Trending Articles
International Journal of Computer-Aided
Technologies (IJCAx)
ISSN : 2349 - 218X
http://airccse.org/journal/ijcax/
Citation Count -23
RESEARCH ISSUES IN WEB MINING
Dr.S. Vijiyarani1 and Ms. E. Suganya2
1Assistant professor, Department of Computer science, School of Computer Science and
Engineering, Bharathiar University, Coimbatore
2 M.Phil Research Scholar, Department of Computer science, School of Computer
science and Engineering, Bharathiar University, Coimbatore
ABSTRACT
Web is a collection of inter-related files on one or more web servers while web mining means
extracting valuable information from web databases. Web mining is one of the data mining
domains where data mining techniques are used for extracting information from the web servers.
The web data includes web pages, web links, objects on the web and web logs. Web mining is
used to understand the customer behaviour, evaluate a particular website based on the information
which is stored in web log files. Web mining is evaluated by using data mining techniques,
namely classification, clustering, and association ules. It has some beneficial areas or applications
such as Electronic commerce, E-learning, Egovernment, E-policies, E-democracy, Electronic
business, security, crime investigation and digital library. Retrieving the required web page from
the web efficiently and effectively becomes a challenging task because web is made up of
unstructured data, which delivers the large amount of information and increase the complexity of
dealing information from different web service providers. The collection of information becomes
very hard to find, extract, filter or evaluate the relevant information for the users. In this paper,
we have studied the basic concepts of web mining, classification, processes and issues. In
addition to this, this paper also analyzed the web mining research challenges.
KEYWORDS
Web Mining, Classification, Application, Tools, Algorithms, Research Issues
For More Details :- http://airccse.org/journal/ijcax/papers/2315ijcax05.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
Joy Shalom Sona, Prof. Asha Ambhaikar” https://www.ijser.org/paper/A-ReconcilingWebsite-System-To-Enhance-Efficiency-With-Web-Mining-Techniques.html”
International Journal Of Scientific & Engineering Research Volume 3, Issue 2, February2012 1 ISSN 2229-5518
[2]
Aparna
Ranade,
Abhijit
R.
Joshi,
Ph.
D,”
https://www.ijcaonline.org/archives/volume92/number7/16025-5174” International Journal
of Computer Applications (0975 – 8887) Volume 92 – No.7, April 2014
[3]
Karan
Bhalla
&
Deepak
Prasad,”
https://pdfs.semanticscholar.org/d9ad/6c5764127b0e9be928b4fb7439524c8a377f.pdf”
[4]
Amit Pratap Singh1, Dr. R. C. Jain 2,” https://www.ijettcs.org/Volume3Issue3/IJETTCS2014-06-03-066.pdf” International Journal of Emerging Trends & Technology in Computer
Science (IJETTCS)Volume 3, Issue 3, May – June 2014 ISSN 2278-6856
[5]
R.
Lokeshkumar1,
R.
Sindhuja2,
Dr.
P.
Sengottuvelan,
“https://www.academia.edu/28019281/A_Survey_on_Preprocessing_of_Web_Log_File_in
_Web_Usage_Mining_to_Improve_the_Quality_of_Data”
International
Journal
of
Emerging Technology and Advanced Engineering, ISSN 2250-2459, ISO 9001:2008
Certified Journal, Volume 4, Issue 8, August 2014
[6]
Mitali
Srivastava,
Rakhi
Garg,
P.
K.
Mishra,”
https://www.academia.edu/12271878/Preprocessing_Techniques_in_Web_Usage_Mining_
A_Survey” International Journal of Computer Applications (0975 – 8887) Volume 97–
No.18, July 2014
[7]
http://www.slideshare.net/akhanna3/discovering-knowledge-using-web-structure-mining27488978
[8]
Ashish Kumar Garg, Mohammad Amir, Jarrar Ahmed, Man Singh, Sham Bansa,”
https://pdfs.semanticscholar.org/84ff/630c476e73a4a1fa8af6c993980233841235.pdf”
International Journal of Science and Research (IJSR) ISSN (Online): 2319-7064
[9]
C.Gomathi, M. Moorthi,” http://www.ccsenet.org/journal/index.php/cis/article/view/1192”
Computer and information science journal vol. 1, No.4, November 2008
[10] Md. Zahid Hasan, Khawja Jakaria Ahmad Chisty and Nur-E-Zaman Ayshik,
“https://pdfs.semanticscholar.org/a2b7/3aa9941218fcbf54c5925aa2716a1614ae4d.pdf
[11]
Jaideep Srivastava, “Web Mining: Accomplishments & Future Directions”, University of
Minnesota USA,
[email protected], http://www.cs.umn.edu/faculty/srivasta.html
[12]
http://www.slideshare.net/AmirFahmideh/web-mining-structure-mining
[13]
http://www.slideshare.net/Tommy96/web-mining-tutorial
[14]
http://www.faadooengineers.com/threads/2177-PPT-Link-Mining
[15]
Deepti
Kapila,
Prof.
Charanjit
Singh,
“http://www.ijdmta.com/abstract_meta_References.php?id=V5-I1-P9”,
International
Journal of Advanced Research in Computer Science and Software Engineering Volume 4,
Issue 6, June 2014 ISSN: 2277 128X
[16]
Alberto
Sillitti,
Marco
Scotto,
Giancarlo
Succi,
Tullio
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.205.7555”
Vernazza,”
[17]
Sandhya,
Mala
chaturvedi,
“http://www.pspchv.com/AbstractPJCSET/Abstract%20PDF%20of%20PJCSET%20Volume%2013/2.%20Abstract,%20Vol.
13,%20Issues%201-2,%20Pages%2013-25%20PJCSET.pdf”, The International Journal Of
Engineering And Science (IIJES) Volume 2 Issue 3
[18]
Ananthi.J,”
http://ijcsit.com/docs/Volume%205/vol5issue03/ijcsit20140503316.pdf”,
International Journal of Computer Science and Information Technologies, Vol. 5 (3), 2014
[19] S.Balan, “A Study of Various Techniques of Web Content Mining Research Issues and
Tools”, International journal of innovative research and studies ISSN 2319-9725
International Journal of Computer-Aided Technologies (IJCAx) Vol.2, No.3, July 2015 64
[20]
D.Jayalatchumy,
Dr.
P.Thambidurai,
“http://ijcsit.com/docs/Volume%206/vol6issue06/ijcsit2015060644.pdf”, IOSR Journal of
Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278- 8727Volume 14,
Issue 3
[21]
http://www.ijitee.org/wpNaga
Lakshmi,
Raja
Sekhara
Rao
,
content/uploads/papers/v2i4/D0584032413.pdf”, International Journal of Innovative
Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-2, Issue-4
[22] Mamta M. Hegde, Prof. M.V.Phatak, “https://www.ijert.org/devising-a-methodology-forlink-analysis-by-reducing-noise”, International Journal of Advanced Research in Computer
Engineering & Technology Volume 1, Issue 3, May2012
[23]
Mr.
Dushyant
B.Rathod,
Dr.Samrat
Khanna,
“https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=203” ISSN: 2321-9939
AUTHORS
Dr. S. Vijayarani has completed MCA, M.Phil and Ph.D in Computer Science. She is
working as Assistant Professor in the School of Computer Science and Engineering,
Bharathiar University, Coimbatore. Her fields of research interest are data mining,
privacy and security issues in data mining and data streams. She has published papers
in the international journals and presented research papers in international and
nationalconferences.
Ms. E. Suganya has completed M.Sc in Computer Science. She is currently pursuing
her M.Phil in Computer Science in the School of Computer Science and Engineering,
Bharathiar University, Coimbatore. Her fields of interest are Data Mining and Web
Mining.
Citation Count –06
THE STUDY OF CUCKOO OPTIMIZATION ALGORITHM FOR
PRODUCTION PLANNING PROBLEM
A. Akbarzadeh1, E. Shadkam2
1,2Department of Industrial Engineering, Faculty of Eng.; Khayyam
University, Mashhad,Iran
2Department of Industrial Engineering, Isfahan University of
Technology, Isfahan, Iran
ABSTRACT
Constrained Nonlinear programming problems are hard problems, and one of the most widely
used and common problems for production planning problem to optimize. In this study, one of
the mathematical models of production planning is survey and the problem solved by cuckoo
algorithm. Cuckoo Algorithm is efficient method to solve continues non linear problem.
