International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
March 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
October 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
March 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
October 2021: Top Read Articles in Soft Computingijsc
Soft computing is likely to play an important role in science and engineering in the future. The successful applications of soft computing and the rapid growth suggest that the impact of soft computing will be felt increasingly in coming years. Soft Computing encourages the integration of soft computing techniques and tools into both everyday and advanced applications. This Open access peer-reviewed journal serves as a platform that fosters new applications for all scientists and engineers engaged in research and development in this fast growing field.
Most Cited Articles in Academia - International Journal of Computer Science a...IJCSES Journal
The AIRCC's International Journal of Computer Science and Engineering Survey (IJCSES) is devoted to fields of Computer Science and Engineering surveys, tutorials and overviews. The IJCSES is a peer-reviewed, open access scientific journal published in electronic form as well as print form. The journal will publish research surveys, tutorials and expository overviews in computer science and engineering. Articles from supplementary fields are welcome, as long as they are relevant to computer science and engineering
Trends in mobile network communication and telematics in 2020ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
AIRCC's International Journal of Computer Network & Communications( IJCNC) is dedicated to strengthen the field of Computer Networks and Communications and publishes only good quality papers. IJCNC is highly selective and maintains less than 5% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc. Papers published in IJCNC has received enormous citations and has been regarded as one of the best Journal in the networking research field.
International Journal on Cybernetics & Informatics ( IJCI) is an open access peer- reviewed journal that focuses on the areas related to cybernetics which is information, control and system theory, understands the design and function of any system and the relationship among these applications. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
International Conference on Latest Trends in Engineering Science and ManagementConference Info
The International Conference on “INTERNATIONAL CONFERENCE ON EMERGING TRENDS OF ENGINEERING SCIENCE MNAGEMENT AND ITS APPLICATIONS(ICETESMA-16)" aims at bringing together the researchers, scientists, engineers, and scholar students in all areas of Engineering and Technology, Science, Management and Humanities and provides an international forum for the dissemination of original research results, new ideas and practical development experiences which concentrate on both theory and practices.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ART...ijmnct
International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
International journal of computer networks & communications (ijcnc) --no...IJCNCJournal
AIRCC's International Journal of Computer Network & Communications( IJCNC) is dedicated to strengthen the field of Computer Networks and Communications and publishes only good quality papers. IJCNC is highly selective and maintains less than 5% acceptance rate. All accepted papers will be tested for plagiarism manually as well as by Docoloc. Papers published in IJCNC has received enormous citations and has been regarded as one of the best Journal in the networking research field.
International Journal on Cybernetics & Informatics ( IJCI) is an open access peer- reviewed journal that focuses on the areas related to cybernetics which is information, control and system theory, understands the design and function of any system and the relationship among these applications. This journal aims to provide a platform for exchanging ideas in new emerging trends that needs more focus and exposure and will attempt to publish proposals that strengthen our goals.
Top Ten Read Articles - International Journal of Wireless & Mobile Networks (...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas.
TOP 10 MOBILE AND UBIQUITOUS COMPUTING PAPERS:: RECOMMENDED READING – COMPUTE...IJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small
and low-costsensor nodes with capability of sensing various types of physical and environmental
conditions, data processing, and wireless communication. Variety of sensing capabilities results
in profusion of application areas. However, the characteristics of wireless sensor networks
require more effective methods for data forwarding and processing. In WSN, the sensor nodes
have a limited transmission range, and their processing and storage capabilities , as well as their
energy resources, are also limited. Routing protocols for wireless sensor networks are
responsible for maintaining the routes in the network and have to ensure reliable multi-hop
communication under these conditions. In this paper, we give a survey of routing protocols for
Wireless Sensor Network and compare their strengths and limitations.
New research articles 2019 may issue international journal of computer networ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Most Cited Survey Article in Computer Science And EngineeringIJCSES Journal
Advances in wireless sensor network (WSN) technology has provided the availability of small and low-cost sensor nodes with capability of sensing various types of physical and environmental conditions, data processing, and wireless communication. Variety of sensing capabilities results in profusion of application areas. However, the characteristics of wireless sensor networks require more effective methods for data forwarding and processing. In WSN, the sensor nodes have a limited transmission range, and their processing and storage capabilities as well as their energy resources are also limited. Routing protocols for wireless sensor networks are responsible for maintaining the routes in the network and have to ensure reliable multi-hop communication under these conditions. In this paper, we give a survey of routing protocols for Wireless Sensor Network and compare their strengths and limitations.
International Conference on Latest Trends in Engineering Science and ManagementConference Info
The International Conference on “INTERNATIONAL CONFERENCE ON EMERGING TRENDS OF ENGINEERING SCIENCE MNAGEMENT AND ITS APPLICATIONS(ICETESMA-16)" aims at bringing together the researchers, scientists, engineers, and scholar students in all areas of Engineering and Technology, Science, Management and Humanities and provides an international forum for the dissemination of original research results, new ideas and practical development experiences which concentrate on both theory and practices.
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
April 2023-Top Cited Articles in International Journal of Ubiquitous Computin...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
Most Viewed Articles in Academia for an year - International Journal of Ubiqu...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Top 10 Read Article - International Journal of Wireless & Mobile Networks (IJ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer-reviewed journal that publishes
articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all
technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together
researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts
and establishing new collaborations in these areas.
