SlideShare a Scribd company logo
1 of 8
Download to read offline
TOP DOWNLOADED
ARTICLE IN ACADEMIA
2020
International Journal of Information Technology,
Modeling and Computing (IJITMC)
http://airccse.org/journal/ijitmc/index.html
ISSN: 2320-7493 (Online); 2320-8449 (Print)
A Novel Secure Combination Technique of Steganography And Cryptography
Pye Pye Aung1 and Tun Min Naing2
1
University of Technology (Yatanarpon Cyber City),Pyin Oo Lwin, Myanmar
2
Computer University (Pathein), Myanmar
ABSTRACT
A new technique proposed with the combination of cryptography and Steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distortsa message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which
issued to hide in cover image. In steganography, a part of encrypted message as a key is used to hide
indiscrete cosine transform (DCT)of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
KEYWORDS
Cryptography, DCT Coefficient, Hiding Text, Steganography, Stego-image
PDF LINK: http://airccse.org/journal/ijitmc/papers/2114ijitmc05.pdf
Volume Link: http://airccse.org/journal/ijitmc/current2014.html
REFERENCES
[1] Secure Data Transmission using Stenography and Encryption Technique, Shamim Ahmed
Laskar and Kattamanchi Hemachandran, International Journal on Cryptography and Information
Security (IJCIS), Vol.2, No.3, September 2012.
[2] Novel Security Scheme for Image Steganography using Cryptography Technique,
International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 2, Issue 4, April 2012.
[3] A Novel Information Security Scheme using Cryptic Steganography B. Raja Rao et. al. /
Indian Journal of Computer Science and Engineering Vol. 1 No. 4 327-332.
[4] G. Ulutas, M. Ulutas and V. Nabiyev, “Distortion free geometry based secret image sharing”,
Elsevier Inc, Procedia Computer Science, Vol.3, pp.721–726, 2011.
[5] Proposed System for Data Hiding Using Cryptography And Setganography International
Journal of Computer Applications (0975 – 8887) Volume 8– No.9, October 2010.
[6] B. E. Carvajal-Gámez , F. J. Gallegos-Funes and J. L. López-Bonilla, “Scaling Factor for
RGB Images to Steganography Applications”, Journal of Vectorial Relativity, Vol.4, No.3
pp.55-65, 2009.
[7] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography,
Computer Vision theory and applications volume 1, pp. 127-134.
[8] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm
optimization algorithm”, Information Sciences 177 (15) (2007) 3099–31091.
[9] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography,
Computer Vision theory and applications volume 1, pp. 127-134.
[10] William Stallings, ―Cryptography and Network Security: Principles and practices‖, Pearson
education, Third Edit ion, ISBN 81-7808-902-5.
SUPERVISED LEARNING MODEL FOR KICKSTARTER CAMPAIGNS
WITH R MINING
R. S. Kamath1 and R. K. Kamat2
1
Department of Computer Studies, Chatrapati Shahu Institute of Business Education and
Research, Kolhapur, India
2
Department of Electronics, Shiva University, Kolhapur
ABSTRACT
Web mediated crowd funding is a talented paradigm used by project launcher to solicit funds from
backers to realize projects. Kickstarter is one such largest funding platform for creative projects.
However, not all the campaigns in Kickstarter attain their funding goal and are successful. It is therefore
important to know about campaigns’ chances of success. As a broad goal, authors intended in extraction
of the hidden knowledge from the Kickstarter campaign database and classification of these projects
based on their dependency parameters. For this authors have designed a classification model for the
analysis of Kickstarter campaigns by using direct information retrieved from Kickstarter URLs. This aids
to identify the possibility of success of a campaign.
KEYWORDS
Crowd funding; prediction; classifiers; machine learning; R systems; kickstarter
PDF LINK: http://aircconline.com/ijitmc/V4N1/4116ijitmc02.pdf
Volume Link: http://airccse.org/journal/ijitmc/current2016.html
References
[1] Aleyasen, A. (2014) ‘KickUpper: A Tool For Making Better Crowdfunding Projects’. Spring
2014.
[2] An, J., Quercia, D. and Crowcroft, J. (2014) ‘Recommending Investors for Crowdfunding
Projects’, WWW’14, April 7–11, Seoul, Korea
[3] Carpita M., Simonetto A., Sandri M. And Zuccolotto P. (2014) ‘Football Mining with R’.
Data Mining Applications with R, Chapter 14, Academic Press, Elsevier,
[4] Chen, K., Jones, B., Kim, I. and Schlamp, B. n.d. KickPredict: Predicting Kickstarter
Success.
[5] courses.cms.caltech.edu/cs145/2013/blue.pdf (Accessed 04 April 2015).
[6] Elizabeth, M., Gerber, Julie, S. and Kuo, P. n.d. Crowdfunding: Why People Are Motivated
to Post and Fund Projects on Crowdfunding Platform.
http://www.juliehui.org/wpcontent/uploads/2013/04/CSCW_Crowdfunding_Final.pdf Accessed
04 April 2015).
[7] Etter, V., Grossglauser, M., and Thiran, P. (2013) ‘Predicting the Success of Kickstarter
