ahmed, Man Singh, Sham Bansa,” Implementation of a
Search Engine” International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[9] C.Gomathi, M. Moorthi,” Web Access Pattern Algorithms in Education Domain” Computer and
information science journal vol. 1, No.4, November 2008
[10] Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik, “Research Challenges in
Web Data Mining”, International Journal of Computer Science and Telecommunications Volume 3, Issue 7,
July 2012
[11] Jaideep Srivastava, “Web Mining: Accomplishments & Future Directions”, University of Minnesota
USA, srivasta@cs.umn.edu, http://www.cs.umn.edu/faculty/srivasta.html
[12] http://www.slideshare.net/AmirFahmideh/web-mining-structure-mining
[13] http://www.slideshare.net/Tommy96/web-mining-tutorial
[14] http://www.faadooengineers.com/threads/2177-PPT-Link-Mining
[15] Deepti Kapila, Prof. Charanjit Singh, “Survey on Page Ranking Algorithms for Digital Libraries”,
International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue
6, June 2014 ISSN: 2277 128X
[16] Alberto Sillitti, Marco Scotto, Giancarlo Succi, Tullio Vernazza,” News Miner: a Tool for Information
Retrieval”
[17] Sandhya, Mala chaturvedi, “a survey on web mining algorithms”, The International Journal Of
Engineering And Science (IIJES) Volume 2 Issue 3
[18] Ananthi.J,” A Survey Web Content Mining Methods and Applications for Information Extraction from
Online Shopping Sites”, International Journal of Computer Science and Information Technologies, Vol. 5
(3), 2014
[19] S.Balan, “A Study of Various Techniques of Web Content Mining Research Issues and Tools”,
International journal of innovative research and studies ISSN 2319-9725
[20] D.Jayalatchumy, Dr. P.Thambidurai, “Web Mining Research Issues and Future Directions – A Survey”,
IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278- 8727Volume 14,
Issue 3
[21] Naga Lakshmi, Raja Sekhara Rao , Sai Satyanarayana Reddy, “An Overview of Preprocessing on Web
Log Data for Web Usage Analysis”, International Journal of Innovative Technology and Exploring
Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4
[21] Mamta M. Hegde, Prof. M.V.Phatak, “Developing an approach for hyperlink analysis with noise
reduction using Web Structure Mining”, International Journal of Advanced Research in Computer
Engineering & Technology Volume 1, Issue 3, May2012
[23] Mr. Dushyant B.Rathod, Dr.Samrat Khanna, “A Review on Emerging Trends of Web Mining and its
Applications” ISSN: 2321-9939
INTEGRATED INERTER DESIGN AND APPLICATION TO OPTIMAL
VEHICLE SUSPENSION SYSTEM
Thanh-Tung Tran1
, Chiaki Hori1
and Hiroshi Hasegawa2
1Graduate of Systems Engineering and Science, Shibaura Institute of Technology, Japan
2College of Systems Engineering and Science, Shibaura Institute of Technology, Japan
ABSTRACT
The formula cars need high tire grip on racing challenge by reducing rolling displacement at corner or double
change lands. In this case study, the paper clarifies some issues related to suspension system with inerter to
reduce displacement and rolling angle under impact from road disturbance on Formula SAE Car. We propose
some new designs, which have an advance for suspension system by improving dynamics. We optimize
design of model based on the minimization of cost functions for roll dynamics, by reducing the displacement
transfer and the energy consumed by the inerter. Base on a passive suspension model that we carried out
quarter-car and half-car model for different parameters which show the benefit of the inerter. The important
advantage of the proposed solution is its integration a new mechanism, the inerter, this system can increase
advance in development and have effects on the vehicle dynamics in stability vehicle.
KEYWORDS
Inerter, Suspension System, Optimal, Formula SAE, Rolling.
For More Details :https://airccse.org/journal/ijcax/papers/1314ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol1.html
REFERENCES
[1] Bosch, 2011. The book, Automotive Handbook, SAE International.
[2] Marcello Chiaberge, 2011. The book, New Trends and Developments in Automotive System Engineering,
First published.
[3] Bohdan T. Kulakowski, John F. Gardner, J. Lowen Shearer, 2007. Cambridge University Press 2007,
Dynamic Modeling and Control of Engineering Systems, Third edition.
[4] Malcolm C. Smith, 2003. Plenary Lecture, The Inerter Concept and Its Application, Department of
Engineering, University of Cambridge, U.K.
[5] Michael Z.Q. Chen, Christos Papageorgiou, Frank Scheibe, Fu-Cheng Wang, and Malcolm C. Smith,
2009. IEEE Circuits and Systems Magazine, The Missing Mechanical Circuit Element.
[6] Malcolm C. Smith, 2002. IEEE Transactions on Automatic Control, Vol.47, No.10, Synthesis of
Mechanical Networks: The Inerter.
[7] Takanori Uemura, 2009. Master Thesis in Shibaura Institute of Technology, Proposed suspension system
that aims to achieve both ride comfort and maneuverability.
[8] Jyuro Izumi, ESPEC Technology Report No. 6, Combined environmental testing for equipment used on
automobiles - Overview and test approach.
DESIGN OF GENERATIVE MODEL FOR THE
LANGUAGE OF TRADITIONAL SUAKIN USING
PARAMETRIC SHAPE GRAMMAR
Olakanbi Bolaji AbdulRaheem1
and Osama Abdulwahab Rayis1
Design and Innovation Center, Africa City of Technology, Khartoum, Sudan
ABSTRACT
This paper aims at presenting a parametric shape grammar of traditional Suakin houses (Red Sea state,
Sudan). This work systematically attempts to generate appropriate plans arrangement that allows required
functional relationships between spaces to be satisfied. The topological and geometrical properties of old
Suakin houses were analyzed. These properties were originated and incorporated into the traditional
Suakin buildings for the past ten centuries. The shape rules, dimensional, geometric and topological
patterns of houses in the corpus are used as the generative model for the language of traditional suakin
style This paper concludes with a discussion of the creative and generative value of the parametric shape
grammars. Moreover, it facilitates the understanding of the formal composition of Suakin old style and
the revival of a contemporary Suakin building style.
KEYWORDS
Generative model, Parametric shape grammar, Suakin.
For More Details : https://aircconline.com/ijcax/V3N3/3316ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol3.html
REFERENCES
[1] Stiny, G., Pictorial and formal aspects of shape and shape grammars. Vol. 13. 1975:
Springer.
[2] Stiny, G., Kindergarten grammars: designing with Froebel's building gifts. Environment
and Planning B, 1980. 7(4): p. 409-462.
[3] Stiny, G., The algebras of design. Research in Engineering Design, 1991. 2(3): p. 171-
181.
[4] Stiny, G. and W.J. Mitchell, The palladian grammar. Environment and Planning B,
1978. 5(1): p. 5-18.
[5] Flemming, U., The secret of the Casa Giuliani Frigerio. Environment and Planning B,
1981. 8(1).
[6] Koning, H. and J. Eizenberg, The language of the prairie: Frank Lloyd Wright's prairie
houses. Environment and Planning B, 1981. 8(3): p. 295-323.
[7] Laham, W.I., Lebanese House Shape Grammar. 1987.
[8] Hanson, N.L.R. and A.D. Radford, Living on the edge: a grammar for some country
houses by Glenn Murcutt. Architecture Australia, 1986. 75(5): p. 66-73.
[9] Buelinckx, H., Wren's language of City church designs: a formal generative
classification. Environment and Planning B, 1993. 20: p. 645-645.
[10] Knight, T. Applications in architectural design, and education and practice. in
NSF/MIT Workshop on Shape Computation. 1999.
[11] Downing, F. and U. Flemming, The bungalows of buffalo. 1981: Department of
Architecture, Carnegie-Mellon University.
[12] Flemming, U., More than the sum of parts: the grammar of Queen Anne houses.
Environment and Planning B: Planning and Design, 1987. 14(3): p. 323-350.
[13] Chiou, S.C. and R. Krishnamurti, Example Taiwanese traditional houses. Environment
and Planning B, 1996. 23: p. 191-216.
[14] Chiou, S.C. and R. Krishnamurti, The grammatical basis of Chinese traditional
architecture. Language of Design, 1995. 3: p. 5-31.
[15] Aksoy, M., G. Saglamer, and I. Turkey, A SHAPE-GRAMMAR FOR COURTYARD
HOUSES. Advanced Technologies: Architecture, Planning, Civil Engineering, 1993:
p. 251.
[16] Li, A.I., kang. 2001. A shape grammar for teaching the architectural style of the
Yingzao fashi, Ph. D. dissertation, Department of Architecture, Massachusetts Institute
of Technology, Cambridge, Mass.
[17] Li, A.I., A shape grammar for teaching the architectural style of the Yingzao fashi.
2001,Massachusetts Institute of Technology.
[18] Mayall, K. and G.B. Hall, Landscape grammar 1: spatial grammar theory and
landscape planning. Environment and Planning B, 2005. 32(6): p. 895.
[19] Duarte, J., J. Rocha, and G. Ducla-Soares, A patio-house shape grammar for the
Medina of Marrakech. publications in Proceedings of ECAADE, 2006. 6.
[20] Duarte, J.P., Customizing mass housing: a discursive grammar for Siza's Malagueira
houses. 2001, Massachusetts Institute of Technology.
[21] Eilouti, B.H. and A.M.I. Al-Jokhadar, A computer-aided rule-based mamluk madrasa
plan generator, in Nexus Network Journal. 2007, Springer. p. 31-57.
[22] Said, S. and M.R. Embi, A Parametric Shape Grammar of the Traditional Malay Long-
Roof Type Houses. International Journal of Architectural Computing, 2008. 6(2): p.
121-144.
[23] George, S., Shape: Talking about Seeing and Doing. 2006, MA: MIT Press,
Cambridge,MA.
[24] Wittgenstein, L., Remarks on the Foundation of Mathematics. MIT Press,
Cambridge,Massachusetts, 1991.