International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication
Energy consumption is a primary concern in design and operation of wireless communication networks based on environmental concern and cost. The coming 5G network proposes better data rates but also speaks about energy efficiency in its agenda. In order to achieve high energy efficient. Manvi Chib | Tamanna Pathania ""The Review of Energy Efficient Network"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd24036.pdf
Paper URL: https://www.ijtsrd.com/engineering/electrical-engineering/24036/the-review-of-energy-efficient-network/manvi-chib
October 2020: Top Read Articles in Antennasjantjournal
International Journal of Antennas is a peer-reviewed, open access journal that publishes original research as well as review articles in the field of antennas and its allied domain. This journal aims to bring together leading academic scientists, researchers, engineers and research scholars to exchange and share their experiences and research results in their specialized arena in antenna engineering. The journal invites good quality research and review papers for publications.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
TOP 10 ROUTING PAPERS: RECOMMENDED READING – NETWORK RESEARCHIJCNCJournal
In mobile ad hoc networks (MANETs), links are created and destroyed in an unpredictable way, which makes quite challenging the determination of routes between each pair of nodes. In this paper, we propose a formulation of the routing problem in multi-services MANETs, as well as the implementation of an adaptation of the dynamic
source routing (DSR) protocol.
January 2024 Top 10 Read Article -International Journal of Wireless & Mobile ...ijwmn
The International Journal of Wireless & Mobile Networks (IJWMN) is a bi monthly open access peer- reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all technical and practical aspects of Wireless & Mobile Networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced wireless & mobile networking concepts and establishing new collaborations in these areas. Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in Wireless and Mobile Networks.
February 2024 - Top 10 Read Article for Wireless & Mobile Networks -Internati...ijwmn
Call for Papers..!!!
International Journal of Wireless & Mobile Networks (IJWMN)
ISSN:0975-3834 [Online]; 0975-4679 [Print]
(ERA Listed, WJCI Indexed)
Web Page URL : https://airccse.org/journal/ijwmn.html
Submission URL :https://airccse.com/submissioncs/home.html
February 2024 - Top 10 Read Article for Wireless & Mobile Networks
International Journal of Wireless & Mobile Networks (IJWMN)- ERA, WJCI Indexed
https://www.academia.edu/115661722/February_2024_Top_10_Read_Article_International_Journal_of_Wireless_and_Mobile_Networks_IJWMN_ERA_Listed_WJCI_Indexed
Submission Deadline : March 03, 2024
Contact Us : ijwmn@airccse.org or ijwmn@aircconline.com
Genome-wide transcription profiling is a powerful technique in studying disease susceptible footprints. Moreover, when applied to disease tissue it may reveal quantitative and qualitative alterations in gene expression that give information on the context or underlying basis for the disease and may provide a new diagnostic approach. However, the data obtained from high-density microarrays is highly complex and poses considerable challenges in data mining. Past researches prove that neuro diseases damage the brain network interaction, protein- protein interaction and gene-gene interaction. A number of neurological research paper also analyze the relationship among damaged part. Analysis of gene-gene interaction network drawn by using state-of-the-art gene database of Alzheimer’s patient can conclude a lot of information. In this paper we used gene dataset affected with Alzheimer’s disease and normal patient’s dataset from NCBI databank. After proper processing the .CEL affymetrix data using RMA, we use the processed data to find gene interaction outputs. Then we filter the output files using probe set filtering attributes p-value and fold count and draw a gene-gene interaction network. Then we analyze the interaction network using GeneMania software.
April 2024 Top 10 Read Article for Wireless & Mobile Networksijwmn
Call for Papers..!!!
International Journal of Wireless & Mobile Networks (IJWMN) – H- Index -37
ISSN: 0975-3834 [Online]; 0975-4679 [Print]
Web Page URL : https://airccse.org/journal/ijwmn.html
Submission URL :https://airccse.com/submissioncs/home.html
Submission Deadline : April 27, 2024
Contact Us : ijwmn@airccse.org or ijwmn@aircconline.com
International Journal of Computational Science, Information Technology and Co...rinzindorjej
The International Journal of Computational Science, Information Technology and Control Engineering (IJCSITCE) is an open access peer-reviewed journal that publishes quality articles which make innovative contributions in all areas of Computational Science, Mathematical Modeling, Information Technology, Networks, Computer Science, Control and Automation Engineering. IJCSITCE is an abstracted and indexed journal that focuses on all technical and practical aspects of Scientific Computing, Modeling and Simulation, Information Technology, Computer Science, Networks and Communication Engineering, Control Theory and Automation. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced techniques in computational science, information technology, computer science, chaos, control theory and automation, and establishing new collaborations in these areas.
In the era of data-driven warfare, the integration of big data and machine learning (ML) techniques has
become paramount for enhancing defence capabilities. This research report delves into the applications of
big data and ML in the defence sector, exploring their potential to revolutionize intelligence gathering,
strategic decision-making, and operational efficiency. By leveraging vast amounts of data and advanced
algorithms, these technologies offer unprecedented opportunities for threat detection, predictive analysis,
and optimized resource allocation. However, their adoption also raises critical concerns regarding data
privacy, ethical implications, and the potential for misuse. This report aims to provide a comprehensive
understanding of the current state of big data and ML in defence, while examining the challenges and
ethical considerations that must be addressed to ensure responsible and effective implementation.
Cloud Computing, being one of the most recent innovative developments of the IT world, has been
instrumental not just to the success of SMEs but, through their productivity and innovative contribution to
the economy, has even made a remarkable contribution to the economic growth of the United States. To
this end, the study focuses on how cloud computing technology has impacted economic growth through
SMEs in the United States. Relevant literature connected to the variables of interest in this study was
reviewed, and secondary data was generated and utilized in the analysis section of this paper. The findings
of this paper revealed that there have been meaningful contributions that the usage of virtualization has
made in the commercial dealings of small firms in the United States, and this has also been reflected in the
economic growth of the country. This paper further revealed that as important as cloud-based software is,
some SMEs are still skeptical about how it can help improve their business and increase their bottom line
and hence have failed to adopt it. Apart from the SMEs, some notable large firms in different industries,
including information and educational services, have adopted cloud computing technology and hence
contributed to the economic growth of the United States. Lastly, findings from our inferential statistics
revealed that no discernible change has occurred in innovation between small and big businesses in the
adoption of cloud computing. Both categories of businesses adopt cloud computing in the same way, and
their contribution to the American economy has no significant difference in the usage of virtualization.