Campaigns’, COSN’13, October 7–8, Boston, Massachusetts, USA.
[8] Grivenics, D., Sprovieri, D., Zwimpfer, C., Dornberger, R. and Hil, D. (2014) Crowdfunding
IT Research and Business Ideas: Predicting the chances of success of a crowdfunding project.
http://www.sprovieri.eu/crowdfunding_paper.pdf (Accessed 02 April 2015).
[9] Koenig, M. n.d. Make Your Kickstarter Crowdfunding Campaign Insanely Successful.
http://bit.ly/FiverrKickstarterSeminar (Accessed 08 April 2015]
[10] Kuppuswamy, V. and Bayus, B. (2014) ‘Crowdfunding Creative Ideas: The Dynamics of
Project Backers in Kickstarter’, UNC Kenan-Flagler Research Paper.
[11] Lu, C., Xie, S., Kong, X. and Yu, P. (2014) ‘Inferring the Impacts of Social Media on
Crowdfunding’, WSDM’14, February 24–28, New York, New York, USA.
[12] Michael, D., Greenberg, Hariharan, K., Gerber, E., and Pardo, B. (2013) ‘Crowdfunding
Support Tools: Predicting Success & Failure’ CHI’13, April 27 – May 2, Paris, France ACM.
[13] Mitra, T. (2014) ‘The Language that Gets People to Give: Phrases that Predict Success on
Kickstarter’, Proceedings of the 17th ACM conference on Computer supported cooperative work
& social computing, 49–61. ACM.
[14] Mollick, E. (2014) ‘The dynamics of crowdfunding: An exploratory study’, Journal of
Business Venturing Vol. 29 Iss. 1 pp:1–16
[15] Owano, N., (2013) Prediction model for Kickstarter tells if projects will sail,
http://phys.org/news/2013-10-kickstarter.html (Accessed 27 March 2015)
[16] Pravilovic, S. (2013) ‘R language in data mining techniques and statistics’, American
Journal of Software Engineering and Applications, Vol. 2 Iss. 1 pp 7-12
[17] Rakesh, V., Choo, J., and Reddy, C. n.d. ‘What Motivates People to Invest in Crowdfunding
Projects? Recommendation using Heterogeneous Traits in Kickstarter’, Association for the
Advancement of Artificial Intelligence, [online] www.aaai.org (Accessed 04 April 2015)
[18] Witt, N. n.d. A Kickstarter’s Guide To Kickstarter: How to successfully fund your creative
project’, http://kickstarterguide.com/files/2012/07/A-Kickstarters-Guide.pdf (Accessed 28 March
2015)
[19] Xu, A., Yang, X., Rao, H., Fu, W., Huang, S. and Bailey, B. (2014) ‘Show Me the Money!
An Analysis of Project Updates during Crowdfunding Campaigns’, CHI’14, April 26 – May 1,
Toronto, ON, Canada. ACM 978-1-4503-2473-1/14/04
Optimal and PID Controller for Controlling Camera’s Position in Unmanned
Aerial Vehicles
MOHAMMAD ABDULRAHMAN AL-MASHHADANI
Department of Information System and Technology, Belarusian National Technical
University, Minsk, Belarus
ABSTRACT
This paper describes two controllers designed specifically for adjusting camera’s position in a small
unmanned aerial vehicle (UAV). The optimal controller was designed and first simulated by using
MATLAB technique and the results displayed graphically, also PID controller was designed and
simulatedby using MATLAB technique .The goal of this paper is to connect the tow controllers in
cascade mode to obtain the desired performance and correction in camera’s position in both roll and pitch.
KEYWORDS
Unmanned Aerial Vehicles, System Control, Servo Motor, PID Controller, Optimal Control.
PDF Link: http://airccse.org/journal/ijitmc/papers/1413ijitmc03.pdf
Volume Link: http://airccse.org/journal/ijitmc/current2012.html
REFERENCES
[1] SeferKurnaz , Omer Cetin and OkyayKaynak , Adaptive neuro-fuzzy inference system based
autonomous flight controlof unmanned air vehicles, Expert Systems with Applications 37
,2010,P 1229–1234
[2] Rahul Malhotra, Narinder Singh, Yaduvir Singh, SOFT COMPUTING TECHNIQUES FOR
PROCESSCONTROL APPLICATIONS, International Journal on Soft Computing ( IJSC ),
Vol.2, No.3, August 2011
[3] SHAMSUL NIZAM BIN MOHD YUSOF AHAMID, DEVELOPING LQR TO CONTROL
SPEED MOTOR USING MATLAB GUI, Faculty of Electrical and Electronics Engineering ,
University Malaysia Pahang, NOVEMBER 2008
[4] Jyotsna’sBlog,SERVOMECHANISMS AND ITS APPLICATIONS,July 2009
[5] http://www.engineersgarage.com/articles/servo-motor
[6] Servo control systems: DC servomechanisms. Control-systems principles.co.UK.
[7] Downs, Stuart G., unmanned air vehicle servoing dipole, Northrop Grumman Corporation
Los Angeles, CA,2004 [8] PID control-National Instrument , http://www.ni.com/white-
paper/6440/en
[9] Tsai-JiunRenand Tien-ChiChen, Motion control for a two-wheeled vehicle using a self-
tuning PID controller, Control Engineering Practice Volume 16, Issue 3, March 2008, P 365–375
[10] Wallén, A. (2000): “Tools for Autonomous Process Control”. PhD, Department of
automatic Control, Lund Institute of Technology, Lund, Sweden.
[11] Panagopoulos, H. (2000): “PID Control; Design, Extension, Application”. PhD thesis,
Department of automatic Control, Lund Institute of Technology, Lund,Sweden.
[12] ieniazek, J. Software-based Camera Stabilization on Unmanned Aircraft, Aircraft
Engineering and Aerospace Technology: An International Journal, Vol. 75, No. 6, 2003.