Moreover, mentioned models of production planning solved with Genetic algorithm and Lingo
software and the results will compared. The Cuckoo Algorithm is suitable choice for optimization
in convergence of solution.
KEYWORDS:
Meta-heuristic algorithms, Cuckoo Optimization Algorithm, Lot Sizing, Production Planning.
For More Details :- http://airccse.org/journal/ijcax/papers/2315ijcax01.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
Shirneshan, H., Bijari, M., Moslehi Gh., Determination the lot sizing with probable demand
and the level of the service, Production and Operations Management, 1391.
[2]
Sereshti, N., Bijari, M., http://isiarticles.com/bundles/Article/pre/pdf/22856.pdf, the 7th
International Conference of Industrial Engineering, 1389.
[3]
Abdullahi,
M.
Abdullahi,
D.,
Karimpur,
J.,
https://arxiv.org/ftp/arxiv/papers/1508/1508.01310.pdf, 9th International Conference on
Industrial Engineering, 1391.
[4]
Mahmoudi, Sh., the segmentation of color image by Cuckoo optimization algorithm, the
first PC-IT and Electronics Engineering Conference, Islamic Azad University.
[5]
Hakimi Gilani, S., Vafrakhth, H., https://arxiv.org/ftp/arxiv/papers/1508/1508.01310.pdf,
the second Conference on Renewable Energy and Distributed Generation Iran, Tehran
University, 2012.
[6]
Merzifonluo lu, Y., and Geunes, J., Uncapacitated production and Location planing models
with demand fulfillment flexibility, International Journal of production Economics,
Vol.102, No. 2, pp. 199-216, 2006.
[7]
Hwa Huang, R., Yang, CL., https://ideas.repec.org/a/eee/proeco/v115y2008i1p163170.html —An ant Colony Approach. International Journal of Production Economics 115,
2008, pp. 163-170.
[8]
Loukil, T., Teghem, J., Fortemps, Ph., https://www.academia.edu/5723525/A_multiobjective_production_scheduling_case_study_solved_by_simulated_annealing. European
Journal of Operational Research 179, 2007, pp. 709-722.
[9]
Zegordi,
S,
Kamal
Abadi,
I.,
Beheshti
Nia,
M.,
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.473.6478&rep=rep1&type=pdf.
Computers & Industrial Engineering 58, 2010, pp. 373-381.
[10] Ying
Wu,
L.,
Dong
Hu,
Y.,
Mei
Xu,
D.,
Hua,
B.,
https://www.semanticscholar.org/paper/Solving-batch-production-scheduling-usinggenetic-Wu-Hu/cc5e3e1d83b3ed02a8f61a5b5f6a822ad2494189.
Computer
Aided
Chemical Engineering 15, 2003, pp. 648-653.
[11] Tat Chan, W., Hu, H., https://www.semanticscholar.org/paper/Optimization-of-precastproduction-scheduling-for-Liang-Hu/b249e1b223ea70add3ea13e74f8f5fdbefd9d9de.
Computers & Structures 79, 2001, pp. 1605-1616.
[12] Sankar, A.S., Ponnanbalam, S.G., Rajendran, C., A Multiobjective Genetic Algorithm for
Scheduling a Flexible Manufacturing System. International Journal of Advanced
Manufacturing Technology, 22(3), 2003, pp. 229–236.
[13] Liu, J., Tang, L., A Modified Genetic Algorithm for Single Machine Scheduling. Computers
and Industrial Engineering, 37(1), 1999, pp. 43–46.
[14] Li, Y., Ip, W., Wang, D., Genetic Algorithm Approach to Earliness and Tardiness
Production Scheduling and Planning Problem. International Journal of Production
Economics 54, 1998, pp. 65-76.
[15]
Knosala,
R.,
Wal,
T.,
http://www.et.byu.edu/~ered/ME482/Paper_Topics/genetic_Algorithm.pdf 109, 2001, pp.
90-95.
[16] Jou, C., A Genetic Algorithm with Sub-Indexed Partitioning Genes and its Application to
Production Scheduling of Parallel Machines. Computers & Industrial Engineering 48, 2005,
pp. 39- 54.
[17] Ho
Ko,
C.,
Fan
Wang,
Sh.,
https://worldwidescience.org/topicpages/m/multiobjective+genetic+algorithms.html. Expert
Systems with Applications 38, 2011, pp. 8293-8302.
[18] Chung, SH., Chan, F., Chan, H., A Modified Genetic Algorithm Approach for Scheduling
of Perfect Maintenance in Distributed Production Scheduling. Engineering Applications of
Artificial Intelligence 22,2009, pp. 1005-1014.
[19]
Averbakh, I., https://www.sciencedirect.com/science/article/abs/pii/S0377221708010680.
European Journal of Operational Research 200, 2010, pp. 377-384.
[20] X. S. Yang and S. Deb, Cuckoo search via Lévy Flights, In: World Congress on Nature &
Biologically Inspired Computing (NaBIC2009). IEEE Publications, pp. 210–214, 2009.
[21] R. Rajabioun, http://iranarze.ir/wp-content/uploads/2017/10/7962-English-IranArze.pdf, In:
Applied Soft Computing journal, vol. 11, pp.5508 - 5518, 2011.
[22] Brank, J., Sceckenbach, B., Staein, M., Deb, K., Scmeck, H., Portfolio Optimization with
an Envelope-Based Multi-Objective Evolutionary Algorithm, Eouropean Journal of
Operational Reaserch, Vol. 199, 2009, pp. 684-693.
Citation Count –02
A MULTI CRITERIA DECISION MAKING BASED APPROACH
FOR SEMANTIC IMAGE ANNOTATION
Hengame Deljooi and Somayye Jafarali Jassbi
Department of Computer Engineering, Science and Research Branch,
Islamic Azad University, Tehran, Iran
ABSTRACT
Automatic image annotation has emerged as an important research topic due to its potential
application on both image understanding and web image search. This paper presents a model,
which integrates visual topics and regional contexts to automatic image annotation. Regional
contexts model the relationship between the regions, while visual topics provide the global
distribution of topics over an image. Previous image annotation methods neglected the
relationship between the regions in an image, while these regions are exactly explanation of the
image semantics, therefore considering the relationship between them are helpful to annotate the
images. Regional contexts and visual topics are learned by PLSA (Probability Latent Semantic
Analysis) from the training data. The proposed model incorporates these two types of information
by MCDM (Multi Criteria Decision Making) approach based on WSM (Weighted Sum Method).
Experiments conducted on the 5k Corel dataset demonstrate the effectiveness of the proposed
model.
KEYWORDS
Automatic Image Annotation, Regional Contexts, Visual Topics, PLSA, Multi Criteria Decision
Making
For More Details :- http://airccse.org/journal/ijcax/papers/2115ijcax02.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
A.
Tousch,
S.
Herbin,
J.
Audlibert,
(2012)
“http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.467.1097&rep=rep1&type=pdf,
” Elsevier Ltd., Pattern Recognition, vol. 40, pp. 333-345.
[2] D.
Zhang,
Md.M.
Islam,
G.
“https://dl.acm.org/doi/10.1016/j.patcog.2011.05.013,” Elsevier
Recognition, vol. 45.
Lu,
Ltd.,
(2011)
Pattern
[3] R.
Datta,
D.
Joshi,
J.
Li,
J.Z.
Wang,
(2008)
“http://infolab.stanford.edu/~wangz/project/imsearch/review/JOUR/datta_TR.pdf,” ACM
Comput. Surv, vol. 40, no. 2, Article 5.
[4]
Y.
Liu,
D.
Zhang,
G.
Lu,
W.
Ma,
(2007)
“https://dl.acm.org/doi/10.1016/j.patcog.2006.04.045,” Elsevier Ltd., Pattern Recognition,
vol. 40, pp. 262-282.
[5] Y. Pan, H.J. Yang, P. Duygulu, Ch. Faloutsos, (2004) “Automatic image captioning,” In
Proceedings of the IEEE International Conference on Multimedia and Expo (ICME), pp.
1987-1990.