Energy-constrained Wireless Sensor Networks (WSNs) have garnered significant research interest in
recent years. Multiple-Input Multiple-Output (MIMO), or Cooperative MIMO, represents a specialized
application of MIMO technology within WSNs. This approach operates effectively, especially in
challenging and resource-constrained environments. By facilitating collaboration among sensor nodes,
Cooperative MIMO enhances reliability, coverage, and energy efficiency in WSN deployments.
Consequently, MIMO finds application in diverse WSN scenarios, spanning environmental monitoring,
industrial automation, and healthcare applications.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication. IJCSIT publishes original research papers and review papers, as well as auxiliary material such as: research papers, case studies, technical reports etc.
With growing, Car parking increases with the number of car users. With the increased use of smartphones
and their applications, users prefer mobile phone-based solutions. This paper proposes the Smart Parking
Management System (SPMS) that depends on Arduino parts, Android applications, and based on IoT. This
gave the client the ability to check available parking spaces and reserve a parking spot. IR sensors are
utilized to know if a car park space is allowed. Its area data are transmitted using the WI-FI module to the
server and are recovered by the mobile application which offers many options attractively and with no cost
to users and lets the user check reservation details. With IoT technology, the smart parking system can be
connected wirelessly to easily track available locations.
Welcome to AIRCC's International Journal of Computer Science and Information Technology (IJCSIT), your gateway to the latest advancements in the dynamic fields of Computer Science and Information Systems.
Computer-Assisted Language Learning (CALL) are computer-based tutoring systems that deal with
linguistic skills. Adding intelligence in such systems is mainly based on using Natural Language
Processing (NLP) tools to diagnose student errors, especially in language grammar. However, most such
systems do not consider the modeling of student competence in linguistic skills, especially for the Arabic
language. In this paper, we will deal with basic grammar concepts of the Arabic language taught for the
fourth grade of the elementary school in Egypt. This is through Arabic Grammar Trainer (AGTrainer)
which is an Intelligent CALL. The implemented system (AGTrainer) trains the students through different
questions that deal with the different concepts and have different difficulty levels. Constraint-based student
modeling (CBSM) technique is used as a short-term student model. CBSM is used to define in small grain
level the different grammar skills through the defined skill structures. The main contribution of this paper
is the hierarchal representation of the system's basic grammar skills as domain knowledge. That
representation is used as a mechanism for efficiently checking constraints to model the student knowledge
and diagnose the student errors and identify their cause. In addition, satisfying constraints and the number
of trails the student takes for answering each question and fuzzy logic decision system are used to
determine the student learning level for each lesson as a long-term model. The results of the evaluation
showed the system's effectiveness in learning in addition to the satisfaction of students and teachers with its
features and abilities.
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This research aims to further understanding in the field of continuous authentication using behavioural
biometrics. We are contributing a novel dataset that encompasses the gesture data of 15 users playing
Minecraft with a Samsung Tablet, each for a duration of 15 minutes. Utilizing this dataset, we employed
machine learning (ML) binary classifiers, being Random Forest (RF), K-Nearest Neighbors (KNN), and
Support Vector Classifier (SVC), to determine the authenticity of specific user actions. Our most robust
model was SVC, which achieved an average accuracy of approximately 90%, demonstrating that touch
dynamics can effectively distinguish users. However, further studies are needed to make it viable option
for authentication systems. You can access our dataset at the following
link:https://github.com/AuthenTech2023/authentech-repo
This paper discusses the capabilities and limitations of GPT-3 (0), a state-of-the-art language model, in the
context of text understanding. We begin by describing the architecture and training process of GPT-3, and
provide an overview of its impressive performance across a wide range of natural language processing
tasks, such as language translation, question-answering, and text completion. Throughout this research
project, a summarizing tool was also created to help us retrieve content from any types of document,
specifically IELTS (0) Reading Test data in this project. We also aimed to improve the accuracy of the
summarizing, as well as question-answering capabilities of GPT-3 (0) via long text
In the realm of computer security, the importance of efficient and reliable user authentication methods has
become increasingly critical. This paper examines the potential of mouse movement dynamics as a
consistent metric for continuous authentication. By analysing user mouse movement patterns in two
contrasting gaming scenarios, "Team Fortress" and "Poly Bridge," we investigate the distinctive
behavioral patterns inherent in high-intensity and low-intensity UI interactions. The study extends beyond
conventional methodologies by employing a range of machine learning models. These models are carefully
selected to assess their effectiveness in capturing and interpreting the subtleties of user behavior as
reflected in their mouse movements. This multifaceted approach allows for a more nuanced and
comprehensive understanding of user interaction patterns. Our findings reveal that mouse movement
dynamics can serve as a reliable indicator for continuous user authentication. The diverse machine
learning models employed in this study demonstrate competent performance in user verification, marking
an improvement over previous methods used in this field. This research contributes to the ongoing efforts to
enhance computer security and highlights the potential of leveraging user behavior, specifically mouse
dynamics, in developing robust authentication systems.
Image segmentation and classification tasks in computer vision have proven to be highly effective using neural networks, specifically Convolutional Neural Networks (CNNs). These tasks have numerous
practical applications, such as in medical imaging, autonomous driving, and surveillance. CNNs are capable
of learning complex features directly from images and achieving outstanding performance across several
datasets. In this work, we have utilized three different datasets to investigate the efficacy of various preprocessing and classification techniques in accurssedately segmenting and classifying different structures
within the MRI and natural images. We have utilized both sample gradient and Canny Edge Detection
methods for pre-processing, and K-means clustering have been applied to segment the images. Image
augmentation improves the size and diversity of datasets for training the models for image classification.
This work highlights transfer learning’s effectiveness in image classification using CNNs and VGG 16 that
provides insights into the selection of pre-trained models and hyper parameters for optimal performance.