More Related Content

What's hot

Extracting City Traffic Events from Social Streams
 Extracting City Traffic Events from Social Streams Extracting City Traffic Events from Social Streams
Extracting City Traffic Events from Social StreamsPramod Anantharam
 
An Efficient Activity Detection System based on Skeleton Joints Identification
An Efficient Activity Detection System based on Skeleton Joints Identification An Efficient Activity Detection System based on Skeleton Joints Identification
An Efficient Activity Detection System based on Skeleton Joints Identification IJECEIAES
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - gerogepatton
 
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWARE
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWAREUBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWARE
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWAREijseajournal
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
 
Philosophy of Deep Learning
Philosophy of Deep LearningPhilosophy of Deep Learning
Philosophy of Deep LearningMelanie Swan
 
A study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainA study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainSof Ouni
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2IRJET Journal
 
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...Artificial Intelligence Institute at UofSC
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksIJSRED
 
Artificial intelligence in civil engineering seminar report
Artificial intelligence in civil engineering seminar reportArtificial intelligence in civil engineering seminar report
Artificial intelligence in civil engineering seminar reportDhanushS51
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEijesajournal
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEditor IJCATR
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Paolo Missier
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems IJECEIAES
 

What's hot (20)

Extracting City Traffic Events from Social Streams
 Extracting City Traffic Events from Social Streams Extracting City Traffic Events from Social Streams
Extracting City Traffic Events from Social Streams
 
An Efficient Activity Detection System based on Skeleton Joints Identification
An Efficient Activity Detection System based on Skeleton Joints Identification An Efficient Activity Detection System based on Skeleton Joints Identification
An Efficient Activity Detection System based on Skeleton Joints Identification
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWARE
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWAREUBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWARE
UBIQUITOUS COMPUTING AND SCRUM SOFTWARE ANALYSIS FOR COMMUNITY SOFTWARE
 
Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...Multi-objective NSGA-II based community detection using dynamical evolution s...
Multi-objective NSGA-II based community detection using dynamical evolution s...
 
