The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Top downloaded article in academia 2020 - International Journal of Information Technology, Modeling and Computing (IJITMC)
1. TOP DOWNLOADED
ARTICLE IN ACADEMIA
2020
International Journal of Information Technology,
Modeling and Computing (IJITMC)
http://airccse.org/journal/ijitmc/index.html
ISSN: 2320-7493 (Online); 2320-8449 (Print)
2. A Novel Secure Combination Technique of Steganography And Cryptography
Pye Pye Aung1 and Tun Min Naing2
1
University of Technology (Yatanarpon Cyber City),Pyin Oo Lwin, Myanmar
2
Computer University (Pathein), Myanmar
ABSTRACT
A new technique proposed with the combination of cryptography and Steganography enhanced with new
secure feature for generating a new security system. Cryptography and Steganography are two popular
ways for secure data transmission in which the former distortsa message so it cannot be understood and
another hides a message so it cannot be seen. In cryptography, this system is used advanced encryption
standard (AES) algorithm to encrypt secret message and then these are separated keys; one of which
issued to hide in cover image. In steganography, a part of encrypted message as a key is used to hide
indiscrete cosine transform (DCT)of an image which is highly secured. This kind of system is to be
introduced in applications such as transferring secret data that can be authentication of various fields.
KEYWORDS
Cryptography, DCT Coefficient, Hiding Text, Steganography, Stego-image
PDF LINK: http://airccse.org/journal/ijitmc/papers/2114ijitmc05.pdf
Volume Link: http://airccse.org/journal/ijitmc/current2014.html
3. REFERENCES
[1] Secure Data Transmission using Stenography and Encryption Technique, Shamim Ahmed
Laskar and Kattamanchi Hemachandran, International Journal on Cryptography and Information
Security (IJCIS), Vol.2, No.3, September 2012.
[2] Novel Security Scheme for Image Steganography using Cryptography Technique,
International Journal of Advanced Research in Computer Science and Software Engineering,
Volume 2, Issue 4, April 2012.
[3] A Novel Information Security Scheme using Cryptic Steganography B. Raja Rao et. al. /
Indian Journal of Computer Science and Engineering Vol. 1 No. 4 327-332.
[4] G. Ulutas, M. Ulutas and V. Nabiyev, “Distortion free geometry based secret image sharing”,
Elsevier Inc, Procedia Computer Science, Vol.3, pp.721–726, 2011.
[5] Proposed System for Data Hiding Using Cryptography And Setganography International
Journal of Computer Applications (0975 – 8887) Volume 8– No.9, October 2010.
[6] B. E. Carvajal-Gámez , F. J. Gallegos-Funes and J. L. López-Bonilla, “Scaling Factor for
RGB Images to Steganography Applications”, Journal of Vectorial Relativity, Vol.4, No.3
pp.55-65, 2009.
[7] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography,
Computer Vision theory and applications volume 1, pp. 127-134.
[8] X. Li and J. Wang, “A steganographic method based upon JPEG and particle swarm
optimization algorithm”, Information Sciences 177 (15) (2007) 3099–31091.
[9] Domenico Daniele Bloisi, Luca Iocchi: Image based Steganography and cryptography,
Computer Vision theory and applications volume 1, pp. 127-134.
[10] William Stallings, ―Cryptography and Network Security: Principles and practices‖, Pearson
education, Third Edit ion, ISBN 81-7808-902-5.
4. SUPERVISED LEARNING MODEL FOR KICKSTARTER CAMPAIGNS
WITH R MINING
R. S. Kamath1 and R. K. Kamat2
1
Department of Computer Studies, Chatrapati Shahu Institute of Business Education and
Research, Kolhapur, India
2
Department of Electronics, Shiva University, Kolhapur
ABSTRACT
Web mediated crowd funding is a talented paradigm used by project launcher to solicit funds from
backers to realize projects. Kickstarter is one such largest funding platform for creative projects.