[6] S. Hare, P.H. Lewis, (2005) “https://eprints.soton.ac.uk/260954/,” In Proceedings of
Multimedia and the Semantic Web / European
Semantic Web Conference.
[7]
C. Cusano, G. Ciocca, R. Schettini, (2003) “https://www.semanticscholar.org/paper/Imageannotation-using-SVM-Cusano-Ciocca/7d671a94d5,” In Proceedings of Internet Imaging
IV, SPIE 5304, vol. 5304, pp. 330-338.
[8]
E. Chang, K. Goh, G. Sychay, G. Wu, (2003) “http://infolab.stanford.edu/~echang/CSVT02.pdf,” In Proceedings of IEEE Conference on Computer Vision and Pattern Recognition
(CVPR), pp. 26-38.
[9]
J. Li, J. Wang, (2003) “https://ieeexplore.ieee.org/document/1227984,”IEEE Trans. on
PAMI, 25(19), pp. 1075-1088.
[10] A.
Fakhari,
A.
M.
Eftekhari
Moghadam,
“https://www.sciencedirect.com/science/article/abs/pii/S156849461200470X,”
Ltd., Applied Soft Computing, Vol. 13, pp. 1292-1302.
(2013)
Elsevier
[11]
J.
Tang,
H.
Li,
G.
Qi,
T.
Chua,
(2010)
“https://scholarbank.nus.edu.sg/handle/10635/39277,” IEEE Trans. on Multimedia, vol. 12,
no. 2.
[12]
J. Liu, M. Li, Q. Liu, H. Lu, S. Ma, (2009) “Image annotation via graph learning,” Elsevier
Ltd., Pattern Recognition, vol. 42, pp. 218-228.
[13] J.
Liu,
B.
Wang,
H.
Lu,
S.
https://www.researchgate.net/publication/220646304_A_graphbased_image_annotation_framework,
Elsevier Ltd.,Pattern Recognition Letters, vol. 29, pp. 407-415.
Ma,
(2008)
[14] J. Liu, M. Li, W. Ma, Q. Liu, H. Lu, (2006) "An Adaptive Graph Model For Automatic
Image Annotation," In Proceedings of the 8th ACM international workshop on Multimedia
information retrieval.
[15] G.
Carneiro,
A.B.
Chan,
P.J.
Moreno,
N.
Vasconcelos,
(2007)“
http://visal.cs.cityu.edu.hk/static/pubs/journal/pami07-semantics.pdf,” IEEE Trans. on
PAMI, vol. 29, no. 3.
[16] Y.
Mori,
H.
Takahashi,
R.
Oka,
(1999)
“http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.31.1704,” In Proceedings of
First International Workshop Multimedia Intelligent Storage and Retrieval Management.
[17] P.
Duygulu,
K.
Barnard,
J.
Freitas,
D.
Forsyth,
(2002)
“https://link.springer.com/chapter/10.1007/3-540-47979-1_7,” In Proceedings of the 7th
European Conference on Computer Vision, vol. 2353, pp. 97-112.
[18] J. Jeon, V. Lavrenko, R. Manmatha, (2003) “Automatic image annotation and retrieval
using CrossMedia Relevance Model,” In Proceedings of the 26th annual international ACM
SIGIR, pp. 119-126.
[19] V. Lavrenko, R. Manmatha, J. Jeon, (2003) “http://ciir.cs.umass.edu/pubfiles/mm-46.pdf,”
In Proceedings of Advance in Neutral Information Processing.
[20] S. Feng, R. Manmatha, V. Laverenko, (2004) “http://ciir.cs.umass.edu/pubfiles/mm333.pdf,” In IEEE Computer Society Conference on Computer Vision and Pattern
Recognition(CVPR), pp. 1002-1009.
[21] Y.
Wang,
T.
Mei,
Sh.
Gong,
“https://www.hindawi.com/journals/mpe/2017/8493267/,”
Recognition, vol. 42, pp. 259-266.
X.Sh.
Elsevier
Hua,
Ltd.,
(2009)
Pattern
[22] T. Hofmann, (2001) “Unsupervised learning by probabilistic latent semantic analysis,”
Machine Learning, vol. 42, pp. 177-196.
[23] Y. Deng, B.S. Manjunath, (2001) "Unsupervised Segmentation of Color-Texture Regions
in Images and Video," IEEE Trans. on PAMI, Vol. 23, No. 8, pp. 800-810.
[24] A.P. Dempster, N.M. Laird, D.B. Rubin, (2007) "Maximum Likelihood from Incomplete
Data via the
EM Algorithm," Journal of the Royal Statistical Society, Vol. 39, No. 1,
pp. 1-38.
[25] G. Csurka, Ch.R. Dance, L. Fan, J. Willamowski, C. Bray, (2004) "
https://www.cs.cmu.edu/~efros/courses/LBMV07/Papers/csurka-eccv-04.pdf,"
In
Proceedings of ECCV Workshop on Statistical Learning in Computer Vision, pp. 1-16.
[26] K. Hotta, (2008) “Scene classification based on multi-resolution orientation histogram of
Gabor features,” In ICVS'08 Proceedings of the 6th international conference on Computer
vision systems, vol. 5008, pp. 291-301.
[27] K. Hotta, (2009) “https://dl.acm.org/doi/abs/10.5555/1819298.1819304,” In
IEEE International Conference on Image Processing (ICIP), pp. 2053-2056.
16th
[28] L. Fei Fei, P. Perona, (2005) “A Bayesian hierarchical model for learning natural scene
categories,” In
Proceedings of the IEEE Computer Society Conference on Computer
Vision and Pattern Recognition (CVPR'05), vol. 2, pp. 524-531.
[29] S. Lazebnik, C. Schmid, J. Ponce, (2006) " https://hal.inria.fr/inria-00548585/document," In
Proceedings of IEEE Computer Society Conference on
Computer Vision and
Pattern Recognition, pp. 2169-2178.
AUTHORS
Hengame Deljooi received her B.Sc. in hardware computer engineering from Azad
University of Qazvin and the M.Sc. degree in computer architecture from Azad University of
Qazvin in 2008 and 2012 respectively, she is currently working toward the Ph.D. degree in
Computer architecture at I slamic Azad University, Science and Research Branch. Her
research intrests include Computer Architecture, Image Processing and Image Retrieval.
Somayyeh Jafarali Jassbi received her B.Sc. in hardware computer engineering from
Azad University of Tehran, South Branch in 2003. She also received the M.Sc. and
Ph.D. degree in computer architecture from the Islamic Azad University, Science and
Research Branch in 2007 and 2010 respectively. She is c urrently assistant professor in
department of computer engineering of Science and Research Branch of Islamic Azad
University. Her research intrests are Information Technology, Computer Arithmetic,
Network Security and Cryptography.
Citation Count –01
TEACHER’S ATTITUDE TOWARDS UTILISING FUTURE
GADGETS IN EDUCATION
Dr. Ajay Surana and Ms. Sushma Rani
Head of the Department (Associate Professor), Department of Education,
Banasthali University, Jaipur, Rajasthan, India
Senior Research Fellow (UGC-SRF), Department of Education,
Banasthali University, Jaipur, Rajasthan, India.
ABSTRACT
Today’s era is an era of modernization and globalization. Everything is happening at a very fast
rate whether it is politics, societal reforms, commercialization, transportation, or educational
innovations. In every few second, technology grows either in the form of arrival of the new
devices/gadgets with millions of apps and these latest technological objects may be in the form of
hardware/software devices. We are the educationists, teachers, students and stakeholders of
present Indian educational system. These gadgets/devices are partly being used by us or most of
them are still unaware of these innovative technologies due to the mass media or economical
factor. So, there is a need to improvise ourselves towards utilizing the future gadgets in order to
explore the educational uses, barriers and preparatoryneeds of these available devices for
educational purposes. This paper aims to study the opinion of the teacher-educators about the
usage of future gadgets in higher education. It will also contribute towards establishing the list of
latest technological devices, and how it can enhances the process of teachinglearning system.
KEYWORDS
Futurology, Future Gadgets, Technological devices, Educational Technology.
For More Details :- http://aircconline.com/ijcax/V2N4/2415ijcax01.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
A.G. Almekhlafi., & F.A. Almeqdadi. (2010). Teacher’s Perception of Technology
Integration in United Arab Emirates School Classrooms. Journal of Education Technology
& Society, 13(1), 165- 175. Retrieved on August 02, 2014 from
http://ifets.info/journals/13_1/16.pdf.
