International Journal of Advanced Computer Research最新文献

筛选
英文 中文
KMK based hybrid approach for the performance estimation in case of diabetes data 基于KMK的糖尿病数据性能估计混合方法
International Journal of Advanced Computer Research Pub Date : 2021-11-30 DOI: 10.19101/ijacr.2021.1152043
Yasir Minhaj Dubey Animesh Kumar Khan
{"title":"KMK based hybrid approach for the performance estimation in case of diabetes data","authors":"Yasir Minhaj Dubey Animesh Kumar Khan","doi":"10.19101/ijacr.2021.1152043","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152043","url":null,"abstract":"In this paper k-means clustering algorithm has been used with k-points (KMK) selection. It has been applied on the PIMA Indian diabetes dataset. It has been used for distance estimation, centroid selection, effect of data size variations and for the analysis of the complete record. The cluster section has been found to be improved based on k-point selection. It has been used for the assignment of initial centroid. The results indicate that the KMK algorithm is capable in the improvement of centroid selection and distance measures in the assignments of data points. It is due to the better centroid selection mechanism by k-points selection based on the weight measures from the selected dataset. So, the obtained clusters are better in comparison to k-means.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121973443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of mathematics performance using educational data mining techniques 利用教育数据挖掘技术预测数学成绩
International Journal of Advanced Computer Research Pub Date : 2021-09-30 DOI: 10.19101/ijacr.2021.1152024
{"title":"Prediction of mathematics performance using educational data mining techniques","authors":"","doi":"10.19101/ijacr.2021.1152024","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152024","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130930314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classifying bug reports to bugs and other requests: an approach using topic modelling and fuzzy set theory 对bug报告和其他请求进行分类:一种使用主题建模和模糊集理论的方法
International Journal of Advanced Computer Research Pub Date : 2021-09-30 DOI: 10.19101/ijacr.2021.1152031
{"title":"Classifying bug reports to bugs and other requests: an approach using topic modelling and fuzzy set theory","authors":"","doi":"10.19101/ijacr.2021.1152031","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152031","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129671555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GU_DB : a database management system prototype for academia GU_DB:学术界的数据库管理系统原型
International Journal of Advanced Computer Research Pub Date : 2021-07-30 DOI: 10.19101/ijacr.2021.1152017
{"title":"GU_DB : a database management system prototype for academia","authors":"","doi":"10.19101/ijacr.2021.1152017","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152017","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"184 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123078944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solar power based automatic irrigation system 太阳能自动灌溉系统
International Journal of Advanced Computer Research Pub Date : 2021-05-30 DOI: 10.19101/ijacr.2021.1152013
{"title":"Solar power based automatic irrigation system","authors":"","doi":"10.19101/ijacr.2021.1152013","DOIUrl":"https://doi.org/10.19101/ijacr.2021.1152013","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114979684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blended learning approach for teaching python programming language: towards a post pandemic pedagogy python编程语言教学的混合学习方法:面向大流行后的教学法
International Journal of Advanced Computer Research Pub Date : 2021-01-31 DOI: 10.19101/IJACR.2020.1048120
M. A. Tadlaoui, Mohamed Chekou
{"title":"A blended learning approach for teaching python programming language: towards a post pandemic pedagogy","authors":"M. A. Tadlaoui, Mohamed Chekou","doi":"10.19101/IJACR.2020.1048120","DOIUrl":"https://doi.org/10.19101/IJACR.2020.1048120","url":null,"abstract":"Blended learning has generated remarkable interest in educational research This interest is being concentrated increasingly throughout the Covid-19’s duration Indeed, this teaching method combines both, presential and distance learning This teaching method’s philosophy is quite simple it aims to exploit the qualities of the mentioned two teaching modes However, the usage of Blended learning isn't sufficiently advanced as it causes genuine issues in the educational scripting of the instructive substance In this research, it is an aim to concretize this philosophy in a fairly complicated course, as well as an advanced level: Python programming language for students of preparatory classes To achieve this goal, a developed a personalized course model using Bayesian networks capable of helping educators in their teaching practices in addition to their students’ cognitive processes is presented, as well as actualizing this model in a course creation application Moreover, the Python programming was tested with various understudies with various degree of aptitude in the subject educated The results presented in this paper, shows the effectivity of this approach in teaching complex course especially during the COVID19 period, based on both the satisfaction rate and the success rate metrics that was chosen to asset the following approach","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133392307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Automatic waste segregator and monitoring system 自动垃圾分类和监控系统
International Journal of Advanced Computer Research Pub Date : 2020-07-31 DOI: 10.19101/ijacr.2020.1048053
R. Mapari, S. Narkhede, A. Navale, Jiyot Babrah