Philosophy of Deep Learning
Philosophy of Deep LearningPhilosophy of Deep Learning
Philosophy of Deep Learning
 
Understanding City Traffic Dynamics Utilizing Sensor and Textual Observations
Understanding City Traffic Dynamics Utilizing Sensor and Textual ObservationsUnderstanding City Traffic Dynamics Utilizing Sensor and Textual Observations
Understanding City Traffic Dynamics Utilizing Sensor and Textual Observations
 
A study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainA study of existing ontologies in the io t domain
A study of existing ontologies in the io t domain
 
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2 IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
IRJET - Explicit Content Detection using Faster R-CNN and SSD Mobilenet V2
 
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
 
Application To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural NetworksApplication To Monitor And Manage People In Crowded Places Using Neural Networks
Application To Monitor And Manage People In Crowded Places Using Neural Networks
 
Artificial intelligence in civil engineering seminar report
Artificial intelligence in civil engineering seminar reportArtificial intelligence in civil engineering seminar report
Artificial intelligence in civil engineering seminar report
 
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCEANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
ANALYSIS OF SYSTEM ON CHIP DESIGN USING ARTIFICIAL INTELLIGENCE
 
New research articles 2019 - July issue : International Journal of Computer ...
New research articles 2019 - July issue :  International Journal of Computer ...New research articles 2019 - July issue :  International Journal of Computer ...
New research articles 2019 - July issue : International Journal of Computer ...
 
Effective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography TechniquesEffective Parameters of Image Steganography Techniques
Effective Parameters of Image Steganography Techniques
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
323462348
323462348323462348
323462348
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)Transparency in ML and AI (humble views from a concerned academic)
Transparency in ML and AI (humble views from a concerned academic)
 
A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems A one decade survey of autonomous mobile robot systems
A one decade survey of autonomous mobile robot systems
 

Similar to Top downloaded article in academia 2020 - International Journal of Information Technology, Modeling and Computing (IJITMC)

Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 AIRCC Publishing Corporation
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
Top Downloaded Papers : International Journal of Software Engineering & Appli...
Top Downloaded Papers : International Journal of Software Engineering & Appli...Top Downloaded Papers : International Journal of Software Engineering & Appli...
Top Downloaded Papers : International Journal of Software Engineering & Appli...ijseajournal
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing sipij
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processingsipij
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processingsipij
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processingsipij
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligencevivatechijri
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processingsipij
 
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...rinzindorjej
 
January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering IJCSEA Journal
 
Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technologydannyijwest
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...ijesajournal
 

Similar to Top downloaded article in academia 2020 - International Journal of Information Technology, Modeling and Computing (IJITMC) (20)

Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019 Top Computer Science & Information Technology Articles of 2019
Top Computer Science & Information Technology Articles of 2019
 
June 2022: Top 10 Read Articles in Signal & Image Processing
June 2022: Top 10 Read Articles in Signal & Image   ProcessingJune 2022: Top 10 Read Articles in Signal & Image   Processing
June 2022: Top 10 Read Articles in Signal & Image Processing
 
Top Downloaded Papers : International Journal of Software Engineering & Appli...
Top Downloaded Papers : International Journal of Software Engineering & Appli...Top Downloaded Papers : International Journal of Software Engineering & Appli...
Top Downloaded Papers : International Journal of Software Engineering & Appli...
 