[2] Anisha, Gopalakrishnan. V. (2014). Influence of Multiple Intelligence and Self-Efficacy of
the Secondary Teacher education students on their Teaching Competency. Ph.D. Thesis,
Manonmanjam Sundaranar University. Retrieved August 02, 2014 from http://www.
hdl.handle.net/10603/20363
.
[3] Jagannath, K. Dange. (2013). Effectiveness of Computer- Assisted Instruction in the
development of Study Habits in relation to the Gender, Locality and Socio-Economic status
of Secondary School Students. International Journal of Education and Psychological
Research (IJEPR), 2(4), 75-86. Retrieved July 30, 2014 from http://www.ijepr.org.
[4] Jessica, CM. Li., & Joseph, Wu. (2013). Active learning for discovery and innovation in
criminologywith Chineselearners. Journal of Innovations in Education and Teaching
international.Taylor and Francis Group. doi: 10.1080/14703297.2013.796720.
[5] K. Sibichan. K., & Annaraja, P. (2010). Teacher Trainee’s Computer Competency enhances
their technology use in Classroom Teaching. EDUTRACKS, 10(4), December 2010, New
Delhi: Neelkamal Publications, (pp. 33-37).
[6] Kavitha, M., & Arumugam, J. (2011). Scientiometric Analysis of Indian contribution to
Mathematical Research. Journal of Library & Information Communication Technology.
2011, 3(1-2), 61-70.
[7] M. Muthumanickam., A. Ravichandran., & N. Elangovan. (2010). Quality Concerns in
Teacher Education: Use of ICT in Higher Education and Lecturer’s Competencies 285-292.
New Delhi: A.P.H. Publishing Corporation.
[8]
Madhulika, S. Patel., &, Meenakshi, Khar. (2010). Addressing Teachers on the issues of
new
textbooks in English language - An experience through Video
Conference. Journal of Indian
Education (NCERT), 35(4), February, 2010. 94-105.
Retrieved July 30, 2014 from
www.ncert.nic.in/publication/journals/pdf_files/jie/jie_feb_2010.pdf.
[9]
Mark, Pegrum., Christine, Howitt., & Michelle, Stripe.(2013). Learning to take the Tablet :
How PreService teachers use iPads to facilitate their Learning. Australasian Journal of
Educational Technology, 29(4). 2013, 464-479. Retrieved August 09, 2014 from
http://www.ascilite.org.au/ajet/submission/index.php/AJET/article/download/.../604.
[10] Marina, Kandroudi., & Tharrenos, Bratitsis.(2014). Exploring the Educational Perspectives
of XBOX Kinect Based Video Games. (pp.219-227). Paper presented at Sixth Eureopean
Conference on Games-Based learning, University college Cork and Waterford institute of
Technology,Ireland.Retrieved July 23, 2014 from http://www.kinecteducation.com.
[11] R. Sourecha., & A. Selvan. (2013). Efficacy of Smart Board in Teaching Disaster
Management at High School Level. EDUTRACKS, 13(2), October 2013, (pp. 38-40).
[12] Saima, Rasul., Qadir, Bukhsh., & Muzamilla, Akram. (2010). Opinion of Teachers and
Students about Futurology of Higher Education in Pakistan. International Journal for CrossDisciplinary Subjects in Education (IJCDSE) 1(4). 255-259. Retrieved March 15, 2014
from http://www.infonomic-society.org.
[13] W. Kotrlik, Joe ., & H. Redmann, Donna. (2009). Technology Adoption for Use in
Instruction by Secondary Technology Education Teachers. Journal of Technology
Education, 21(1), 2009. 44-59. Louisiana State University, Baton Rouge. (ERIC Document
Reproduction Service No. EJ914276). Retrieved August 01, 2014 from ERIC database.
[14] Xiangyu, W., E.D. Love, Peter., Robert, K., Jeong, Kim, Mi. & Rex, Davis. Peter. (2012).
Integration of E-Learning 2.0 with WEB 2.0. Journal of Information Technology in
Construction.(IT CON). 17, 387-396. Retrieved July 25, 2014, from
http://www.itcon.org/2012/26.
AUTHORS
Dr. Ajay Surana. Ph.D. (Education), M.Sc. (Mathematics), M.Ed. Place and Date
of Birth: Jodhpur, India & 14/05/1972 Doctor of Philosophy (Ph.D.) in Education
from Banasthali University, Banasthali, India, 2003, Master of Education (M.Ed.)
from Jai Narain Vyas University, Jodhpur, India, 1995, Master of Science (M.Sc.) in
Mathematics from Jai Narain Vyas University, Jodhpur, India, 1992 Bachelor of
Science from Rajasthan University, Jaipur, India, 1990. Educational Background: He
has experience of teaching in Sr. Sec. School for 3 years. He has experience
of teaching P.G (M.Ed.) and U.G. (B.Ed.) classed since year 1998 (15+ years). Presently working
as Head & Associate Professor, Department of Education, Banasthali University, Jaipur,
Rajasthan. His areas of specialization are teaching of Mathematics, Edu. Technology, teaching of
Mathematics, Edu. Technology, Computer Assisted Learning & Teaching and Educational
Research.
Citation Count –01
On Fuzzy Soft Multi Set and Its Application in Information Systems
Anjan Mukherjee1 and Ajoy Kanti Das2
1Department of Mathematics,Tripura University, Agartala-799022,Tripura, India
2 Department of Mathematics, ICV-College, Belonia -799155, Tripura, India
ABSTRACT
Research on information and communication technologies have been developed rapidly since it
can be applied easily to several areas like computer science, medical science, economics,
environments, engineering, among other. Applications of soft set theory, especially in
information systems have been found paramount importance. Recently, Mukherjee and Das
defined some new operations in fuzzy soft multi set theory and show that the De-Morgan’s type
of results hold in fuzzy soft multi set theory with respect to these newly defined operations. In
this paper, we extend their work and study some more basic properties of their defined
operations. Also, we define some basic supporting tools in information system also application of
fuzzy soft multi sets in information system are presented and discussed. Here we define the
notion of fuzzy multi-valued information system in fuzzy soft multi set theory and show that
every fuzzy soft multi set is a fuzzy multi valued information system.
KEYWORDS
Soft set, fuzzy set, soft multi set, fuzzy soft multi set, information system.
For More Details :- http://airccse.org/journal/ijcax/papers/2315ijcax03.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1] K.Alhazaymeh & N. Hassan, (2014) “https://ijpam.eu/contents/2014-93-4/3/3.pdf”, Int. J.
Pure and Applied Math., Vol. 93, pp511-523.
[2]
M.I.Ali,
F.
Feng,
X.
Liu,
W.K.
Minc
&
M.
Shabir,
“https://publications.waset.org/15505/investigations-on-some-operations-of-soft-sets”,
Math. Appl., vol. 57, pp1547-1553.
(2009)
Comp.
[3] S.Alkhazaleh & A.R. Salleh, (2012) “Fuzzy Soft Multi sets Theory”, Hindawi Publishing
Corporation, Abstract and Applied Analysis, Article ID 350603, 20 pages, doi:
10.1155/2012/350603.
[4]
S.Alkhazaleh,
A.R.
Salleh
&
N.
Hassan,
(2011)
https://www.hindawi.com/journals/ads/2011/757868/, Appl. Math. Sci., Vol. 5, pp3561– 3573.
[5] K.V Babitha & S.J. John, (2013) “On Soft Multi sets”, Ann. Fuzzy Math. Inform., Vol. 5
pp35-44.
[6]
T.
Herewan
&
M.M.
Deris,
(2011)
“https://www.scirp.org/(S(351jmbntvnsjt1aadkposzje))/reference/ReferencesPapers.aspx?Referen
ceID=1892193”, Knowl.-Based Syst. Vol. 24, pp186-195.
[7] A.M. Ibrahim & H.M. Balami, (2013) “Application of soft multiset in decision making
problems”, J. Nig. Ass. of mathematical physics, Vol. 25, pp307- 311.
[8]
H.M.
Balami
&
A.