[25] Stiny, G. and J. Gips, Shape grammars and the generative specification of painting and
sculpture. Information processing, 1972. 71(1460-1465).
[26] Qezar Musa AlZein, T.M.N., et al., eds. Suakin: Studies in history, civilization and
international interactions Khartoum corporation for Press and Publication. Vol. 1.
2013.
[27] Dirar, M.S., History Of Suakin and the Red Sea (in Arabic). Vol. 1. 1981, Khartoum:
AI Dar AI Sudania. 277.
[28] Salim, A.R., Suakin: On Reviving an Ancient Red Sea Port City. Traditional Dwellings
and Settlements Review, 1997: p. 63-74.
[29] MALLINSON, A.a.E., SUAKIN PATTERN BOOK: A DESIGN AND
CONSTRUCTION CODE FOR SUAKIN ISLAND. The SUAKIN PATTERN
BOOK. Vol. 1. 2007: MALLINSON A&E, 16 ELVASTON PLACE LONDON, SW7
[30] Salim, A., secrets of Suakin. Vol. 1. 2015, Omdroum, Sudan: Abdel-karim Mirghani
cultural centre. 323.
[31] C aD daE, G.C., A shape grammar: the language of traditional Turkish houses.
Environment and Planing B: Planning and Design, 1996. 23(5): p. 443-464.
[32] Colakoglu, B., Design by grammar: an interpretation and generation of vernacular
hayat houses in contemporary context. Environment and Planning B: Planning and
Design, 2005. 32(1): p. 141-149.
[33] Duarte, J.P., A discursive grammar for customizing mass housing: the case of Siza's
houses at Malagueira. Automation in Construction, 2005. 14(2): p. 265-275.
[34] HOSNY, S.S., SHAPE GRAMMARS: STYLE GENERATORS IN COMPUTER-
AIDED ARCHITECTURAL DESIGN future university, department of architecture,
Egypt, 2012.
[35] Knight, T.W., Languages of designs: from known to new. Environment and Planning
B, 1981. 8(2): p. 213-238.
[36] Mitchell, W.J., A computational view of design creativity. Modeling creativity and
knowledge-based creative design, 1993: p. 25-42.
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
Ganaraj K
PG Scholar, Computer Science Department,
Bearys Institute of technology and Engineering
Mangalore, Karnataka, India
ABSTRACT
The advancement in the mobile devices, wireless and web technologies given rise to the new application
that will make the voting process very easy and efficient. The E-voting promises the possibility of
convenient, easy and safe way to capture and count the votes in an election[1]. This research project
provides the specification and requirements for E-Voting using an Android platform. The e-voting means
the voting process in election by using electronic device. The android platform is used to develop an evoting
application. At first, an introduction about the system is presented. Sections II and III describe all
the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed
evoting system will be presented. This technology helps the user to cast the vote without visiting the polling
booth. The application follows proper authentication measures in order to avoid fraud voters using the
system. Once the voting session is completed the results can be available within a fraction of seconds. All
the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure
of results by third person other than the administrator. Once the session is completed the admin
can decrypt the vote count and publish results and can complete the voting process.
KEYWORDS
Electronic voting, e-mail Network.
For More Details : https://aircconline.com/ijcax/V4N2/4217ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol4.html
REFERENCES
[1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based
System, IJARCSSE,vol.3,Issue 11,2013
[2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34.
[3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”,
Christos Bouras, Nikolaos Katris, Vassilis Triantafillou.
[4] “E-voting on Android System” paper (International Journal of Emerging Technology and
Advanced Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors-
Prof. N. J. Kulkarni, Prof. S. S. Mujgond, February 2012.
[5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie
Faith Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001. [6] “Voting – What
is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report, July 2001. [7] Java
Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402-
9
DATA MINING APPLICATION IN ADVERTISEMENT
MANAGEMENT OF HIGHER EDUCATIONAL INSTITUTES
Priyanka Saini
M.Tech(CS) Student, Banasthali University Rajasthan
Sweta Rai
M.Tech(CS) Student, Banasthali University Tonk,Rajasthan
Ajit Kuamr Jain
Assistant Professor, Computer Science Department Banasthali University
Tonk,Rajasthan
ABSTRACT
In recent years, Indian higher educational institute’s competition grows rapidly for attracting students to
get enrollment in their institutes. To attract students educational institutes select a best advertisement
method. There are different advertisements available in the market but a selection of them is very difficult
for institutes. This paper is helpful for institutes to select a best advertisement medium using some data
mining methods.
KEYWORDS
Data Mining, KDD, Data Mining in Education, Association Rule Mining, Apriori Algorithm .
For More Details : https://airccse.org/journal/ijcax/papers/1114ijcax05.pdf
Volume Link : https://airccse.org/journal/ijcax/vol1.html
REFERENCES
[1] Han, J., Kamber, M.: Data Mining: Concepts and Techniques,Morgan Kaufmann Publishers
USA,(2000).
[2] A.Y.K. Chan, K.O. Chow, and K.S. Cheung“,Online Course Refinement through Association
Rule Mining”Journal of Educational Technology Systems Volume 36, Number 4 / 2007-2008,
pp 433 – 44, 2008.
[3] Romero, C., and Ventura S.(2013), “ Data Mining in Education”. WIREs Data Mining and
Know.Dis.,Vol.3,pp.12-27.
[4] Heikki,Mannila, .Data mining: machine learning, statistics, and databases., IEEE, 1996.
[5] Klosgen, W. & Zytkow,J. (2002), Handbook of data mining and knowledge discovery ,
Oxford University Press, New York.
[6] International Educational Data Mining Society www.educationaldatamining.org.
[7] C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005”.Expert
Systems with Applications 33 (2007) 135-146.
[8] S.Pal., “Mining Educational Data to Reduce Dropout Rates of Engineering Students”, I.J.
Information Engineering and Electronic Business (IJIEEB), Vol. 4, No. 2, 2012, pp. 1-7.
[9] C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005”, expert
system with applications 33 (2007) 135-146.
[10] S. K. Yadav, B.K. Bharadwaj and S. Pal, “Data Mining Applications: A comparative study
for Predicting Student’s Performance”, International Journal of Innovative Technology and
CreativeEngineering (IJITCE), Vol. 1, No. 12, pp. 13-19, 2011.
[11] U. K. Pandey and S. Pal, “A Data Mining view on Class Room Teaching Language”, IJCSI,
Vol 8 issue 2 Maerch 2011 pg 277-282, ISSN 1694-0814.
[12] B.K. Bharadwaj and S. Pal. “Mining Educational Data to Analyze Students’ Performance”,
International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6,
pp. 63-69, 2011.
[13] Q. A. AI-Radaideh, E. W. AI-Shawakfa, and M. I.AI-Najjar,“Mining student data using
decision trees”,International Arab Conference on Information Technology (ACIT’2006),
Yarmouk University, Jordan, 2006.
[14]K.Shanmuga Priya and A.V.Senthil Kumar,” Improving the Student’s Performance Using
Educational Data Mining”, Int. J. Advanced Networking and Applications Volume: 04 Issue: 04
Pages:1680-1685 (2013) ISSN : 0975-0290.
[15] Bhise R.B, Thorat S.S, Supekar A.K, “Importance of Data Mining in Higher Education
System”, IOSR(Journal Of Humanities And Social Science),Volume 6, Issue 6 ,PP 18-21, (Jan.
- Feb.2013).
[16] Abeer Badr El Din Ahmed and Ibrahim Sayed Elaraby, “Data Mining: A prediction for
Student's Performance Using Classification Method”, World Journal of Computer Application
and Technology 2(2): 43-47, 2014.
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
Hossein Sahlani
Department of Information, Amin University, Tehran, Iran
ABSTRACT
Semantic annotation of images is an important research topic on both image understanding database or
web image search. Image annotation is a technique to choosing appropriate labels for images with
extracting effective and hidden feature in pictures. In the feature extraction step of proposed method, we
present a model, which combined effective features of visual topics (global features over an image) and
regional contexts (relationship between the regions in Image and each other regions images) toautomatic
image annotation.In the annotation step of proposed method, we create a new ontology (base on WordNet
ontology) for the semantic relationships between tags in the classification and improving semantic gap
exist in the automatic image annotation.Experiments result on the 5k Corel dataset show the proposed
method of image annotation in addition to reducing the complexity of the classification, increased
accuracy compared to the another methods.
KEYWORDS
Automatic Image Annotation, Ontology, Statistical Models, Regional Contexts, Visual Topics.
For More Details : https://aircconline.com/ijcax/V3N4/3416ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol3.html
REFERENCES
[1] Einarsson S. H, (2004), "Data structures for intermediate search results in the Eff2 image
retrieval system," ReykjavĂ­k University, technical report.
[2] A. Tousch, S. Herbin, J. Audlibert, (2012) “Semantic Hierarchies for Image Annotation: A
Survey,” Elsevier Ltd., Pattern Recognition, vl.40, pp. 333-345.
[3] Long F, Zhang H and Dagan Feng D, (2003), "Fundamentals of content-based image retrieval,
in Multimedia Information Retrieval and Management Technological Fundamentals and
Applications," Springer-Verlag, pp. 1-26.