January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing	January 2023: Top 10 Read Articles in Signal &Image Processing
January 2023: Top 10 Read Articles in Signal &Image Processing
 
August 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image ProcessingAugust 2022: Top 10 Read Articles in Signal & Image Processing
August 2022: Top 10 Read Articles in Signal & Image Processing
 
September 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image ProcessingSeptember 2022: Top 10 Read Articles in Signal & Image Processing
September 2022: Top 10 Read Articles in Signal & Image Processing
 
October 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image ProcessingOctober 2022: Top 10 Read Articles in Signal & Image Processing
October 2022: Top 10 Read Articles in Signal & Image Processing
 
April 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image ProcessingApril 2022: Top Read Articles in Signal & Image Processing
April 2022: Top Read Articles in Signal & Image Processing
 
July 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image ProcessingJuly 2022: Top 10 Read Articles in Signal & Image Processing
July 2022: Top 10 Read Articles in Signal & Image Processing
 
May 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image ProcessingMay 2022: Top Read Articles in Signal & Image Processing
May 2022: Top Read Articles in Signal & Image Processing
 
SCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial IntelligenceSCCAI- A Student Career Counselling Artificial Intelligence
SCCAI- A Student Career Counselling Artificial Intelligence
 
April 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image ProcessingApril 2023: Top 10 Read Articles in Signal & Image Processing
April 2023: Top 10 Read Articles in Signal & Image Processing
 
International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...International Journal of Computational Science, Information Technology and Co...
International Journal of Computational Science, Information Technology and Co...
 
January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering January 2021: Top Ten Cited Article in Computer Science, Engineering
January 2021: Top Ten Cited Article in Computer Science, Engineering
 
Top 10 Read articles in Web & semantic technology
 Top  10 Read articles in Web & semantic technology Top  10 Read articles in Web & semantic technology
Top 10 Read articles in Web & semantic technology
 
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...
 
June 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its ApplicationsJune 2023: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
 
April 2023: Top 10 Read Articles in Network Security and Its Applications
 April 2023: Top 10 Read Articles in Network Security and Its Applications April 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
 
January 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its ApplicationsJanuary 2023: Top 10 Read Articles in Network Security and Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
 
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...September 2022-Top 10 Cited Articles-International Journal of Embedded System...
September 2022-Top 10 Cited Articles-International Journal of Embedded System...
 

Recently uploaded

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 

Recently uploaded (20)

#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 

Top downloaded article in academia 2020 - International Journal of Information Technology, Modeling and Computing (IJITMC)