“https://www.ijsrm.in/index.php/ijsrm/article/view/209”,
research and management, Vol. 1, pp471-482.
M.
Ibrahim,
(2013)
International Journal of scientific
[9] P.K. Maji, R. Biswas & A.R. Roy, (2001) “Fuzzy soft sets”, J. Fuzzy Math., Vol. 9, pp589602. International Journal of Computer-Aided Technologies (IJCAx) Vol.2, No.3, July 2015 46
[10]
P.K.
Maji,
R.
Biswas
&
A.R.
Roy,
(2003)
“https://www.sciencedirect.com/science/article/pii/S0898122103000166”, Comp. Math. Appl.,
Vol. 45 pp555-562.
[11]
P.K.
Maji,
R.
Biswas
&
A.R.
Roy,
(2002)
“https://www.sciencedirect.com/science/article/pii/S089812210200216X”, Comput. Math. Appl.,
Vol. 44, pp1077-1083.
[12] D.Molodtsov, (1999) “Soft set theory-first results”, Comp. Math. Appl., Vol. 37, pp19-31.
[13] A.Mukherjee & A.K. Das, (2015) “http://airccse.org/journal/ijcax/papers/2315ijcax03.pdf”,
Smart Innovation Systems and Technologies, Springer Verlag, (Accepted).
[14]
A.Mukherjee
&
A.K.
Das,
(2015)
“https://pdfs.semanticscholar.org/15f1/d2577ed796fa23de16a6c442eeba0c9ab8ca.pdf. Vol. 4, pp
51-65.
[15] A.Mukherjee & A.K. Das, (2013) “http://www.afmi.or.kr/articles_in_%20press/201311/AFMI-H-130709R1/softmulti.pdf”, Rev. Bull. Cal.Math.Soc., Vol. 21, No.2, pp193-212.
[16] A.Mukherjee & A.K. Das, (2014) “Topological structure formed by soft multi sets and soft
multi compact space”, Ann. Fuzzy Math. Inform. Vol. 7, pp919-933.
[17] D.Tokat & I. Osmanoglu, (2011) “Soft multi set and soft multi topology”, Nevsehir
Universitesi Fen Bilimleri Enstitusu Dergisi Cilt., Vol. 2, pp109-118.
[18]
L.A.
Zadeh,
(1965)
“https://www.sciencedirect.com/science/article/pii/S001999586590241X”, Inform. Control., Vol.
8, pp338-353.
Citation Count –35
BLIND AID : TRAVEL AID FOR BLIND
Vidya Rao1, Pranoti Mane2, Aditya Kumar3and Lifna C.S4
Department of Computer Engineering, VES Institute of Technology, Mumbai, India
ABSTRACT
Visually impaired people face many problems in their day to day lives. Among them, outdoor
navigation is one of the major concerns. The existing solutions based on Wireless Sensor
Networks(WSN) and Global Positioning System (GPS) track ZigBee units or RFID (Radio
Frequency Identification) tags fixed on the navigation system. The issues pertaining to these
solutions are as follows: (1) It is suitable only when the visually impaired person is commuting in
a familiar environment; (2) The device provides only a one way communication; (3) Most of
these instruments are heavy and sometimes costly. Preferable solution would be to make a system
which is easy to carry and cheap. The objective of this paper is to break down the technological
barriers, and to propose a system by developing an Android App which would help a visually
impaired person while traveling via the public transport system like Bus. The proposed system
uses an inbuilt feature of smart phone such as GPS location tracker to track the location of the
user and Text to Speech converter. The system also integrates Google Speech to Text converter
for capturing the voice input and converts them to text. This system recommends the requirement
of installing a GPS module in buses for real time tracking. With minor modification, this App can
also help older people for independent navigation.
KEYWORDS
Blind Aid; Android App; GPS module; Google Speech to Text converter.
For More Details :- http://aircconline.com/ijcax/V2N4/2415ijcax02.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1] Gulati, R. (2011). https://www.ijser.org/viewPaperDetail.aspx?JAN1109, 2(1), 1-5.
[2] Loomis, J. M., Golledge, R. G., & Klatzky, R. L. (1998). Navigation system for the blind:
Auditory display modes and guidance. Presence: Teleoperators and Virtual Environments, 7(2),
193-203.
[3] Mishra, R., & Koley, S. (2012). http://www.ijettjournal.org/volume-3/issue-2/IJETTV3I2P217.pdf'. International Journal of Engineering and Technology, 3(2), l53-157.
[4] Lavanya, G., Preethy, W., Shameem, A., & Sushmitha, R. (2013, March). Passenger BUS
alert system for easy navigation of blind. In Circuits, Power and Computing Technologies
(ICCPCT), 2013 International Conference on (pp. 798-802). IEEE.
[5] Quoc, T. P., Kim, M. C., Lee, H. K., & Eom, K. H. (2010).
https://link.springer.com/chapter/10.1007/978-3-642-24267-0_18, Science and Technology, 3(3),
13-24.
[6] Android Developers. [Online] https://developer.android.com/sdk/index.
[7] Free Web Hosting with PHP, MySQL and cPanel. [Online] http://www.000webhost.com.
AUTHORS
Vidya Rao, Pranoti Mane, Aditya Kumar, Mrs. Lifna C.S
Citation Count –01
PREDICTING ACADEMIC MAJOR OF STUDENTS USING
BAYESIAN NETWORKS TO THE CASE OF IRAN
Shiva Asadianfam 1, Mahboubeh Shamsi 2, Sima Asadianfam 3
1Department of Computer Engineering, Qom Branch, Islamic Azad University, Qom,Iran
2Department of Electrical & Computer Engineering, Qom University of
Technology,Qom, Iran
3Department of Computer Engineering, Zanjan Branch, Islamic Azad University,
Zanjan, Iran
ABSTRACT
In this study, which took place current year in the city of Maragheh in IRAN. Number of high
school students in the fields of study: mathematics, Experimental Sciences, humanities,
vocational, business and science were studied and compared. The purpose of this research is to
predict the academic major of high school students using Bayesian networks. The effective
factors have been used in academic major selection for the first time as an effective indicator of
Bayesian networks. Evaluation of Impacts of indicators on each other, discretization data and
processing them was performed by GeNIe. The proper course would be advised for students to
continue their education.
KEYWORDS
Academic major selection, Field selection, Bayesian networks, GeNIe.
For More Details :- http://airccse.org/journal/ijcax/papers/2315ijcax04.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1] Paivandi, Saeed. 2012, Februar 2. "Iran: Second Higher Education Cultural Revolution?"
RetrievedFrom
Http://Www.Universityworldnews.Com/Article.Php?Story=20101105221117557
[2] Gottleib, F.M. (2006), "Humanistic Leadership: Emotional Intelligence And Team Learning.
[Dissertation Abstract D.M.]". University Of Phoenix.
[3] Bish, M.R. (2004). " http://www.krepublishers.com/02-Journals/T-Anth/Anth-18-0-000-14Web/Anth-18-2-000-14-Abst-PDF/T-ANTH-18-2-565-14-1060-Kilnic-A-C/T-ANTH-18-2565-14-1060-Kilnic-A-C-Tx[31].pdf ". Unpublished Ed.D Dissertation, University Of Novth
Carolina At Charlotte
[4]
Singh,S.K.(2007). "Role Of Emotional Intelligence In Organizational Learning : An
Empirical
Study". Singapore Management Review.
[5]
Kevin B. Korb, Ann E.Nicholson. 2011." https://www.crcpress.com/Bayesian-ArtificialIntelligence/Korb-Nicholson/p/book/9781439815915 ", Second Edition, Crc Press.
[6] Bayat S., Cuggia M., Et Al., 2008. " https://link.springer.com/chapter/10.1007/978-2-28799305-3_22 " Ehealth Beyond The Horizon – Get It There, 605-610.
[7]
Yuyang
Liu,
Wooi
Ping
Cheah,
Byung-Ki
Kim,
Hyukro
Park,
“http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.178.3039”, International Journal
Of Advanced Science And Technology, Pp. 35-42.
[8] Khlifia Jayech, Mohamed Ali Mahjoub, “Clustering And Bayesian Network For Image Of
Faces Classification”, International Journal Of Advanced Computer Science And
Applications, Special Issue On Image Processing And Analys, May 2011.