We have proposed a comprehensive approach for image segmentation and classification, incorporating preprocessing techniques, the K-means algorithm for segmentation, and employing deep learning models such
as CNN and VGG 16 for classification.
The security of Electric Vehicle (EV) charging has gained momentum after the increase in the EV adoption
in the past few years. Mobile applications have been integrated into EV charging systems that mainly use a
cloud-based platform to host their services and data. Like many complex systems, cloud systems are
susceptible to cyberattacks if proper measures are not taken by the organization to secure them. In this
paper, we explore the security of key components in the EV charging infrastructure, including the mobile
application and its cloud service. We conducted an experiment that initiated a Man in the Middle attack
between an EV app and its cloud services. Our results showed that it is possible to launch attacks against
the connected infrastructure by taking advantage of vulnerabilities that may have substantial economic and
operational ramifications on the EV charging ecosystem. We conclude by providing mitigation suggestions
and future research directions.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
This paper describes the outcome of an attempt to implement the same transitive closure (TC) algorithm
for Apache MapReduce running on different Apache Hadoop distributions. Apache MapReduce is a
software framework used with Apache Hadoop, which has become the de facto standard platform for
processing and storing large amounts of data in a distributed computing environment. The research
presented here focuses on the variations observed among the results of an efficient iterative transitive
closure algorithm when run against different distributed environments. The results from these comparisons
were validated against the benchmark results from OYSTER, an open source Entity Resolution system. The
experiment results highlighted the inconsistencies that can occur when using the same codebase with
different implementations of Map Reduce.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfKamal Acharya
The College Bus Management system is completely developed by Visual Basic .NET Version. The application is connect with most secured database language MS SQL Server. The application is develop by using best combination of front-end and back-end languages. The application is totally design like flat user interface. This flat user interface is more attractive user interface in 2017. The application is gives more important to the system functionality. The application is to manage the student’s details, driver’s details, bus details, bus route details, bus fees details and more. The application has only one unit for admin. The admin can manage the entire application. The admin can login into the application by using username and password of the admin. The application is develop for big and small colleges. It is more user friendly for non-computer person. Even they can easily learn how to manage the application within hours. The application is more secure by the admin. The system will give an effective output for the VB.Net and SQL Server given as input to the system. The compiled java program given as input to the system, after scanning the program will generate different reports. The application generates the report for users. The admin can view and download the report of the data. The application deliver the excel format reports. Because, excel formatted reports is very easy to understand the income and expense of the college bus. This application is mainly develop for windows operating system users. In 2017, 73% of people enterprises are using windows operating system. So the application will easily install for all the windows operating system users. The application-developed size is very low. The application consumes very low space in disk. Therefore, the user can allocate very minimum local disk space for this application.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Courier management system project report.pdfKamal Acharya
It is now-a-days very important for the people to send or receive articles like imported furniture, electronic items, gifts, business goods and the like. People depend vastly on different transport systems which mostly use the manual way of receiving and delivering the articles. There is no way to track the articles till they are received and there is no way to let the customer know what happened in transit, once he booked some articles. In such a situation, we need a system which completely computerizes the cargo activities including time to time tracking of the articles sent. This need is fulfilled by Courier Management System software which is online software for the cargo management people that enables them to receive the goods from a source and send them to a required destination and track their status from time to time.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
New research articles 2020 june issue- international journal of computer science information technology (ijcsit)
1. International Journal of Computer Science
and Information Technology (IJCSIT)
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
Current Issue: June 2020, Volume 12,
Number 3 --- Table of Contents
http://airccse.org/journal/ijcsit2020_curr.html
2. FOR MOBILE RADIO COMMUNICATION SYSTEMS
OVER NAKAGAMI FADING CHANEL
Akinyinka Olukunle Akande, Onyebuchi Chikezie Nosiri, Nnaemeka Chiemezie
Onuekwusi and Emmanuel Uchenna Ekwueme
Department of Electrical and Electronic Engineering,
Federal University of Technology Owerri, Imo State, Nigeria
ABSTRACT
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the
quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the
channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and
Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was
evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR)
and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the
hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel.
MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC
outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-
MRC exhibits enhanced potentials to mitigate multipath propagation at reduced system complexity.
KEYWORDS
Equal Gain Combining (EGC), Nakagami, Outage Probability, Processing Time, Multipath, Hybrid
For More Details: http://aircconline.com/ijcsit/V12N3/12320ijcsit01.pdf
Volume Link: http://airccse.org/journal/ijcsit2020_curr.html
3. REFERENCES
[1] Akande, A. O, Semire, F. A, and Adeyemo, Z. K (2017). “Analysis and Optimization of
COST-231-Hata Model for Mobile Radio System in Nigeria”. Inter. Journal of
Computer Applications, vol.173, no. 6, pp. 4 -10.
[2] Dinamani, A, Shruti, R, Babina, S and Das S (2013).“Performance Evaluation of a
hybrid MRC-SC diversity Combiner in Rayleigh Communication channel”.Circuits,
Controls and Communications (CCUBE) IEEE 2013 Inter., Conference, India, pp 1-4.
[3] Sodhi, R and Khanna, R (2016). “Analysis of Hybrid Diversity Combining Technique
over TWDP Fading Channel”.Indian Journal of Science and Technology, vol. 9, no. 47,
pp.1-6.
[4] Patel M, Nirav P and Paliwal, A (2015). “Performance Analysis of Different Diversity
Combining Techniques with MIMO Systems”.International Journal of Advanced
Research in Electrical, Electronics and Instrumentation Engineering, vol. 4, no. 12,
pp.9411-9418.
[5] Nivethika S. D, Sreeja B. S, Manikandan E and Radha, S (2018). “A stretchable Smart
and Highly Efficient Radio Frequency Antenna on Low Cost Substrate”.Microwave
and Optical Technology Letters, vol. 60 no. 7, pp. 1798-1803.