{"title":"Automatic waste segregator and monitoring system","authors":"R. Mapari, S. Narkhede, A. Navale, Jiyot Babrah","doi":"10.19101/ijacr.2020.1048053","DOIUrl":"https://doi.org/10.19101/ijacr.2020.1048053","url":null,"abstract":"Waste management is a collective process of collection, segregation, transport and disposal of waste to the appropriate locations. The segregation of different types of wastes is the most important issue faced while designing a waste segregation and monitoring system. As a result of which, the waste is still being segregated manually, thus producing a harmful effect on the segregator itself. This project reports an automatic segregator and monitoring system. Plastic recycling is a solution to this. Plastic recycling is the process of regaining plastic discarded as waste and reprocessing it in order to reuse it. The segregation section consists of ATmega328 as its main controller. It includes an inductive proximity sensor, capacitive proximity sensor and a moisture sensor in order to sense the type of waste. Automatic waste segregator classifies the waste as plastic, dry, wet and metallic. The waste collection process is monitored by the monitoring section. The automatic waste segregator and monitoring system is a cost-effective management system for segregation of plastic, dry, wet and metallic waste without the continuous attention of a person. A simple controller with inductive, capacitive proximity sensors and moisture sensor are used to make the system low cost and simple. The achieved results are as per the expected objectives, which provide proper segregation of waste, without manual intervention.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134589252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
IoT based rear-end collision avoidance system in highways 基于物联网的高速公路追尾避碰系统
International Journal of Advanced Computer Research Pub Date : 2019-10-25 DOI: 10.19101/ijacr.2019.940067
Sandra Johnson, A MohammedFayaz, S. Harikrishnan
{"title":"IoT based rear-end collision avoidance system in highways","authors":"Sandra Johnson, A MohammedFayaz, S. Harikrishnan","doi":"10.19101/ijacr.2019.940067","DOIUrl":"https://doi.org/10.19101/ijacr.2019.940067","url":null,"abstract":"Rear-end vehicular collision due to illegally parked and unusually slow-moving vehicles on National Highways can be avoided if drivers can get alert messages and full information needed to make an objective judgment about what is ahead. A lot of work has been done on collision avoidance strategies using various networking techniques. IoT based solutions area recent research trend. The objective of this project is to develop an intelligent system that will identify illegally parked and the slow-moving vehicles on highways using the message queuing telemetry transport (MQTT) protocol that enables vehicles to exchange their real-time information, such as velocity and position, with the neighbouring vehicles through brokers (also called as servers). MQTT being a lightweight IoT protocol for machine to machine communication is useful for an effective data transfer between vehicles. An optimal algorithm has been developed to accurately identify every vehicle in the vicinity of the region of interest and to calculate both speed and position of the vehicle and transfer data from one vehicle to another vehicle. The new algorithm is implemented in a Raspberry Pi using a global positioning system (GPS) module. The results show that the collision avoidance system that uses MQTT protocol can accurately generate alert messages 90% of the time when there are only ten or less than ten vehicles which is also the case in most highways. Also, the system is easy to implement without requiring extra equipment. Hence the new technique can be used in various types of vehicles, especially cargo trucks and buses that use the highways frequently.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128390992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE 概率学习者模型在LMS-LD课程创建应用程序COPROLINE中的实现
International Journal of Advanced Computer Research Pub Date : 2019-10-25 DOI: 10.19101/ijacr.2019.940039
M. A. Tadlaoui, F. E. Moudden, Mohamed Khaldi
{"title":"The implementation of a probabilistic learner model in LMS-LD course creation application COPROLINE","authors":"M. A. Tadlaoui, F. E. Moudden, Mohamed Khaldi","doi":"10.19101/ijacr.2019.940039","DOIUrl":"https://doi.org/10.19101/ijacr.2019.940039","url":null,"abstract":"","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127684539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A survey of IoT security threats and defenses 物联网安全威胁和防御调查
International Journal of Advanced Computer Research Pub Date : 2019-10-25 DOI: 10.19101/ijacr.2019.940088
Hassan I. Ahmed, Abdurrahman A. Nasr, S. Abdel-Mageid, H. Aslan
{"title":"A survey of IoT security threats and defenses","authors":"Hassan I. Ahmed, Abdurrahman A. Nasr, S. Abdel-Mageid, H. Aslan","doi":"10.19101/ijacr.2019.940088","DOIUrl":"https://doi.org/10.19101/ijacr.2019.940088","url":null,"abstract":"Internet of Things (IoT) plays a well-known role in the interconnection of the physical and virtual objects for the purpose of exchanging information. IoT environment can connect billions of devices or objects, each one has an ID for identification proof. The IoT system is considered one of the most important technologies in recent decades, and the focus of attention in many fields including healthcare, industry, agriculture, military applications, and space science. Thus, it is more attractive for cyber-attacks. The IoT requires multi-dimensional security solutions such as confidentiality, integrity, and authentication services. In this paper, we address different security challenges, threats, and defenses in the layers of IoT systems. It is known that the IoT system architecture consists of three layers: physical/sensor layer, network layer, and application layer. To be comprehensive and to facilitate comparative methods, the security problems of each layer separately and the suggested solutions have been analyzed. Moreover, the challenges of the IoT especially big data and also the evaluation strategies of the IoT system and their effects on the security operations have been evaluated.","PeriodicalId":273530,"journal":{"name":"International Journal of Advanced Computer Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129868176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信