[4] D. Zhang, Md.M. Islam, G. Lu, (2011) “A review on automatic image annotation techniques,”
Elsevier Ltd., Pattern Recognition, vol. 45.
[5] Li X, Chen S, Shyu M and Furht B, (2002), "An Effective Content-Based Visual Image
Retrieval System," in 26th IEEE Computer Society International Computer Software and
Applications Conference (COMPSAC), Oxford, pp. 914- 919.
[6] Rui Y., Huang Th. S. and Chang Sh., (1999), "Image Retrieval: Current Techniques,
Promising Directions, and Open Issues," Journal of Visual Communication and Image
Representation, vol. 10, pp. 39–62.
[8] S. J. Hwang, K. Grauman, and F. Sha. (2014), Semantic kernel forests from multiple
taxonomies. Neural Information Processing Systems.
[9] S. J. Hwang, K. Grauman, and F. Sha. (2014),“Analogy-preserving semantic embedding for
visual object categorization”. International Conference on Machine Learning, pages 639–647.
[10] Mohammad Mehdi Farhangi, Mohsen Soryani, Mahmood Fathy, (2012): Improvement the
Bag of Words Image Representation Using Spatial Information. ACITY (2): 681-690.
[11] Guang-Hai Liu, Lei Zhang, Ying-Kun Hou, Zuo-Yong Li, Jing-Yu Yang, (2010) “Image
retrieval based on multi-texton histogram”, Pattern Recognition Journals of science direct,
Volume 43, Issue 7, July, Pages 2380–2389.
[12] HengameDeljooi, Ahmad R. Eskandari, (2014) “A Novel Semantic Statistical Model for
Automatic Image Annotation Using the Relationship between the Regions Based on Multi-
Criteria Decision Making”, International Journal of Electrical and Computer Engineering
(IJECE), Vol. 4, No. 1, Feburary, pp. 37~51.
[13] HengameDeljooi, SomayyeJafaraliJassbi,(2015) “A Multi Criteria Decision Making Based
Approach for Semantic Image Annotation”, International Journal of Computer-Aided
Technologies (IJCAx) Vol.2, No.1.
DECISION TREE ALGORITHM IMPLEMENTATIONUSING EDUCATIONAL DATA
Priyanka Saini1
,Sweta Rai2
and Ajit Kumar Jain3
1,2
M.Tech Student, Banasthali University, Tonk, Rajasthan
3
Assistant Professor , Department of Computer Science, Banasthali University
ABSTRACT
There is different decision tree based algorithms in data mining tools. These algorithms are used for
classification of data objects and used for decision making purpose. This study determines the decision
tree based ID3 algorithm and its implementation with student data example.
KEYWORDS
Decision tree, ID3 algorithm, Entropy and Information Gain.
For More Details : https://airccse.org/journal/ijcax/papers/1114ijcax04.pdf
Volume Link :https://airccse.org/journal/ijcax/vol1.html
REFERENCES
[1] Quinlan, J.R. 1986, Induction of Decision trees, Machine Learning.
[2] Anand Bahety,’ Extension and Evaluation of ID3 – Decision Tree Algorithm’. University of Maryland,
College Park.
[3] Mary Slocum,‟,Decision making using ID3,RIVIER ACADEMIC JOURNAL, VOLUME 8,
NUMBER 2, FALL 2012.
[4] Kumar Ashok, Taneja H C, Chitkara Ashok K and Kumar Vikas,’ Classification of Census Using
Information Theoretic Measure Based ID3 Algorithm’ . Int. Journal of Math. Analysis, Vol. 6,
2012, no. 51, 2511 – 2518.
[5] Sonika Tiwari and Prof. Roopali Soni,’ Horizontal partitioning ID3 algorithm A new approach of
detecting network anomalies using decision tree’, International Journal of Engineering Research &
Technology (IJERT)Vol. 1 Issue 7, eptember – 2012.
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS
IN MOBILE AD HOC NETWORKS
Mohamed Elboukhari1
, Mostafa Azizi1 and Abdelmalek Azizi2,3
1
Department of Applied Engineering, ESTO, Oujda, Morocco
2
Departement Mathematics & Computer Science, FSO, Oujda, Morocco
3
Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without
any pre-determined infrastructure and fixed organization of available links. Each node in MANET
operates as a router, forwarding information packets for other mobile nodes. There are many routing
protocols that possess different performance levels in different scenarios. The main task is to evaluate the
existing routing protocols and finding by comparing them the best one. In this article we compare AODV,
DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the
best operational conditions for each MANETs protocol. We study these five MANETs routing protocols
by different simulations in NS-2 simulator. We describe that pause time parameter affect their
performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to-
End Delay, Normalized Routing Load and Average Throughput.
KEYWORDS
Mobile Ad Hoc Network (MANET), Performance Parameters, AODV, DSR, DSDV, OLSR, DYMO.
For More Details : https://airccse.org/journal/ijcax/papers/2215ijcax01.pdf
Volume Link : https://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1] Rahman A, Islam S, Talevski A. 2009. Performance measurement of various routing
protocols in ad-hoc network”. In: Proceedings of the international multiconference of engineers
and computer scientists, vol. 1. Hong Kong: IMECS.
[2] Tyagi SS, Chauhan RK. 2010. Performance analysis of proactive and reactive routing
protocols for ad hoc networks. Int J Comput Appl 2010;1(14).
[3] Basagni S, Conti M, Giordano S, Stojmenovic I. 2004. Mobile ad hoc networking. A John
wiley and sons, Inc., Publication.
[4] AkshaiAggarwal,SavitaGandhi,NirbhayChaubey. 2011. Performance Analysis of AODV,
DSDV and DSR in MANETs. IJDPS, Vol.2, No.6.
[5] P. Manickam T. Guru Baskar , M.Girija, Dr.D.Manimegala. 2011. Performance Comparisons
of Routing Protocols in Mobile Ad- Hoc Networks. International Journal of Wireless & Mobile
Networks (IJWMN), pp. 98-106.
[6] Sabina Barakovic, Suad Kasapovic, and Jasmina Barakovic. 2010. Comparison of MANET
Routing Protocols in Different Traffic and Mobility Models”, Telfor Journal, Vol. 2, No. 1.
[7] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare. 2008. Simulation Based Comparative
Performance Analysis of Adhoc Routing Protocols. Proceedings of TENCON 2008.
[8] Chenna Reddy, P.; ChandraSekhar Reddy, P. 2006. Performance Analysis of Adhoc Network
Routing Protocols. ISAUHC '06, International Symposium on Ad Hoc andUbiquitous
Computing, vol., no., pp.186-187, 20-23 Dec.
[9] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar. 2011. Comparative Study of Adhoc
Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork. Indian Journal of
Computer Science and Engineering Vol. 1 No. 4 364-371.
[10] Ginni Tonk, Indu Kashyap, S.S. Tyagi. 2012. Performance Comparison of Ad-Hoc Network
Routing Protocols using NS-2. International Journal of Innovative Technology and Exploring
Engineering (IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1.
[11] Li Layuan, Li Chunlin, Yaun Peiyan. 2007. Performance evaluation and simulation of
routing protocols in ad hocnetworks. Computer Communications 30 (2007) 1890- 1898.
[12] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni.2011. QoS Parameter Analysis
on AODV and DSDV Protocols in a Wireless Network. International Journal of Communication
Network and Security, Volume-1, Issue-1.
[13] Deepak Kumar, Ashutosh Srivastava, S C Gupta. 2012. Performance Comparison of DSDV
and AODV Routing Protocols in MANETS. International Journal of Electronics Communication
and Computer Technology (IJECCT) Volume 2 Issue 3.
[14] Jun-Zhao Sun.2001. Mobile Ad Hoc Networking: An Essential Technology for Pervasive
Computing. Proceedings of International conference on info-tech and info-net, Vol-3, pp. 316-
321.
[15] C.E. Perkins and E.M. Royer.1999. Ad-hoc On-Demand Distance Vector Routing”,
Proceeding of 2nd IEEE Workshop. Mobile Computing System Applications, pp:90-100.
[16] Perkins, E. Belding-Royer, and S. Das. 2003. Ad hoc On-Demand Distance Vector (AODV)
Routing. “draft-ietf-manet-aodv-13.txt.
[17] S. A. Ade1& P.A.Tijare. 2010. Performance Comparison of AODV, DSDV, OLSR and
DSR Routing Protocols in Mobile Ad Hoc Networks. International Journal of Information
Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548.
[18] J. Broch, D. Jhonson, and D. Maltz.2007. The dynamic source routing protocol for mobile
adhoc networks for IPv4” IETF RFC 4728.
[19] I. Chakeres and C. Perkins.2012. Dynamic MANET On-Demand (DYMO) Routing. IETF
Internet-Draft, draft-ietf-manet-dymo-23.
[20] Charles E. Perkins and Pravin Bhagwat. 1994. Highly dynamic destination-sequenced
distancevector routing (DSDV) for mobile computers. Technical report, IBM Research and
University of Maryland, USA.
[21] T. Clausen and P. Jacquet.2003. Optimized link State Routing protocol (OLSR). RFC-3626,
IETF Networking Group.
[22] Aleksandr Huhtonen.2004. Comparing AODV and OLSR routing protocols. Helsinki
University of Technology, Telecommunication software and multimedia laboratory.
[23] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas . 2009 .MANET
Routing Protocols vs. Mobility Models: Performance Analysis and Comparison. Proceedings of
the 9th
WSEAS International Conference on Applied Informatics and Communications (AIC
'09).
[24] BonnMotion: A mobility scenario generation and analysis tool. 2014. Available at
http://sys.cs.uos.de/bonnmotion/
[25] NS -2, the ns Manual. 2014. Available at http: //www. isi.edu/nsnam/ns/doc.
[26] Francisco J. Ros. 2014. Software development available at
http://masimum.inf.um.es/fjrm/development/
[27] Robins A.D. 2010. “GAWK: an effective AWK programming”, 3rd ed.
[28] MATLAB: The language of Technical Computing. 2014.Available at
http://www.mathworks.com/
[29] S.Corson and J.Macker. 1999. Routing Protocol Performance Issues and Evaluation
considerations. RFC2501, IETF Network Working Group.
[30] The NS-3 reference manual. 2014. Available at http://www.nsnam.org/