However, not all the campaigns in Kickstarter attain their funding goal and are successful. It is therefore
important to know about campaigns’ chances of success. As a broad goal, authors intended in extraction
of the hidden knowledge from the Kickstarter campaign database and classification of these projects
based on their dependency parameters. For this authors have designed a classification model for the
analysis of Kickstarter campaigns by using direct information retrieved from Kickstarter URLs. This aids
to identify the possibility of success of a campaign.
KEYWORDS
Crowd funding; prediction; classifiers; machine learning; R systems; kickstarter
PDF LINK: http://aircconline.com/ijitmc/V4N1/4116ijitmc02.pdf
Volume Link: http://airccse.org/journal/ijitmc/current2016.html
5. References
[1] Aleyasen, A. (2014) ‘KickUpper: A Tool For Making Better Crowdfunding Projects’. Spring
2014.
[2] An, J., Quercia, D. and Crowcroft, J. (2014) ‘Recommending Investors for Crowdfunding
Projects’, WWW’14, April 7–11, Seoul, Korea
[3] Carpita M., Simonetto A., Sandri M. And Zuccolotto P. (2014) ‘Football Mining with R’.
Data Mining Applications with R, Chapter 14, Academic Press, Elsevier,
[4] Chen, K., Jones, B., Kim, I. and Schlamp, B. n.d. KickPredict: Predicting Kickstarter
Success.
[5] courses.cms.caltech.edu/cs145/2013/blue.pdf (Accessed 04 April 2015).
[6] Elizabeth, M., Gerber, Julie, S. and Kuo, P. n.d. Crowdfunding: Why People Are Motivated
to Post and Fund Projects on Crowdfunding Platform.
http://www.juliehui.org/wpcontent/uploads/2013/04/CSCW_Crowdfunding_Final.pdf Accessed
04 April 2015).
[7] Etter, V., Grossglauser, M., and Thiran, P. (2013) ‘Predicting the Success of Kickstarter
Campaigns’, COSN’13, October 7–8, Boston, Massachusetts, USA.
[8] Grivenics, D., Sprovieri, D., Zwimpfer, C., Dornberger, R. and Hil, D. (2014) Crowdfunding
IT Research and Business Ideas: Predicting the chances of success of a crowdfunding project.
http://www.sprovieri.eu/crowdfunding_paper.pdf (Accessed 02 April 2015).
[9] Koenig, M. n.d. Make Your Kickstarter Crowdfunding Campaign Insanely Successful.
http://bit.ly/FiverrKickstarterSeminar (Accessed 08 April 2015]
[10] Kuppuswamy, V. and Bayus, B. (2014) ‘Crowdfunding Creative Ideas: The Dynamics of
Project Backers in Kickstarter’, UNC Kenan-Flagler Research Paper.
[11] Lu, C., Xie, S., Kong, X. and Yu, P. (2014) ‘Inferring the Impacts of Social Media on
Crowdfunding’, WSDM’14, February 24–28, New York, New York, USA.
[12] Michael, D., Greenberg, Hariharan, K., Gerber, E., and Pardo, B. (2013) ‘Crowdfunding
Support Tools: Predicting Success & Failure’ CHI’13, April 27 – May 2, Paris, France ACM.
[13] Mitra, T. (2014) ‘The Language that Gets People to Give: Phrases that Predict Success on
Kickstarter’, Proceedings of the 17th ACM conference on Computer supported cooperative work
& social computing, 49–61. ACM.