[6] Kanthimathi M, Amutha R and Anusha, S (2018). “Modulation Diversity for
Differential Amplitude and Phase Shift Keying Technique”.The International journal
of Engineering Technology,vol. 7, no. 1, pp. 418-420.
[7] Sheikholeslami and Ashtiani (2015), “Optimal Probabilistic Initial and Target Channel
Selection in Cognitive Radio Networks”, IEEE Trans., on Wireless Communications,
vol.14, no.1 pp 570 –584
[8] Walia M and Mahindru A (2014). “Performance Analysis of Conventional Diversity
Combining Schemes in Rayleigh and Rician Fading Channels”.IOSR Journal of
Computer Engineering (IOSR-JCE), vol. 16,no. 3, pp. 28-32.
[9] Singla M and Tiwana S. S (2017). “A Review on Hybrid Diversity Techniques over
various Fading Channels”.International Journal of Engineering Technology,
Management and Applied Sciences, vol. 5, no. 4, pp. 118-120.
[10] Simon M.K. and Alouini M.S (2015).Digital Communications over fading channels,
New York, John Wiley and Sons.
[11] Hoyong L, Sang K. P and Song,Y (2011). “Performance analysis of a hybrid SC/MRC
diversity scheme over Rayleigh fading”.Proceeding of 13th International Conference
on Advanced Communication Technology (ICACT), Korea, 2011, pp. 1115-1118.
4. [12] Narayanan, S, Renzo, M. Graziosi, F and Haas, H (2016). “Distributed spatial
modulation: A Cooperative Diversity Protocol for Half-Duplex Relay-Aided Wireless
Networks”, IEEE Transactions on Vehicular Technology, vol. 65, pp. 2947- 2964.
[13] Sharma, P and Buttar, A. S (2014). “BER Improvement in Rayleigh Fading SIMO
Channel Using Hybrid Diversity Combining Technique”.International Journal on
Recent and Innovation Trends in Computing and Communication, 2(8), 2355-2358.
[14] Sayed, R, Shobug, M and Badrudduza, A (2016). “Performance Analysis of Diversity
Combining Techniques over Rayleigh Fading SIMO Multicasting Wireless
Network”.Scholars Journal of Engineering and Technology (SJET),vol. 4, no. 10, pp.
489-499.
[15] Goldsmith A (2005). “Wireless Communications”. New York: Cambridge University
Press, USA.
[16] Rajkumar S, Srinivasan N and Natesan, A (2018). “A Penta-band Hybrid Fractal
MIMO Antenna for ISM Applications”. International Journal of RF and Microwave
Computer-Aided Engineering,vol. 28, no. 2, pp. 1-13.
[17] Rao, P.H, Sujitha, R and Selvan, K. T (2017). “A Multiband, Multi-polarization Shared
Aperture Antenna: Design and Evaluation”.IEEE Antennas and Propagation Magazine,
59(4), 26-37.
AUTHORS
Akinyinka Olukunle Akande obtained his B. Tech (2008) in Electronic and
Electrical Engineering from Ladoke Akintola University of TechnologyOgbomoso
in 2008.M.Eng in Communication Engineering in 2013 and a PhD in
Communication Engineering in 2019 from University of Ilorinand LAUTECH,
Ogbomoso, respectively. He is presently a Lecturer II at Federal University of
Technology Owerri. His research interests include Mobile Wireless
Communicationsand Resource Management in Cognitive Radio networks. He is a
member of the Nigerian Society of Engineers (NSE) and Council for the
Regulation of Engineering in Nigeria (COREN)
Onyebuchi Chikezie Nosiri acquired Bachelor of Engineering (B.Eng) Degree in
Electrical and Electronic Engineering from Nnamdi Azikiwe University, Awka in
2002, Master of Engineering in Electronic and Communication Engineering and
PhD in Communication Engineering from Nnamdi Azikiwe University, Awka in
2009 and 2015 respectively. He is currently a Senior Lecturer at Federal University
of Technology Owerri. His research interests include developing modern adaptive
noise/interference cancellation techniques for wireless networks, Cognitive Radio
and Wireless sensor networks, forensic and data analysis for criminal community
detection in wireless networks. He is a member of the Nigerian Society of Engineers (NSE), Council for the
Regulation of Engineering in Nigeria (COREN) and Institute of Electrical and Electronic Engineering (IEEE).
Emmanuel Uchenna Ekwueme is an Assistant Lecturer at Federal University of
Technology Owerri. He obtained his Bachelor and Master degrees in
Communication Engineering in 2011 and 2018 respectively. His research
5. Interests include wireless communication system, 5G Networks, Software Define Networks and Machine
Learning. He is a member of the Nigerian Society of Engineers (NSE) and Council for the Regulation of
Engineering in Nigeria (COREN)
Nnaemeka Chiemezie Onuekwusi is a lecturer I, at the Department of Electrical
and Electronic Engineering of the Federal University of Technology Owerri, Imo
State, Nigeria. From the same institution, he received his Bachelor’s Degree in
Electrical and Electronic Engineering in 2007, Masters in Communication
Engineering in 2012 and a PhD in Communication Engineering in 2019. He is a
member of the Nigerian Society of Engineers (NSE), Council for the Regulation
of Engineering in Nigeria (COREN) and Institute of Electrical and Electronic
Engineering (IEEE). His research interests are in Wireless Sensor Networks and
Smart Grids and has to his credit published works in the areas
6. USING SOCIAL MEDIA AS A TOOL
FOR PROMOTING FESTIVAL TOURISM
Krittanai Ngernyuang1
and Pei-Ying Wu2
1
Department of Tourism and Leisure, Chung Hua University, Hsinchu, Taiwan
2
Department of Tourism and MICE, Chung Hua University, Hsinchu, Taiwan
ABSTRACT
The impact of social media on Tourism has been one of the main topics in tourism research. Many
studies discuss and analyze the impact of social media on Tourism. However, less research studied
on the impact of social media on specific, like festivals tourism. Festival make people united and the
experiences of those participating in festivals can have a significant influence on others and social
media provides the perfect channel for sharing their experiences.