More Related Content

What's hot

Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...IJERA Editor
 
Shivani jain
Shivani jainShivani jain
Shivani jainShivani Jain
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...IJECEIAES
 
Benchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysisBenchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysisConference Papers
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...idescitation
 
000IFSD141525f
000IFSD141525f000IFSD141525f
000IFSD141525fHariom Dave
 
Minor Project Report On Intranet database
Minor Project Report On Intranet databaseMinor Project Report On Intranet database
Minor Project Report On Intranet databaseAnjeet Kumar
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET Journal
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET Journal
 
Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generatorConference Papers
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET Journal
 
Advanced Software Engineering Program with IIT Madras
Advanced Software Engineering Program with IIT MadrasAdvanced Software Engineering Program with IIT Madras
Advanced Software Engineering Program with IIT MadrasMamathaSharma4
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET Journal
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET Journal
 

What's hot (20)

Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
Security and Protection of Enterprise Data in Cloud: Implementation of Deniab...
 
Shivani jain
Shivani jainShivani jain
Shivani jain
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 
A novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verificationA novel graphical password approach for accessing cloud & data verification
A novel graphical password approach for accessing cloud & data verification
 
Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...Implementing data-driven decision support system based on independent educati...
Implementing data-driven decision support system based on independent educati...
 
Benchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysisBenchmarking supervised learning models for sentiment analysis
Benchmarking supervised learning models for sentiment analysis
 
July 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2021 - Top 10 Read Articles in Network Security & Its Applications
July 2021 - Top 10 Read Articles in Network Security & Its Applications
 
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...A Generalized Image Authentication Based On Statistical Moments of Color Hist...
A Generalized Image Authentication Based On Statistical Moments of Color Hist...
 
000IFSD141525f
000IFSD141525f000IFSD141525f
000IFSD141525f
 
Minor Project Report On Intranet database
Minor Project Report On Intranet databaseMinor Project Report On Intranet database
Minor Project Report On Intranet database
 
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the CloudIRJET -  	  Privacy Preserving Keyword Search over Encrypted Data in the Cloud
IRJET - Privacy Preserving Keyword Search over Encrypted Data in the Cloud
 
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...IRJET -  	  Security Model for Preserving the Privacy of Medical Big Data in ...
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...
 
September 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its ApplicationsSeptember 2021: Top 10 Read Articles in Network Security and Its Applications
September 2021: Top 10 Read Articles in Network Security and Its Applications
 
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...IRJET-  	  A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
IRJET- A Novel Survey to Secure Medical Images in Cloud using Digital Wat...
 
Ai driven occupational skills generator
Ai driven occupational skills generatorAi driven occupational skills generator
Ai driven occupational skills generator
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...IRJET-  	  A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
IRJET- A Key-Policy Attribute based Temporary Keyword Search Scheme for S...
 
Advanced Software Engineering Program with IIT Madras
Advanced Software Engineering Program with IIT MadrasAdvanced Software Engineering Program with IIT Madras
Advanced Software Engineering Program with IIT Madras
 
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
IRJET - A Genetic Approach for Reversible Database Watermarking using Fingerp...
 
IRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DESIRJET- A Survey Paper on Secured Email Server Using 3DES
IRJET- A Survey Paper on Secured Email Server Using 3DES
 

Similar to Top 10 Download Article in Computer Aided Technologies: October 2021

E akshara - next generation ubiquitous smart learning platform
E akshara - next generation ubiquitous smart learning platformE akshara - next generation ubiquitous smart learning platform
E akshara - next generation ubiquitous smart learning platformeSAT Journals
 
Paper id 24201424
Paper id 24201424Paper id 24201424
Paper id 24201424IJRAT
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesIIRindia
 
Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...IAEME Publication
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...AIRCC Publishing Corporation
 
Data science for digital culture improvement in higher education using K-mean...
Data science for digital culture improvement in higher education using K-mean...Data science for digital culture improvement in higher education using K-mean...
Data science for digital culture improvement in higher education using K-mean...IJECEIAES
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...eSAT Publishing House
 
Accessibility and effeciency of developed online learning system
Accessibility and effeciency of developed online learning systemAccessibility and effeciency of developed online learning system
Accessibility and effeciency of developed online learning systemBryan Guibijar
 
Mobile Devices and Apps in Education
Mobile Devices and Apps in EducationMobile Devices and Apps in Education
Mobile Devices and Apps in EducationRebecca Kate Miller
 
Internet technology utilization in learning
Internet technology utilization in learningInternet technology utilization in learning
Internet technology utilization in learningIRJET Journal
 
The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...Journal of Education and Learning (EduLearn)
 
E-learning Online Education App
E-learning Online Education AppE-learning Online Education App
E-learning Online Education AppIRJET Journal
 
Development of Online Learning System
Development of Online Learning SystemDevelopment of Online Learning System
Development of Online Learning Systemijtsrd
 
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...IAEME Publication
 
Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework eraser Juan José Calderón
 
USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...
USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...
USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...IJCI JOURNAL
 

Similar to Top 10 Download Article in Computer Aided Technologies: October 2021 (20)

E akshara - next generation ubiquitous smart learning platform
E akshara - next generation ubiquitous smart learning platformE akshara - next generation ubiquitous smart learning platform
E akshara - next generation ubiquitous smart learning platform
 
Paper id 24201424
Paper id 24201424Paper id 24201424
Paper id 24201424
 
A Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining TechniquesA Survey on Educational Data Mining Techniques
A Survey on Educational Data Mining Techniques
 
Internet Usage by University Academics: Implications for the 21st Century Tea...
Internet Usage by University Academics: Implications for the 21st Century Tea...Internet Usage by University Academics: Implications for the 21st Century Tea...
Internet Usage by University Academics: Implications for the 21st Century Tea...
 
Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...Potentials of the internet and its resources to academic staff the case of tw...
Potentials of the internet and its resources to academic staff the case of tw...
 
Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...Top Cited Article in Computer Science & Information Technology Research: June...
Top Cited Article in Computer Science & Information Technology Research: June...
 
Data science for digital culture improvement in higher education using K-mean...
Data science for digital culture improvement in higher education using K-mean...Data science for digital culture improvement in higher education using K-mean...
Data science for digital culture improvement in higher education using K-mean...
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
ICTs Integration in Education: Mobile learning and the Technology Acceptance ...
ICTs Integration in Education: Mobile learning and the Technology Acceptance ...ICTs Integration in Education: Mobile learning and the Technology Acceptance ...
ICTs Integration in Education: Mobile learning and the Technology Acceptance ...
 
A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...A study model on the impact of various indicators in the performance of stude...
A study model on the impact of various indicators in the performance of stude...
 
Accessibility and effeciency of developed online learning system
Accessibility and effeciency of developed online learning systemAccessibility and effeciency of developed online learning system
Accessibility and effeciency of developed online learning system
 
Mobile Devices and Apps in Education
Mobile Devices and Apps in EducationMobile Devices and Apps in Education
Mobile Devices and Apps in Education
 
Internet technology utilization in learning
Internet technology utilization in learningInternet technology utilization in learning
Internet technology utilization in learning
 
The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...The Influence of Information Technology Toward Interest in Utilization of The...
The Influence of Information Technology Toward Interest in Utilization of The...
 
E-learning Online Education App
E-learning Online Education AppE-learning Online Education App
E-learning Online Education App
 
Resume
ResumeResume
Resume
 
Development of Online Learning System
Development of Online Learning SystemDevelopment of Online Learning System
Development of Online Learning System
 
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
EFFECT OF DIGITAL LITERACY ON INFORMATION SEEKING BEHAVIOUR AMONG MANAGERS OF...
 
Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework Big data integration for transition from e-learning to smart learning framework
Big data integration for transition from e-learning to smart learning framework
 
USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...
USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...
USABILITY OF WEB SITES ADDRESSING TECHNOLOGY BASED CASER (CLASSROOM ASSESSMEN...
 

More from ijcax

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESijcax
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMijcax
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSijcax
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...ijcax
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation ijcax
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems ijcax
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...ijcax
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMijcax
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSijcax
 
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...ijcax
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...ijcax
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR ijcax
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...ijcax
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...ijcax
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDijcax
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION ijcax
 

More from ijcax (20)

NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGESNEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES
 
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEMTHE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR PRODUCTION PLANNING PROBLEM
 
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKSCOMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS
 
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
PREDICTING ACADEMIC MAJOR OF STUDENTS USING BAYESIAN NETWORKS TO THE CASE OF ...
 
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
A Multi Criteria Decision Making Based Approach for Semantic Image Annotation
 
On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems On Fuzzy Soft Multi Set and Its Application in Information Systems
On Fuzzy Soft Multi Set and Its Application in Information Systems
 
RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING RESEARCH ISSUES IN WEB MINING
RESEARCH ISSUES IN WEB MINING
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
INTELLIGENT AGENT FOR PUBLICATION AND SUBSCRIPTION PATTERN ANALYSIS OF NEWS W...
 
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORMADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM
 
TRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBSTRACE LENGTH CALCULATION ON PCBS
TRACE LENGTH CALCULATION ON PCBS
 
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
 
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
RESEARCH TRENDS Ä°N EDUCATIONAL TECHNOLOGY Ä°N TURKEY: 2010-2018 YEAR THESIS AN...
 
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
IMPACT OF APPLYING INTERNATIONAL QUALITY STANDARDS ON MEDICAL EQUIPMENT IN SA...
 
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR
 
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
Developing Product Configurator Tool Using CADs’ API with the help of Paramet...
 
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
DESIGN AND DEVELOPMENT OF CUSTOM CHANGE MANAGEMENT WORKFLOW TEMPLATES AND HAN...
 
BLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLINDBLIND AID : TRAVEL AID FOR BLIND
BLIND AID : TRAVEL AID FOR BLIND
 
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION
 

Recently uploaded

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 

Top 10 Download Article in Computer Aided Technologies: October 2021

  • 1. Top 10 Download Article in Computer Aided Technologies: October 2021 International Journal of Computer-Aided Technologies (IJCAx) ISSN : 2349 - 218X https://airccse.org/journal/ijcax/index.html
  • 2. TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE GADGETS IN EDUCATION Dr. Ajay Surana and Ms. Sushma Rani Head of the Department (Associate Professor), Department of Education, Banasthali University, Jaipur, Rajasthan, India Senior Research Fellow (UGC-SRF), Department of Education, Banasthali University, Jaipur, Rajasthan, India. ABSTRACT Today’s era is an era of modernization and globalization. Everything is happening at a very fast rate whether it is politics, societal reforms, commercialization, transportation, or educational innovations. In every few second, technology grows either in the form of arrival of the new devices/gadgets with millions of apps and these latest technological objects may be in the form of hardware/software devices. We are the educationists, teachers, students and stakeholders of present Indian educational system. These gadgets/devices are partly being used by us or most of them are still unaware of these innovative technologies due to the mass media or economical factor. So, there is a need to improvise ourselves towards utilizing the future gadgets in order to explore the educational uses, barriers and preparatory needs of these available devices for educational purposes. This paper aims to study the opinion of the teacher-educators about the usage of future gadgets in higher education. It will also contribute towards establishing the list of latest technological devices, and how it can enhances the process of teaching learning system. KEYWORDS Futurology, Future Gadgets, Technological devices, Educational Technology. For More Details : https://aircconline.com/ijcax/V2N4/2415ijcax01.pdf Volume Link :https://airccse.org/journal/ijcax/vol2.html
  • 3. REFERENCES [1] A.G. Almekhlafi., & F.A. Almeqdadi. (2010). Teacher’s Perception of Technology Integration in United Arab Emirates School Classrooms. Journal of Education Technology & Society, 13(1), 165- 175. Retrieved on August 02, 2014 from http://ifets.info/journals/13_1/16.pdf. [2] Anisha, Gopalakrishnan. V. (2014). Influence of Multiple Intelligence and Self-Efficacy of the Secondary Teacher education students on their Teaching Competency. Ph.D. Thesis, Manonmanjam Sundaranar University. Retrieved August 02, 2014 from http://www. hdl.handle.net/10603/20363. [3] Jagannath, K. Dange. (2013). Effectiveness of Computer- Assisted Instruction in the development of Study Habits in relation to the Gender, Locality and Socio-Economic status of Secondary School Students. International Journal of Education and Psychological Research (IJEPR), 2(4), 75-86. Retrieved July 30, 2014 from http://www.ijepr.org. [4] Jessica, CM. Li., & Joseph, Wu. (2013). Active learning for discovery and innovation in criminology with Chineselearners. Journal of Innovations in Education and Teaching international.Taylor and Francis Group. doi: 10.1080/14703297.2013.796720. [5] K. Sibichan. K., & Annaraja, P. (2010). Teacher Trainee’s Computer Competency enhances their technology use in Classroom Teaching. EDUTRACKS, 10(4), December 2010, New Delhi: Neelkamal Publications, (pp. 33-37). [6] Kavitha, M., & Arumugam, J. (2011). Scientiometric Analysis of Indian contribution to Mathematical Research. Journal of Library & Information Communication Technology. 2011, 3(1- 2), 61-70. [7] M. Muthumanickam., A. Ravichandran., & N. Elangovan. (2010). Quality Concerns in Teacher Education: Use of ICT in Higher Education and Lecturer’s Competencies 285-292. New Delhi: A.P.H. Publishing Corporation. [8] Madhulika, S. Patel., &, Meenakshi, Khar. (2010). Addressing Teachers on the issues of new textbooks in English language - An experience through Video Conference. Journal of Indian Education (NCERT), 35(4), February, 2010. 94-105. Retrieved July 30, 2014 from www.ncert.nic.in/publication/journals/pdf_files/jie/jie_feb_2010.pdf. [9] Mark, Pegrum., Christine, Howitt., & Michelle, Stripe.(2013). Learning to take the Tablet : How PreService teachers use iPads to facilitate their Learning. Australasian Journal of Educational Technology, 29(4). 2013, 464-479. Retrieved August 09, 2014 from http://www.ascilite.org.au/ajet/submission/index.php/AJET/article/download/.../604. [10] Marina, Kandroudi., & Tharrenos, Bratitsis.(2014). Exploring the Educational Perspectives of XBOX Kinect Based Video Games. (pp.219-227). Paper presented at Sixth Eureopean Conference on Games-Based learning, University college Cork and Waterford institute of Technology,Ireland.Retrieved July 23, 2014 from http://www.kinecteducation.com.
  • 4. [11] R. Sourecha., & A. Selvan. (2013). Efficacy of Smart Board in Teaching Disaster Management at High School Level. EDUTRACKS, 13(2), October 2013, (pp. 38-40). [12] Saima, Rasul., Qadir, Bukhsh., & Muzamilla, Akram. (2010). Opinion of Teachers and Students about Futurology of Higher Education in Pakistan. International Journal for Cross-Disciplinary Subjects in Education (IJCDSE) 1(4). 255-259. Retrieved March 15, 2014 from http://www.infonomic-society.org. [13] W. Kotrlik, Joe ., & H. Redmann, Donna. (2009). Technology Adoption for Use in Instruction by Secondary Technology Education Teachers. Journal of Technology Education, 21(1), 2009. 44- 59. Louisiana State University, Baton Rouge. (ERIC Document Reproduction Service No. EJ914276). Retrieved August 01, 2014 from ERIC database. [14] Xiangyu, W., E.D. Love, Peter., Robert, K., Jeong, Kim, Mi. & Rex, Davis. Peter. (2012). Integration of E-Learning 2.0 with WEB 2.0. Journal of Information Technology in Construction.(IT CON). 17, 387-396. Retrieved July 25, 2014, from http://www.itcon.org/2012/26.
  • 5. RESEARCH ISSUES IN WEB MINING Dr.S. Vijiyarani1 and Ms. E. Suganya2 1 Assistant professor, Department of Computer science, School of Computer Science and Engineering, Bharathiar University, Coimbatore 2 M.Phil Research Scholar, Department of Computer science, School of Computer science and Engineering, Bharathiar University, Coimbatore ABSTRACT Web is a collection of inter-related files on one or more web servers while web mining means extracting valuable information from web databases. Web mining is one of the data mining domains where data mining techniques are used for extracting information from the web servers. The web data includes web pages, web links, objects on the web and web logs. Web mining is used to understand the customer behaviour, evaluate a particular website based on the information which is stored in web log files. Web mining is evaluated by using data mining techniques, namely classification, clustering, and association rules. It has some beneficial areas or applications such as Electronic commerce, E-learning, Egovernment, E policies, E-democracy, Electronic business, security, crime investigation and digital library. Retrieving the required web page from the web efficiently and effectively becomes a challenging task because web is made up of unstructured data, which delivers the large amount of information and increase the complexity of dealing information from different web service providers. The collection of information becomes very hard to find, extract, filter or evaluate the relevant information for the users. In this paper, we have studied the basic concepts of web mining, classification, processes and issues. In addition to this, this paper also analyzed the web mining research challenges. KEYWORDS Web Mining, Classification, Application, Tools, Algorithms, Research Issues. For More Details : https://airccse.org/journal/ijcax/papers/2315ijcax05.pdf Volume Link : https://airccse.org/journal/ijcax/vol2.html
  • 6. REFERENCES [1] Joy Shalom Sona, Prof. Asha Ambhaikar” A Reconciling Website System to Enhance Efficiency with Web Mining Techniques” International Journal Of Scientific & Engineering Research Volume 3, Issue 2, February-2012 1 ISSN 2229-5518 [2] Aparna Ranade, Abhijit R. Joshi, Ph. D,” Techniques for Understanding User Usage Behavior on the Internet” International Journal of Computer Applications (0975 – 8887) Volume 92 – No.7, April 2014 [3] Karan Bhalla & Deepak Prasad,” Data Preparation and Pattern Discovery For Web Usage Mining” [4] Amit Pratap Singh1, Dr. R. C. Jain 2,” A Survey on Different Phases of Web Usage Mining for Anomaly User Behavior Investigation” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS)Volume 3, Issue 3, May – June 2014 ISSN 2278-6856 [5] R. Lokeshkumar1, R. Sindhuja2, Dr. P. Sengottuvelan, “A Survey on Pre-processing of Web Log File in Web Usage Mining to Improve the Quality of Data” International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 8, August 2014 [6] Mitali Srivastava, Rakhi Garg, P. K. Mishra,” Preprocessing Techniques in Web Usage Mining: A Survey” International Journal of Computer Applications (0975 – 8887) Volume 97– No.18, July 2014 [7] http://www.slideshare.net/akhanna3/discovering-knowledge-using-web-structure-mining-27488978 [8] Ashish Kumar Garg, Mohammad Amir, Jarrar Ahmed, Man Singh, Sham Bansa,” Implementation of a Search Engine” International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064 [9] C.Gomathi, M. Moorthi,” Web Access Pattern Algorithms in Education Domain” Computer and information science journal vol. 1, No.4, November 2008 [10] Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik, “Research Challenges in Web Data Mining”, International Journal of Computer Science and Telecommunications Volume 3, Issue 7, July 2012 [11] Jaideep Srivastava, “Web Mining: Accomplishments & Future Directions”, University of Minnesota USA, srivasta@cs.umn.edu, http://www.cs.umn.edu/faculty/srivasta.html [12] http://www.slideshare.net/AmirFahmideh/web-mining-structure-mining [13] http://www.slideshare.net/Tommy96/web-mining-tutorial [14] http://www.faadooengineers.com/threads/2177-PPT-Link-Mining [15] Deepti Kapila, Prof. Charanjit Singh, “Survey on Page Ranking Algorithms for Digital Libraries”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 6, June 2014 ISSN: 2277 128X