  • 1. TOP DOWNLOADED ARTICLE IN ACADEMIA 2020 International Journal of Information Technology, Modeling and Computing (IJITMC) http://airccse.org/journal/ijitmc/index.html ISSN: 2320-7493 (Online); 2320-8449 (Print)
  • 2. A Novel Secure Combination Technique of Steganography And Cryptography Pye Pye Aung1 and Tun Min Naing2 1 University of Technology (Yatanarpon Cyber City),Pyin Oo Lwin, Myanmar 2 Computer University (Pathein), Myanmar ABSTRACT A new technique proposed with the combination of cryptography and Steganography enhanced with new secure feature for generating a new security system. Cryptography and Steganography are two popular ways for secure data transmission in which the former distortsa message so it cannot be understood and another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which issued to hide in cover image. In steganography, a part of encrypted message as a key is used to hide indiscrete cosine transform (DCT)of an image which is highly secured. This kind of system is to be introduced in applications such as transferring secret data that can be authentication of various fields. KEYWORDS Cryptography, DCT Coefficient, Hiding Text, Steganography, Stego-image PDF LINK: http://airccse.org/journal/ijitmc/papers/2114ijitmc05.pdf Volume Link: http://airccse.org/journal/ijitmc/current2014.html
  • 3. REFERENCES [1] Secure Data Transmission using Stenography and Encryption Technique, Shamim Ahmed Laskar and Kattamanchi Hemachandran, International Journal on Cryptography and Information Security (IJCIS), Vol.2, No.3, September 2012. [2] Novel Security Scheme for Image Steganography using Cryptography Technique, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012. [3] A Novel Information Security Scheme using Cryptic Steganography B. Raja Rao et. al. / Indian Journal of Computer Science and Engineering Vol. 1 No. 4 327-332. [4] G. Ulutas, M. Ulutas and V. Nabiyev, “Distortion free geometry based secret image sharing”, Elsevier Inc, Procedia Computer Science, Vol.3, pp.721–726, 2011. [5] Proposed System for Data Hiding Using Cryptography And Setganography International Journal of Computer Applications (0975 – 8887) Volume 8– No.9, October 2010. [6] B. E. Carvajal-Gámez , F. J. Gallegos-Funes and J. L. López-Bonilla, “Scaling Factor for RGB Images to Steganography Applications”, Journal of Vectorial Relativity, Vol.4, No.3 pp.55-65, 2009. [7] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1, pp. 127-134. [8] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm optimization algorithm”, Information Sciences 177 (15) (2007) 3099–31091. [9] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography, Computer Vision theory and applications volume 1, pp. 127-134. [10] William Stallings, ―Cryptography and Network Security: Principles and practices‖, Pearson education, Third Edit ion, ISBN 81-7808-902-5.
  • 4. SUPERVISED LEARNING MODEL FOR KICKSTARTER CAMPAIGNS WITH R MINING R. S. Kamath1 and R. K. Kamat2 1 Department of Computer Studies, Chatrapati Shahu Institute of Business Education and Research, Kolhapur, India 2 Department of Electronics, Shiva University, Kolhapur ABSTRACT Web mediated crowd funding is a talented paradigm used by project launcher to solicit funds from backers to realize projects. Kickstarter is one such largest funding platform for creative projects. However, not all the campaigns in Kickstarter attain their funding goal and are successful. It is therefore important to know about campaigns’ chances of success. As a broad goal, authors intended in extraction of the hidden knowledge from the Kickstarter campaign database and classification of these projects based on their dependency parameters. For this authors have designed a classification model for the analysis of Kickstarter campaigns by using direct information retrieved from Kickstarter URLs. This aids to identify the possibility of success of a campaign. KEYWORDS Crowd funding; prediction; classifiers; machine learning; R systems; kickstarter PDF LINK: http://aircconline.com/ijitmc/V4N1/4116ijitmc02.pdf Volume Link: http://airccse.org/journal/ijitmc/current2016.html
  • 5. References [1] Aleyasen, A. (2014) ‘KickUpper: A Tool For Making Better Crowdfunding Projects’. Spring 2014. [2] An, J., Quercia, D. and Crowcroft, J. (2014) ‘Recommending Investors for Crowdfunding Projects’, WWW’14, April 7–11, Seoul, Korea [3] Carpita M., Simonetto A., Sandri M. And Zuccolotto P. (2014) ‘Football Mining with R’. Data Mining Applications with R, Chapter 14, Academic Press, Elsevier, [4] Chen, K., Jones, B., Kim, I. and Schlamp, B. n.d. KickPredict: Predicting Kickstarter Success. [5] courses.cms.caltech.edu/cs145/2013/blue.pdf (Accessed 04 April 2015). [6] Elizabeth, M., Gerber, Julie, S. and Kuo, P. n.d. Crowdfunding: Why People Are Motivated to Post and Fund Projects on Crowdfunding Platform. http://www.juliehui.org/wpcontent/uploads/2013/04/CSCW_Crowdfunding_Final.pdf Accessed 04 April 