This research focused on social media factors that influenced visitors in the festival tourism. The
study was designed to explored how social media factors impact to festival tourism. The structured
interview was conducted to confirm social media factors from secondary data. The results show that
social media better use as a search engine tools. For future research it is suggested to conduct
quantitative survey to confirm these social media factors which analyzed by this study.
KEYWORDS
Social media, Festival, tourism, Festival tourism, eWOM
For More Details: http://aircconline.com/ijcsit/V12N3/12320ijcsit02.pdf
Volume Link: http://airccse.org/journal/ijcsit2020_curr.html
7. REFERENCES
[1] Al-Ghaith, W. (2015). Applying the Technology Acceptance Model to Understand Social
Networking Sites (SNS) Usage: Impact of Perceived Social Capital. International Journal Of
Computer Science And Information Technology, 7(4), 105-117. doi: 10.5121/ijcsit.2015.7409
[2] Chaffey, D. (2019). Global social media research summary 2019. Posted by Dave Chaffey on
February 12, 2019, in Social media strategy, Digital marketing statistics, Retrieved 9 May
2019, from https://www.smartinsights.com/social-media-marketing/social-media-strategy/new-
global-social-media-research/
[3] Cavanagh, R. (2007). Songkran: Thai New Year Water Festival. Retrieved 18 July 2019, from
https://www.thaizer.com/festivals/songkran-thai-new-year-water-festival/
[4] Clement, J. (2020). Global social networks ranked by number of users 2020. Retrieved 13 May
2020, from https://www.statista.com/statistics/272014/global-social-networks-ranked-by-
number-of-users/
[5] Cohen, H. (2019). Social Media Definition: The Ultimate Guide That Will Make You Smarter.
Posted by Heidi Cohen on March 19, 2019, in Marketing Resources, Social Media, (Retrieved 9
May 2019, from http://heidicohen.com/social-media-definition/
[6] Crompton, J. L. (1979). Motivations for pleasure vacation. Annals of Tourism Research, 6(4),
408–424.
[7] Cudny, W., Gosik, B., Rouba, R. (2011). Festiwal kultury chrześcijańskiej w Łodzijako
przykład produktu turystycznego – wydarzenie. Ekonomiczne Problemy Usług, 66(648), 89-
100.
[8] De Lira, V. M., Macdonald, C., Ounis, I., Perego, R., Renso, C., & Times, V. C. (2019). Event
attendance classification in social media. Information Processing & Management, 56(3), 687–
703. doi:10.1016/j.ipm.2018.11.001
[9] Ellison, N .B., Charles, S .and Lampe, C( .2007), “The benefits of Facebook “Friends :”social
capital and college students ’use of online social network sites”, Journal of Computer-
Mediated Communications, Vol .12 No .4, pp .1143-1168.
[10] Engel, J.F., Kollat, D.T., & Blackwell, R.D. (1968). Consumer Behaviour. New York: Rinehart
& Winston.
[11] Falassi, A. (1987) Festival: Definition and morphology. In: Falassi, A., Ed., Time out of Time,
University of New Mexico Press, Albuquerque
[12] Flinn, J. and Frew, M. (2013), “Glastonbury: managing the mystification of festivity”, Leisure
Studies, Vol. 33 No. 4, pp. 418-433.
[13] Goeldner, C., & Ritchie, J. (2012). Tourism (12th ed., p. 188). Hoboken, N.J.: John Wiley &
Sons.
8. [14] Hanan, H., & Aminuddin, N. (2012) ‘Food festival towards destination image of Kelantan’. In
Proceedings of Melaka International Heritage Conferences 2012 & 5 Tourism Outlook
Conference 2012, Shah Alam: Penerbit UiTM: 88-93.
[15] Hanan, H., & Karim, Ab. S., (2015) “Influence of Social Media in Food Festival Destination
Image”, International Conference on Tourism and Ethnicity in ASEAN and Beyond 2015
[16] Hede, A. -M., & Kellett, P. (2012). Building online brand communities: Exploring the benefits,
challenges and risks in the Australian event sector. Journal of Vacation Marketing, 18(3), 239–
250.
[17] Hua, L. Y., Ramayah, T., Ping, T. A., & Jacky, C. J.-H. (2017). Social Media as a Tool to Help
Select Tourism Destinations: The Case of Malaysia. Information Systems Management, 34(3),
265–279. doi:10.1080/10580530.2017.1330004
[18] K5. (2019). 8 things you should do in Thailand - Keyframe5. Retrieved from
https://www.keyframe5.com/things-you-should-do-in-thailand/ Accessed on 16 July 2019
[19] Law, R., Buhalis, D., & Cobanoglu, C. (2014). Progress on information and communication
technologies in hospitality and tourism. International Journal of Contemporary Hospitality
Management, 26(5), 727–750. doi:10.1108/ijchm-08-2013-0367
[20] Lyck, L., Long, P., & Grige, A. (2012). Tourism, festivals and cultural events in times of crisis.
Copenhagen: Business School.