[9]
Nir
Friedman,
Michal
Linial,
Iftach
Nachman,
Dana
Pe'er,"
https://www.liebertpub.com/doi/abs/10.1089%2F106652700750050961 ", Proceedings Of
The Fourth Annual International Conference On Computational Molecular Biology, Pp. 125, 2000.
[10] Pablo Felgaer, Paola Britos, "Prediction In Health Domain Using Bayesian Networks
Optimization Based On Induction Learning Techniques", International Journal Of Modern
Physics C, Vol. 17, No. 3, Pp. 447–455 ,2006.
[11] Arezoo Aghaie, Ali Saeedi, " https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2227603
", International Conference On Information Management And Engineering, Pp.450-455,
2009.
Citation Count –01
DEVELOPING PRODUCT CONFIGURATOR TOOL USING CADS’ API
WITH THE HELP OF PARAMETRIC MODELING FOR DESIGN
AUTOMATION OF HYDRAULIC ACTUATOR.
A.K. Patil1 and R.B. Buktar2
1Post Graduate student, Department of Mechanical Engineering,
SPCE, Mumbai-58
2Professor and Head of the Department (Mechanical Engineering),
SPCE, Mumbai-58
ABSTRACT
Order placingis a crucial phase of lifecycle of a Mass-customizable product and seeks
improvement in Mechanical industry. ‘Product Configurator’ is a good solution to bring in data
transparency and speed up the process. Configuration tools arebeing used on a very small
scale,reasons being lack of awareness and dearer costs of existing tools. In this research work a
product configurator is developedfor Hydraulic Actuator (HA).This method uses Applicable
Programing Interface (API) of a CAD tool coupled with Visual Basics (VB) and MS Excel.Itis a
standaloneapplication of VB and its integration into web portal can be the future scope. The final
aim was to reduce time delay at CRM phase,bring more transparency in the ordering system and
to establish a method which, small and medium scale enterprises canafford. Trails on the tool
developed generated Part-Assembly drawings, BOM and JT files in moments.
KEYWORDS
Mass Customization, Configuration, CAD, API.
For More Details :- http://airccse.org/journal/ijcax/papers/2315ijcax02.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
P.T. Helo, Q.L. Xu, S.J. Kyllo¨nen, R.J. Jiaohttp://lipas.uwasa.fi/~phelo/papers/IntegratedVehicle-Configuration-System-Connecting-the-domains-of-masscustomization_2010_Computers-in-Industry.pdf, Computers in Industry 61 (2010) 44–52,
July 2009.
[2] AlessioTrentin, Elisa Perin, CiprianoForza, Overcoming the customization-responsiveness
squeeze by using product configurators: Beyond anecdotal evidence, Computers in Industry
62 (2011) 260– 268, Elsevier, September 2010.
[3]
Anders
Haug,
Lars
Hvamb,
NielsHenrik
Mortensen,
https://issuu.com/airccse/docs/2315ijcax02__1_, Computers in Industry 63 (2012) 471–481,
Elsevier, February 2012.
[4] Martin Landherr, EngelbertWestkämper, Integrated Product and Assembly Configuration
Using Systematic Modularization and Flexible Integration, Variety Management in
Manufacturing. Proceedings of the 47th CIRP Conference on Manufacturing Systems,
Procedia CIRP 17 (2014) 260 – 265, Elsevier.
[5]
Dong
Yang,
Ming
https://www.sciencedirect.com/science/article/abs/pii/S1474034612000389,
Engineering Informatics 26 (2012) 592–602, Elsevier, March 2012.
Dong,
Advanced
[6] BulutAslan, Mark Stevenson, Linda C. Hendry, Enterprise Resource Planning systems: An
assessment of applicability to Make-To-Order companies, Computers in Industry 63 (2012)
692–
705, Elsevier, May 2012.
[7]
JuhaTiihonen,
TimoSoininen,
IlkkaNiemelä,
ReijoSulonen,
https://researchportal.helsinki.fi/en/publications/a-practical-tool-for-mass-customisingconfigurable-products, International Conference On Engineering Design, ICED 03
Stockholm, August 19-21, 2003.
[8] Dong Yang, Ming Dong, Xiao-Kun Chang, A dynamic constraint satisfaction approach for
configuring structural products under mass customization, Engineering Applications of
Artificial Intelligence 25 (2012) 1723–1737, July 2012.
[9]
D.
Mourtzisa,
M.
Doukasa,
https://pdf.sciencedirectassets.com/282173/1-s2.0S2212827112X00040/1-s2.0-S2212827112002090/main.pdf?X-Amz-SecurityToken=IQoJb3JpZ2luX2VjEEMaCXVzLWVhc3QtMSJHMEUCIQCGsVTrNTHgO6y0JI2
b%2BUQoRvyW82R8izE9NHNWOy2%2BawIgWidxVHxdPeacm%2FjbGA65tid2sq5nsV
Y4uIvlgYOCWaQqtAMILBACGgwwNTkwMDM1NDY4NjUiDHkrkiB7BmEFkSkCHiqR
A673FpBpekPS%2BqehC%2B%2F3hClQVhVDHEpkzn%2BaPsRGLYwFfNogT5hf%2Bk
z2RsnBF0O%2BAiKEnAch5Mpecpm1FFN6Mjg%2FJ7bGC1eF7CBKIjKAZbqdSjMwUx
V27RYUZB6TvnNSVnGnD6GIHcx4xhyz75s4SgGTdJH7hborblDbeS66Tdl%2BUuCNGi
VUaylXPcM7P7FG7%2BGRzbBG8HgssMg2gI3QM4T91Gn2LYPXyKeEeS8Pw3Evw6K
XN5L7g6pCH2GMDswwz9VkNVVwvQsn1yfTLlOrrwTmZVQ6Sp3%2FQ7mZmYlqQfm
wIsAgBnGfHjmWbb1A9T1oYjmo4REqPdF2gkmFfQvkKZMsPrrKG9DcNBiKx0LIvEccA
VkzvLtb2LNeJxwGgnpDmtKrtiO9l46CUzsjbWiiJ17gi6uh9Ek1Ewrij7ML%2FTMM7SkIO
c4m%2BY0ogqfsFv2XiVnbPJboVvzEkGW0Zq2rBrpN4wxEHVlzTJGgb%2BWHkR6Crqa
nG5vQPwF47811WKYYTvhyp2E7SZdhqP3QiLpHiheWMJapqPMFOusBagx0bvQaz69bw
3de49QNZCSn%2FpXr9VGTOaqqa9qATUmFxg7VU9YZPmQ31mm3g8suTk1TrXVYu9c
xFnJ7%2BlrbpuzbmHr5YP2WSePjUfzTL3c2UQeX0%2F7XMo%2FISRg1FPIZ%2BP0DS
3ipgZNejv8s5mwY%2Fa6FBir1K5lr8YVvV0BqhiHDkNcW7KI3h4ki7FLdPVF3sv5v4sGQ
rtfR13blyd0DbfSZVxn7nsBaTJkK0%2Bf5%2FmC0iahkb%2FbCmb6rZfpwvXgbba0g%2B
N6%2Bhjr5c5gNYLblQwiu9UvLX6nElJRdsKK4xg2wTRu5ieJ0LGd1Jw%3D%3D&XAmz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20200312T120643Z&X-AmzSignedHeaders=host&X-Amz-Expires=300&X-AmzCredential=ASIAQ3PHCVTY3M7VH3NX%2F20200312%2Fus-east1%2Fs3%2Faws4_request&X-AmzSignature=83e487b58b540bfdebc5e0766cc36b7e98f58ffb8becbd979451fc6b89032fd5&has
h=0b5207d99d02016c4b2f983d201e65cd13d69223fcf348ca29ea40d3e50ab9ea&host=6804
2c943591013ac2b2430a89b270f6af2c76d8dfd086a07176afe7c76c2c61&pii=S22128271120
02090&tid=spdf-42c06254-0a43-4f51-ae83cde43d2ee6d0&sid=fa4b70408199034c292ada373c545fce6665gxrqb&type=client,
45th
CIRP Conference on Manufacturing Systems 2012, Procedia CIRP 3 ( 2012 ) 209 – 214,
Elsevier.