2015). [7] Etter, V., Grossglauser, M., and Thiran, P. (2013) ‘Predicting the Success of Kickstarter Campaigns’, COSN’13, October 7–8, Boston, Massachusetts, USA. [8] Grivenics, D., Sprovieri, D., Zwimpfer, C., Dornberger, R. and Hil, D. (2014) Crowdfunding IT Research and Business Ideas: Predicting the chances of success of a crowdfunding project. http://www.sprovieri.eu/crowdfunding_paper.pdf (Accessed 02 April 2015). [9] Koenig, M. n.d. Make Your Kickstarter Crowdfunding Campaign Insanely Successful. http://bit.ly/FiverrKickstarterSeminar (Accessed 08 April 2015] [10] Kuppuswamy, V. and Bayus, B. (2014) ‘Crowdfunding Creative Ideas: The Dynamics of Project Backers in Kickstarter’, UNC Kenan-Flagler Research Paper. [11] Lu, C., Xie, S., Kong, X. and Yu, P. (2014) ‘Inferring the Impacts of Social Media on Crowdfunding’, WSDM’14, February 24–28, New York, New York, USA. [12] Michael, D., Greenberg, Hariharan, K., Gerber, E., and Pardo, B. (2013) ‘Crowdfunding Support Tools: Predicting Success & Failure’ CHI’13, April 27 – May 2, Paris, France ACM. [13] Mitra, T. (2014) ‘The Language that Gets People to Give: Phrases that Predict Success on Kickstarter’, Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, 49–61. ACM. [14] Mollick, E. (2014) ‘The dynamics of crowdfunding: An exploratory study’, Journal of Business Venturing Vol. 29 Iss. 1 pp:1–16 [15] Owano, N., (2013) Prediction model for Kickstarter tells if projects will sail, http://phys.org/news/2013-10-kickstarter.html (Accessed 27 March 2015)
  • 6. [16] Pravilovic, S. (2013) ‘R language in data mining techniques and statistics’, American Journal of Software Engineering and Applications, Vol. 2 Iss. 1 pp 7-12 [17] Rakesh, V., Choo, J., and Reddy, C. n.d. ‘What Motivates People to Invest in Crowdfunding Projects? Recommendation using Heterogeneous Traits in Kickstarter’, Association for the Advancement of Artificial Intelligence, [online] www.aaai.org (Accessed 04 April 2015) [18] Witt, N. n.d. A Kickstarter’s Guide To Kickstarter: How to successfully fund your creative project’, http://kickstarterguide.com/files/2012/07/A-Kickstarters-Guide.pdf (Accessed 28 March 2015) [19] Xu, A., Yang, X., Rao, H., Fu, W., Huang, S. and Bailey, B. (2014) ‘Show Me the Money! An Analysis of Project Updates during Crowdfunding Campaigns’, CHI’14, April 26 – May 1, Toronto, ON, Canada. ACM 978-1-4503-2473-1/14/04
  • 7. Optimal and PID Controller for Controlling Camera’s Position in Unmanned Aerial Vehicles MOHAMMAD ABDULRAHMAN AL-MASHHADANI Department of Information System and Technology, Belarusian National Technical University, Minsk, Belarus ABSTRACT This paper describes two controllers designed specifically for adjusting camera’s position in a small unmanned aerial vehicle (UAV). The optimal controller was designed and first simulated by using MATLAB technique and the results displayed graphically, also PID controller was designed and simulatedby using MATLAB technique .The goal of this paper is to connect the tow controllers in cascade mode to obtain the desired performance and correction in camera’s position in both roll and pitch. KEYWORDS Unmanned Aerial Vehicles, System Control, Servo Motor, PID Controller, Optimal Control. PDF Link: http://airccse.org/journal/ijitmc/papers/1413ijitmc03.pdf Volume Link: http://airccse.org/journal/ijitmc/current2012.html
  • 8. REFERENCES [1] SeferKurnaz , Omer Cetin and OkyayKaynak , Adaptive neuro-fuzzy inference system based autonomous flight controlof unmanned air vehicles, Expert Systems with Applications 37 ,2010,P 1229–1234 [2] Rahul Malhotra, Narinder Singh, Yaduvir Singh, SOFT COMPUTING TECHNIQUES FOR PROCESSCONTROL APPLICATIONS, International Journal on Soft Computing ( IJSC ), Vol.2, No.3, August 2011 [3] SHAMSUL NIZAM BIN MOHD YUSOF AHAMID, DEVELOPING LQR TO CONTROL SPEED MOTOR USING MATLAB GUI, Faculty of Electrical and Electronics Engineering , University Malaysia Pahang, NOVEMBER 2008 [4] Jyotsna’sBlog,SERVOMECHANISMS AND ITS APPLICATIONS,July 2009 [5] http://www.engineersgarage.com/articles/servo-motor [6] Servo control systems: DC servomechanisms. Control-systems principles.co.UK. [7] Downs, Stuart G., unmanned air vehicle servoing dipole, Northrop Grumman Corporation Los Angeles, CA,2004 [8] PID control-National Instrument , http://www.ni.com/white- paper/6440/en [9] Tsai-JiunRenand Tien-ChiChen, Motion control for a two-wheeled vehicle using a self- tuning PID controller, Control Engineering Practice Volume 16, Issue 3, March 2008, P 365–375 [10] Wallén, A. (2000): “Tools for Autonomous Process Control”. PhD, Department of automatic Control, Lund Institute of Technology, Lund, Sweden. [11] Panagopoulos, H. (2000): “PID Control; Design, Extension, Application”. PhD thesis, Department of automatic Control, Lund Institute of Technology, Lund,Sweden. [12] ieniazek, J. Software-based Camera Stabilization on Unmanned Aircraft, Aircraft Engineering and Aerospace Technology: An International Journal, Vol. 75, No. 6, 2003.