[21] MacKay, K., Barbe, D., Van Winkle, C. M., & Halpenny, E. (2017). Social media activity in a
festival context: temporal and content analysis. International Journal of Contemporary
Hospitality Management, 29(2), 669–689. doi:10.1108/ijchm-10-2015-0618
[22] Marios, D. Sotiriadis, (2017), "Sharing tourism experiences in social media A literature review
and a set of suggested business strategies ", International Journal of Contemporary Hospitality
Management, Vol. 29 Iss 1 pp. 179 – 225
[23] Nieto, J., Hernandez-Maestro, R. M., & Munoz-Gallego, P. A. (2014) ‘Marketing decisions,
customer reviews, and business performance: the use of Top rural website by Spanish rural
lodging establishments. Tourism Management, 45, 115-123Oklobdžija, S. (2015). The role and
importance of social media in promoting music festivals. Paper presented at Synthesis 2015 -
International Scientific Conference of IT and Business-Related Research.
doi:10.15308/Synthesis-2015-583-587
[24] ÖZDEMIR, G., & ÇULHA, O. ( 2009.) Satisfaction and Loyalty of Festival Visitors. Anatolia,
20(2) , 359-373. doi: 10.1080/13032917.2009.10518914
[25] Saiko-Gamble, S. (2011) Global Travel & Tourism Partnership International Conference
Canadian Academy of Travel and Tourism. Elie, Manitoba, Canada
[26] Sigala, M., Christou, E., and Gretzel, U. (Eds) (2012), Social Media in Travel, Tourism and
Hospitality:Theory, Practice and Cases, Ashgate, London.
9. [27] Sotiriadis, M. D. (2017). Sharing tourism experiences in social media. International Journal of
Contemporary Hospitality Management, 29(1), 179–225. doi:10.1108/ijchm-05-2016-0300
[28] Shedrick, J. (2019). Songkran Festival: Everything You Need To Know - Hostelworld.
Retrieved 16 July 2019, from https://www.hostelworld.com/blog/songkran-everything-you-
need-to-know/
[29] Thailandforvisitors. (2019). Phi Ta Khon Festival. Retrieved 18 July 2019, from
http://thailandforvisitors.com/isan/loei/dan-sai/phi-ta-khon.php
[30] Thaipaipan Co. (2019). Phi Ta Khon : Thailand's Halloween. Retrieved 18 July 2019, from
http://www.thaipaipan.com/index.php?option=com_content&view=article&id=1181&catid=30
6&Itemid=64
[31] Terrell, K. (2019). The History of Social Media: Social Networking Evolution!. Accessed on 26
May 2019. Retrieved from https://historycooperative.org/the-history-of-social-media/
[32] Techopedia. (2019) What is YouTube? - Definition from Techopedia. Accessed on 22 June
2019 Retrieved from https://www.techopedia.com/definition/5219/youtube
[33] Tourism Authority of Thailand. (2019). Events & Festivals. Retrieved from
https://na.tourismthailand.org/Events-and-Festivals Accessed on 16 July 2019
[34] World Tourism Organization and Global Tourism Economy Research Centre (2018),
UNWTO/GTERC Asia Tourism Trends – 2018 Edition, Executive Summary, UNWTO,
Madrid
[35] Yu, C. (2019). Southeast Asia & Vietnam Travel Agents - Indochina Odyssey Tours Team.
Retrieved 18 July 2019, from https://www.indochinaodysseytours.com/about-iot/team.html
[36] Zeng, B. (2013). Social Media in Tourism. Journal of Tourism & Hospitality, 02(02).
doi:10.4172/2167-0269.1000e125
[37] Zeng, B., & Gerritsen, R. (2014). What do we know about social media in tourism? A review.
Tourism Management Perspectives, 10, 27–36.
[38] Zeithaml, V., Bitner, M., & Gremler, D. (2017). Services marketing: Integrating Customer
Focus Across the Firm (7th ed.). New Delhi: McGraw-Hill Education.
[39] Živković, R., Gajić, J., Brdar, I. (2014). The Impact of Social Media on Tourism. Paper
presented at Sinteza 2014 - Impact of the Internet on Business Activities in Serbia and
Worldwide. doi:10.15308/sinteza-2014-758-761
10. AUTHOR
Author: Krittanai Ngernyuang
Mr. Krittanai Ngernyuang is a graduate student of the Tourism and Leisure department at Chung
Hua University, Taiwan. He has two bachelor degrees, 1. Bachelor of Police Sciences from Royal
Thai Police Academy, Thailand; and 2. Bachelor of Laws from Sukhothai Thammathirat Open
University, Thailand.
Corresponding author: Pei-Ying Wu
Dr. Pei-Ying Wu is an Assistant Professor of Department of Tourism and MICE Management at
Chung Hua University, Taiwan. She has an Ph.D. in Events Management from the Leeds Beckett
University in England, UK. She is also a qualified NCDA (National Career Development
Association) consultant. Her research interests include marketing in events management, Service
Quality Management in business events, events impacts measurement, Hospitality and Tourism
Management, career development.
11. WEB-BASED LEARNING IN PERIODS OF CRISIS:
REFLECTIONS ON THE IMPACT OF COVID-19
Stella Chiemeke1
, Omokhagbo Mike Imafidor2
1
Department of Computer Science, University of Benin, Benin City, Nigeria
2
Africa PPP Advisory Nigeria Limited, Abuja, Nigeria
ABSTRACT
Education systems and its actors are generally responding to quarantine and large-scale shutdown
(partial) of cities with a sudden shift to Web-Based Learning. However, given that a pandemic of
this nature and scale is novel, there is a knowledge gap as to how teachers and learners should
respond to the shift, and what the likely impact and the key considerations should be. This study
aims to extrapolate and theorize from the existing knowledgebase about the use of Web-Based
Learning, as well as from an expert and practitioner wisdom and experience, to offer high-level
guidance for policymakers and education system actors that are forced to make decisions in fast-
moving and very challenging circumstances with little guidance or relevant experience. It is an early
attempt at theorizing the impact of the pandemic on two key actors (Learners and Teachers) and one
interface (Content), all across eight dimensions of learning. The analysis is based on Khan’s (2001)
dimension of Web-Based Learning and Anderson’s (2011) Model of Online Learning. Overall, we
posit based on experience and practice, that the pandemic has delivered severe shocks to both the
demand and supply side of Web-Based Learning, with Leaners, Teachers, and Content all
significantly affected. While we hypothesize a general drop in the quality of teaching and learning in
the short run, we expect the opposite to be the case in the long run, when the demand and supply side
self-correct, albeit guided by strong government and market institutions.