[14] Mollick, E. (2014) ‘The dynamics of crowdfunding: An exploratory study’, Journal of
Business Venturing Vol. 29 Iss. 1 pp:1–16
[15] Owano, N., (2013) Prediction model for Kickstarter tells if projects will sail,
http://phys.org/news/2013-10-kickstarter.html (Accessed 27 March 2015)
6. [16] Pravilovic, S. (2013) ‘R language in data mining techniques and statistics’, American
Journal of Software Engineering and Applications, Vol. 2 Iss. 1 pp 7-12
[17] Rakesh, V., Choo, J., and Reddy, C. n.d. ‘What Motivates People to Invest in Crowdfunding
Projects? Recommendation using Heterogeneous Traits in Kickstarter’, Association for the
Advancement of Artificial Intelligence, [online] www.aaai.org (Accessed 04 April 2015)
[18] Witt, N. n.d. A Kickstarter’s Guide To Kickstarter: How to successfully fund your creative
project’, http://kickstarterguide.com/files/2012/07/A-Kickstarters-Guide.pdf (Accessed 28 March
2015)
[19] Xu, A., Yang, X., Rao, H., Fu, W., Huang, S. and Bailey, B. (2014) ‘Show Me the Money!
An Analysis of Project Updates during Crowdfunding Campaigns’, CHI’14, April 26 – May 1,
Toronto, ON, Canada. ACM 978-1-4503-2473-1/14/04
7. Optimal and PID Controller for Controlling Camera’s Position in Unmanned
Aerial Vehicles
MOHAMMAD ABDULRAHMAN AL-MASHHADANI
Department of Information System and Technology, Belarusian National Technical
University, Minsk, Belarus
ABSTRACT
This paper describes two controllers designed specifically for adjusting camera’s position in a small
unmanned aerial vehicle (UAV). The optimal controller was designed and first simulated by using
MATLAB technique and the results displayed graphically, also PID controller was designed and
simulatedby using MATLAB technique .The goal of this paper is to connect the tow controllers in
cascade mode to obtain the desired performance and correction in camera’s position in both roll and pitch.
KEYWORDS
Unmanned Aerial Vehicles, System Control, Servo Motor, PID Controller, Optimal Control.
PDF Link: http://airccse.org/journal/ijitmc/papers/1413ijitmc03.pdf
Volume Link: http://airccse.org/journal/ijitmc/current2012.html
8. REFERENCES
[1] SeferKurnaz , Omer Cetin and OkyayKaynak , Adaptive neuro-fuzzy inference system based
autonomous flight controlof unmanned air vehicles, Expert Systems with Applications 37
,2010,P 1229–1234
[2] Rahul Malhotra, Narinder Singh, Yaduvir Singh, SOFT COMPUTING TECHNIQUES FOR
PROCESSCONTROL APPLICATIONS, International Journal on Soft Computing ( IJSC ),
Vol.2, No.3, August 2011
[3] SHAMSUL NIZAM BIN MOHD YUSOF AHAMID, DEVELOPING LQR TO CONTROL
SPEED MOTOR USING MATLAB GUI, Faculty of Electrical and Electronics Engineering ,
University Malaysia Pahang, NOVEMBER 2008
[4] Jyotsna’sBlog,SERVOMECHANISMS AND ITS APPLICATIONS,July 2009
[5] http://www.engineersgarage.com/articles/servo-motor
[6] Servo control systems: DC servomechanisms. Control-systems principles.co.UK.
[7] Downs, Stuart G., unmanned air vehicle servoing dipole, Northrop Grumman Corporation
Los Angeles, CA,2004 [8] PID control-National Instrument , http://www.ni.com/white-
paper/6440/en
[9] Tsai-JiunRenand Tien-ChiChen, Motion control for a two-wheeled vehicle using a self-
tuning PID controller, Control Engineering Practice Volume 16, Issue 3, March 2008, P 365–375
[10] Wallén, A. (2000): “Tools for Autonomous Process Control”. PhD, Department of
automatic Control, Lund Institute of Technology, Lund, Sweden.
[11] Panagopoulos, H. (2000): “PID Control; Design, Extension, Application”. PhD thesis,
Department of automatic Control, Lund Institute of Technology, Lund,Sweden.
[12] ieniazek, J. Software-based Camera Stabilization on Unmanned Aircraft, Aircraft
Engineering and Aerospace Technology: An International Journal, Vol. 75, No. 6, 2003.