[10] Jonas Landahl, Dag Bergsjö, Hans Johannesson, Future Alternatives for Automotive
Configuration Management, Conference on Systems Engineering Research (CSER 2014),
Procedia Computer Science 28 (2014) 103 – 110, Elsevier, March 2014.
[11] Kenn
Steger-Jensena,
CarstenSvensson,
https://www.sciencedirect.com/science/article/abs/pii/S0166361503001921, Computers in
Industry 54 (2004) 83–103, Elsevier, July 2003.
[12] Sumitshrivastva_blogspot_in_2012_09_design_calculation_analysis_Mechanical
Guru’s
blog [13] Flavio S. Fogliatto, Giovani J.C. daSilveira, Denis Borenstein, The mass
customization decade: An updated review of the literature, Int. J. Production Economics 138
(2012) 14–25.
[14]
GüntherSchuha,
Stefan
Rudolf
a,
Michael
Riesenera,
https://www.academia.edu/37173441/Developing_Product_Configurator_Tool_Using_CAD
s_API_with_the_help_of_Parametric_Modeling_for_Design_Automation_of_Hydraulic_Ac
tuator, Science Direct, Procedia CIRP 17 (2014) 290 – 295.
[15] C. Forzaa and F. Salvador, Product configuration and inter-firm co-ordination: an innovative
solution from a small manufacturing enterprise, Computers in Industry 49 (2002) 37–46.
AUTHORS :
Mr. Aniket K. Patil Post Graduate Student (M. Tech in Machine Design)
Department of Mechanical Engineering Sardar Patel College of Engineering,
Mumbai-58
Dr. Rajesh B. Buktar Ph. D. in Technology Prof.& Head of Department,
Department of Mechanical Engineering Sardar Patel College of Engineering,
Mumbai-58
Citation Count –01
COMPARATIVE ANALYSIS OF ROUTING PROTOCOLS
IN MOBILE AD HOC NETWORKS
Mohamed Elboukhari1, Mostafa Azizi1and Abdelmalek Azizi2,3
1Department of Applied Engineering, ESTO, Oujda, Morocco
2Departement Mathematics & Computer Science, FSO, Oujda, Morocco
3Academy Hassan II of Sciences & Technology, Rabat, Morocco
ABSTRACT
A Mobile Ad Hoc Network (MANET) is a collection of mobile nodes that want to communicate
without any pre-determined infrastructure and fixed organization of available links. Each node in
MANET operates as a router, forwarding information packets for other mobile nodes. There are
many routing protocols that possess different performance levels in different scenarios. The main
task is to evaluate the existing routing protocols and finding by comparing them the best one. In
this article we compare AODV, DSR, DSDV, OLSR and DYMO routing protocols in mobile ad
hoc networks (MANETs) to specify the best operational conditions for each MANETs protocol.
We study these five MANETs routing protocols by different simulations in NS-2 simulator. We
describe that pause time parameter affect their performance. This performance analysis is
measured in terms of Packet Delivery Ratio, Average End-to-End Delay, Normalized Routing
Load and Average Throughput.
KEYWORDS
Mobile Ad Hoc Network (MANET), Performance Parameters, AODV, DSR, DSDV, OLSR,
DYMO
For More Details :- http://airccse.org/journal/ijcax/papers/2215ijcax01.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
Rahman A, Islam S, Talevski A. 2009. Performance measurement of various routing
protocols in ad-hoc network”. In: Proceedings of the international multiconference of
engineers and computer scientists, vol. 1. Hong Kong: IMECS.
[2]
Tyagi
SS,
Chauhan
RK.
2010.
https://books.google.co.in/books?id=kQvFBAAAQBAJ&pg=PA562&lpg=PA562&dq=Ty
agi+SS,+Chauhan+RK.+2010.+Performance+analysis+of+proactive+and+reactive+routing
+protocols+for+ad+hoc+networks&source=bl&ots=EnL99vmDl&sig=ACfU3U3Xfa95ypETaBa1ShRWvERjPkZTA&hl=en&sa=X&ved=2ahUKEwiptJfi8ZToAhWN_XMBHZH7CcQQ6AEwA3oEC
AkQAQ#v=onepage&q=Tyagi%20SS%2C%20Chauhan%20RK.%202010.%20Performan
ce%20analysis%20of%20proactive%20and%20reactive%20routing%20protocols%20for%
20ad%20hoc%20networks&f=false. Int J Comput Appl 2010;1(14).
[3]
Basagni S, Conti M, Giordano S, Stojmenovic I. 2004. Mobile ad hoc networking. A John
wiley and sons, Inc., Publication.
[4]
AkshaiAggarwal,SavitaGandhi,NirbhayChaubey.
https://arxiv.org/ftp/arxiv/papers/1402/1402.2217.pdf. IJDPS, Vol.2, No.6.
[5]
P. Manickam T. Guru Baskar , M.Girija, Dr.D.Manimegala. 2011. Performance
Comparisons of Routing Protocols in Mobile Ad- Hoc Networks. International Journal of
Wireless & Mobile Networks (IJWMN), pp. 98-106.
[6]
Sabina
Barakovic,
Suad
Kasapovic,
and
Jasmina
Barakovic.
2010.
http://journal.telfor.rs/Published/Vol2No1/Vol2No1_A2.pdf”, Telfor Journal, Vol. 2, No. 1.
[7]
Guntupalli Lakshmikant, A Gaiwak, P.D. Vyavahare. 2008. Simulation Based Comparative
Performance Analysis of Adhoc Routing Protocols. Proceedings of TENCON 2008.
[8]
Chenna
Reddy,
P.;
ChandraSekhar
Reddy,
P.
2006https://ieeexplore.ieee.org/abstract/document/4290671. ISAUHC '06, International
Symposium on Ad Hoc andUbiquitous Computing, vol., no., pp.186-187, 20-23 Dec.
[9]
Kapang Lego, Pranav Kumar Singh, Dipankar Sutradhar. 2011. Comparative Study of
Adhoc
Routing Protocol AODV, DSR and DSDV in Mobile Adhoc NETwork. Indian
Journal of Computer Science and Engineering Vol. 1 No. 4 364-371.
[10]
Ginni Tonk, Indu Kashyap, S.S. Tyagi. 2012. http://www.ijitee.org/wpcontent/uploads/papers/v1i1/A116051112.pdf. International Journal of Innovative
Technology and Exploring Engineering (IJITEE)ISSN: 2278-3075,Volume- 1, Issue-1.
[11]
Li Layuan, Li Chunlin, Yaun Peiyan. 2007. Performance evaluation and simulation of
routing protocols in ad hocnetworks. Computer Communications 30 (2007) 1890- 1898.
[12]
Vijayalaskhmi
M.
Avinash
Patel,
Linganagouda
Kulkarni.2011
https://pdfs.semanticscholar.org/8f6b/0fa1bcdb4168154c2957a3c3435c2982b60a.pdf
International Journal of Communication Network and Security, Volume-1, Issue-1.
2011.
[13] Deepak Kumar, Ashutosh Srivastava, S C Gupta. 2012. Performance Comparison of DSDV
and AODV Routing Protocols in MANETS. International Journal of Electronics
Communication and Computer Technology (IJECCT) Volume 2 Issue 3.
[14]
Jun-Zhao Sun.2001. https://ieeexplore.ieee.org/document/983076
International conference on info-tech and info-net, Vol-3, pp. 316-321.
Proceedings
of
[15] C.E. Perkins and E.M. Royer.1999. Ad-hoc On-Demand Distance Vector Routing”,
Proceeding of 2nd IEEE Workshop. Mobile Computing System Applications, pp:90-100.
[16] Perkins, E. Belding-Royer, and S. Das. 2003http://www.ronai.hu/library/AODVPerkins.pdf “draft-ietf-manet-aodv-13.txt.
[17] S. A. Ade1& P.A.Tijare. 2010. Performance Comparison of AODV, DSDV, OLSR and
DSR
Routing Protocols in Mobile Ad Hoc Networks. International Journal of
Information Technology and Knowledge Management July-December 2010, Volume 2,
No. 2, pp. 545-548. https://tools.ietf.org/html/rfc4728” IETF RFC 4728.
[19]
[20]
I. Chakeres and C. Perkins.2012. Dynamic MANET On-Demand (DYMO) Routing. IETF
Internet-Draft, draft-ietf-manet-dymo-23.