KEYWORDS
Web-Based Learning, COVID-19, Learners
For More Details: http://aircconline.com/ijcsit/V12N3/12320ijcsit03.pdf
Volume Link: http://airccse.org/journal/ijcsit2020_curr.html
12. REFERENCES
1. Alison, G. (2017). Beyond Access: Addressing Digital Inequality in Africa. Centre for
International Governance Innovation and Chatham House. Paper Series: No. 48
2. Anderson, T. (2011). The theory and practice of online learning (2nd Edition). Edmonton, AB:
AU Press.
3. Anderson, T., Rourke, L., Garrison, D.R, and Archer, W. (2001). Assessing social presence in
asynchronous text-based computer conferencing. Journal of Asynchronous Learning Networks,
5(2) Retrieved from:
http://immagic.com/eLibrary/ARCHIVES/GENERAL/ATHAB_CA/Anderson.pdf
4. Archambault, L. (2010). Identifying and addressing teaching challenges in k-12 online
environments. Distance Learning, 7(2), pp. 13-17.
5. Counted, A. and Arawole, J. (2016). We are connected, but constrained’: internet inequality
and the challenges of millennials in Africa as actors in innovation. Journal in Innovation and
Entrepreneurship 5(3), https://doi.org/10.1186/s13731-015-0029-1
6. Dalton, K. and Gren, I. (2015). Barriers and strategies on adoption of e-learning in Tanzanian
higher learning institutions: Lessons for adopters. International Journal of Education and
Development using Information and Communication Technology (IJEDICT);11(2),126-137.
7. Garrison, D. R., Anderson, T., and Archer, W. (2000). Critical inquiry in a text-based
environment: Computer conferencing in higher education model. The Internet and Higher
Education, 2(2-3), 87-105.
8. Gennaioli, la Porta, Lopez-de-silanes and Shleifer, (2011). Human Capital and Regional
Development, NBER working Paper 17158.
9. Ghavifekr, S. and Rosdy, W.A.W. (2015). Teaching and learning with technology:
Effectiveness of ICT integration in schools. International Journal of Research in Education and
Science (IJRES), 1(2), 175-191.
10. Harasim, L. (2012). Learning theory and online technologies. New York: Routledge/Taylor &
Francis.
11. Kahn, B. H. (2001). Web-based training: An introduction. In B.H. Kahn (Ed.) Web-based
Training. Englewood Cliffs, NJ.: Educational Technology Publications.
12. Kwanjai D. (2014). The design of web-based learning model using collaborative learning
techniques and a scaffolding system to enhance learners’ competency in higher education. 5th
World Conference on Educational Sciences - WCES 2013. Procedia - Social and Behavioral
Sciences; 116, 436 – 441
13. Moeketsi Letseka, Matsephe Martha Letseka and Victor Pitsoe (November 5th 2018). The
Challenges of E-learning in South Africa, Trends in E-learning, Mahmut Sinecen, IntechOpen,
13. DOI: 10.5772/intechopen.74843. Available from: https://www.intechopen.com/books/trends-
in-e-learning/the-challenges-of-e-learning-in-south-africa
14. Nagunwa, T. and Lwoga, E. 2012. “Developing eLearning technologies to implement
competency based medical education: Experiences from Muhimbili University of Health and
Allied Sciences”, International Journal of Education and Development using Information and
Communication Technology (IJEDICT), vol. 8, no. 3, pp. 07-21.
15. Picciano, A. G. (2017). Theories and frameworks for online education: Seeking an integrated
model. Online Learning, 21(3), 166-190. doi: 10.24059/olj.v21i3.1225
16. Said H. (2010). A Conceptual Framework for Using and Evaluating Web-Based Learning
Resources in School Education. Journal of Information Technology Education; 9,53-79.
17. Sanga, C., Magesa, M. M., Chingonikaya, E. and Kayunze, K. A. 2013. “Can e-learning
promote participation of female students in STEM disciplines in higher learning institutions of
Tanzania?”, International Journal of Education and Development using Information and
Communication Technology (IJEDICT), vol.9, no.3, pp. 86-102.
18. Siemens, G. (2004). Connectivism: A learning theory for the digital age. Paper retrieved from:
http://www.elearnspace.org/Articles/connectivism.htm
19. Sudha, A. and Amutha S. (2015) Higher Secondary Learners’ Effectiveness towards Web
Based Instruction (WBI) on Chemistry. Universal Journal of Educational Research, 3(7): 463-
466. DOI:10.13189/ujer.2015.030706
20. The European-wide e-Learning Recognition Review Report (2015). Retrieved from:
http://www.elearningnews.it/_resources/images/ebook/european-wide-elearning-
recognitionreview.Pdf.
21. The World Bank. (2010). ICTs & education: Issues and opportunities. Report. Retrieved June
30, 2011 from http://siteresources.worldbank.org/EDUCATION/Resources/ESSU/463292-
1290618190826/Background_Note_EducationStrategy2020_ICT_Edu.pdf
22. Titiana C (2019). Design of Web-Based Learning Model: Shifting the Accent from Knowledge
Transmission to Knowledge Construction. Proceedings of the Central and Eastern European,
177-189
23. Todaro, M. and Smith, S. (2011). Economic Development, (11th ed.), Addison Wesley, 2011.
24. Van Reijswoud, V. (2009). Appropriate ICT as a tool to increase effectiveness in ICT4D:
Theoretical considerations and illustrating cases. The Electronic Journal on Information
Systems in Developing Countries, 38(9), 1–18
25. Yongxia, D. and Peili Z. (2018). Practice and effectiveness of web-based problem-based
learning approach in a large class-size system: A comparative study. Nurse Education in
Practice, 31;161-164