  • 7. [16] Alberto Sillitti, Marco Scotto, Giancarlo Succi, Tullio Vernazza,” News Miner: a Tool for Information Retrieval” [17] Sandhya, Mala chaturvedi, “a survey on web mining algorithms”, The International Journal Of Engineering And Science (IIJES) Volume 2 Issue 3 [18] Ananthi.J,” A Survey Web Content Mining Methods and Applications for Information Extraction from Online Shopping Sites”, International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014 [19] S.Balan, “A Study of Various Techniques of Web Content Mining Research Issues and Tools”, International journal of innovative research and studies ISSN 2319-9725 [20] D.Jayalatchumy, Dr. P.Thambidurai, “Web Mining Research Issues and Future Directions – A Survey”, IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278- 8727Volume 14, Issue 3 [21] Naga Lakshmi, Raja Sekhara Rao , Sai Satyanarayana Reddy, “An Overview of Preprocessing on Web Log Data for Web Usage Analysis”, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4 [21] Mamta M. Hegde, Prof. M.V.Phatak, “Developing an approach for hyperlink analysis with noise reduction using Web Structure Mining”, International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 3, May2012 [23] Mr. Dushyant B.Rathod, Dr.Samrat Khanna, “A Review on Emerging Trends of Web Mining and its Applications” ISSN: 2321-9939
  • 8. INTEGRATED INERTER DESIGN AND APPLICATION TO OPTIMAL VEHICLE SUSPENSION SYSTEM Thanh-Tung Tran1 , Chiaki Hori1 and Hiroshi Hasegawa2 1Graduate of Systems Engineering and Science, Shibaura Institute of Technology, Japan 2College of Systems Engineering and Science, Shibaura Institute of Technology, Japan ABSTRACT The formula cars need high tire grip on racing challenge by reducing rolling displacement at corner or double change lands. In this case study, the paper clarifies some issues related to suspension system with inerter to reduce displacement and rolling angle under impact from road disturbance on Formula SAE Car. We propose some new designs, which have an advance for suspension system by improving dynamics. We optimize design of model based on the minimization of cost functions for roll dynamics, by reducing the displacement transfer and the energy consumed by the inerter. Base on a passive suspension model that we carried out quarter-car and half-car model for different parameters which show the benefit of the inerter. The important advantage of the proposed solution is its integration a new mechanism, the inerter, this system can increase advance in development and have effects on the vehicle dynamics in stability vehicle. KEYWORDS Inerter, Suspension System, Optimal, Formula SAE, Rolling. For More Details :https://airccse.org/journal/ijcax/papers/1314ijcax01.pdf Volume Link : https://airccse.org/journal/ijcax/vol1.html REFERENCES
  • 9. [1] Bosch, 2011. The book, Automotive Handbook, SAE International. [2] Marcello Chiaberge, 2011. The book, New Trends and Developments in Automotive System Engineering, First published. [3] Bohdan T. Kulakowski, John F. Gardner, J. Lowen Shearer, 2007. Cambridge University Press 2007, Dynamic Modeling and Control of Engineering Systems, Third edition. [4] Malcolm C. Smith, 2003. Plenary Lecture, The Inerter Concept and Its Application, Department of Engineering, University of Cambridge, U.K. [5] Michael Z.Q. Chen, Christos Papageorgiou, Frank Scheibe, Fu-Cheng Wang, and Malcolm C. Smith, 2009. IEEE Circuits and Systems Magazine, The Missing Mechanical Circuit Element. [6] Malcolm C. Smith, 2002. IEEE Transactions on Automatic Control, Vol.47, No.10, Synthesis of Mechanical Networks: The Inerter. [7] Takanori Uemura, 2009. Master Thesis in Shibaura Institute of Technology, Proposed suspension system that aims to achieve both ride comfort and maneuverability. [8] Jyuro Izumi, ESPEC Technology Report No. 6, Combined environmental testing for equipment used on automobiles - Overview and test approach.
  • 10. DESIGN OF GENERATIVE MODEL FOR THE LANGUAGE OF TRADITIONAL SUAKIN USING PARAMETRIC SHAPE GRAMMAR Olakanbi Bolaji AbdulRaheem1 and Osama Abdulwahab Rayis1 Design and Innovation Center, Africa City of Technology, Khartoum, Sudan ABSTRACT This paper aims at presenting a parametric shape grammar of traditional Suakin houses (Red Sea state, Sudan). This work systematically attempts to generate appropriate plans arrangement that allows required functional relationships between spaces to be satisfied. The topological and geometrical properties of old Suakin houses were analyzed. These properties were originated and incorporated into the traditional Suakin buildings for the past ten centuries. The shape rules, dimensional, geometric and topological patterns of houses in the corpus are used as the generative model for the language of traditional suakin style This paper concludes with a discussion of the creative and generative value of the parametric shape grammars. Moreover, it facilitates the understanding of the formal composition of Suakin old style and the revival of a contemporary Suakin building style. KEYWORDS Generative model, Parametric shape grammar, Suakin. For More Details : https://aircconline.com/ijcax/V3N3/3316ijcax01.pdf Volume Link : https://airccse.org/journal/ijcax/vol3.html
  • 11. REFERENCES [1] Stiny, G., Pictorial and formal aspects of shape and shape grammars. Vol. 13. 1975: Springer. [2] Stiny, G., Kindergarten grammars: designing with Froebel's building gifts. Environment and Planning B, 1980. 7(4): p. 409-462. [3] Stiny, G., The algebras of design. Research in Engineering Design, 1991. 2(3): p. 171- 181. [4] Stiny, G. and W.J. Mitchell, The palladian grammar. Environment and Planning B, 1978. 5(1): p. 5-18. [5] Flemming, U., The secret of the Casa Giuliani Frigerio. Environment and Planning B, 1981. 8(1). [6] Koning, H. and J. Eizenberg, The language of the prairie: Frank Lloyd Wright's prairie houses. Environment and Planning B, 1981. 8(3): p. 295-323. [7] Laham, W.I., Lebanese House Shape Grammar. 1987. [8] Hanson, N.L.R. and A.D. Radford, Living on the edge: a grammar for some country houses by Glenn Murcutt. Architecture Australia, 1986. 75(5): p. 66-73. [9] Buelinckx, H., Wren's language of City church designs: a formal generative classification. Environment and Planning B, 1993. 20: p. 645-645. [10] Knight, T. Applications in architectural design, and education and practice. in NSF/MIT Workshop on Shape Computation. 1999. [11] Downing, F. and U. Flemming, The bungalows of buffalo. 1981: Department of Architecture, Carnegie-Mellon University. [12] Flemming, U., More than the sum of parts: the grammar of Queen Anne houses. Environment and Planning B: Planning and Design, 1987. 14(3): p. 323-350. [13] Chiou, S.C. and R. Krishnamurti, Example Taiwanese traditional houses. Environment and Planning B, 1996. 23: p. 191-216. [14] Chiou, S.C. and R. Krishnamurti, The grammatical basis of Chinese traditional architecture. Language of Design, 1995. 3: p. 5-31. [15] Aksoy, M., G. Saglamer, and I. Turkey, A SHAPE-GRAMMAR FOR COURTYARD HOUSES. Advanced Technologies: Architecture, Planning, Civil Engineering, 1993: p. 251. [16] Li, A.I., kang. 2001. A shape grammar for teaching the architectural style of the Yingzao fashi, Ph. D. dissertation, Department of Architecture, Massachusetts Institute of Technology, Cambridge, Mass.
  • 12. [17] Li, A.I., A shape grammar for teaching the architectural style of the Yingzao fashi. 2001,Massachusetts Institute of Technology. [18] Mayall, K. and G.B. Hall, Landscape grammar 1: spatial grammar theory and landscape planning. Environment and Planning B, 2005. 32(6): p. 895. [19] Duarte, J., J. Rocha, and G. Ducla-Soares, A patio-house shape grammar for the Medina of Marrakech. publications in Proceedings of ECAADE, 2006. 6. [20] Duarte, J.P., Customizing mass housing: a discursive grammar for Siza's Malagueira houses. 2001, Massachusetts Institute of Technology. [21] Eilouti, B.H. and A.M.I. Al-Jokhadar, A computer-aided rule-based mamluk madrasa plan generator, in Nexus Network Journal. 2007, Springer. p. 31-57. [22] Said, S. and M.R. Embi, A Parametric Shape Grammar of the Traditional Malay Long- Roof Type Houses. International Journal of Architectural Computing, 2008. 6(2): p. 121-144. [23] George, S., Shape: Talking about Seeing and Doing. 2006, MA: MIT Press, Cambridge,MA. [24] Wittgenstein, L., Remarks on the Foundation of Mathematics. MIT Press, Cambridge,Massachusetts, 1991. [25] Stiny, G. and J. Gips, Shape grammars and the generative specification of painting and sculpture. Information processing, 1972. 71(1460-1465). [26] Qezar Musa AlZein, T.M.N., et al., eds. Suakin: Studies in history, civilization and international interactions Khartoum corporation for Press and Publication. Vol. 1. 2013. [27] Dirar, M.S., History Of Suakin and the Red Sea (in Arabic). Vol. 1. 1981, Khartoum: AI Dar AI Sudania. 277. [28] Salim, A.R., Suakin: On Reviving an Ancient Red Sea Port City. Traditional Dwellings and Settlements Review, 1997: p. 63-74. [29] MALLINSON, A.a.E., SUAKIN PATTERN BOOK: A DESIGN AND CONSTRUCTION CODE FOR SUAKIN ISLAND. The SUAKIN PATTERN BOOK. Vol. 1. 2007: MALLINSON A&E, 16 ELVASTON PLACE LONDON, SW7 [30] Salim, A., secrets of Suakin. Vol. 1. 2015, Omdroum, Sudan: Abdel-karim Mirghani cultural centre. 323. [31] C aD daE, G.C., A shape grammar: the language of traditional Turkish houses. Environment and Planing B: Planning and Design, 1996. 23(5): p. 443-464.