Charles
E.
Perkins
and
Pravin
Bhagwat.
1994.
https://dl.acm.org/doi/10.1145/190314.190336. Technical report, IBM Research and
University of Maryland, USA.
[21] T. Clausen and P. Jacquet.2003. Optimized link State Routing protocol (OLSR). RFC3626, IETF Networking Group.
[22]
Aleksandr
Huhtonen.2004.
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1.9443&rep=rep1&type=pdf,
Telecommunication software and multimedia laboratory.
[23] Valentina Timcenko, Mirjana Stojanovic, Slavica Bostjancic Rakas . 2009 .MANET
Routing
Protocols vs. Mobility Models: Performance Analysis and Comparison. Proceedings of the
9th WSEAS International Conference on Applied Informatics and Communications (AIC
'09).
[24] BonnMotion: A mobility scenario generation and analysis tool. 2014. Available at
http://sys.cs.uos.de/bonnmotion/
[25] NS -2, the ns Manual. 2014. Available at http: //www. isi.edu/nsnam/ns/doc.
[26]
Francisco J. Ros. 2014. Software development available at
http://masimum.inf.um.es/fjrm/development/
[27] Robins A.D. 2010. “GAWK: an effective AWK programming”, 3rd ed.
[28]
MATLAB: The language
http://www.mathworks.com/
of
Technical
Computing.
[29]
S.Corson and J.Macker. 1999. Routing Protocol Performance Issues and Evaluation
considerations. RFC2501, IETF Network Working Group.
[30] The NS-3 reference manual. 2014. Available at http://www.nsnam.org/
2014.Available
at
AUTHORS
Mohamed elboukhari received the DESA (diploma of high study) degree in numerical analysis,
computer science and treatment of signal in 2005 from the University of Science, Oujda,
Morocco. He is currently an assistant professor, department of Applied Engineering, ESTO,
university Mohamed First, Oujda, Morocco. His research interests include cryptography, quantum
cryptography and wireless network security, Mobile Ad Hoc Networks (MANETS).
Mostafa azizi received the diploma of engineer in automatic and computer industry in 1993 from
school Mohammadia of engineers, Rabat, Morocco and he received the Ph. D in computer
science in 2001 from the university Montreal, Canada. He is currently professor at university of
Mohamed first, Oujda, Morocco. His main interests include aspect of real time, embedded
system, security and communication and management of the computer systems in relation with
process industry.
Abdelmalek azizi received the Ph. D in theory of numbers in 1993 from university Laval,
Canada. He is professor at department of mathematics in university Mohamed First, Oujda,
Morocco. He is interesting in history of mathematics in Morocco and in the application of the
theory of number in cryptography.
Citation Count –01
INTELLIGENT AGENT FOR PUBLICATION AND
SUBSCRIPTION PATTERN ANALYSIS OF NEWS
WEBSITES
W.D.R Wijedasa and Chathura De Silva
Department of Computer Science Engineering, Faculty of Engineering University of
Moratuwa, Sri Lanka
ABSTRACT
The rapid growth of Internet has revolutionized online news reporting. Many users tend to use
online news websites to obtain news information. When considering Sri Lanka, there are
numerous news websites, which are subscribed on a daily basis. With the rise in this number of
news websites, the Sri Lankan authorities of media face the issue of lacking a proper
methodology or a tool which is capable of tracking and regulating publications made by different
disseminators of news. This paper proposes a News Agent toolbox which periodically extracts
news articles and associated comments with the aid of a concept called Mapping Rules; to
classify them into Personalized Categories defined in terms of keywords based Category Profiles.
The proposed tool also analyzes comments made by the readers with the aid of simple statistical
techniques to discover the most popular news articles and fluctuations in popularity of news
stories.
KEYWORDS
News Articles; Mapping Rules; Personalized Classification; Category Profiles
For More Details :- http://airccse.org/journal/ijcax/papers/2115ijcax01.pdf
Volume Link :- http://airccse.org/journal/ijcax/vol2.html
REFERENCES
[1]
I.
Flaounas,
‘http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.301.6100&rep=rep1&type=pdf’,
University of Bristol, 2011.
[2]
A. Sun, E.-P. Lim, and W.-K. Ng, ‘Personalized classification for keyword-based category
profiles’, in Research and Advanced Technology for Digital Libraries, Springer, 2002, pp.
61–74.
[3]
I. Flaounas, O. Ali, M. Turchi, T. Snowsill, F. Nicart, T. De Bie, and Cristianini,
‘https://dl.acm.org/doi/10.1145/1989323.1989474’, in Proc. of the 2011 ACM SIGMOD
international conference on Management of data, 2011, pp. 1275–1278.
[4] L. Lloyd, D. Kechagias, and S. Skiena, ‘Lydia: A system for large-scale news analysis’, in
String Processing and Information Retrieval, 2005, pp. 161–166.
[5] R. J. Kuhns, ‘ https://www.aclweb.org/anthology/C88-1072/’, in Proceedings of the 12th
conference on Computational linguistics-Volume 1, 1988, pp. 351–355.
[6] K. R. McKeown, R. Barzilay, D. Evans, V. Hatzivassiloglou, J. L. Klavans, A. Nenkova, C.
Sable, B. Schiffman, S. Sigelman, and M. Summarization, Tracking and Summarizing News
on a Daily Basis with Columbia’s Newsblaster, Proceedings of Human Language
Technology Conference. San Diego,USA, 2002.
[7]
Geng,
Q.
Gao,
and
J.
Pan,
‘https://books.google.co.in/books?id=Af66BQAAQBAJ&pg=PA135&lpg=PA135&dq=Gen
g,+Q.+Gao,+and+J.+Pan,+%E2%80%98Extracting+content+for+news+web+pages+based+
on+DOM%E2%80%99&source=bl&ots=UoRaMjkIgq&sig=ACfU3U2sxDbZSKNc6j44NN
TtTaX9NnzK8g&hl=en&sa=X&ved=2ahUKEwit19iy75ToAhWNyzgGHdjfCsEQ6AEwA
XoECAwQAQ#v=onepage&q=Geng%2C%20Q.%20Gao%2C%20and%20J.%20Pan%2C
%20%E2%80%98Extracting%20content%20for%20news%20web%20pages%20based%20
on%20DOM%E2%80%99&f=false’, IJCSNS
International Journal of Computer Science
and Network Security, vol. 7, no. 2, pp. 124–129,2007.
[8]
C.-H. C. A. S. Ee and P. Lim, ‘Automated online news classification with personalization’,
in 4th international conference on Asian digital libraries, 2001.
[9] “Parsing HTML Documents with the Html Agility Pack” [Online]. Available:
http://www.4guysfromrolla.com/articles/011211-1.aspx. [Accessed: 29-Apr-2013].
[10] Kohlschütter, P. Fankhauser, and W. Nejdl, ‘Boilerplate detection using shallow text
features’, in Proceedings of the third ACM international conference on Web search and data
mining, New York, NY, USA, 2010, pp. 441–450.
[11] ‘Get Social Share Counts - A Complete Guide’, CUBE3X. [Online]. Available:
http://cube3x.com/2013/01/get-social-share-counts-a-complete-guide/
[Accessed: 10-Oct-2013].
[12]
[13]
‘Porter
Stemming
Algorithm’.
[Online].
Available:
/martin/PorterStemmer/index.html. [Accessed: 03-Jun-2013].
‘IBM
SPSS
Statistics’,
29-Oct-2013.
http://
[Online].
tartarus.org
Available:
http://www01.ibm.com/software/analytics/spss/products/statistics/
[Accessed: 14-Oct-2013].
AUTHORS
W.D.R Wijedasa received her M.Sc. Degree in Computer Science Engineering fro m
University of Moratuwa Sri Lanka in 2014. She has been working as a Software
Engineer at IFS RnD Pvt Limited from 2010. Her research interests are Data mining,
Artificial Intelligence and Agent Technologies.
Dr. Chathura De Silva received his MEng. Degree and Ph.D. Degree from National
University of Singapore. He has been working as a Senior Lecturer at Department of
Computer Science E ngineering University of Moratuwa Sri Lanka. He is the current
Head of Department of Computer Science Engineering University of Moratuwa.