  • 13. [32] Colakoglu, B., Design by grammar: an interpretation and generation of vernacular hayat houses in contemporary context. Environment and Planning B: Planning and Design, 2005. 32(1): p. 141-149. [33] Duarte, J.P., A discursive grammar for customizing mass housing: the case of Siza's houses at Malagueira. Automation in Construction, 2005. 14(2): p. 265-275. [34] HOSNY, S.S., SHAPE GRAMMARS: STYLE GENERATORS IN COMPUTER- AIDED ARCHITECTURAL DESIGN future university, department of architecture, Egypt, 2012. [35] Knight, T.W., Languages of designs: from known to new. Environment and Planning B, 1981. 8(2): p. 213-238. [36] Mitchell, W.J., A computational view of design creativity. Modeling creativity and knowledge-based creative design, 1993: p. 25-42.
  • 14. ADVANCED E-VOTING APPLICATION USING ANDROID PLATFORM Ganaraj K PG Scholar, Computer Science Department, Bearys Institute of technology and Engineering Mangalore, Karnataka, India ABSTRACT The advancement in the mobile devices, wireless and web technologies given rise to the new application that will make the voting process very easy and efficient. The E-voting promises the possibility of convenient, easy and safe way to capture and count the votes in an election[1]. This research project provides the specification and requirements for E-Voting using an Android platform. The e-voting means the voting process in election by using electronic device. The android platform is used to develop an evoting application. At first, an introduction about the system is presented. Sections II and III describe all the concepts (survey, design and implementation) that would be used in this work. Finally, the proposed evoting system will be presented. This technology helps the user to cast the vote without visiting the polling booth. The application follows proper authentication measures in order to avoid fraud voters using the system. Once the voting session is completed the results can be available within a fraction of seconds. All the candidates vote count is encrypted and stored in the database in order to avoid any attacks and disclosure of results by third person other than the administrator. Once the session is completed the admin can decrypt the vote count and publish results and can complete the voting process. KEYWORDS Electronic voting, e-mail Network. For More Details : https://aircconline.com/ijcax/V4N2/4217ijcax01.pdf Volume Link : https://airccse.org/journal/ijcax/vol4.html
  • 15. REFERENCES [1] Dr.Aree Ali Mohammed and Ramyar Adbolrahman Timour,Efficient E-voting Android Based System, IJARCSSE,vol.3,Issue 11,2013 [2] A.S. Belenky and R.C. Larson, “To Queue or not to Queue?,” OR/MS 27, October 2013, pp. 30-34. [3] “An Electronic Polling Service to Support Public Awareness Using Web Technologies”, Christos Bouras, Nikolaos Katris, Vassilis Triantafillou. [4] “E-voting on Android System” paper (International Journal of Emerging Technology and Advanced Engineering) prepared by : Kirti Autade, Pallavi Ghadge, Sarika Kale ,Co-authors- Prof. N. J. Kulkarni, Prof. S. S. Mujgond, February 2012. [5] “Electronic Voting,” Encyclopedia of Computers and Computer History, prepared by Lorrie Faith Cranor and edited by Raul Rojas, published by Fitzroy Dearborn, 2001. [6] “Voting – What is, What Could be,” Caltech/MIT Voting Technology Project (VTP) Report, July 2001. [7] Java Cryptography an e-book by Jonathan B. Knudsen, First edition May 1998, ISBN:1-56592-402- 9
  • 16. DATA MINING APPLICATION IN ADVERTISEMENT MANAGEMENT OF HIGHER EDUCATIONAL INSTITUTES Priyanka Saini M.Tech(CS) Student, Banasthali University Rajasthan Sweta Rai M.Tech(CS) Student, Banasthali University Tonk,Rajasthan Ajit Kuamr Jain Assistant Professor, Computer Science Department Banasthali University Tonk,Rajasthan ABSTRACT In recent years, Indian higher educational institute’s competition grows rapidly for attracting students to get enrollment in their institutes. To attract students educational institutes select a best advertisement method. There are different advertisements available in the market but a selection of them is very difficult for institutes. This paper is helpful for institutes to select a best advertisement medium using some data mining methods. KEYWORDS Data Mining, KDD, Data Mining in Education, Association Rule Mining, Apriori Algorithm . For More Details : https://airccse.org/journal/ijcax/papers/1114ijcax05.pdf Volume Link : https://airccse.org/journal/ijcax/vol1.html
  • 17. REFERENCES [1] Han, J., Kamber, M.: Data Mining: Concepts and Techniques,Morgan Kaufmann Publishers USA,(2000). [2] A.Y.K. Chan, K.O. Chow, and K.S. Cheung“,Online Course Refinement through Association Rule Mining”Journal of Educational Technology Systems Volume 36, Number 4 / 2007-2008, pp 433 – 44, 2008. [3] Romero, C., and Ventura S.(2013), “ Data Mining in Education”. WIREs Data Mining and Know.Dis.,Vol.3,pp.12-27. [4] Heikki,Mannila, .Data mining: machine learning, statistics, and databases., IEEE, 1996. [5] Klosgen, W. & Zytkow,J. (2002), Handbook of data mining and knowledge discovery , Oxford University Press, New York. [6] International Educational Data Mining Society www.educationaldatamining.org. [7] C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005”.Expert Systems with Applications 33 (2007) 135-146. [8] S.Pal., “Mining Educational Data to Reduce Dropout Rates of Engineering Students”, I.J. Information Engineering and Electronic Business (IJIEEB), Vol. 4, No. 2, 2012, pp. 1-7. [9] C. Romero and S. Ventura, “Educational data mining: A survey from 1995 to 2005”, expert system with applications 33 (2007) 135-146. [10] S. K. Yadav, B.K. Bharadwaj and S. Pal, “Data Mining Applications: A comparative study for Predicting Student’s Performance”, International Journal of Innovative Technology and CreativeEngineering (IJITCE), Vol. 1, No. 12, pp. 13-19, 2011. [11] U. K. Pandey and S. Pal, “A Data Mining view on Class Room Teaching Language”, IJCSI, Vol 8 issue 2 Maerch 2011 pg 277-282, ISSN 1694-0814. [12] B.K. Bharadwaj and S. Pal. “Mining Educational Data to Analyze Students’ Performance”, International Journal of Advance Computer Science and Applications (IJACSA), Vol. 2, No. 6, pp. 63-69, 2011. [13] Q. A. AI-Radaideh, E. W. AI-Shawakfa, and M. I.AI-Najjar,“Mining student data using decision trees”,International Arab Conference on Information Technology (ACIT’2006), Yarmouk University, Jordan, 2006. [14]K.Shanmuga Priya and A.V.Senthil Kumar,” Improving the Student’s Performance Using Educational Data Mining”, Int. J. Advanced Networking and Applications Volume: 04 Issue: 04 Pages:1680-1685 (2013) ISSN : 0975-0290.
  • 18. [15] Bhise R.B, Thorat S.S, Supekar A.K, “Importance of Data Mining in Higher Education System”, IOSR(Journal Of Humanities And Social Science),Volume 6, Issue 6 ,PP 18-21, (Jan. - Feb.2013). [16] Abeer Badr El Din Ahmed and Ibrahim Sayed Elaraby, “Data Mining: A prediction for Student's Performance Using Classification Method”, World Journal of Computer Application and Technology 2(2): 43-47, 2014.
  • 19. NEW ONTOLOGY RETRIEVAL IMAGE METHOD IN 5K COREL IMAGES Hossein Sahlani Department of Information, Amin University, Tehran, Iran ABSTRACT Semantic annotation of images is an important research topic on both image understanding database or web image search. Image annotation is a technique to choosing appropriate labels for images with extracting effective and hidden feature in pictures. In the feature extraction step of proposed method, we present a model, which combined effective features of visual topics (global features over an image) and regional contexts (relationship between the regions in Image and each other regions images) toautomatic image annotation.In the annotation step of proposed method, we create a new ontology (base on WordNet ontology) for the semantic relationships between tags in the classification and improving semantic gap exist in the automatic image annotation.Experiments result on the 5k Corel dataset show the proposed method of image annotation in addition to reducing the complexity of the classification, increased accuracy compared to the another methods. KEYWORDS Automatic Image Annotation, Ontology, Statistical Models, Regional Contexts, Visual Topics. For More Details : https://aircconline.com/ijcax/V3N4/3416ijcax01.pdf Volume Link : https://airccse.org/journal/ijcax/vol3.html
  • 20. REFERENCES [1] Einarsson S. H, (2004), "Data structures for intermediate search results in the Eff2 image retrieval system," ReykjavĂ­k University, technical report. [2] A. Tousch, S. Herbin, J. Audlibert, (2012) “Semantic Hierarchies for Image Annotation: A Survey,” Elsevier Ltd., Pattern Recognition, vl.40, pp. 333-345. [3] Long F, Zhang H and Dagan Feng D, (2003), "Fundamentals of content-based image retrieval, in Multimedia Information Retrieval and Management Technological Fundamentals and Applications," Springer-Verlag, pp. 1-26. [4] D. Zhang, Md.M. Islam, G. Lu, (2011) “A review on automatic image annotation techniques,” Elsevier Ltd., Pattern Recognition, vol. 45. [5] Li X, Chen S, Shyu M and Furht B, (2002), "An Effective Content-Based Visual Image Retrieval System," in 26th IEEE Computer Society International Computer Software and Applications Conference (COMPSAC), Oxford, pp. 914- 919. [6] Rui Y., Huang Th. S. and Chang Sh., (1999), "Image Retrieval: Current Techniques, Promising Directions, and Open Issues," Journal of Visual Communication and Image Representation, vol. 10, pp. 39–62. [8] S. J. Hwang, K. Grauman, and F. Sha. (2014), Semantic kernel forests from multiple taxonomies. Neural Information Processing Systems. [9] S. J. Hwang, K. Grauman, and F. Sha. (2014),“Analogy-preserving semantic embedding for visual object categorization”. International Conference on Machine Learning, pages 639–647. [10] Mohammad Mehdi Farhangi, Mohsen Soryani, Mahmood Fathy, (2012): Improvement the Bag of Words Image Representation Using Spatial Information. ACITY (2): 681-690. [11] Guang-Hai Liu, Lei Zhang, Ying-Kun Hou, Zuo-Yong Li, Jing-Yu Yang, (2010) “Image retrieval based on multi-texton histogram”, Pattern Recognition Journals of science direct, Volume 43, Issue 7, July, Pages 2380–2389. [12] HengameDeljooi, Ahmad R. Eskandari, (2014) “A Novel Semantic Statistical Model for Automatic Image Annotation Using the Relationship between the Regions Based on Multi- Criteria Decision Making”, International Journal of Electrical and Computer Engineering (IJECE), Vol. 4, No. 1, Feburary, pp. 37~51. [13] HengameDeljooi, SomayyeJafaraliJassbi,(2015) “A Multi Criteria Decision Making Based Approach for Semantic Image Annotation”, International Journal of Computer-Aided Technologies (IJCAx) Vol.2, No.1.
  • 21. DECISION TREE ALGORITHM IMPLEMENTATIONUSING EDUCATIONAL DATA Priyanka Saini1 ,Sweta Rai2 and Ajit Kumar Jain3 1,2 M.Tech Student, Banasthali University, Tonk, Rajasthan 3 Assistant Professor , Department of Computer Science, Banasthali University ABSTRACT There is different decision tree based algorithms in data mining tools. These algorithms are used for classification of data objects and used for decision making purpose. This study determines the decision tree based ID3 algorithm and its implementation with student data example. KEYWORDS Decision tree, ID3 algorithm, Entropy and Information Gain. For More Details : https://airccse.org/journal/ijcax/papers/1114ijcax04.pdf Volume Link :https://airccse.org/journal/ijcax/vol1.html
  • 22. REFERENCES [1] Quinlan, J.R. 1986, Induction of Decision trees, Machine Learning. [2] Anand Bahety,’ Extension and Evaluation of ID3 – Decision Tree Algorithm’. University of Maryland, College Park. [3] Mary Slocum,‟,Decision making using ID3,RIVIER ACADEMIC JOURNAL, VOLUME 8, NUMBER 2, FALL 2012. [4] Kumar Ashok, Taneja H C, Chitkara Ashok K and Kumar Vikas,’ Classification of Census Using Information Theoretic Measure Based ID3 Algorithm’ . Int. Journal of Math. Analysis, Vol. 6, 2012, no. 51, 2511 – 2518. [5] Sonika Tiwari and Prof. Roopali Soni,’ Horizontal partitioning ID3 algorithm A new approach of detecting network anomalies using decision tree’, International Journal of Engineering Research & Technology (IJERT)Vol. 1 Issue 7, eptember – 2012.
  • 23. COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS Mohamed Elboukhari1 , Mostafa Azizi1 and Abdelmalek Azizi2,3 1 Department of Applied Engineering, ESTO, Oujda, Morocco 2 Departement Mathematics & Computer Science, FSO, Oujda, Morocco 3 Academy Hassan II of Sciences & Technology, Rabat, Morocco ABSTRACT A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate without any pre-determined infrastructure and fixed organization of available links. Each node in MANET operates as a router, forwarding information packets for other mobile nodes. There are many routing protocols that possess different performance levels in different scenarios. The main task is to evaluate the existing routing protocols and finding by comparing them the best one. In this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol. We study these five MANETs routing protocols by different simulations in NS-2 simulator. We describe that pause time parameter affect their performance. This performance analysis is measured in terms of Packet Delivery Ratio, Average End-to- End Delay, Normalized Routing Load and Average Throughput. KEYWORDS Mobile Ad Hoc Network (MANET), Performance Parameters, AODV, DSR, DSDV, OLSR, DYMO. For More Details : https://airccse.org/journal/ijcax/papers/2215ijcax01.pdf Volume Link : https://airccse.org/journal/ijcax/vol2.html
  • 24. REFERENCES [1] Rahman A, Islam S, Talevski A. 2009. Performance measurement of various routing protocols in ad-hoc network”. In: Proceedings of the international multiconference of engineers and computer scientists, vol. 1. Hong Kong: IMECS. [2] Tyagi SS, Chauhan RK. 2010. Performance analysis of proactive and reactive routing protocols for ad hoc networks. Int J Comput Appl 2010;1(14). [3] Basagni S, Conti M, Giordano S, Stojmenovic I. 2004. Mobile ad hoc networking. A John wiley and sons, Inc., Publication. [4] AkshaiAggarwal,SavitaGandhi,NirbhayChaubey. 2011. Performance Analysis of AODV, DSDV and DSR in MANETs. IJDPS, Vol.2, No.6. [5] P. Manickam T. Guru Baskar , M.Girija, Dr.D.Manimegala. 2011. Performance Comparisons of Routing Protocols in Mobile Ad- Hoc Networks. International Journal of Wireless & Mobile Networks (IJWMN), pp. 98-106. [6] Sabina Barakovic, Suad Kasapovic, and Jasmina Barakovic. 2010. Comparison of MANET Routing Protocols in Different Traffic and Mobility Models”, Telfor Journal, Vol. 2, No. 1. [7] Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare. 2008. Simulation Based Comparative Performance Analysis of Adhoc Routing Protocols. Proceedings of TENCON 2008. [8] Chenna Reddy, P.; ChandraSekhar Reddy, P. 2006. Performance Analysis of Adhoc Network Routing Protocols. ISAUHC '06, International Symposium on Ad Hoc andUbiquitous Computing, vol., no., pp.186-187, 20-23 Dec. [9] Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar. 2011. Comparative Study of Adhoc Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork. Indian Journal of Computer Science and Engineering Vol. 1 No. 4 364-371. [10] Ginni Tonk, Indu Kashyap, S.S. Tyagi. 2012. Performance Comparison of Ad-Hoc Network Routing Protocols using NS-2. International Journal of Innovative Technology and Exploring Engineering (IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1. [11] Li Layuan, Li Chunlin, Yaun Peiyan. 2007. Performance evaluation and simulation of routing protocols in ad hocnetworks. Computer Communications 30 (2007) 1890- 1898. [12] Vijayalaskhmi M. Avinash Patel, Linganagouda Kulkarni.2011. QoS Parameter Analysis on AODV and DSDV Protocols in a Wireless Network. International Journal of Communication Network and Security, Volume-1, Issue-1.
  • 25. [13] Deepak Kumar, Ashutosh Srivastava, S C Gupta. 2012. Performance Comparison of DSDV and AODV Routing Protocols in MANETS. International Journal of Electronics Communication and Computer Technology (IJECCT) Volume 2 Issue 3. [14] Jun-Zhao Sun.2001. Mobile Ad Hoc Networking: An Essential Technology for Pervasive Computing. Proceedings of International conference on info-tech and info-net, Vol-3, pp. 316- 321. [15] C.E. Perkins and E.M. Royer.1999. Ad-hoc On-Demand Distance Vector Routing”, Proceeding of 2nd IEEE Workshop. Mobile Computing System Applications, pp:90-100. [16] Perkins, E. Belding-Royer, and S. Das. 2003. Ad hoc On-Demand Distance Vector (AODV) Routing. “draft-ietf-manet-aodv-13.txt. [17] S. A. Ade1& P.A.Tijare. 2010. Performance Comparison of AODV, DSDV, OLSR and DSR Routing Protocols in Mobile Ad Hoc Networks. International Journal of Information Technology and Knowledge Management July-December 2010, Volume 2, No. 2, pp. 545-548. [18] J. Broch, D. Jhonson, and D. Maltz.2007. The dynamic source routing protocol for mobile adhoc networks for IPv4” IETF RFC 4728. [19] I. Chakeres and C. Perkins.2012. Dynamic MANET On-Demand (DYMO) Routing. IETF Internet-Draft, draft-ietf-manet-dymo-23. [20] Charles E. Perkins and Pravin Bhagwat. 1994. Highly dynamic destination-sequenced distancevector routing (DSDV) for mobile computers. Technical report, IBM Research and University of Maryland, USA. [21] T. Clausen and P. Jacquet.2003. Optimized link State Routing protocol (OLSR). RFC-3626, IETF Networking Group. [22] Aleksandr Huhtonen.2004. Comparing AODV and OLSR routing protocols. Helsinki University of Technology, Telecommunication software and multimedia laboratory. [23] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas . 2009 .MANET Routing Protocols vs. Mobility Models: Performance Analysis and Comparison. Proceedings of the 9th WSEAS International Conference on Applied Informatics and Communications (AIC '09). [24] BonnMotion: A mobility scenario generation and analysis tool. 2014. Available at http://sys.cs.uos.de/bonnmotion/ [25] NS -2, the ns Manual. 2014. Available at http: //www. isi.edu/nsnam/ns/doc. [26] Francisco J. Ros. 2014. Software development available at http://masimum.inf.um.es/fjrm/development/
  • 26. [27] Robins A.D. 2010. “GAWK: an effective AWK programming”, 3rd ed. [28] MATLAB: The language of Technical Computing. 2014.Available at http://www.mathworks.com/ [29] S.Corson and J.Macker. 1999. Routing Protocol Performance Issues and Evaluation considerations. RFC2501, IETF Network Working Group. [30] The NS-3 reference manual. 2014. Available at http://www.nsnam.org/